Hay
Date
July 20, 2025, 8:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.713081] ==================================================================
[   17.713778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   17.713902] 
[   17.714043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.715205]  __kasan_check_write+0x20/0x30
[   17.716248]  kasan_save_stack+0x3c/0x68
[   17.717499]  kthread+0x328/0x630
[   17.718372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.718943] page_type: f5(slab)
[   17.719755] 
[   17.719817] Memory state around the buggy address:
[   17.720041]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.720228]                                      ^
[   17.722405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   17.722529] 
[   17.723382] Hardware name: linux,dummy-virt (DT)
[   17.724377]  kasan_atomics+0x198/0x2e0
[   17.725130]  ret_from_fork+0x10/0x20
[   17.725645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.725985] The buggy address is located 0 bytes to the right of
[   17.725985]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.726415] page dumped because: kasan: bad access detected
[   17.726505]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.726693]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.727992] ==================================================================
[   17.648754] ==================================================================
[   17.649680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   17.649953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.650210]  print_report+0x118/0x5d0
[   17.650952]  kasan_save_stack+0x3c/0x68
[   17.651267]  kasan_atomics+0xb8/0x2e0
[   17.652153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.652416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.652515] page_type: f5(slab)
[   17.652561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.652621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.652700] 
[   17.652858]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.653348] ==================================================================
[   17.884417] ==================================================================
[   17.884470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   17.884521] Read of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.884778] 
[   17.884822] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.885440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.885536] Hardware name: linux,dummy-virt (DT)
[   17.885605] Call trace:
[   17.885718]  show_stack+0x20/0x38 (C)
[   17.885776]  dump_stack_lvl+0x8c/0xd0
[   17.885853]  print_report+0x118/0x5d0
[   17.885901]  kasan_report+0xdc/0x128
[   17.886102]  __asan_report_load4_noabort+0x20/0x30
[   17.886271]  kasan_atomics_helper+0x3dd8/0x4858
[   17.886569]  kasan_atomics+0x198/0x2e0
[   17.886754]  kunit_try_run_case+0x170/0x3f0
[   17.886850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.887015]  kthread+0x328/0x630
[   17.887168]  ret_from_fork+0x10/0x20
[   17.887245] 
[   17.887266] Allocated by task 266:
[   17.887611]  kasan_save_stack+0x3c/0x68
[   17.887686]  kasan_save_track+0x20/0x40
[   17.887773]  kasan_save_alloc_info+0x40/0x58
[   17.888069]  __kasan_kmalloc+0xd4/0xd8
[   17.888145]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.888212]  kasan_atomics+0xb8/0x2e0
[   17.888250]  kunit_try_run_case+0x170/0x3f0
[   17.888529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.888756]  kthread+0x328/0x630
[   17.888961]  ret_from_fork+0x10/0x20
[   17.889059] 
[   17.889159] The buggy address belongs to the object at fff00000c767ae00
[   17.889159]  which belongs to the cache kmalloc-64 of size 64
[   17.889237] The buggy address is located 0 bytes to the right of
[   17.889237]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.889496] 
[   17.889526] The buggy address belongs to the physical page:
[   17.889562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.889627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.889678] page_type: f5(slab)
[   17.889718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.889808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.889855] page dumped because: kasan: bad access detected
[   17.889889] 
[   17.889910] Memory state around the buggy address:
[   17.889956]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.890012]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.890068] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.890124]                                      ^
[   17.890160]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.890231]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.890272] ==================================================================
[   18.170388] ==================================================================
[   18.170509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.170916] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.170984] 
[   18.171015] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.171098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.171128] Hardware name: linux,dummy-virt (DT)
[   18.171161] Call trace:
[   18.171198]  show_stack+0x20/0x38 (C)
[   18.171250]  dump_stack_lvl+0x8c/0xd0
[   18.171298]  print_report+0x118/0x5d0
[   18.171348]  kasan_report+0xdc/0x128
[   18.172523]  __asan_report_load8_noabort+0x20/0x30
[   18.173071]  kasan_atomics_helper+0x3db0/0x4858
[   18.173130]  kasan_atomics+0x198/0x2e0
[   18.173219]  kunit_try_run_case+0x170/0x3f0
[   18.173521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.173581]  kthread+0x328/0x630
[   18.173932]  ret_from_fork+0x10/0x20
[   18.174411] 
[   18.174722] Allocated by task 266:
[   18.175022]  kasan_save_stack+0x3c/0x68
[   18.175567]  kasan_save_track+0x20/0x40
[   18.175626]  kasan_save_alloc_info+0x40/0x58
[   18.175754]  __kasan_kmalloc+0xd4/0xd8
[   18.175979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.176217]  kasan_atomics+0xb8/0x2e0
[   18.176273]  kunit_try_run_case+0x170/0x3f0
[   18.176916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.176972]  kthread+0x328/0x630
[   18.177412]  ret_from_fork+0x10/0x20
[   18.177455] 
[   18.177478] The buggy address belongs to the object at fff00000c767ae00
[   18.177478]  which belongs to the cache kmalloc-64 of size 64
[   18.177754] The buggy address is located 0 bytes to the right of
[   18.177754]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.177960] 
[   18.177987] The buggy address belongs to the physical page:
[   18.178455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.178520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.178570] page_type: f5(slab)
[   18.178611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.178666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.178709] page dumped because: kasan: bad access detected
[   18.178744] 
[   18.178891] Memory state around the buggy address:
[   18.178931]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.179491]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.179639] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.179685]                                      ^
[   18.179925]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.180090]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.180285] ==================================================================
[   18.049897] ==================================================================
[   18.050147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.050422] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.050808] 
[   18.051153] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.051391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.051421] Hardware name: linux,dummy-virt (DT)
[   18.051454] Call trace:
[   18.051480]  show_stack+0x20/0x38 (C)
[   18.052638]  dump_stack_lvl+0x8c/0xd0
[   18.052725]  print_report+0x118/0x5d0
[   18.052777]  kasan_report+0xdc/0x128
[   18.053209]  kasan_check_range+0x100/0x1a8
[   18.053563]  __kasan_check_write+0x20/0x30
[   18.053625]  kasan_atomics_helper+0x1190/0x4858
[   18.053796]  kasan_atomics+0x198/0x2e0
[   18.054077]  kunit_try_run_case+0x170/0x3f0
[   18.054159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.054549]  kthread+0x328/0x630
[   18.054927]  ret_from_fork+0x10/0x20
[   18.054982] 
[   18.055448] Allocated by task 266:
[   18.055647]  kasan_save_stack+0x3c/0x68
[   18.055696]  kasan_save_track+0x20/0x40
[   18.056165]  kasan_save_alloc_info+0x40/0x58
[   18.056573]  __kasan_kmalloc+0xd4/0xd8
[   18.056723]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.056963]  kasan_atomics+0xb8/0x2e0
[   18.057008]  kunit_try_run_case+0x170/0x3f0
[   18.057064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.057585]  kthread+0x328/0x630
[   18.057642]  ret_from_fork+0x10/0x20
[   18.057681] 
[   18.057706] The buggy address belongs to the object at fff00000c767ae00
[   18.057706]  which belongs to the cache kmalloc-64 of size 64
[   18.057768] The buggy address is located 0 bytes to the right of
[   18.057768]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.057987] 
[   18.058116] The buggy address belongs to the physical page:
[   18.058287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.058435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.059182] page_type: f5(slab)
[   18.059401] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.059457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.059500] page dumped because: kasan: bad access detected
[   18.059990] 
[   18.060018] Memory state around the buggy address:
[   18.060089]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.060279]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.060327] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.060499]                                      ^
[   18.060649]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.060900]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.060997] ==================================================================
[   18.236039] ==================================================================
[   18.236148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.236213] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.236264] 
[   18.236294] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.236424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.236455] Hardware name: linux,dummy-virt (DT)
[   18.236489] Call trace:
[   18.236513]  show_stack+0x20/0x38 (C)
[   18.236562]  dump_stack_lvl+0x8c/0xd0
[   18.236794]  print_report+0x118/0x5d0
[   18.236858]  kasan_report+0xdc/0x128
[   18.236950]  kasan_check_range+0x100/0x1a8
[   18.237042]  __kasan_check_write+0x20/0x30
[   18.237321]  kasan_atomics_helper+0x17ec/0x4858
[   18.237585]  kasan_atomics+0x198/0x2e0
[   18.237666]  kunit_try_run_case+0x170/0x3f0
[   18.237754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.237850]  kthread+0x328/0x630
[   18.237940]  ret_from_fork+0x10/0x20
[   18.238011] 
[   18.238042] Allocated by task 266:
[   18.238074]  kasan_save_stack+0x3c/0x68
[   18.238116]  kasan_save_track+0x20/0x40
[   18.238157]  kasan_save_alloc_info+0x40/0x58
[   18.238452]  __kasan_kmalloc+0xd4/0xd8
[   18.238575]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.238656]  kasan_atomics+0xb8/0x2e0
[   18.238743]  kunit_try_run_case+0x170/0x3f0
[   18.238788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.238834]  kthread+0x328/0x630
[   18.238869]  ret_from_fork+0x10/0x20
[   18.238909] 
[   18.238950] The buggy address belongs to the object at fff00000c767ae00
[   18.238950]  which belongs to the cache kmalloc-64 of size 64
[   18.239018] The buggy address is located 0 bytes to the right of
[   18.239018]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.239094] 
[   18.239123] The buggy address belongs to the physical page:
[   18.239166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.239229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.239289] page_type: f5(slab)
[   18.239333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.239392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.239444] page dumped because: kasan: bad access detected
[   18.239480] 
[   18.239503] Memory state around the buggy address:
[   18.239551]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.239597]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.239651] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.239692]                                      ^
[   18.239727]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.239779]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.239828] ==================================================================
[   18.228989] ==================================================================
[   18.229058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.229222] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.229322] 
[   18.229445] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.229693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.229762] Hardware name: linux,dummy-virt (DT)
[   18.229863] Call trace:
[   18.229913]  show_stack+0x20/0x38 (C)
[   18.230035]  dump_stack_lvl+0x8c/0xd0
[   18.230130]  print_report+0x118/0x5d0
[   18.230514]  kasan_report+0xdc/0x128
[   18.230633]  __asan_report_load8_noabort+0x20/0x30
[   18.230758]  kasan_atomics_helper+0x3e20/0x4858
[   18.230854]  kasan_atomics+0x198/0x2e0
[   18.230963]  kunit_try_run_case+0x170/0x3f0
[   18.231067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.231165]  kthread+0x328/0x630
[   18.231239]  ret_from_fork+0x10/0x20
[   18.231552] 
[   18.231659] Allocated by task 266:
[   18.231737]  kasan_save_stack+0x3c/0x68
[   18.232070]  kasan_save_track+0x20/0x40
[   18.232211]  kasan_save_alloc_info+0x40/0x58
[   18.232288]  __kasan_kmalloc+0xd4/0xd8
[   18.232415]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.232503]  kasan_atomics+0xb8/0x2e0
[   18.232602]  kunit_try_run_case+0x170/0x3f0
[   18.232698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.232806]  kthread+0x328/0x630
[   18.232854]  ret_from_fork+0x10/0x20
[   18.232902] 
[   18.232927] The buggy address belongs to the object at fff00000c767ae00
[   18.232927]  which belongs to the cache kmalloc-64 of size 64
[   18.232988] The buggy address is located 0 bytes to the right of
[   18.232988]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.233199] 
[   18.233274] The buggy address belongs to the physical page:
[   18.233344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.233476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.233887] page_type: f5(slab)
[   18.233973] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.234055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.234148] page dumped because: kasan: bad access detected
[   18.234183] 
[   18.234238] Memory state around the buggy address:
[   18.234271]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.234318]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.234365] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.234407]                                      ^
[   18.234442]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.234644]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.234800] ==================================================================
[   18.190783] ==================================================================
[   18.190833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.191175] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.191404] 
[   18.191440] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.191521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.191550] Hardware name: linux,dummy-virt (DT)
[   18.192212] Call trace:
[   18.192255]  show_stack+0x20/0x38 (C)
[   18.192313]  dump_stack_lvl+0x8c/0xd0
[   18.192364]  print_report+0x118/0x5d0
[   18.192413]  kasan_report+0xdc/0x128
[   18.192682]  __asan_report_load8_noabort+0x20/0x30
[   18.192737]  kasan_atomics_helper+0x3df4/0x4858
[   18.192788]  kasan_atomics+0x198/0x2e0
[   18.193308]  kunit_try_run_case+0x170/0x3f0
[   18.193382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.193494]  kthread+0x328/0x630
[   18.193552]  ret_from_fork+0x10/0x20
[   18.193624] 
[   18.194010] Allocated by task 266:
[   18.194298]  kasan_save_stack+0x3c/0x68
[   18.194347]  kasan_save_track+0x20/0x40
[   18.194388]  kasan_save_alloc_info+0x40/0x58
[   18.194430]  __kasan_kmalloc+0xd4/0xd8
[   18.194471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.195222]  kasan_atomics+0xb8/0x2e0
[   18.195272]  kunit_try_run_case+0x170/0x3f0
[   18.195313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.195360]  kthread+0x328/0x630
[   18.195397]  ret_from_fork+0x10/0x20
[   18.195436] 
[   18.195550] The buggy address belongs to the object at fff00000c767ae00
[   18.195550]  which belongs to the cache kmalloc-64 of size 64
[   18.195663] The buggy address is located 0 bytes to the right of
[   18.195663]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.196159] 
[   18.196198] The buggy address belongs to the physical page:
[   18.196233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.196290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.196340] page_type: f5(slab)
[   18.196381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.196434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.197144] page dumped because: kasan: bad access detected
[   18.197180] 
[   18.197432] Memory state around the buggy address:
[   18.197781]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.197953]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.198070] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.198112]                                      ^
[   18.198372]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.198425]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.198467] ==================================================================
[   18.073582] ==================================================================
[   18.073635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.073686] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.074199] 
[   18.074249] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.074733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.074763] Hardware name: linux,dummy-virt (DT)
[   18.074997] Call trace:
[   18.075099]  show_stack+0x20/0x38 (C)
[   18.075378]  dump_stack_lvl+0x8c/0xd0
[   18.075472]  print_report+0x118/0x5d0
[   18.075787]  kasan_report+0xdc/0x128
[   18.075844]  kasan_check_range+0x100/0x1a8
[   18.075892]  __kasan_check_write+0x20/0x30
[   18.075939]  kasan_atomics_helper+0x126c/0x4858
[   18.075989]  kasan_atomics+0x198/0x2e0
[   18.076036]  kunit_try_run_case+0x170/0x3f0
[   18.076085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.077223]  kthread+0x328/0x630
[   18.077305]  ret_from_fork+0x10/0x20
[   18.077356] 
[   18.077387] Allocated by task 266:
[   18.077417]  kasan_save_stack+0x3c/0x68
[   18.077489]  kasan_save_track+0x20/0x40
[   18.077639]  kasan_save_alloc_info+0x40/0x58
[   18.077790]  __kasan_kmalloc+0xd4/0xd8
[   18.078030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.078170]  kasan_atomics+0xb8/0x2e0
[   18.078235]  kunit_try_run_case+0x170/0x3f0
[   18.078278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.078554]  kthread+0x328/0x630
[   18.078636]  ret_from_fork+0x10/0x20
[   18.078890] 
[   18.079060] The buggy address belongs to the object at fff00000c767ae00
[   18.079060]  which belongs to the cache kmalloc-64 of size 64
[   18.079425] The buggy address is located 0 bytes to the right of
[   18.079425]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.079599] 
[   18.079663] The buggy address belongs to the physical page:
[   18.079726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.079781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.079830] page_type: f5(slab)
[   18.080142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.080220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.080742] page dumped because: kasan: bad access detected
[   18.080829] 
[   18.080852] Memory state around the buggy address:
[   18.081169]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.081662]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.081715] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.081759]                                      ^
[   18.081797]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.082480]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.082686] ==================================================================
[   17.796725] ==================================================================
[   17.796826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   17.797233] Write of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.797336] 
[   17.797509] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.797936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.799966]  kunit_try_run_case+0x170/0x3f0
[   17.802222] 
[   17.802858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.804344] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.807340] Call trace:
[   17.807871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.807927]  kthread+0x328/0x630
[   17.807980]  ret_from_fork+0x10/0x20
[   17.808030] 
[   17.808051] Allocated by task 266:
[   17.808082]  kasan_save_stack+0x3c/0x68
[   17.808125]  kasan_save_track+0x20/0x40
[   17.808166]  kasan_save_alloc_info+0x40/0x58
[   17.808712]  __kasan_kmalloc+0xd4/0xd8
[   17.808947]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.809078]  kasan_atomics+0xb8/0x2e0
[   17.809137]  kunit_try_run_case+0x170/0x3f0
[   17.809177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.809238]  kthread+0x328/0x630
[   17.809281]  ret_from_fork+0x10/0x20
[   17.809631] 
[   17.809748] The buggy address belongs to the object at fff00000c767ae00
[   17.809748]  which belongs to the cache kmalloc-64 of size 64
[   17.809862] The buggy address is located 0 bytes to the right of
[   17.809862]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.809957] 
[   17.810348] The buggy address belongs to the physical page:
[   17.810408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.810770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.810890] page_type: f5(slab)
[   17.810989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.811061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.811422] page dumped because: kasan: bad access detected
[   17.811497] 
[   17.811541] Memory state around the buggy address:
[   17.811647]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.811714]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.811779] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.811905]                                      ^
[   17.811945]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.814538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.816328] 
[   17.816352] Allocated by task 266:
[   17.816383]  kasan_save_stack+0x3c/0x68
[   17.816753]  kasan_save_track+0x20/0x40
[   17.816909]  kasan_save_alloc_info+0x40/0x58
[   17.817025]  __kasan_kmalloc+0xd4/0xd8
[   17.817184]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.817267]  kasan_atomics+0xb8/0x2e0
[   17.817325]  kunit_try_run_case+0x170/0x3f0
[   17.817366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.817759]  kthread+0x328/0x630
[   17.818456]  ret_from_fork+0x10/0x20
[   17.819029] 
[   17.819206] The buggy address belongs to the object at fff00000c767ae00
[   17.819206]  which belongs to the cache kmalloc-64 of size 64
[   17.819438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.819657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.819856]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.820102] ==================================================================
[   17.912051] ==================================================================
[   17.912106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   17.912158] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.912407] 
[   17.912473] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.912568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.912607] Hardware name: linux,dummy-virt (DT)
[   17.912639] Call trace:
[   17.912674]  show_stack+0x20/0x38 (C)
[   17.912729]  dump_stack_lvl+0x8c/0xd0
[   17.912777]  print_report+0x118/0x5d0
[   17.912847]  kasan_report+0xdc/0x128
[   17.913516]  kasan_check_range+0x100/0x1a8
[   17.913667]  __kasan_check_read+0x20/0x30
[   17.914062]  kasan_atomics_helper+0xdd4/0x4858
[   17.914172]  kasan_atomics+0x198/0x2e0
[   17.914303]  kunit_try_run_case+0x170/0x3f0
[   17.914463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.914551]  kthread+0x328/0x630
[   17.914594]  ret_from_fork+0x10/0x20
[   17.914813] 
[   17.914876] Allocated by task 266:
[   17.914961]  kasan_save_stack+0x3c/0x68
[   17.915622]  kasan_save_track+0x20/0x40
[   17.916026]  kasan_save_alloc_info+0x40/0x58
[   17.916162]  __kasan_kmalloc+0xd4/0xd8
[   17.916228]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.916271]  kasan_atomics+0xb8/0x2e0
[   17.916539]  kunit_try_run_case+0x170/0x3f0
[   17.916758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.917146]  kthread+0x328/0x630
[   17.917302]  ret_from_fork+0x10/0x20
[   17.917768] 
[   17.917824] The buggy address belongs to the object at fff00000c767ae00
[   17.917824]  which belongs to the cache kmalloc-64 of size 64
[   17.918001] The buggy address is located 0 bytes to the right of
[   17.918001]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.918136] 
[   17.918202] The buggy address belongs to the physical page:
[   17.918325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.918385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.918828] page_type: f5(slab)
[   17.919229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.919326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.919389] page dumped because: kasan: bad access detected
[   17.919993] 
[   17.920024] Memory state around the buggy address:
[   17.920318]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.920486]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.920733] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.920934]                                      ^
[   17.920996]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.921129]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.921183] ==================================================================
[   17.892568] ==================================================================
[   17.892723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   17.892799] Write of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.892853] 
[   17.892994] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.893148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.893244] Hardware name: linux,dummy-virt (DT)
[   17.893302] Call trace:
[   17.893328]  show_stack+0x20/0x38 (C)
[   17.893637]  dump_stack_lvl+0x8c/0xd0
[   17.893785]  print_report+0x118/0x5d0
[   17.894213]  kasan_report+0xdc/0x128
[   17.894308]  kasan_check_range+0x100/0x1a8
[   17.894432]  __kasan_check_write+0x20/0x30
[   17.894549]  kasan_atomics_helper+0xd3c/0x4858
[   17.894692]  kasan_atomics+0x198/0x2e0
[   17.894742]  kunit_try_run_case+0x170/0x3f0
[   17.895076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.895332]  kthread+0x328/0x630
[   17.895673]  ret_from_fork+0x10/0x20
[   17.895842] 
[   17.895913] Allocated by task 266:
[   17.895980]  kasan_save_stack+0x3c/0x68
[   17.896205]  kasan_save_track+0x20/0x40
[   17.896402]  kasan_save_alloc_info+0x40/0x58
[   17.896664]  __kasan_kmalloc+0xd4/0xd8
[   17.896787]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.896843]  kasan_atomics+0xb8/0x2e0
[   17.897040]  kunit_try_run_case+0x170/0x3f0
[   17.897572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.897660]  kthread+0x328/0x630
[   17.897709]  ret_from_fork+0x10/0x20
[   17.897750] 
[   17.897773] The buggy address belongs to the object at fff00000c767ae00
[   17.897773]  which belongs to the cache kmalloc-64 of size 64
[   17.897835] The buggy address is located 0 bytes to the right of
[   17.897835]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.898207] 
[   17.898716] The buggy address belongs to the physical page:
[   17.899010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.899149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.899228] page_type: f5(slab)
[   17.899289] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.899351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.899396] page dumped because: kasan: bad access detected
[   17.899431] 
[   17.899462] Memory state around the buggy address:
[   17.899510]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.899572]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.899618] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.899680]                                      ^
[   17.899716]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.899781]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.899831] ==================================================================
[   18.218148] ==================================================================
[   18.218290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.218513] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.218572] 
[   18.218605] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.218688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.218718] Hardware name: linux,dummy-virt (DT)
[   18.218751] Call trace:
[   18.218776]  show_stack+0x20/0x38 (C)
[   18.218826]  dump_stack_lvl+0x8c/0xd0
[   18.219609]  print_report+0x118/0x5d0
[   18.220021]  kasan_report+0xdc/0x128
[   18.220081]  __asan_report_load8_noabort+0x20/0x30
[   18.220137]  kasan_atomics_helper+0x3e10/0x4858
[   18.220199]  kasan_atomics+0x198/0x2e0
[   18.220738]  kunit_try_run_case+0x170/0x3f0
[   18.220816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.221313]  kthread+0x328/0x630
[   18.221394]  ret_from_fork+0x10/0x20
[   18.222304] 
[   18.222329] Allocated by task 266:
[   18.222370]  kasan_save_stack+0x3c/0x68
[   18.222414]  kasan_save_track+0x20/0x40
[   18.222464]  kasan_save_alloc_info+0x40/0x58
[   18.222507]  __kasan_kmalloc+0xd4/0xd8
[   18.222545]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.222587]  kasan_atomics+0xb8/0x2e0
[   18.222624]  kunit_try_run_case+0x170/0x3f0
[   18.222664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.222710]  kthread+0x328/0x630
[   18.222746]  ret_from_fork+0x10/0x20
[   18.222783] 
[   18.222804] The buggy address belongs to the object at fff00000c767ae00
[   18.222804]  which belongs to the cache kmalloc-64 of size 64
[   18.222864] The buggy address is located 0 bytes to the right of
[   18.222864]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.222931] 
[   18.222954] The buggy address belongs to the physical page:
[   18.222988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.223042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.223092] page_type: f5(slab)
[   18.223131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.223184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.223238] page dumped because: kasan: bad access detected
[   18.223272] 
[   18.223293] Memory state around the buggy address:
[   18.223327]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.223373]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.223418] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.223458]                                      ^
[   18.223495]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.223540]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.223578] ==================================================================
[   18.127704] ==================================================================
[   18.127760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.128290] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.128373] 
[   18.128407] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.128686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.128717] Hardware name: linux,dummy-virt (DT)
[   18.129239] Call trace:
[   18.129326]  show_stack+0x20/0x38 (C)
[   18.129382]  dump_stack_lvl+0x8c/0xd0
[   18.129596]  print_report+0x118/0x5d0
[   18.129674]  kasan_report+0xdc/0x128
[   18.129768]  kasan_check_range+0x100/0x1a8
[   18.130199]  __kasan_check_write+0x20/0x30
[   18.130262]  kasan_atomics_helper+0x147c/0x4858
[   18.130564]  kasan_atomics+0x198/0x2e0
[   18.130795]  kunit_try_run_case+0x170/0x3f0
[   18.131078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.131320]  kthread+0x328/0x630
[   18.131388]  ret_from_fork+0x10/0x20
[   18.131442] 
[   18.131464] Allocated by task 266:
[   18.131495]  kasan_save_stack+0x3c/0x68
[   18.131538]  kasan_save_track+0x20/0x40
[   18.131578]  kasan_save_alloc_info+0x40/0x58
[   18.131619]  __kasan_kmalloc+0xd4/0xd8
[   18.132327]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.132802]  kasan_atomics+0xb8/0x2e0
[   18.132914]  kunit_try_run_case+0x170/0x3f0
[   18.133148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.133471]  kthread+0x328/0x630
[   18.133678]  ret_from_fork+0x10/0x20
[   18.133846] 
[   18.134039] The buggy address belongs to the object at fff00000c767ae00
[   18.134039]  which belongs to the cache kmalloc-64 of size 64
[   18.134103] The buggy address is located 0 bytes to the right of
[   18.134103]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.134171] 
[   18.134204] The buggy address belongs to the physical page:
[   18.134757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.134841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.134924] page_type: f5(slab)
[   18.135031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.135086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.135410] page dumped because: kasan: bad access detected
[   18.135721] 
[   18.135746] Memory state around the buggy address:
[   18.135804]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.136135]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.136329] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.136559]                                      ^
[   18.136639]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.136828]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.136943] ==================================================================
[   18.115608] ==================================================================
[   18.115803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.115887] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.116148] 
[   18.116360] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.116790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.117217] Hardware name: linux,dummy-virt (DT)
[   18.117257] Call trace:
[   18.117431]  show_stack+0x20/0x38 (C)
[   18.117781]  dump_stack_lvl+0x8c/0xd0
[   18.117942]  print_report+0x118/0x5d0
[   18.117994]  kasan_report+0xdc/0x128
[   18.118539]  kasan_check_range+0x100/0x1a8
[   18.118752]  __kasan_check_write+0x20/0x30
[   18.119144]  kasan_atomics_helper+0x1414/0x4858
[   18.119800]  kasan_atomics+0x198/0x2e0
[   18.119890]  kunit_try_run_case+0x170/0x3f0
[   18.120230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.120598]  kthread+0x328/0x630
[   18.120977]  ret_from_fork+0x10/0x20
[   18.121049] 
[   18.121074] Allocated by task 266:
[   18.121104]  kasan_save_stack+0x3c/0x68
[   18.121155]  kasan_save_track+0x20/0x40
[   18.121352]  kasan_save_alloc_info+0x40/0x58
[   18.121417]  __kasan_kmalloc+0xd4/0xd8
[   18.121464]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.121850]  kasan_atomics+0xb8/0x2e0
[   18.121907]  kunit_try_run_case+0x170/0x3f0
[   18.122217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.122520]  kthread+0x328/0x630
[   18.122564]  ret_from_fork+0x10/0x20
[   18.122660] 
[   18.122900] The buggy address belongs to the object at fff00000c767ae00
[   18.122900]  which belongs to the cache kmalloc-64 of size 64
[   18.123403] The buggy address is located 0 bytes to the right of
[   18.123403]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.123531] 
[   18.123696] The buggy address belongs to the physical page:
[   18.123889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.124115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.124430] page_type: f5(slab)
[   18.124499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.124955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.125006] page dumped because: kasan: bad access detected
[   18.125041] 
[   18.125070] Memory state around the buggy address:
[   18.125107]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.125153]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.125208] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.125727]                                      ^
[   18.125999]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.126046]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.126118] ==================================================================
[   18.138184] ==================================================================
[   18.138254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.138305] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.138943] 
[   18.139008] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.139094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.139125] Hardware name: linux,dummy-virt (DT)
[   18.139159] Call trace:
[   18.139903]  show_stack+0x20/0x38 (C)
[   18.140284]  dump_stack_lvl+0x8c/0xd0
[   18.140356]  print_report+0x118/0x5d0
[   18.140419]  kasan_report+0xdc/0x128
[   18.140474]  kasan_check_range+0x100/0x1a8
[   18.140864]  __kasan_check_write+0x20/0x30
[   18.141200]  kasan_atomics_helper+0x14e4/0x4858
[   18.141256]  kasan_atomics+0x198/0x2e0
[   18.141598]  kunit_try_run_case+0x170/0x3f0
[   18.141665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.141763]  kthread+0x328/0x630
[   18.141808]  ret_from_fork+0x10/0x20
[   18.142339] 
[   18.142368] Allocated by task 266:
[   18.142404]  kasan_save_stack+0x3c/0x68
[   18.142451]  kasan_save_track+0x20/0x40
[   18.142916]  kasan_save_alloc_info+0x40/0x58
[   18.143082]  __kasan_kmalloc+0xd4/0xd8
[   18.143204]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.143883]  kasan_atomics+0xb8/0x2e0
[   18.143930]  kunit_try_run_case+0x170/0x3f0
[   18.143969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.144307]  kthread+0x328/0x630
[   18.144635]  ret_from_fork+0x10/0x20
[   18.144779] 
[   18.144802] The buggy address belongs to the object at fff00000c767ae00
[   18.144802]  which belongs to the cache kmalloc-64 of size 64
[   18.145277] The buggy address is located 0 bytes to the right of
[   18.145277]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.145385] 
[   18.145408] The buggy address belongs to the physical page:
[   18.145442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.145496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.145546] page_type: f5(slab)
[   18.146026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.146239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.146291] page dumped because: kasan: bad access detected
[   18.146615] 
[   18.146642] Memory state around the buggy address:
[   18.146833]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.147061]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.147110] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.147480]                                      ^
[   18.147772]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.148093]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.148624] ==================================================================
[   18.083596] ==================================================================
[   18.083985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.084278] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.084492] 
[   18.084644] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.084738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.085007] Hardware name: linux,dummy-virt (DT)
[   18.085371] Call trace:
[   18.085507]  show_stack+0x20/0x38 (C)
[   18.085566]  dump_stack_lvl+0x8c/0xd0
[   18.085616]  print_report+0x118/0x5d0
[   18.085808]  kasan_report+0xdc/0x128
[   18.086158]  kasan_check_range+0x100/0x1a8
[   18.086238]  __kasan_check_write+0x20/0x30
[   18.086475]  kasan_atomics_helper+0x12d8/0x4858
[   18.086932]  kasan_atomics+0x198/0x2e0
[   18.087239]  kunit_try_run_case+0x170/0x3f0
[   18.087296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.087352]  kthread+0x328/0x630
[   18.087395]  ret_from_fork+0x10/0x20
[   18.088152] 
[   18.088181] Allocated by task 266:
[   18.088224]  kasan_save_stack+0x3c/0x68
[   18.088741]  kasan_save_track+0x20/0x40
[   18.088970]  kasan_save_alloc_info+0x40/0x58
[   18.089040]  __kasan_kmalloc+0xd4/0xd8
[   18.089084]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.089132]  kasan_atomics+0xb8/0x2e0
[   18.089169]  kunit_try_run_case+0x170/0x3f0
[   18.089513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.089741]  kthread+0x328/0x630
[   18.089777]  ret_from_fork+0x10/0x20
[   18.090071] 
[   18.090199] The buggy address belongs to the object at fff00000c767ae00
[   18.090199]  which belongs to the cache kmalloc-64 of size 64
[   18.090782] The buggy address is located 0 bytes to the right of
[   18.090782]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.090867] 
[   18.091260] The buggy address belongs to the physical page:
[   18.091305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.091537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.091589] page_type: f5(slab)
[   18.091997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.092180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.092330] page dumped because: kasan: bad access detected
[   18.092372] 
[   18.092521] Memory state around the buggy address:
[   18.092560]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.092835]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.092889] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.092930]                                      ^
[   18.092968]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093599]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093697] ==================================================================
[   17.736420] ==================================================================
[   17.736476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   17.736564] Write of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.736626] 
[   17.737028] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.737392] Hardware name: linux,dummy-virt (DT)
[   17.737874]  dump_stack_lvl+0x8c/0xd0
[   17.738060]  print_report+0x118/0x5d0
[   17.738463]  kasan_atomics_helper+0x684/0x4858
[   17.739056]  kunit_try_run_case+0x170/0x3f0
[   17.739221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.739321]  kthread+0x328/0x630
[   17.739373]  ret_from_fork+0x10/0x20
[   17.740017]  kasan_save_track+0x20/0x40
[   17.740104]  kasan_save_alloc_info+0x40/0x58
[   17.740165]  __kasan_kmalloc+0xd4/0xd8
[   17.740390]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.740975]  kthread+0x328/0x630
[   17.741069]  ret_from_fork+0x10/0x20
[   17.741111] 
[   17.741134] The buggy address belongs to the object at fff00000c767ae00
[   17.741134]  which belongs to the cache kmalloc-64 of size 64
[   17.741808] 
[   17.741847] The buggy address belongs to the physical page:
[   17.741971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.742876]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.743208]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.743301] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.743816]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.744126] ==================================================================
[   17.972969] ==================================================================
[   17.973035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   17.973095] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.973598] 
[   17.973639] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.973763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.973933] Hardware name: linux,dummy-virt (DT)
[   17.974132] Call trace:
[   17.974165]  show_stack+0x20/0x38 (C)
[   17.974460]  dump_stack_lvl+0x8c/0xd0
[   17.974850]  print_report+0x118/0x5d0
[   17.975022]  kasan_report+0xdc/0x128
[   17.975219]  kasan_check_range+0x100/0x1a8
[   17.975467]  __kasan_check_write+0x20/0x30
[   17.975815]  kasan_atomics_helper+0xf20/0x4858
[   17.976019]  kasan_atomics+0x198/0x2e0
[   17.976354]  kunit_try_run_case+0x170/0x3f0
[   17.976558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.976616]  kthread+0x328/0x630
[   17.977007]  ret_from_fork+0x10/0x20
[   17.977077] 
[   17.977098] Allocated by task 266:
[   17.977128]  kasan_save_stack+0x3c/0x68
[   17.977296]  kasan_save_track+0x20/0x40
[   17.977654]  kasan_save_alloc_info+0x40/0x58
[   17.977928]  __kasan_kmalloc+0xd4/0xd8
[   17.978132]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.978308]  kasan_atomics+0xb8/0x2e0
[   17.978357]  kunit_try_run_case+0x170/0x3f0
[   17.978435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.978695]  kthread+0x328/0x630
[   17.978747]  ret_from_fork+0x10/0x20
[   17.978940] 
[   17.979011] The buggy address belongs to the object at fff00000c767ae00
[   17.979011]  which belongs to the cache kmalloc-64 of size 64
[   17.979507] The buggy address is located 0 bytes to the right of
[   17.979507]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.979994] 
[   17.980934] The buggy address belongs to the physical page:
[   17.980973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.981215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.981601] page_type: f5(slab)
[   17.981690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.981746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.982050] page dumped because: kasan: bad access detected
[   17.982240] 
[   17.982263] Memory state around the buggy address:
[   17.982587]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.983027]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.983306] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.983478]                                      ^
[   17.983522]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.983566]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.983731] ==================================================================
[   18.105335] ==================================================================
[   18.105634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.105692] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.105997] 
[   18.106074] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.106336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.106372] Hardware name: linux,dummy-virt (DT)
[   18.106406] Call trace:
[   18.106594]  show_stack+0x20/0x38 (C)
[   18.106978]  dump_stack_lvl+0x8c/0xd0
[   18.107047]  print_report+0x118/0x5d0
[   18.107105]  kasan_report+0xdc/0x128
[   18.107153]  __asan_report_load8_noabort+0x20/0x30
[   18.107217]  kasan_atomics_helper+0x3f04/0x4858
[   18.107267]  kasan_atomics+0x198/0x2e0
[   18.107316]  kunit_try_run_case+0x170/0x3f0
[   18.107367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.107424]  kthread+0x328/0x630
[   18.107468]  ret_from_fork+0x10/0x20
[   18.107799] 
[   18.107883] Allocated by task 266:
[   18.107923]  kasan_save_stack+0x3c/0x68
[   18.108387]  kasan_save_track+0x20/0x40
[   18.108429]  kasan_save_alloc_info+0x40/0x58
[   18.108471]  __kasan_kmalloc+0xd4/0xd8
[   18.108998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.109078]  kasan_atomics+0xb8/0x2e0
[   18.109117]  kunit_try_run_case+0x170/0x3f0
[   18.109166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.109731]  kthread+0x328/0x630
[   18.109773]  ret_from_fork+0x10/0x20
[   18.109813] 
[   18.109838] The buggy address belongs to the object at fff00000c767ae00
[   18.109838]  which belongs to the cache kmalloc-64 of size 64
[   18.109901] The buggy address is located 0 bytes to the right of
[   18.109901]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.110252] 
[   18.110509] The buggy address belongs to the physical page:
[   18.110552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.110811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.110864] page_type: f5(slab)
[   18.111470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.111822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.112123] page dumped because: kasan: bad access detected
[   18.112488] 
[   18.112514] Memory state around the buggy address:
[   18.113208]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.113373]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.113450] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.113492]                                      ^
[   18.113910]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113987]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.114351] ==================================================================
[   18.224093] ==================================================================
[   18.224144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.224225] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.224279] 
[   18.224311] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.224394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.224422] Hardware name: linux,dummy-virt (DT)
[   18.224456] Call trace:
[   18.224480]  show_stack+0x20/0x38 (C)
[   18.224533]  dump_stack_lvl+0x8c/0xd0
[   18.224588]  print_report+0x118/0x5d0
[   18.225466]  kasan_report+0xdc/0x128
[   18.225546]  kasan_check_range+0x100/0x1a8
[   18.225596]  __kasan_check_write+0x20/0x30
[   18.225645]  kasan_atomics_helper+0x175c/0x4858
[   18.226004]  kasan_atomics+0x198/0x2e0
[   18.226199]  kunit_try_run_case+0x170/0x3f0
[   18.226333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.226407]  kthread+0x328/0x630
[   18.226597]  ret_from_fork+0x10/0x20
[   18.226870] 
[   18.226990] Allocated by task 266:
[   18.227074]  kasan_save_stack+0x3c/0x68
[   18.227130]  kasan_save_track+0x20/0x40
[   18.227169]  kasan_save_alloc_info+0x40/0x58
[   18.227224]  __kasan_kmalloc+0xd4/0xd8
[   18.227262]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.227313]  kasan_atomics+0xb8/0x2e0
[   18.227349]  kunit_try_run_case+0x170/0x3f0
[   18.227390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.227435]  kthread+0x328/0x630
[   18.227471]  ret_from_fork+0x10/0x20
[   18.227522] 
[   18.227566] The buggy address belongs to the object at fff00000c767ae00
[   18.227566]  which belongs to the cache kmalloc-64 of size 64
[   18.227641] The buggy address is located 0 bytes to the right of
[   18.227641]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.227720] 
[   18.227765] The buggy address belongs to the physical page:
[   18.227818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.227881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.227931] page_type: f5(slab)
[   18.227971] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.228030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.228075] page dumped because: kasan: bad access detected
[   18.228127] 
[   18.228170] Memory state around the buggy address:
[   18.228214]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.228259]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.228304] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.228344]                                      ^
[   18.228379]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.228424]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.228499] ==================================================================
[   17.901137] ==================================================================
[   17.901201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   17.901253] Read of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.901305] 
[   17.901773] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.902170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.902410] Hardware name: linux,dummy-virt (DT)
[   17.902460] Call trace:
[   17.902522]  show_stack+0x20/0x38 (C)
[   17.903019]  dump_stack_lvl+0x8c/0xd0
[   17.903088]  print_report+0x118/0x5d0
[   17.903474]  kasan_report+0xdc/0x128
[   17.903746]  __asan_report_load4_noabort+0x20/0x30
[   17.904072]  kasan_atomics_helper+0x3e04/0x4858
[   17.904261]  kasan_atomics+0x198/0x2e0
[   17.904353]  kunit_try_run_case+0x170/0x3f0
[   17.904412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.904802]  kthread+0x328/0x630
[   17.905216]  ret_from_fork+0x10/0x20
[   17.905467] 
[   17.905537] Allocated by task 266:
[   17.905689]  kasan_save_stack+0x3c/0x68
[   17.905752]  kasan_save_track+0x20/0x40
[   17.905823]  kasan_save_alloc_info+0x40/0x58
[   17.905869]  __kasan_kmalloc+0xd4/0xd8
[   17.906266]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.906598]  kasan_atomics+0xb8/0x2e0
[   17.906659]  kunit_try_run_case+0x170/0x3f0
[   17.907096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.907316]  kthread+0x328/0x630
[   17.907516]  ret_from_fork+0x10/0x20
[   17.907594] 
[   17.907637] The buggy address belongs to the object at fff00000c767ae00
[   17.907637]  which belongs to the cache kmalloc-64 of size 64
[   17.908146] The buggy address is located 0 bytes to the right of
[   17.908146]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.908358] 
[   17.908467] The buggy address belongs to the physical page:
[   17.908595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.908654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.908718] page_type: f5(slab)
[   17.908766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.909283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.909373] page dumped because: kasan: bad access detected
[   17.909412] 
[   17.909904] Memory state around the buggy address:
[   17.910122]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.910181]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.910343] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.910428]                                      ^
[   17.910485]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.910624]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.910702] ==================================================================
[   18.062576] ==================================================================
[   18.062772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.062825] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.062877] 
[   18.062911] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.062994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.063021] Hardware name: linux,dummy-virt (DT)
[   18.063055] Call trace:
[   18.063079]  show_stack+0x20/0x38 (C)
[   18.063130]  dump_stack_lvl+0x8c/0xd0
[   18.063179]  print_report+0x118/0x5d0
[   18.063730]  kasan_report+0xdc/0x128
[   18.064950]  kasan_check_range+0x100/0x1a8
[   18.065025]  __kasan_check_write+0x20/0x30
[   18.065137]  kasan_atomics_helper+0x11f8/0x4858
[   18.065198]  kasan_atomics+0x198/0x2e0
[   18.065432]  kunit_try_run_case+0x170/0x3f0
[   18.065506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.065688]  kthread+0x328/0x630
[   18.066085]  ret_from_fork+0x10/0x20
[   18.066153] 
[   18.066309] Allocated by task 266:
[   18.066543]  kasan_save_stack+0x3c/0x68
[   18.066590]  kasan_save_track+0x20/0x40
[   18.066629]  kasan_save_alloc_info+0x40/0x58
[   18.066671]  __kasan_kmalloc+0xd4/0xd8
[   18.067105]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.067174]  kasan_atomics+0xb8/0x2e0
[   18.067786]  kunit_try_run_case+0x170/0x3f0
[   18.067845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.068242]  kthread+0x328/0x630
[   18.068607]  ret_from_fork+0x10/0x20
[   18.068664] 
[   18.068691] The buggy address belongs to the object at fff00000c767ae00
[   18.068691]  which belongs to the cache kmalloc-64 of size 64
[   18.068753] The buggy address is located 0 bytes to the right of
[   18.068753]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.069379] 
[   18.069411] The buggy address belongs to the physical page:
[   18.069493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.069557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.069628] page_type: f5(slab)
[   18.069670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.069724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.069954] page dumped because: kasan: bad access detected
[   18.070217] 
[   18.070300] Memory state around the buggy address:
[   18.070337]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.070686]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.070741] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.070783]                                      ^
[   18.070821]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.070864]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.070905] ==================================================================
[   17.958862] ==================================================================
[   17.959438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   17.959588] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.959642] 
[   17.959676] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.959760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.959791] Hardware name: linux,dummy-virt (DT)
[   17.959824] Call trace:
[   17.959849]  show_stack+0x20/0x38 (C)
[   17.960324]  dump_stack_lvl+0x8c/0xd0
[   17.960813]  print_report+0x118/0x5d0
[   17.961168]  kasan_report+0xdc/0x128
[   17.961362]  kasan_check_range+0x100/0x1a8
[   17.961439]  __kasan_check_write+0x20/0x30
[   17.961501]  kasan_atomics_helper+0xeb8/0x4858
[   17.961708]  kasan_atomics+0x198/0x2e0
[   17.961990]  kunit_try_run_case+0x170/0x3f0
[   17.962412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.962479]  kthread+0x328/0x630
[   17.962901]  ret_from_fork+0x10/0x20
[   17.963161] 
[   17.963494] Allocated by task 266:
[   17.963943]  kasan_save_stack+0x3c/0x68
[   17.963999]  kasan_save_track+0x20/0x40
[   17.964259]  kasan_save_alloc_info+0x40/0x58
[   17.964506]  __kasan_kmalloc+0xd4/0xd8
[   17.964547]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.964908]  kasan_atomics+0xb8/0x2e0
[   17.965283]  kunit_try_run_case+0x170/0x3f0
[   17.965404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.965741]  kthread+0x328/0x630
[   17.965783]  ret_from_fork+0x10/0x20
[   17.966148] 
[   17.966381] The buggy address belongs to the object at fff00000c767ae00
[   17.966381]  which belongs to the cache kmalloc-64 of size 64
[   17.966679] The buggy address is located 0 bytes to the right of
[   17.966679]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.967043] 
[   17.967077] The buggy address belongs to the physical page:
[   17.967512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.967956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.968046] page_type: f5(slab)
[   17.968267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.968328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.968372] page dumped because: kasan: bad access detected
[   17.968406] 
[   17.968710] Memory state around the buggy address:
[   17.969205]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.969258]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.969353] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.969723]                                      ^
[   17.969768]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.970038]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.970104] ==================================================================
[   18.149310] ==================================================================
[   18.149779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.150180] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.150251] 
[   18.150285] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.150368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.150397] Hardware name: linux,dummy-virt (DT)
[   18.151048] Call trace:
[   18.151368]  show_stack+0x20/0x38 (C)
[   18.151821]  dump_stack_lvl+0x8c/0xd0
[   18.151886]  print_report+0x118/0x5d0
[   18.152202]  kasan_report+0xdc/0x128
[   18.152304]  kasan_check_range+0x100/0x1a8
[   18.152364]  __kasan_check_write+0x20/0x30
[   18.152835]  kasan_atomics_helper+0x154c/0x4858
[   18.152987]  kasan_atomics+0x198/0x2e0
[   18.153177]  kunit_try_run_case+0x170/0x3f0
[   18.153338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.153416]  kthread+0x328/0x630
[   18.153695]  ret_from_fork+0x10/0x20
[   18.154039] 
[   18.154062] Allocated by task 266:
[   18.154093]  kasan_save_stack+0x3c/0x68
[   18.154136]  kasan_save_track+0x20/0x40
[   18.154177]  kasan_save_alloc_info+0x40/0x58
[   18.154229]  __kasan_kmalloc+0xd4/0xd8
[   18.154270]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.154311]  kasan_atomics+0xb8/0x2e0
[   18.154839]  kunit_try_run_case+0x170/0x3f0
[   18.155451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.155536]  kthread+0x328/0x630
[   18.155571]  ret_from_fork+0x10/0x20
[   18.155940] 
[   18.155967] The buggy address belongs to the object at fff00000c767ae00
[   18.155967]  which belongs to the cache kmalloc-64 of size 64
[   18.156060] The buggy address is located 0 bytes to the right of
[   18.156060]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.156259] 
[   18.156371] The buggy address belongs to the physical page:
[   18.156556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.156644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.156696] page_type: f5(slab)
[   18.157166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.157312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.157357] page dumped because: kasan: bad access detected
[   18.157812] 
[   18.157846] Memory state around the buggy address:
[   18.157890]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.158162]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.158221] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.158567]                                      ^
[   18.158617]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.158958]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.159002] ==================================================================
[   17.946644] ==================================================================
[   17.946698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   17.946750] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.946804] 
[   17.946839] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.946921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.948802] Hardware name: linux,dummy-virt (DT)
[   17.949027] Call trace:
[   17.949135]  show_stack+0x20/0x38 (C)
[   17.949445]  dump_stack_lvl+0x8c/0xd0
[   17.949602]  print_report+0x118/0x5d0
[   17.949674]  kasan_report+0xdc/0x128
[   17.949723]  __asan_report_store8_noabort+0x20/0x30
[   17.949901]  kasan_atomics_helper+0x3e5c/0x4858
[   17.949955]  kasan_atomics+0x198/0x2e0
[   17.950025]  kunit_try_run_case+0x170/0x3f0
[   17.950078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.950132]  kthread+0x328/0x630
[   17.950497]  ret_from_fork+0x10/0x20
[   17.951345] 
[   17.951498] Allocated by task 266:
[   17.951731]  kasan_save_stack+0x3c/0x68
[   17.952119]  kasan_save_track+0x20/0x40
[   17.952218]  kasan_save_alloc_info+0x40/0x58
[   17.952260]  __kasan_kmalloc+0xd4/0xd8
[   17.952299]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.952786]  kasan_atomics+0xb8/0x2e0
[   17.953205]  kunit_try_run_case+0x170/0x3f0
[   17.953251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.953305]  kthread+0x328/0x630
[   17.953690]  ret_from_fork+0x10/0x20
[   17.953733] 
[   17.953755] The buggy address belongs to the object at fff00000c767ae00
[   17.953755]  which belongs to the cache kmalloc-64 of size 64
[   17.953817] The buggy address is located 0 bytes to the right of
[   17.953817]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.953885] 
[   17.954418] The buggy address belongs to the physical page:
[   17.954460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.954537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.954622] page_type: f5(slab)
[   17.954945] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.955014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.955166] page dumped because: kasan: bad access detected
[   17.955211] 
[   17.955545] Memory state around the buggy address:
[   17.955901]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.956294]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.956417] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.956724]                                      ^
[   17.956773]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.957167]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.957327] ==================================================================
[   18.160168] ==================================================================
[   18.160252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.160687] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.160747] 
[   18.161325] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.161677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.161849] Hardware name: linux,dummy-virt (DT)
[   18.161889] Call trace:
[   18.161915]  show_stack+0x20/0x38 (C)
[   18.162002]  dump_stack_lvl+0x8c/0xd0
[   18.162306]  print_report+0x118/0x5d0
[   18.162725]  kasan_report+0xdc/0x128
[   18.163047]  kasan_check_range+0x100/0x1a8
[   18.163422]  __kasan_check_write+0x20/0x30
[   18.163653]  kasan_atomics_helper+0x15b4/0x4858
[   18.163707]  kasan_atomics+0x198/0x2e0
[   18.164255]  kunit_try_run_case+0x170/0x3f0
[   18.164614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.164678]  kthread+0x328/0x630
[   18.164942]  ret_from_fork+0x10/0x20
[   18.164999] 
[   18.165029] Allocated by task 266:
[   18.165066]  kasan_save_stack+0x3c/0x68
[   18.165294]  kasan_save_track+0x20/0x40
[   18.165335]  kasan_save_alloc_info+0x40/0x58
[   18.165376]  __kasan_kmalloc+0xd4/0xd8
[   18.165416]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.165968]  kasan_atomics+0xb8/0x2e0
[   18.166034]  kunit_try_run_case+0x170/0x3f0
[   18.166100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.166154]  kthread+0x328/0x630
[   18.166282]  ret_from_fork+0x10/0x20
[   18.166569] 
[   18.166593] The buggy address belongs to the object at fff00000c767ae00
[   18.166593]  which belongs to the cache kmalloc-64 of size 64
[   18.166657] The buggy address is located 0 bytes to the right of
[   18.166657]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.166724] 
[   18.166880] The buggy address belongs to the physical page:
[   18.166920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.167455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.167704] page_type: f5(slab)
[   18.167769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.167884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.168004] page dumped because: kasan: bad access detected
[   18.168232] 
[   18.168256] Memory state around the buggy address:
[   18.168381]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.168429]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.168920] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.168972]                                      ^
[   18.169108]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169166]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169327] ==================================================================
[   17.932389] ==================================================================
[   17.932449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   17.932500] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.932552] 
[   17.932661] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.932750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.932780] Hardware name: linux,dummy-virt (DT)
[   17.932816] Call trace:
[   17.932846]  show_stack+0x20/0x38 (C)
[   17.932929]  dump_stack_lvl+0x8c/0xd0
[   17.933317]  print_report+0x118/0x5d0
[   17.933675]  kasan_report+0xdc/0x128
[   17.934064]  kasan_check_range+0x100/0x1a8
[   17.934458]  __kasan_check_write+0x20/0x30
[   17.934646]  kasan_atomics_helper+0xe44/0x4858
[   17.934757]  kasan_atomics+0x198/0x2e0
[   17.934951]  kunit_try_run_case+0x170/0x3f0
[   17.935055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.935959]  kthread+0x328/0x630
[   17.939632]  ret_from_fork+0x10/0x20
[   17.939773] 
[   17.939798] Allocated by task 266:
[   17.939881]  kasan_save_stack+0x3c/0x68
[   17.940484]  kasan_save_track+0x20/0x40
[   17.940530]  kasan_save_alloc_info+0x40/0x58
[   17.940592]  __kasan_kmalloc+0xd4/0xd8
[   17.940648]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.940798]  kasan_atomics+0xb8/0x2e0
[   17.940930]  kunit_try_run_case+0x170/0x3f0
[   17.941104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.941151]  kthread+0x328/0x630
[   17.941210]  ret_from_fork+0x10/0x20
[   17.941250] 
[   17.941273] The buggy address belongs to the object at fff00000c767ae00
[   17.941273]  which belongs to the cache kmalloc-64 of size 64
[   17.941333] The buggy address is located 0 bytes to the right of
[   17.941333]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.941398] 
[   17.941422] The buggy address belongs to the physical page:
[   17.941456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.941737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.941846] page_type: f5(slab)
[   17.942222] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.942279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.942376] page dumped because: kasan: bad access detected
[   17.942509] 
[   17.942536] Memory state around the buggy address:
[   17.942640]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.942725]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.943231] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.943346]                                      ^
[   17.943842]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.944110]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.944644] ==================================================================
[   18.017079] ==================================================================
[   18.017133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.017184] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.017250] 
[   18.017282] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.017366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.017396] Hardware name: linux,dummy-virt (DT)
[   18.017430] Call trace:
[   18.019024]  show_stack+0x20/0x38 (C)
[   18.019365]  dump_stack_lvl+0x8c/0xd0
[   18.019430]  print_report+0x118/0x5d0
[   18.019883]  kasan_report+0xdc/0x128
[   18.019995]  kasan_check_range+0x100/0x1a8
[   18.020457]  __kasan_check_write+0x20/0x30
[   18.020575]  kasan_atomics_helper+0x10c0/0x4858
[   18.020627]  kasan_atomics+0x198/0x2e0
[   18.021072]  kunit_try_run_case+0x170/0x3f0
[   18.021151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.021492]  kthread+0x328/0x630
[   18.021731]  ret_from_fork+0x10/0x20
[   18.021861] 
[   18.021883] Allocated by task 266:
[   18.022337]  kasan_save_stack+0x3c/0x68
[   18.022636]  kasan_save_track+0x20/0x40
[   18.022878]  kasan_save_alloc_info+0x40/0x58
[   18.022925]  __kasan_kmalloc+0xd4/0xd8
[   18.023215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.023265]  kasan_atomics+0xb8/0x2e0
[   18.023747]  kunit_try_run_case+0x170/0x3f0
[   18.023802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.023905]  kthread+0x328/0x630
[   18.023941]  ret_from_fork+0x10/0x20
[   18.024076] 
[   18.024394] The buggy address belongs to the object at fff00000c767ae00
[   18.024394]  which belongs to the cache kmalloc-64 of size 64
[   18.024964] The buggy address is located 0 bytes to the right of
[   18.024964]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.025467] 
[   18.025651] The buggy address belongs to the physical page:
[   18.025856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.026117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.026259] page_type: f5(slab)
[   18.026304] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.026609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.027064] page dumped because: kasan: bad access detected
[   18.027105] 
[   18.027530] Memory state around the buggy address:
[   18.028199]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.028847]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.029181] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.029597]                                      ^
[   18.030549]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.031086]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.031368] ==================================================================
[   17.985147] ==================================================================
[   17.986141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   17.986395] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.986820] 
[   17.986988] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.987234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.987270] Hardware name: linux,dummy-virt (DT)
[   17.987792] Call trace:
[   17.988139]  show_stack+0x20/0x38 (C)
[   17.988461]  dump_stack_lvl+0x8c/0xd0
[   17.988664]  print_report+0x118/0x5d0
[   17.988969]  kasan_report+0xdc/0x128
[   17.989174]  kasan_check_range+0x100/0x1a8
[   17.989562]  __kasan_check_write+0x20/0x30
[   17.989762]  kasan_atomics_helper+0xf88/0x4858
[   17.990175]  kasan_atomics+0x198/0x2e0
[   17.990650]  kunit_try_run_case+0x170/0x3f0
[   17.990776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.991131]  kthread+0x328/0x630
[   17.991386]  ret_from_fork+0x10/0x20
[   17.991874] 
[   17.992026] Allocated by task 266:
[   17.992061]  kasan_save_stack+0x3c/0x68
[   17.992235]  kasan_save_track+0x20/0x40
[   17.992274]  kasan_save_alloc_info+0x40/0x58
[   17.992319]  __kasan_kmalloc+0xd4/0xd8
[   17.993572]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.993638]  kasan_atomics+0xb8/0x2e0
[   17.993676]  kunit_try_run_case+0x170/0x3f0
[   17.993718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.993764]  kthread+0x328/0x630
[   17.993800]  ret_from_fork+0x10/0x20
[   17.993839] 
[   17.993985] The buggy address belongs to the object at fff00000c767ae00
[   17.993985]  which belongs to the cache kmalloc-64 of size 64
[   17.994051] The buggy address is located 0 bytes to the right of
[   17.994051]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.994118] 
[   17.994141] The buggy address belongs to the physical page:
[   17.994222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.994277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.994326] page_type: f5(slab)
[   17.994579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.994860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.994929] page dumped because: kasan: bad access detected
[   17.995031] 
[   17.995052] Memory state around the buggy address:
[   17.995086]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.995181]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.995238] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.995310]                                      ^
[   17.995437]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.995547]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.995716] ==================================================================
[   18.094594] ==================================================================
[   18.094647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.094698] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.094749] 
[   18.094782] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.094864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.094892] Hardware name: linux,dummy-virt (DT)
[   18.095503] Call trace:
[   18.095544]  show_stack+0x20/0x38 (C)
[   18.095870]  dump_stack_lvl+0x8c/0xd0
[   18.095929]  print_report+0x118/0x5d0
[   18.096406]  kasan_report+0xdc/0x128
[   18.096492]  kasan_check_range+0x100/0x1a8
[   18.096549]  __kasan_check_write+0x20/0x30
[   18.096814]  kasan_atomics_helper+0x1384/0x4858
[   18.097024]  kasan_atomics+0x198/0x2e0
[   18.097313]  kunit_try_run_case+0x170/0x3f0
[   18.097560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.097793]  kthread+0x328/0x630
[   18.098033]  ret_from_fork+0x10/0x20
[   18.098089] 
[   18.098113] Allocated by task 266:
[   18.098355]  kasan_save_stack+0x3c/0x68
[   18.098664]  kasan_save_track+0x20/0x40
[   18.098907]  kasan_save_alloc_info+0x40/0x58
[   18.099262]  __kasan_kmalloc+0xd4/0xd8
[   18.099476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.099627]  kasan_atomics+0xb8/0x2e0
[   18.099671]  kunit_try_run_case+0x170/0x3f0
[   18.099713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.099758]  kthread+0x328/0x630
[   18.099791]  ret_from_fork+0x10/0x20
[   18.099830] 
[   18.099854] The buggy address belongs to the object at fff00000c767ae00
[   18.099854]  which belongs to the cache kmalloc-64 of size 64
[   18.100480] The buggy address is located 0 bytes to the right of
[   18.100480]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.101051] 
[   18.101080] The buggy address belongs to the physical page:
[   18.101227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.101433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.101498] page_type: f5(slab)
[   18.101539] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.101752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.102054] page dumped because: kasan: bad access detected
[   18.102092] 
[   18.102235] Memory state around the buggy address:
[   18.102438]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.103114]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.103469] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.103519]                                      ^
[   18.103708]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.103959]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.104433] ==================================================================
[   17.996222] ==================================================================
[   17.996274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   17.996325] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.996376] 
[   17.996407] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.996488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.996562] Hardware name: linux,dummy-virt (DT)
[   17.996596] Call trace:
[   17.996632]  show_stack+0x20/0x38 (C)
[   17.996681]  dump_stack_lvl+0x8c/0xd0
[   17.996730]  print_report+0x118/0x5d0
[   17.996777]  kasan_report+0xdc/0x128
[   17.996825]  kasan_check_range+0x100/0x1a8
[   17.997021]  __kasan_check_write+0x20/0x30
[   17.997135]  kasan_atomics_helper+0xff0/0x4858
[   17.997196]  kasan_atomics+0x198/0x2e0
[   17.997244]  kunit_try_run_case+0x170/0x3f0
[   17.997292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.997374]  kthread+0x328/0x630
[   17.997428]  ret_from_fork+0x10/0x20
[   17.997532] 
[   17.997554] Allocated by task 266:
[   17.997585]  kasan_save_stack+0x3c/0x68
[   17.997627]  kasan_save_track+0x20/0x40
[   17.997742]  kasan_save_alloc_info+0x40/0x58
[   17.997818]  __kasan_kmalloc+0xd4/0xd8
[   17.997881]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.997929]  kasan_atomics+0xb8/0x2e0
[   17.997967]  kunit_try_run_case+0x170/0x3f0
[   17.998146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.998212]  kthread+0x328/0x630
[   17.998279]  ret_from_fork+0x10/0x20
[   17.998319] 
[   17.998342] The buggy address belongs to the object at fff00000c767ae00
[   17.998342]  which belongs to the cache kmalloc-64 of size 64
[   17.998402] The buggy address is located 0 bytes to the right of
[   17.998402]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.998537] 
[   17.998633] The buggy address belongs to the physical page:
[   17.998734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.998816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.998864] page_type: f5(slab)
[   17.998902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.998955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.999061] page dumped because: kasan: bad access detected
[   17.999097] 
[   17.999141] Memory state around the buggy address:
[   17.999176]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.999242]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.999405] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.999689]                                      ^
[   17.999739]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.999783]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.999849] ==================================================================
[   18.000938] ==================================================================
[   18.001063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.001249] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.001494] 
[   18.001588] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.001701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.001729] Hardware name: linux,dummy-virt (DT)
[   18.001763] Call trace:
[   18.001955]  show_stack+0x20/0x38 (C)
[   18.002300]  dump_stack_lvl+0x8c/0xd0
[   18.002440]  print_report+0x118/0x5d0
[   18.003039]  kasan_report+0xdc/0x128
[   18.003208]  kasan_check_range+0x100/0x1a8
[   18.003262]  __kasan_check_write+0x20/0x30
[   18.004222]  kasan_atomics_helper+0x1058/0x4858
[   18.004784]  kasan_atomics+0x198/0x2e0
[   18.004849]  kunit_try_run_case+0x170/0x3f0
[   18.005723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.005793]  kthread+0x328/0x630
[   18.006485]  ret_from_fork+0x10/0x20
[   18.006927] 
[   18.006958] Allocated by task 266:
[   18.007733]  kasan_save_stack+0x3c/0x68
[   18.007908]  kasan_save_track+0x20/0x40
[   18.007964]  kasan_save_alloc_info+0x40/0x58
[   18.008611]  __kasan_kmalloc+0xd4/0xd8
[   18.009070]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.009260]  kasan_atomics+0xb8/0x2e0
[   18.009529]  kunit_try_run_case+0x170/0x3f0
[   18.009574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.009620]  kthread+0x328/0x630
[   18.009655]  ret_from_fork+0x10/0x20
[   18.010610] 
[   18.011089] The buggy address belongs to the object at fff00000c767ae00
[   18.011089]  which belongs to the cache kmalloc-64 of size 64
[   18.011662] The buggy address is located 0 bytes to the right of
[   18.011662]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.012023] 
[   18.012455] The buggy address belongs to the physical page:
[   18.012580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.013228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.013300] page_type: f5(slab)
[   18.013342] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.013477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.013784] page dumped because: kasan: bad access detected
[   18.013836] 
[   18.013857] Memory state around the buggy address:
[   18.014258]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.014449]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.014694] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.015065]                                      ^
[   18.015110]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.015156]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.015204] ==================================================================
[   17.658851] ==================================================================
[   17.658905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   17.659164] Hardware name: linux,dummy-virt (DT)
[   17.659580]  __kasan_check_read+0x20/0x30
[   17.659840]  kthread+0x328/0x630
[   17.660232]  __kasan_kmalloc+0xd4/0xd8
[   17.660992] The buggy address is located 0 bytes to the right of
[   17.660992]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.661423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.661635]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.661763]                                      ^
[   17.661924] ==================================================================
[   18.199344] ==================================================================
[   18.199399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.199450] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.199502] 
[   18.199534] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.199616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.200511] Hardware name: linux,dummy-virt (DT)
[   18.201003] Call trace:
[   18.201874]  show_stack+0x20/0x38 (C)
[   18.202080]  dump_stack_lvl+0x8c/0xd0
[   18.202134]  print_report+0x118/0x5d0
[   18.202195]  kasan_report+0xdc/0x128
[   18.202952]  kasan_check_range+0x100/0x1a8
[   18.203025]  __kasan_check_write+0x20/0x30
[   18.203432]  kasan_atomics_helper+0x16d0/0x4858
[   18.203597]  kasan_atomics+0x198/0x2e0
[   18.203688]  kunit_try_run_case+0x170/0x3f0
[   18.204521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.205259]  kthread+0x328/0x630
[   18.205314]  ret_from_fork+0x10/0x20
[   18.205822] 
[   18.205860] Allocated by task 266:
[   18.206077]  kasan_save_stack+0x3c/0x68
[   18.206578]  kasan_save_track+0x20/0x40
[   18.207112]  kasan_save_alloc_info+0x40/0x58
[   18.207705]  __kasan_kmalloc+0xd4/0xd8
[   18.208054]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.208101]  kasan_atomics+0xb8/0x2e0
[   18.208141]  kunit_try_run_case+0x170/0x3f0
[   18.208181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.208240]  kthread+0x328/0x630
[   18.208969]  ret_from_fork+0x10/0x20
[   18.209037] 
[   18.209071] The buggy address belongs to the object at fff00000c767ae00
[   18.209071]  which belongs to the cache kmalloc-64 of size 64
[   18.210250] The buggy address is located 0 bytes to the right of
[   18.210250]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.210536] 
[   18.210649] The buggy address belongs to the physical page:
[   18.210685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.211710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.212291] page_type: f5(slab)
[   18.212775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.213241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.213311] page dumped because: kasan: bad access detected
[   18.213794] 
[   18.214576] Memory state around the buggy address:
[   18.214752]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.214851]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.215536] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.215960]                                      ^
[   18.216065]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.216760]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.216838] ==================================================================
[   18.181367] ==================================================================
[   18.181420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.181469] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.181521] 
[   18.181554] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.182111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.182154] Hardware name: linux,dummy-virt (DT)
[   18.182244] Call trace:
[   18.182405]  show_stack+0x20/0x38 (C)
[   18.183156]  dump_stack_lvl+0x8c/0xd0
[   18.183243]  print_report+0x118/0x5d0
[   18.183292]  kasan_report+0xdc/0x128
[   18.183342]  kasan_check_range+0x100/0x1a8
[   18.184051]  __kasan_check_write+0x20/0x30
[   18.184200]  kasan_atomics_helper+0x1644/0x4858
[   18.184251]  kasan_atomics+0x198/0x2e0
[   18.184300]  kunit_try_run_case+0x170/0x3f0
[   18.184350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.184406]  kthread+0x328/0x630
[   18.184449]  ret_from_fork+0x10/0x20
[   18.184943] 
[   18.184982] Allocated by task 266:
[   18.185013]  kasan_save_stack+0x3c/0x68
[   18.185067]  kasan_save_track+0x20/0x40
[   18.185410]  kasan_save_alloc_info+0x40/0x58
[   18.185892]  __kasan_kmalloc+0xd4/0xd8
[   18.185984]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.186181]  kasan_atomics+0xb8/0x2e0
[   18.186295]  kunit_try_run_case+0x170/0x3f0
[   18.186353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.186553]  kthread+0x328/0x630
[   18.186590]  ret_from_fork+0x10/0x20
[   18.186813] 
[   18.186843] The buggy address belongs to the object at fff00000c767ae00
[   18.186843]  which belongs to the cache kmalloc-64 of size 64
[   18.187392] The buggy address is located 0 bytes to the right of
[   18.187392]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.187512] 
[   18.187566] The buggy address belongs to the physical page:
[   18.187601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.188134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.188251] page_type: f5(slab)
[   18.188328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.188694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.188745] page dumped because: kasan: bad access detected
[   18.189080] 
[   18.189108] Memory state around the buggy address:
[   18.189294]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.189363]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.189416] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.189459]                                      ^
[   18.189530]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.189964]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.190344] ==================================================================
[   17.922805] ==================================================================
[   17.922860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   17.922913] Read of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.923722] 
[   17.923774] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.923878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.923967] Hardware name: linux,dummy-virt (DT)
[   17.924003] Call trace:
[   17.924044]  show_stack+0x20/0x38 (C)
[   17.924443]  dump_stack_lvl+0x8c/0xd0
[   17.924673]  print_report+0x118/0x5d0
[   17.924739]  kasan_report+0xdc/0x128
[   17.924787]  __asan_report_load8_noabort+0x20/0x30
[   17.924842]  kasan_atomics_helper+0x3f58/0x4858
[   17.924946]  kasan_atomics+0x198/0x2e0
[   17.925027]  kunit_try_run_case+0x170/0x3f0
[   17.925261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.925585]  kthread+0x328/0x630
[   17.925965]  ret_from_fork+0x10/0x20
[   17.926212] 
[   17.926271] Allocated by task 266:
[   17.926432]  kasan_save_stack+0x3c/0x68
[   17.926499]  kasan_save_track+0x20/0x40
[   17.926566]  kasan_save_alloc_info+0x40/0x58
[   17.926609]  __kasan_kmalloc+0xd4/0xd8
[   17.927291]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.927475]  kasan_atomics+0xb8/0x2e0
[   17.927542]  kunit_try_run_case+0x170/0x3f0
[   17.927596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.927953]  kthread+0x328/0x630
[   17.928011]  ret_from_fork+0x10/0x20
[   17.928068] 
[   17.928100] The buggy address belongs to the object at fff00000c767ae00
[   17.928100]  which belongs to the cache kmalloc-64 of size 64
[   17.928160] The buggy address is located 0 bytes to the right of
[   17.928160]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.928239] 
[   17.928262] The buggy address belongs to the physical page:
[   17.928355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.928443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.928494] page_type: f5(slab)
[   17.928545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.928607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.928660] page dumped because: kasan: bad access detected
[   17.928694] 
[   17.928716] Memory state around the buggy address:
[   17.928776]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.928835]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.929235] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.929911]                                      ^
[   17.929970]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930293]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930888] ==================================================================
[   18.032795] ==================================================================
[   18.033439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.033742] Write of size 8 at addr fff00000c767ae30 by task kunit_try_catch/266
[   18.034110] 
[   18.034614] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.034988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.035021] Hardware name: linux,dummy-virt (DT)
[   18.035384] Call trace:
[   18.035560]  show_stack+0x20/0x38 (C)
[   18.035873]  dump_stack_lvl+0x8c/0xd0
[   18.036248]  print_report+0x118/0x5d0
[   18.036387]  kasan_report+0xdc/0x128
[   18.036440]  kasan_check_range+0x100/0x1a8
[   18.036944]  __kasan_check_write+0x20/0x30
[   18.037263]  kasan_atomics_helper+0x1128/0x4858
[   18.037504]  kasan_atomics+0x198/0x2e0
[   18.037678]  kunit_try_run_case+0x170/0x3f0
[   18.038303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.038688]  kthread+0x328/0x630
[   18.038739]  ret_from_fork+0x10/0x20
[   18.039010] 
[   18.039172] Allocated by task 266:
[   18.039453]  kasan_save_stack+0x3c/0x68
[   18.039521]  kasan_save_track+0x20/0x40
[   18.039653]  kasan_save_alloc_info+0x40/0x58
[   18.039698]  __kasan_kmalloc+0xd4/0xd8
[   18.039799]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.040117]  kasan_atomics+0xb8/0x2e0
[   18.040156]  kunit_try_run_case+0x170/0x3f0
[   18.040207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.041238]  kthread+0x328/0x630
[   18.041435]  ret_from_fork+0x10/0x20
[   18.041774] 
[   18.041802] The buggy address belongs to the object at fff00000c767ae00
[   18.041802]  which belongs to the cache kmalloc-64 of size 64
[   18.042034] The buggy address is located 0 bytes to the right of
[   18.042034]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   18.042354] 
[   18.042587] The buggy address belongs to the physical page:
[   18.042803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   18.042871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.042924] page_type: f5(slab)
[   18.043198] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.043691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.043988] page dumped because: kasan: bad access detected
[   18.044377] 
[   18.044672] Memory state around the buggy address:
[   18.045073]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.045176]  fff00000c767ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.045649] >fff00000c767ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.046016]                                      ^
[   18.046064]  fff00000c767ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.046899]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.046956] ==================================================================

[   15.397973] ==================================================================
[   15.398460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.398827] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.399085] 
[   15.399179] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.399226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.399238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.399261] Call Trace:
[   15.399273]  <TASK>
[   15.399338]  dump_stack_lvl+0x73/0xb0
[   15.399373]  print_report+0xd1/0x610
[   15.399396]  ? __virt_addr_valid+0x1db/0x2d0
[   15.399432]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.399454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.399485]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.399509]  kasan_report+0x141/0x180
[   15.399532]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.399560]  __asan_report_store4_noabort+0x1b/0x30
[   15.399585]  kasan_atomics_helper+0x4ba2/0x5450
[   15.399608]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.399630]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.399656]  ? kasan_atomics+0x152/0x310
[   15.399683]  kasan_atomics+0x1dc/0x310
[   15.399706]  ? __pfx_kasan_atomics+0x10/0x10
[   15.399739]  ? __pfx_read_tsc+0x10/0x10
[   15.399761]  ? ktime_get_ts64+0x86/0x230
[   15.399798]  kunit_try_run_case+0x1a5/0x480
[   15.399835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.399859]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.399884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.399908]  ? __kthread_parkme+0x82/0x180
[   15.399929]  ? preempt_count_sub+0x50/0x80
[   15.399963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.399988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.400012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.400086]  kthread+0x337/0x6f0
[   15.400108]  ? trace_preempt_on+0x20/0xc0
[   15.400132]  ? __pfx_kthread+0x10/0x10
[   15.400152]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.400175]  ? calculate_sigpending+0x7b/0xa0
[   15.400200]  ? __pfx_kthread+0x10/0x10
[   15.400222]  ret_from_fork+0x116/0x1d0
[   15.400241]  ? __pfx_kthread+0x10/0x10
[   15.400262]  ret_from_fork_asm+0x1a/0x30
[   15.400293]  </TASK>
[   15.400304] 
[   15.408994] Allocated by task 283:
[   15.409314]  kasan_save_stack+0x45/0x70
[   15.409552]  kasan_save_track+0x18/0x40
[   15.409752]  kasan_save_alloc_info+0x3b/0x50
[   15.409988]  __kasan_kmalloc+0xb7/0xc0
[   15.410282]  __kmalloc_cache_noprof+0x189/0x420
[   15.410515]  kasan_atomics+0x95/0x310
[   15.410653]  kunit_try_run_case+0x1a5/0x480
[   15.410933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.411441]  kthread+0x337/0x6f0
[   15.411585]  ret_from_fork+0x116/0x1d0
[   15.411770]  ret_from_fork_asm+0x1a/0x30
[   15.412001] 
[   15.412107] The buggy address belongs to the object at ffff8881038b5600
[   15.412107]  which belongs to the cache kmalloc-64 of size 64
[   15.412676] The buggy address is located 0 bytes to the right of
[   15.412676]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.413052] 
[   15.413169] The buggy address belongs to the physical page:
[   15.413429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.413800] flags: 0x200000000000000(node=0|zone=2)
[   15.414485] page_type: f5(slab)
[   15.414620] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.415073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.415431] page dumped because: kasan: bad access detected
[   15.415870] 
[   15.415996] Memory state around the buggy address:
[   15.416398]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.416748]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.417142] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.417428]                                      ^
[   15.417648]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.418281]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.418898] ==================================================================
[   16.031905] ==================================================================
[   16.032487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   16.032810] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.033142] 
[   16.033257] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.033302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.033314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.033336] Call Trace:
[   16.033352]  <TASK>
[   16.033367]  dump_stack_lvl+0x73/0xb0
[   16.033396]  print_report+0xd1/0x610
[   16.033420]  ? __virt_addr_valid+0x1db/0x2d0
[   16.033445]  ? kasan_atomics_helper+0x1079/0x5450
[   16.033479]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.033503]  ? kasan_atomics_helper+0x1079/0x5450
[   16.033526]  kasan_report+0x141/0x180
[   16.033549]  ? kasan_atomics_helper+0x1079/0x5450
[   16.033576]  kasan_check_range+0x10c/0x1c0
[   16.033601]  __kasan_check_write+0x18/0x20
[   16.033621]  kasan_atomics_helper+0x1079/0x5450
[   16.033645]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.033668]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.033695]  ? kasan_atomics+0x152/0x310
[   16.033722]  kasan_atomics+0x1dc/0x310
[   16.033746]  ? __pfx_kasan_atomics+0x10/0x10
[   16.033771]  ? __pfx_read_tsc+0x10/0x10
[   16.033846]  ? ktime_get_ts64+0x86/0x230
[   16.033873]  kunit_try_run_case+0x1a5/0x480
[   16.033899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.033922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.033948]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.033972]  ? __kthread_parkme+0x82/0x180
[   16.033993]  ? preempt_count_sub+0x50/0x80
[   16.034018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.034074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.034100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.034134]  kthread+0x337/0x6f0
[   16.034155]  ? trace_preempt_on+0x20/0xc0
[   16.034179]  ? __pfx_kthread+0x10/0x10
[   16.034201]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.034225]  ? calculate_sigpending+0x7b/0xa0
[   16.034250]  ? __pfx_kthread+0x10/0x10
[   16.034273]  ret_from_fork+0x116/0x1d0
[   16.034293]  ? __pfx_kthread+0x10/0x10
[   16.034315]  ret_from_fork_asm+0x1a/0x30
[   16.034347]  </TASK>
[   16.034358] 
[   16.042729] Allocated by task 283:
[   16.042957]  kasan_save_stack+0x45/0x70
[   16.043177]  kasan_save_track+0x18/0x40
[   16.043376]  kasan_save_alloc_info+0x3b/0x50
[   16.043606]  __kasan_kmalloc+0xb7/0xc0
[   16.043858]  __kmalloc_cache_noprof+0x189/0x420
[   16.044027]  kasan_atomics+0x95/0x310
[   16.044401]  kunit_try_run_case+0x1a5/0x480
[   16.044632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.044928]  kthread+0x337/0x6f0
[   16.045102]  ret_from_fork+0x116/0x1d0
[   16.045304]  ret_from_fork_asm+0x1a/0x30
[   16.045512] 
[   16.045600] The buggy address belongs to the object at ffff8881038b5600
[   16.045600]  which belongs to the cache kmalloc-64 of size 64
[   16.046089] The buggy address is located 0 bytes to the right of
[   16.046089]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.046484] 
[   16.046587] The buggy address belongs to the physical page:
[   16.046847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.047319] flags: 0x200000000000000(node=0|zone=2)
[   16.047498] page_type: f5(slab)
[   16.047624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.047919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.048261] page dumped because: kasan: bad access detected
[   16.048525] 
[   16.048622] Memory state around the buggy address:
[   16.048957]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.049301]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.049615] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.049952]                                      ^
[   16.050162]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.050583]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.050932] ==================================================================
[   15.466902] ==================================================================
[   15.467409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.467768] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.468195] 
[   15.468359] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.468409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.468422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.468446] Call Trace:
[   15.468465]  <TASK>
[   15.468495]  dump_stack_lvl+0x73/0xb0
[   15.468566]  print_report+0xd1/0x610
[   15.468591]  ? __virt_addr_valid+0x1db/0x2d0
[   15.468616]  ? kasan_atomics_helper+0x3df/0x5450
[   15.468639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.468693]  ? kasan_atomics_helper+0x3df/0x5450
[   15.468717]  kasan_report+0x141/0x180
[   15.468741]  ? kasan_atomics_helper+0x3df/0x5450
[   15.468769]  kasan_check_range+0x10c/0x1c0
[   15.468803]  __kasan_check_read+0x15/0x20
[   15.468825]  kasan_atomics_helper+0x3df/0x5450
[   15.468849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.468874]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.468900]  ? kasan_atomics+0x152/0x310
[   15.468929]  kasan_atomics+0x1dc/0x310
[   15.468954]  ? __pfx_kasan_atomics+0x10/0x10
[   15.469011]  ? __pfx_read_tsc+0x10/0x10
[   15.469036]  ? ktime_get_ts64+0x86/0x230
[   15.469087]  kunit_try_run_case+0x1a5/0x480
[   15.469132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.469157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.469184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.469210]  ? __kthread_parkme+0x82/0x180
[   15.469233]  ? preempt_count_sub+0x50/0x80
[   15.469260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.469286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.469311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.469406]  kthread+0x337/0x6f0
[   15.469431]  ? trace_preempt_on+0x20/0xc0
[   15.469458]  ? __pfx_kthread+0x10/0x10
[   15.469493]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.469518]  ? calculate_sigpending+0x7b/0xa0
[   15.469544]  ? __pfx_kthread+0x10/0x10
[   15.469568]  ret_from_fork+0x116/0x1d0
[   15.469589]  ? __pfx_kthread+0x10/0x10
[   15.469611]  ret_from_fork_asm+0x1a/0x30
[   15.469645]  </TASK>
[   15.469656] 
[   15.480158] Allocated by task 283:
[   15.480396]  kasan_save_stack+0x45/0x70
[   15.480631]  kasan_save_track+0x18/0x40
[   15.480995]  kasan_save_alloc_info+0x3b/0x50
[   15.481193]  __kasan_kmalloc+0xb7/0xc0
[   15.481540]  __kmalloc_cache_noprof+0x189/0x420
[   15.481970]  kasan_atomics+0x95/0x310
[   15.482212]  kunit_try_run_case+0x1a5/0x480
[   15.482489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.482773]  kthread+0x337/0x6f0
[   15.482957]  ret_from_fork+0x116/0x1d0
[   15.483175]  ret_from_fork_asm+0x1a/0x30
[   15.483596] 
[   15.483703] The buggy address belongs to the object at ffff8881038b5600
[   15.483703]  which belongs to the cache kmalloc-64 of size 64
[   15.484385] The buggy address is located 0 bytes to the right of
[   15.484385]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.485079] 
[   15.485224] The buggy address belongs to the physical page:
[   15.485520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.485935] flags: 0x200000000000000(node=0|zone=2)
[   15.486273] page_type: f5(slab)
[   15.486503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.486972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.487325] page dumped because: kasan: bad access detected
[   15.487584] 
[   15.487690] Memory state around the buggy address:
[   15.488053]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.488324]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.488565] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.489243]                                      ^
[   15.489508]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.489894]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.490249] ==================================================================
[   16.199017] ==================================================================
[   16.200197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   16.201324] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.202072] 
[   16.202388] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.202446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.202460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.202493] Call Trace:
[   16.202512]  <TASK>
[   16.202528]  dump_stack_lvl+0x73/0xb0
[   16.202561]  print_report+0xd1/0x610
[   16.202585]  ? __virt_addr_valid+0x1db/0x2d0
[   16.202609]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.202631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.202654]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.202676]  kasan_report+0x141/0x180
[   16.202700]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.202727]  __asan_report_load4_noabort+0x18/0x20
[   16.202754]  kasan_atomics_helper+0x49ce/0x5450
[   16.202777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.202800]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.202826]  ? kasan_atomics+0x152/0x310
[   16.202854]  kasan_atomics+0x1dc/0x310
[   16.202878]  ? __pfx_kasan_atomics+0x10/0x10
[   16.202902]  ? __pfx_read_tsc+0x10/0x10
[   16.202924]  ? ktime_get_ts64+0x86/0x230
[   16.202959]  kunit_try_run_case+0x1a5/0x480
[   16.202986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.203010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.203045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.203134]  ? __kthread_parkme+0x82/0x180
[   16.203158]  ? preempt_count_sub+0x50/0x80
[   16.203183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.203209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.203232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.203257]  kthread+0x337/0x6f0
[   16.203278]  ? trace_preempt_on+0x20/0xc0
[   16.203302]  ? __pfx_kthread+0x10/0x10
[   16.203323]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.203347]  ? calculate_sigpending+0x7b/0xa0
[   16.203371]  ? __pfx_kthread+0x10/0x10
[   16.203393]  ret_from_fork+0x116/0x1d0
[   16.203413]  ? __pfx_kthread+0x10/0x10
[   16.203435]  ret_from_fork_asm+0x1a/0x30
[   16.203466]  </TASK>
[   16.203489] 
[   16.216728] Allocated by task 283:
[   16.217235]  kasan_save_stack+0x45/0x70
[   16.217441]  kasan_save_track+0x18/0x40
[   16.217599]  kasan_save_alloc_info+0x3b/0x50
[   16.217757]  __kasan_kmalloc+0xb7/0xc0
[   16.217945]  __kmalloc_cache_noprof+0x189/0x420
[   16.218478]  kasan_atomics+0x95/0x310
[   16.218892]  kunit_try_run_case+0x1a5/0x480
[   16.219410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.219984]  kthread+0x337/0x6f0
[   16.220371]  ret_from_fork+0x116/0x1d0
[   16.221031]  ret_from_fork_asm+0x1a/0x30
[   16.221501] 
[   16.221702] The buggy address belongs to the object at ffff8881038b5600
[   16.221702]  which belongs to the cache kmalloc-64 of size 64
[   16.222335] The buggy address is located 0 bytes to the right of
[   16.222335]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.222734] 
[   16.222831] The buggy address belongs to the physical page:
[   16.223011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.223444] flags: 0x200000000000000(node=0|zone=2)
[   16.223694] page_type: f5(slab)
[   16.223900] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.224255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.224648] page dumped because: kasan: bad access detected
[   16.224921] 
[   16.225031] Memory state around the buggy address:
[   16.225227]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.225524]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.225784] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.226393]                                      ^
[   16.226638]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.226975]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.227453] ==================================================================
[   15.442640] ==================================================================
[   15.443270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.443980] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.444232] 
[   15.444332] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.444379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.444393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.444417] Call Trace:
[   15.444432]  <TASK>
[   15.444448]  dump_stack_lvl+0x73/0xb0
[   15.444520]  print_report+0xd1/0x610
[   15.444547]  ? __virt_addr_valid+0x1db/0x2d0
[   15.444572]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.444596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.444622]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.444646]  kasan_report+0x141/0x180
[   15.444670]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.444697]  __asan_report_store4_noabort+0x1b/0x30
[   15.444725]  kasan_atomics_helper+0x4b6e/0x5450
[   15.444748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.444810]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.444837]  ? kasan_atomics+0x152/0x310
[   15.444880]  kasan_atomics+0x1dc/0x310
[   15.444919]  ? __pfx_kasan_atomics+0x10/0x10
[   15.444945]  ? __pfx_read_tsc+0x10/0x10
[   15.444969]  ? ktime_get_ts64+0x86/0x230
[   15.444996]  kunit_try_run_case+0x1a5/0x480
[   15.445042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.445068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.445094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.445120]  ? __kthread_parkme+0x82/0x180
[   15.445143]  ? preempt_count_sub+0x50/0x80
[   15.445169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.445195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.445221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.445265]  kthread+0x337/0x6f0
[   15.445288]  ? trace_preempt_on+0x20/0xc0
[   15.445327]  ? __pfx_kthread+0x10/0x10
[   15.445351]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.445375]  ? calculate_sigpending+0x7b/0xa0
[   15.445400]  ? __pfx_kthread+0x10/0x10
[   15.445424]  ret_from_fork+0x116/0x1d0
[   15.445445]  ? __pfx_kthread+0x10/0x10
[   15.445477]  ret_from_fork_asm+0x1a/0x30
[   15.445510]  </TASK>
[   15.445523] 
[   15.455549] Allocated by task 283:
[   15.455776]  kasan_save_stack+0x45/0x70
[   15.455991]  kasan_save_track+0x18/0x40
[   15.456338]  kasan_save_alloc_info+0x3b/0x50
[   15.456572]  __kasan_kmalloc+0xb7/0xc0
[   15.456759]  __kmalloc_cache_noprof+0x189/0x420
[   15.457107]  kasan_atomics+0x95/0x310
[   15.457363]  kunit_try_run_case+0x1a5/0x480
[   15.457713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.457995]  kthread+0x337/0x6f0
[   15.458224]  ret_from_fork+0x116/0x1d0
[   15.458567]  ret_from_fork_asm+0x1a/0x30
[   15.458729] 
[   15.459015] The buggy address belongs to the object at ffff8881038b5600
[   15.459015]  which belongs to the cache kmalloc-64 of size 64
[   15.459769] The buggy address is located 0 bytes to the right of
[   15.459769]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.460608] 
[   15.460811] The buggy address belongs to the physical page:
[   15.461090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.461411] flags: 0x200000000000000(node=0|zone=2)
[   15.461671] page_type: f5(slab)
[   15.461924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.462403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.462767] page dumped because: kasan: bad access detected
[   15.463089] 
[   15.463321] Memory state around the buggy address:
[   15.463518]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.463909]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.464368] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.464676]                                      ^
[   15.465049]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.465702]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.466263] ==================================================================
[   15.816755] ==================================================================
[   15.817846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.818666] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.819448] 
[   15.819684] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.819733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.819746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.819789] Call Trace:
[   15.819837]  <TASK>
[   15.819856]  dump_stack_lvl+0x73/0xb0
[   15.819888]  print_report+0xd1/0x610
[   15.819924]  ? __virt_addr_valid+0x1db/0x2d0
[   15.819948]  ? kasan_atomics_helper+0xac7/0x5450
[   15.819970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.819994]  ? kasan_atomics_helper+0xac7/0x5450
[   15.820070]  kasan_report+0x141/0x180
[   15.820098]  ? kasan_atomics_helper+0xac7/0x5450
[   15.820126]  kasan_check_range+0x10c/0x1c0
[   15.820151]  __kasan_check_write+0x18/0x20
[   15.820172]  kasan_atomics_helper+0xac7/0x5450
[   15.820195]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.820219]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.820246]  ? kasan_atomics+0x152/0x310
[   15.820273]  kasan_atomics+0x1dc/0x310
[   15.820297]  ? __pfx_kasan_atomics+0x10/0x10
[   15.820323]  ? __pfx_read_tsc+0x10/0x10
[   15.820345]  ? ktime_get_ts64+0x86/0x230
[   15.820371]  kunit_try_run_case+0x1a5/0x480
[   15.820397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.820421]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.820447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.820483]  ? __kthread_parkme+0x82/0x180
[   15.820505]  ? preempt_count_sub+0x50/0x80
[   15.820531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.820555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.820580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.820606]  kthread+0x337/0x6f0
[   15.820627]  ? trace_preempt_on+0x20/0xc0
[   15.820652]  ? __pfx_kthread+0x10/0x10
[   15.820674]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.820697]  ? calculate_sigpending+0x7b/0xa0
[   15.820721]  ? __pfx_kthread+0x10/0x10
[   15.820745]  ret_from_fork+0x116/0x1d0
[   15.820783]  ? __pfx_kthread+0x10/0x10
[   15.820805]  ret_from_fork_asm+0x1a/0x30
[   15.820838]  </TASK>
[   15.820849] 
[   15.833636] Allocated by task 283:
[   15.834037]  kasan_save_stack+0x45/0x70
[   15.834610]  kasan_save_track+0x18/0x40
[   15.835010]  kasan_save_alloc_info+0x3b/0x50
[   15.835551]  __kasan_kmalloc+0xb7/0xc0
[   15.836012]  __kmalloc_cache_noprof+0x189/0x420
[   15.836544]  kasan_atomics+0x95/0x310
[   15.836933]  kunit_try_run_case+0x1a5/0x480
[   15.837406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.838004]  kthread+0x337/0x6f0
[   15.838396]  ret_from_fork+0x116/0x1d0
[   15.838799]  ret_from_fork_asm+0x1a/0x30
[   15.839206] 
[   15.839598] The buggy address belongs to the object at ffff8881038b5600
[   15.839598]  which belongs to the cache kmalloc-64 of size 64
[   15.840941] The buggy address is located 0 bytes to the right of
[   15.840941]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.841589] 
[   15.841674] The buggy address belongs to the physical page:
[   15.841968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.842820] flags: 0x200000000000000(node=0|zone=2)
[   15.843453] page_type: f5(slab)
[   15.843801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.844546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.845096] page dumped because: kasan: bad access detected
[   15.845288] 
[   15.845365] Memory state around the buggy address:
[   15.845541]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.845976]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.846740] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.847544]                                      ^
[   15.848057]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.848949]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.849683] ==================================================================
[   15.364988] ==================================================================
[   15.365837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.366117] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.366353] 
[   15.366451] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.366897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.366928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.366953] Call Trace:
[   15.366968]  <TASK>
[   15.366988]  dump_stack_lvl+0x73/0xb0
[   15.367264]  print_report+0xd1/0x610
[   15.367292]  ? __virt_addr_valid+0x1db/0x2d0
[   15.367316]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.367350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.367373]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.367395]  kasan_report+0x141/0x180
[   15.367429]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.367455]  __asan_report_load4_noabort+0x18/0x20
[   15.367489]  kasan_atomics_helper+0x4bbc/0x5450
[   15.367511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.367534]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.367559]  ? kasan_atomics+0x152/0x310
[   15.367585]  kasan_atomics+0x1dc/0x310
[   15.367608]  ? __pfx_kasan_atomics+0x10/0x10
[   15.367632]  ? __pfx_read_tsc+0x10/0x10
[   15.367654]  ? ktime_get_ts64+0x86/0x230
[   15.367679]  kunit_try_run_case+0x1a5/0x480
[   15.367706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.367728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.367754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.367792]  ? __kthread_parkme+0x82/0x180
[   15.367813]  ? preempt_count_sub+0x50/0x80
[   15.367838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.367863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.367887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.367911]  kthread+0x337/0x6f0
[   15.367931]  ? trace_preempt_on+0x20/0xc0
[   15.367955]  ? __pfx_kthread+0x10/0x10
[   15.367976]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.367999]  ? calculate_sigpending+0x7b/0xa0
[   15.368024]  ? __pfx_kthread+0x10/0x10
[   15.368061]  ret_from_fork+0x116/0x1d0
[   15.368081]  ? __pfx_kthread+0x10/0x10
[   15.368102]  ret_from_fork_asm+0x1a/0x30
[   15.368134]  </TASK>
[   15.368145] 
[   15.385800] Allocated by task 283:
[   15.386308]  kasan_save_stack+0x45/0x70
[   15.386737]  kasan_save_track+0x18/0x40
[   15.386892]  kasan_save_alloc_info+0x3b/0x50
[   15.387324]  __kasan_kmalloc+0xb7/0xc0
[   15.387758]  __kmalloc_cache_noprof+0x189/0x420
[   15.388277]  kasan_atomics+0x95/0x310
[   15.388663]  kunit_try_run_case+0x1a5/0x480
[   15.388849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.389051]  kthread+0x337/0x6f0
[   15.389487]  ret_from_fork+0x116/0x1d0
[   15.389890]  ret_from_fork_asm+0x1a/0x30
[   15.390569] 
[   15.390688] The buggy address belongs to the object at ffff8881038b5600
[   15.390688]  which belongs to the cache kmalloc-64 of size 64
[   15.391355] The buggy address is located 0 bytes to the right of
[   15.391355]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.391768] 
[   15.391850] The buggy address belongs to the physical page:
[   15.392128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.392577] flags: 0x200000000000000(node=0|zone=2)
[   15.392781] page_type: f5(slab)
[   15.392913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.393400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.393941] page dumped because: kasan: bad access detected
[   15.394266] 
[   15.394345] Memory state around the buggy address:
[   15.394580]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.394935]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.395698] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.396043]                                      ^
[   15.396312]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.396682]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.397016] ==================================================================
[   16.289866] ==================================================================
[   16.290515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   16.290941] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.291419] 
[   16.291591] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.291649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.291663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.291713] Call Trace:
[   16.291729]  <TASK>
[   16.291745]  dump_stack_lvl+0x73/0xb0
[   16.291789]  print_report+0xd1/0x610
[   16.291823]  ? __virt_addr_valid+0x1db/0x2d0
[   16.291858]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.291882]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.291934]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.291958]  kasan_report+0x141/0x180
[   16.292009]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.292052]  __asan_report_store8_noabort+0x1b/0x30
[   16.292079]  kasan_atomics_helper+0x50d4/0x5450
[   16.292103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.292174]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.292217]  ? kasan_atomics+0x152/0x310
[   16.292248]  kasan_atomics+0x1dc/0x310
[   16.292272]  ? __pfx_kasan_atomics+0x10/0x10
[   16.292328]  ? __pfx_read_tsc+0x10/0x10
[   16.292353]  ? ktime_get_ts64+0x86/0x230
[   16.292378]  kunit_try_run_case+0x1a5/0x480
[   16.292438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.292462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.292508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.292533]  ? __kthread_parkme+0x82/0x180
[   16.292556]  ? preempt_count_sub+0x50/0x80
[   16.292582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.292608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.292661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.292687]  kthread+0x337/0x6f0
[   16.292735]  ? trace_preempt_on+0x20/0xc0
[   16.292760]  ? __pfx_kthread+0x10/0x10
[   16.292796]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.292820]  ? calculate_sigpending+0x7b/0xa0
[   16.292861]  ? __pfx_kthread+0x10/0x10
[   16.292885]  ret_from_fork+0x116/0x1d0
[   16.292920]  ? __pfx_kthread+0x10/0x10
[   16.292957]  ret_from_fork_asm+0x1a/0x30
[   16.293002]  </TASK>
[   16.293028] 
[   16.302710] Allocated by task 283:
[   16.302888]  kasan_save_stack+0x45/0x70
[   16.303151]  kasan_save_track+0x18/0x40
[   16.303440]  kasan_save_alloc_info+0x3b/0x50
[   16.303734]  __kasan_kmalloc+0xb7/0xc0
[   16.303933]  __kmalloc_cache_noprof+0x189/0x420
[   16.304199]  kasan_atomics+0x95/0x310
[   16.304410]  kunit_try_run_case+0x1a5/0x480
[   16.304746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.305013]  kthread+0x337/0x6f0
[   16.305186]  ret_from_fork+0x116/0x1d0
[   16.305378]  ret_from_fork_asm+0x1a/0x30
[   16.305571] 
[   16.305649] The buggy address belongs to the object at ffff8881038b5600
[   16.305649]  which belongs to the cache kmalloc-64 of size 64
[   16.306546] The buggy address is located 0 bytes to the right of
[   16.306546]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.307439] 
[   16.307587] The buggy address belongs to the physical page:
[   16.307916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.308279] flags: 0x200000000000000(node=0|zone=2)
[   16.308546] page_type: f5(slab)
[   16.308743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.309089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.309572] page dumped because: kasan: bad access detected
[   16.309989] 
[   16.310065] Memory state around the buggy address:
[   16.310232]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.310457]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.310948] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.311436]                                      ^
[   16.311730]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.312209]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.312607] ==================================================================
[   15.490887] ==================================================================
[   15.491133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.491817] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.492368] 
[   15.492552] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.492709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.492751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.492775] Call Trace:
[   15.492794]  <TASK>
[   15.492812]  dump_stack_lvl+0x73/0xb0
[   15.492844]  print_report+0xd1/0x610
[   15.492868]  ? __virt_addr_valid+0x1db/0x2d0
[   15.492892]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.492915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.492939]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.492963]  kasan_report+0x141/0x180
[   15.492986]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.493013]  __asan_report_load4_noabort+0x18/0x20
[   15.493104]  kasan_atomics_helper+0x4b54/0x5450
[   15.493129]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.493153]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.493180]  ? kasan_atomics+0x152/0x310
[   15.493208]  kasan_atomics+0x1dc/0x310
[   15.493232]  ? __pfx_kasan_atomics+0x10/0x10
[   15.493258]  ? __pfx_read_tsc+0x10/0x10
[   15.493281]  ? ktime_get_ts64+0x86/0x230
[   15.493307]  kunit_try_run_case+0x1a5/0x480
[   15.493333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.493356]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.493382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.493407]  ? __kthread_parkme+0x82/0x180
[   15.493429]  ? preempt_count_sub+0x50/0x80
[   15.493505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.493530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.493555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.493580]  kthread+0x337/0x6f0
[   15.493600]  ? trace_preempt_on+0x20/0xc0
[   15.493656]  ? __pfx_kthread+0x10/0x10
[   15.493679]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.493703]  ? calculate_sigpending+0x7b/0xa0
[   15.493728]  ? __pfx_kthread+0x10/0x10
[   15.493751]  ret_from_fork+0x116/0x1d0
[   15.493772]  ? __pfx_kthread+0x10/0x10
[   15.493794]  ret_from_fork_asm+0x1a/0x30
[   15.493851]  </TASK>
[   15.493862] 
[   15.503531] Allocated by task 283:
[   15.503801]  kasan_save_stack+0x45/0x70
[   15.504013]  kasan_save_track+0x18/0x40
[   15.504274]  kasan_save_alloc_info+0x3b/0x50
[   15.504514]  __kasan_kmalloc+0xb7/0xc0
[   15.504729]  __kmalloc_cache_noprof+0x189/0x420
[   15.504977]  kasan_atomics+0x95/0x310
[   15.505120]  kunit_try_run_case+0x1a5/0x480
[   15.505276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.505461]  kthread+0x337/0x6f0
[   15.505652]  ret_from_fork+0x116/0x1d0
[   15.505920]  ret_from_fork_asm+0x1a/0x30
[   15.506354] 
[   15.506648] The buggy address belongs to the object at ffff8881038b5600
[   15.506648]  which belongs to the cache kmalloc-64 of size 64
[   15.507557] The buggy address is located 0 bytes to the right of
[   15.507557]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.508461] 
[   15.508614] The buggy address belongs to the physical page:
[   15.508915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.509377] flags: 0x200000000000000(node=0|zone=2)
[   15.509631] page_type: f5(slab)
[   15.509761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.509999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.510373] page dumped because: kasan: bad access detected
[   15.510937] 
[   15.511156] Memory state around the buggy address:
[   15.511566]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.511959]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.512388] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.512622]                                      ^
[   15.512899]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.513722]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.514356] ==================================================================
[   16.313518] ==================================================================
[   16.313953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   16.314517] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.314957] 
[   16.315115] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.315163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.315176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.315198] Call Trace:
[   16.315216]  <TASK>
[   16.315232]  dump_stack_lvl+0x73/0xb0
[   16.315265]  print_report+0xd1/0x610
[   16.315289]  ? __virt_addr_valid+0x1db/0x2d0
[   16.315313]  ? kasan_atomics_helper+0x151d/0x5450
[   16.315349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.315374]  ? kasan_atomics_helper+0x151d/0x5450
[   16.315397]  kasan_report+0x141/0x180
[   16.315434]  ? kasan_atomics_helper+0x151d/0x5450
[   16.315505]  kasan_check_range+0x10c/0x1c0
[   16.315531]  __kasan_check_write+0x18/0x20
[   16.315552]  kasan_atomics_helper+0x151d/0x5450
[   16.315588]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.315612]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.315638]  ? kasan_atomics+0x152/0x310
[   16.315667]  kasan_atomics+0x1dc/0x310
[   16.315691]  ? __pfx_kasan_atomics+0x10/0x10
[   16.315717]  ? __pfx_read_tsc+0x10/0x10
[   16.315740]  ? ktime_get_ts64+0x86/0x230
[   16.315765]  kunit_try_run_case+0x1a5/0x480
[   16.315801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.315826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.315869]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.315895]  ? __kthread_parkme+0x82/0x180
[   16.315939]  ? preempt_count_sub+0x50/0x80
[   16.315965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.315991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.316027]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.316054]  kthread+0x337/0x6f0
[   16.316076]  ? trace_preempt_on+0x20/0xc0
[   16.316100]  ? __pfx_kthread+0x10/0x10
[   16.316123]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.316147]  ? calculate_sigpending+0x7b/0xa0
[   16.316172]  ? __pfx_kthread+0x10/0x10
[   16.316195]  ret_from_fork+0x116/0x1d0
[   16.316216]  ? __pfx_kthread+0x10/0x10
[   16.316238]  ret_from_fork_asm+0x1a/0x30
[   16.316270]  </TASK>
[   16.316281] 
[   16.325984] Allocated by task 283:
[   16.326282]  kasan_save_stack+0x45/0x70
[   16.326558]  kasan_save_track+0x18/0x40
[   16.326788]  kasan_save_alloc_info+0x3b/0x50
[   16.327009]  __kasan_kmalloc+0xb7/0xc0
[   16.327257]  __kmalloc_cache_noprof+0x189/0x420
[   16.327572]  kasan_atomics+0x95/0x310
[   16.327773]  kunit_try_run_case+0x1a5/0x480
[   16.328048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.328291]  kthread+0x337/0x6f0
[   16.328600]  ret_from_fork+0x116/0x1d0
[   16.329080]  ret_from_fork_asm+0x1a/0x30
[   16.329295] 
[   16.329423] The buggy address belongs to the object at ffff8881038b5600
[   16.329423]  which belongs to the cache kmalloc-64 of size 64
[   16.329970] The buggy address is located 0 bytes to the right of
[   16.329970]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.330565] 
[   16.330664] The buggy address belongs to the physical page:
[   16.330917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.331219] flags: 0x200000000000000(node=0|zone=2)
[   16.331382] page_type: f5(slab)
[   16.331581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.332174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.332649] page dumped because: kasan: bad access detected
[   16.333002] 
[   16.333201] Memory state around the buggy address:
[   16.333442]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.333818]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.334354] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.334948]                                      ^
[   16.335341]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.335699]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.336088] ==================================================================
[   16.360901] ==================================================================
[   16.361322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.361682] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.362149] 
[   16.362238] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.362282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.362294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.362316] Call Trace:
[   16.362332]  <TASK>
[   16.362348]  dump_stack_lvl+0x73/0xb0
[   16.362379]  print_report+0xd1/0x610
[   16.362402]  ? __virt_addr_valid+0x1db/0x2d0
[   16.362497]  ? kasan_atomics_helper+0x164f/0x5450
[   16.362522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.362580]  ? kasan_atomics_helper+0x164f/0x5450
[   16.362605]  kasan_report+0x141/0x180
[   16.362657]  ? kasan_atomics_helper+0x164f/0x5450
[   16.362684]  kasan_check_range+0x10c/0x1c0
[   16.362710]  __kasan_check_write+0x18/0x20
[   16.362731]  kasan_atomics_helper+0x164f/0x5450
[   16.362754]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.362778]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.362806]  ? kasan_atomics+0x152/0x310
[   16.362834]  kasan_atomics+0x1dc/0x310
[   16.362858]  ? __pfx_kasan_atomics+0x10/0x10
[   16.362885]  ? __pfx_read_tsc+0x10/0x10
[   16.362906]  ? ktime_get_ts64+0x86/0x230
[   16.362932]  kunit_try_run_case+0x1a5/0x480
[   16.362985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.363048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.363121]  ? __kthread_parkme+0x82/0x180
[   16.363176]  ? preempt_count_sub+0x50/0x80
[   16.363201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.363264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.363289]  kthread+0x337/0x6f0
[   16.363336]  ? trace_preempt_on+0x20/0xc0
[   16.363362]  ? __pfx_kthread+0x10/0x10
[   16.363384]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.363419]  ? calculate_sigpending+0x7b/0xa0
[   16.363444]  ? __pfx_kthread+0x10/0x10
[   16.363477]  ret_from_fork+0x116/0x1d0
[   16.363525]  ? __pfx_kthread+0x10/0x10
[   16.363547]  ret_from_fork_asm+0x1a/0x30
[   16.363580]  </TASK>
[   16.363602] 
[   16.373665] Allocated by task 283:
[   16.373966]  kasan_save_stack+0x45/0x70
[   16.374255]  kasan_save_track+0x18/0x40
[   16.374485]  kasan_save_alloc_info+0x3b/0x50
[   16.374663]  __kasan_kmalloc+0xb7/0xc0
[   16.374852]  __kmalloc_cache_noprof+0x189/0x420
[   16.375142]  kasan_atomics+0x95/0x310
[   16.375336]  kunit_try_run_case+0x1a5/0x480
[   16.375497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.375678]  kthread+0x337/0x6f0
[   16.375803]  ret_from_fork+0x116/0x1d0
[   16.375981]  ret_from_fork_asm+0x1a/0x30
[   16.376449] 
[   16.376573] The buggy address belongs to the object at ffff8881038b5600
[   16.376573]  which belongs to the cache kmalloc-64 of size 64
[   16.377176] The buggy address is located 0 bytes to the right of
[   16.377176]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.378238] 
[   16.378347] The buggy address belongs to the physical page:
[   16.378629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.379180] flags: 0x200000000000000(node=0|zone=2)
[   16.379512] page_type: f5(slab)
[   16.379709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.380041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.380392] page dumped because: kasan: bad access detected
[   16.380695] 
[   16.380838] Memory state around the buggy address:
[   16.381240]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.381462]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.381809] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.382300]                                      ^
[   16.382858]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.383806]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.384526] ==================================================================
[   16.648727] ==================================================================
[   16.649008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.649722] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.650563] 
[   16.650761] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.650815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.650829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.650852] Call Trace:
[   16.650871]  <TASK>
[   16.650899]  dump_stack_lvl+0x73/0xb0
[   16.650934]  print_report+0xd1/0x610
[   16.650960]  ? __virt_addr_valid+0x1db/0x2d0
[   16.650986]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.651008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.651032]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.651054]  kasan_report+0x141/0x180
[   16.651079]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.651107]  kasan_check_range+0x10c/0x1c0
[   16.651133]  __kasan_check_write+0x18/0x20
[   16.651154]  kasan_atomics_helper+0x1e12/0x5450
[   16.651177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.651201]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.651227]  ? kasan_atomics+0x152/0x310
[   16.651256]  kasan_atomics+0x1dc/0x310
[   16.651281]  ? __pfx_kasan_atomics+0x10/0x10
[   16.651306]  ? __pfx_read_tsc+0x10/0x10
[   16.651329]  ? ktime_get_ts64+0x86/0x230
[   16.651355]  kunit_try_run_case+0x1a5/0x480
[   16.651380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.651404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.651430]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.651455]  ? __kthread_parkme+0x82/0x180
[   16.651487]  ? preempt_count_sub+0x50/0x80
[   16.651523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.651548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.651584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.651609]  kthread+0x337/0x6f0
[   16.651631]  ? trace_preempt_on+0x20/0xc0
[   16.651654]  ? __pfx_kthread+0x10/0x10
[   16.651676]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.651700]  ? calculate_sigpending+0x7b/0xa0
[   16.651725]  ? __pfx_kthread+0x10/0x10
[   16.651748]  ret_from_fork+0x116/0x1d0
[   16.651767]  ? __pfx_kthread+0x10/0x10
[   16.651800]  ret_from_fork_asm+0x1a/0x30
[   16.651832]  </TASK>
[   16.651844] 
[   16.664993] Allocated by task 283:
[   16.665144]  kasan_save_stack+0x45/0x70
[   16.665300]  kasan_save_track+0x18/0x40
[   16.665437]  kasan_save_alloc_info+0x3b/0x50
[   16.665602]  __kasan_kmalloc+0xb7/0xc0
[   16.665736]  __kmalloc_cache_noprof+0x189/0x420
[   16.666453]  kasan_atomics+0x95/0x310
[   16.666921]  kunit_try_run_case+0x1a5/0x480
[   16.667377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.667972]  kthread+0x337/0x6f0
[   16.668343]  ret_from_fork+0x116/0x1d0
[   16.668790]  ret_from_fork_asm+0x1a/0x30
[   16.669244] 
[   16.669499] The buggy address belongs to the object at ffff8881038b5600
[   16.669499]  which belongs to the cache kmalloc-64 of size 64
[   16.670305] The buggy address is located 0 bytes to the right of
[   16.670305]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.670687] 
[   16.670765] The buggy address belongs to the physical page:
[   16.670945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.671276] flags: 0x200000000000000(node=0|zone=2)
[   16.671530] page_type: f5(slab)
[   16.671704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.672464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.672900] page dumped because: kasan: bad access detected
[   16.673147] 
[   16.673368] Memory state around the buggy address:
[   16.673559]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.674148]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.674534] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.674885]                                      ^
[   16.675206]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.675497]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.675977] ==================================================================
[   15.569724] ==================================================================
[   15.570802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.571575] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.572613] 
[   15.572722] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.573117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.573144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.573171] Call Trace:
[   15.573192]  <TASK>
[   15.573265]  dump_stack_lvl+0x73/0xb0
[   15.573307]  print_report+0xd1/0x610
[   15.573331]  ? __virt_addr_valid+0x1db/0x2d0
[   15.573357]  ? kasan_atomics_helper+0x565/0x5450
[   15.573379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.573405]  ? kasan_atomics_helper+0x565/0x5450
[   15.573429]  kasan_report+0x141/0x180
[   15.573453]  ? kasan_atomics_helper+0x565/0x5450
[   15.573492]  kasan_check_range+0x10c/0x1c0
[   15.573518]  __kasan_check_write+0x18/0x20
[   15.573540]  kasan_atomics_helper+0x565/0x5450
[   15.573564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.573588]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.573616]  ? kasan_atomics+0x152/0x310
[   15.573645]  kasan_atomics+0x1dc/0x310
[   15.573669]  ? __pfx_kasan_atomics+0x10/0x10
[   15.573695]  ? __pfx_read_tsc+0x10/0x10
[   15.573718]  ? ktime_get_ts64+0x86/0x230
[   15.573745]  kunit_try_run_case+0x1a5/0x480
[   15.573791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.573816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.573843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.573868]  ? __kthread_parkme+0x82/0x180
[   15.573890]  ? preempt_count_sub+0x50/0x80
[   15.573916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.573942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.573967]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.573992]  kthread+0x337/0x6f0
[   15.574013]  ? trace_preempt_on+0x20/0xc0
[   15.574056]  ? __pfx_kthread+0x10/0x10
[   15.574078]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.574108]  ? calculate_sigpending+0x7b/0xa0
[   15.574134]  ? __pfx_kthread+0x10/0x10
[   15.574157]  ret_from_fork+0x116/0x1d0
[   15.574179]  ? __pfx_kthread+0x10/0x10
[   15.574202]  ret_from_fork_asm+0x1a/0x30
[   15.574234]  </TASK>
[   15.574247] 
[   15.592952] Allocated by task 283:
[   15.593108]  kasan_save_stack+0x45/0x70
[   15.593270]  kasan_save_track+0x18/0x40
[   15.593417]  kasan_save_alloc_info+0x3b/0x50
[   15.593791]  __kasan_kmalloc+0xb7/0xc0
[   15.594173]  __kmalloc_cache_noprof+0x189/0x420
[   15.594669]  kasan_atomics+0x95/0x310
[   15.595078]  kunit_try_run_case+0x1a5/0x480
[   15.595569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.596111]  kthread+0x337/0x6f0
[   15.596519]  ret_from_fork+0x116/0x1d0
[   15.596812]  ret_from_fork_asm+0x1a/0x30
[   15.597362] 
[   15.597526] The buggy address belongs to the object at ffff8881038b5600
[   15.597526]  which belongs to the cache kmalloc-64 of size 64
[   15.598512] The buggy address is located 0 bytes to the right of
[   15.598512]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.599106] 
[   15.599279] The buggy address belongs to the physical page:
[   15.599915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.600761] flags: 0x200000000000000(node=0|zone=2)
[   15.601332] page_type: f5(slab)
[   15.601557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.602090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.602911] page dumped because: kasan: bad access detected
[   15.603238] 
[   15.603379] Memory state around the buggy address:
[   15.603785]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.604427]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.604668] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.605217]                                      ^
[   15.605717]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.606721]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.607572] ==================================================================
[   16.860137] ==================================================================
[   16.860814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.861423] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.861664] 
[   16.861830] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.861882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.861894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.861917] Call Trace:
[   16.861938]  <TASK>
[   16.861955]  dump_stack_lvl+0x73/0xb0
[   16.861989]  print_report+0xd1/0x610
[   16.862013]  ? __virt_addr_valid+0x1db/0x2d0
[   16.862037]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.862059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.862082]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.862114]  kasan_report+0x141/0x180
[   16.862137]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.862165]  __asan_report_load8_noabort+0x18/0x20
[   16.862190]  kasan_atomics_helper+0x4fa5/0x5450
[   16.862214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.862237]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.862264]  ? kasan_atomics+0x152/0x310
[   16.862291]  kasan_atomics+0x1dc/0x310
[   16.862315]  ? __pfx_kasan_atomics+0x10/0x10
[   16.862340]  ? __pfx_read_tsc+0x10/0x10
[   16.862364]  ? ktime_get_ts64+0x86/0x230
[   16.862390]  kunit_try_run_case+0x1a5/0x480
[   16.862415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.862439]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.862465]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.862501]  ? __kthread_parkme+0x82/0x180
[   16.862523]  ? preempt_count_sub+0x50/0x80
[   16.862548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.862574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.862598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.862622]  kthread+0x337/0x6f0
[   16.862644]  ? trace_preempt_on+0x20/0xc0
[   16.862668]  ? __pfx_kthread+0x10/0x10
[   16.862690]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.862713]  ? calculate_sigpending+0x7b/0xa0
[   16.862739]  ? __pfx_kthread+0x10/0x10
[   16.862780]  ret_from_fork+0x116/0x1d0
[   16.862801]  ? __pfx_kthread+0x10/0x10
[   16.862822]  ret_from_fork_asm+0x1a/0x30
[   16.862854]  </TASK>
[   16.862866] 
[   16.872061] Allocated by task 283:
[   16.872201]  kasan_save_stack+0x45/0x70
[   16.872355]  kasan_save_track+0x18/0x40
[   16.872558]  kasan_save_alloc_info+0x3b/0x50
[   16.872812]  __kasan_kmalloc+0xb7/0xc0
[   16.873008]  __kmalloc_cache_noprof+0x189/0x420
[   16.873238]  kasan_atomics+0x95/0x310
[   16.873428]  kunit_try_run_case+0x1a5/0x480
[   16.873593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.873810]  kthread+0x337/0x6f0
[   16.873987]  ret_from_fork+0x116/0x1d0
[   16.874193]  ret_from_fork_asm+0x1a/0x30
[   16.874397] 
[   16.874506] The buggy address belongs to the object at ffff8881038b5600
[   16.874506]  which belongs to the cache kmalloc-64 of size 64
[   16.875040] The buggy address is located 0 bytes to the right of
[   16.875040]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.875565] 
[   16.875649] The buggy address belongs to the physical page:
[   16.875919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.876237] flags: 0x200000000000000(node=0|zone=2)
[   16.876452] page_type: f5(slab)
[   16.876643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.876964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.877282] page dumped because: kasan: bad access detected
[   16.877534] 
[   16.877630] Memory state around the buggy address:
[   16.877879]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.878129]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.878409] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.878743]                                      ^
[   16.878989]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.879273]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.879513] ==================================================================
[   15.727377] ==================================================================
[   15.727727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.728156] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.728478] 
[   15.728606] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.728654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.728667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.728690] Call Trace:
[   15.728709]  <TASK>
[   15.728726]  dump_stack_lvl+0x73/0xb0
[   15.728758]  print_report+0xd1/0x610
[   15.728782]  ? __virt_addr_valid+0x1db/0x2d0
[   15.728807]  ? kasan_atomics_helper+0x860/0x5450
[   15.728829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.728854]  ? kasan_atomics_helper+0x860/0x5450
[   15.728877]  kasan_report+0x141/0x180
[   15.728901]  ? kasan_atomics_helper+0x860/0x5450
[   15.728928]  kasan_check_range+0x10c/0x1c0
[   15.728954]  __kasan_check_write+0x18/0x20
[   15.728975]  kasan_atomics_helper+0x860/0x5450
[   15.729014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.729048]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.729074]  ? kasan_atomics+0x152/0x310
[   15.729152]  kasan_atomics+0x1dc/0x310
[   15.729180]  ? __pfx_kasan_atomics+0x10/0x10
[   15.729206]  ? __pfx_read_tsc+0x10/0x10
[   15.729230]  ? ktime_get_ts64+0x86/0x230
[   15.729257]  kunit_try_run_case+0x1a5/0x480
[   15.729283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.729307]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.729334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.729359]  ? __kthread_parkme+0x82/0x180
[   15.729381]  ? preempt_count_sub+0x50/0x80
[   15.729406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.729441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.729466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.729509]  kthread+0x337/0x6f0
[   15.729530]  ? trace_preempt_on+0x20/0xc0
[   15.729556]  ? __pfx_kthread+0x10/0x10
[   15.729578]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.729600]  ? calculate_sigpending+0x7b/0xa0
[   15.729635]  ? __pfx_kthread+0x10/0x10
[   15.729658]  ret_from_fork+0x116/0x1d0
[   15.729677]  ? __pfx_kthread+0x10/0x10
[   15.729711]  ret_from_fork_asm+0x1a/0x30
[   15.729743]  </TASK>
[   15.729754] 
[   15.738621] Allocated by task 283:
[   15.738763]  kasan_save_stack+0x45/0x70
[   15.739020]  kasan_save_track+0x18/0x40
[   15.739261]  kasan_save_alloc_info+0x3b/0x50
[   15.739534]  __kasan_kmalloc+0xb7/0xc0
[   15.739775]  __kmalloc_cache_noprof+0x189/0x420
[   15.740030]  kasan_atomics+0x95/0x310
[   15.740305]  kunit_try_run_case+0x1a5/0x480
[   15.740529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.740741]  kthread+0x337/0x6f0
[   15.740906]  ret_from_fork+0x116/0x1d0
[   15.741218]  ret_from_fork_asm+0x1a/0x30
[   15.741418] 
[   15.741532] The buggy address belongs to the object at ffff8881038b5600
[   15.741532]  which belongs to the cache kmalloc-64 of size 64
[   15.742106] The buggy address is located 0 bytes to the right of
[   15.742106]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.742898] 
[   15.743025] The buggy address belongs to the physical page:
[   15.743314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.743666] flags: 0x200000000000000(node=0|zone=2)
[   15.743982] page_type: f5(slab)
[   15.744213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.744485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.744722] page dumped because: kasan: bad access detected
[   15.744902] 
[   15.744977] Memory state around the buggy address:
[   15.745243]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.745582]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.746079] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.746373]                                      ^
[   15.746548]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746782]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.747109] ==================================================================
[   16.898547] ==================================================================
[   16.898941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.899325] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.899670] 
[   16.899811] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.899860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.899873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.899896] Call Trace:
[   16.899917]  <TASK>
[   16.899934]  dump_stack_lvl+0x73/0xb0
[   16.899966]  print_report+0xd1/0x610
[   16.899990]  ? __virt_addr_valid+0x1db/0x2d0
[   16.900014]  ? kasan_atomics_helper+0x5115/0x5450
[   16.900036]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.900058]  ? kasan_atomics_helper+0x5115/0x5450
[   16.900081]  kasan_report+0x141/0x180
[   16.900104]  ? kasan_atomics_helper+0x5115/0x5450
[   16.900132]  __asan_report_load8_noabort+0x18/0x20
[   16.900160]  kasan_atomics_helper+0x5115/0x5450
[   16.900186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.900210]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.900237]  ? kasan_atomics+0x152/0x310
[   16.900264]  kasan_atomics+0x1dc/0x310
[   16.900287]  ? __pfx_kasan_atomics+0x10/0x10
[   16.900313]  ? __pfx_read_tsc+0x10/0x10
[   16.900336]  ? ktime_get_ts64+0x86/0x230
[   16.900362]  kunit_try_run_case+0x1a5/0x480
[   16.900388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.900412]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.900439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.900464]  ? __kthread_parkme+0x82/0x180
[   16.900497]  ? preempt_count_sub+0x50/0x80
[   16.900523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.900548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.900573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.900598]  kthread+0x337/0x6f0
[   16.900619]  ? trace_preempt_on+0x20/0xc0
[   16.900644]  ? __pfx_kthread+0x10/0x10
[   16.900666]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.900689]  ? calculate_sigpending+0x7b/0xa0
[   16.900715]  ? __pfx_kthread+0x10/0x10
[   16.900739]  ret_from_fork+0x116/0x1d0
[   16.900777]  ? __pfx_kthread+0x10/0x10
[   16.900800]  ret_from_fork_asm+0x1a/0x30
[   16.900833]  </TASK>
[   16.900845] 
[   16.908118] Allocated by task 283:
[   16.908303]  kasan_save_stack+0x45/0x70
[   16.908495]  kasan_save_track+0x18/0x40
[   16.908682]  kasan_save_alloc_info+0x3b/0x50
[   16.908909]  __kasan_kmalloc+0xb7/0xc0
[   16.909060]  __kmalloc_cache_noprof+0x189/0x420
[   16.909265]  kasan_atomics+0x95/0x310
[   16.909453]  kunit_try_run_case+0x1a5/0x480
[   16.909669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.909930]  kthread+0x337/0x6f0
[   16.910058]  ret_from_fork+0x116/0x1d0
[   16.910202]  ret_from_fork_asm+0x1a/0x30
[   16.910348] 
[   16.910424] The buggy address belongs to the object at ffff8881038b5600
[   16.910424]  which belongs to the cache kmalloc-64 of size 64
[   16.910822] The buggy address is located 0 bytes to the right of
[   16.910822]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.911212] 
[   16.911312] The buggy address belongs to the physical page:
[   16.911585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.911962] flags: 0x200000000000000(node=0|zone=2)
[   16.912202] page_type: f5(slab)
[   16.912374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.912734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.913099] page dumped because: kasan: bad access detected
[   16.913356] 
[   16.913451] Memory state around the buggy address:
[   16.913687]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.913985]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.914216] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.914438]                                      ^
[   16.914679]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.915035]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.915361] ==================================================================
[   16.228000] ==================================================================
[   16.228319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   16.228925] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.229382] 
[   16.229528] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.229575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.229588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.229612] Call Trace:
[   16.229630]  <TASK>
[   16.229657]  dump_stack_lvl+0x73/0xb0
[   16.229691]  print_report+0xd1/0x610
[   16.229714]  ? __virt_addr_valid+0x1db/0x2d0
[   16.229750]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.229773]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.229798]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.229821]  kasan_report+0x141/0x180
[   16.229844]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.229873]  kasan_check_range+0x10c/0x1c0
[   16.229901]  __kasan_check_read+0x15/0x20
[   16.229922]  kasan_atomics_helper+0x13b5/0x5450
[   16.229946]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.229970]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.229996]  ? kasan_atomics+0x152/0x310
[   16.230024]  kasan_atomics+0x1dc/0x310
[   16.230048]  ? __pfx_kasan_atomics+0x10/0x10
[   16.230082]  ? __pfx_read_tsc+0x10/0x10
[   16.230112]  ? ktime_get_ts64+0x86/0x230
[   16.230138]  kunit_try_run_case+0x1a5/0x480
[   16.230175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.230199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.230226]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.230251]  ? __kthread_parkme+0x82/0x180
[   16.230273]  ? preempt_count_sub+0x50/0x80
[   16.230297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.230323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.230348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.230426]  kthread+0x337/0x6f0
[   16.230448]  ? trace_preempt_on+0x20/0xc0
[   16.230483]  ? __pfx_kthread+0x10/0x10
[   16.230515]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.230538]  ? calculate_sigpending+0x7b/0xa0
[   16.230574]  ? __pfx_kthread+0x10/0x10
[   16.230608]  ret_from_fork+0x116/0x1d0
[   16.230627]  ? __pfx_kthread+0x10/0x10
[   16.230649]  ret_from_fork_asm+0x1a/0x30
[   16.230691]  </TASK>
[   16.230702] 
[   16.239656] Allocated by task 283:
[   16.239868]  kasan_save_stack+0x45/0x70
[   16.240021]  kasan_save_track+0x18/0x40
[   16.240240]  kasan_save_alloc_info+0x3b/0x50
[   16.240529]  __kasan_kmalloc+0xb7/0xc0
[   16.240785]  __kmalloc_cache_noprof+0x189/0x420
[   16.241033]  kasan_atomics+0x95/0x310
[   16.241278]  kunit_try_run_case+0x1a5/0x480
[   16.241493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.241747]  kthread+0x337/0x6f0
[   16.241925]  ret_from_fork+0x116/0x1d0
[   16.242172]  ret_from_fork_asm+0x1a/0x30
[   16.242359] 
[   16.242434] The buggy address belongs to the object at ffff8881038b5600
[   16.242434]  which belongs to the cache kmalloc-64 of size 64
[   16.242989] The buggy address is located 0 bytes to the right of
[   16.242989]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.243732] 
[   16.243897] The buggy address belongs to the physical page:
[   16.244298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.244613] flags: 0x200000000000000(node=0|zone=2)
[   16.244832] page_type: f5(slab)
[   16.245020] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.245434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.245709] page dumped because: kasan: bad access detected
[   16.245889] 
[   16.245963] Memory state around the buggy address:
[   16.246129]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.246353]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.246750] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.247071]                                      ^
[   16.247300]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.247761]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.248111] ==================================================================
[   15.930743] ==================================================================
[   15.931160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.931537] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.931880] 
[   15.931981] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.932026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.932039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.932060] Call Trace:
[   15.932076]  <TASK>
[   15.932092]  dump_stack_lvl+0x73/0xb0
[   15.932122]  print_report+0xd1/0x610
[   15.932146]  ? __virt_addr_valid+0x1db/0x2d0
[   15.932169]  ? kasan_atomics_helper+0xde0/0x5450
[   15.932192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.932215]  ? kasan_atomics_helper+0xde0/0x5450
[   15.932238]  kasan_report+0x141/0x180
[   15.932262]  ? kasan_atomics_helper+0xde0/0x5450
[   15.932289]  kasan_check_range+0x10c/0x1c0
[   15.932314]  __kasan_check_write+0x18/0x20
[   15.932335]  kasan_atomics_helper+0xde0/0x5450
[   15.932358]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.932382]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.932408]  ? kasan_atomics+0x152/0x310
[   15.932436]  kasan_atomics+0x1dc/0x310
[   15.932460]  ? __pfx_kasan_atomics+0x10/0x10
[   15.932497]  ? __pfx_read_tsc+0x10/0x10
[   15.932519]  ? ktime_get_ts64+0x86/0x230
[   15.932545]  kunit_try_run_case+0x1a5/0x480
[   15.932570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.932595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.932620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.932645]  ? __kthread_parkme+0x82/0x180
[   15.932667]  ? preempt_count_sub+0x50/0x80
[   15.932692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.932719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.932743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.932769]  kthread+0x337/0x6f0
[   15.932789]  ? trace_preempt_on+0x20/0xc0
[   15.932813]  ? __pfx_kthread+0x10/0x10
[   15.932835]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.932859]  ? calculate_sigpending+0x7b/0xa0
[   15.932884]  ? __pfx_kthread+0x10/0x10
[   15.932907]  ret_from_fork+0x116/0x1d0
[   15.932928]  ? __pfx_kthread+0x10/0x10
[   15.932950]  ret_from_fork_asm+0x1a/0x30
[   15.932982]  </TASK>
[   15.932993] 
[   15.941229] Allocated by task 283:
[   15.941370]  kasan_save_stack+0x45/0x70
[   15.941532]  kasan_save_track+0x18/0x40
[   15.941988]  kasan_save_alloc_info+0x3b/0x50
[   15.942494]  __kasan_kmalloc+0xb7/0xc0
[   15.942695]  __kmalloc_cache_noprof+0x189/0x420
[   15.942920]  kasan_atomics+0x95/0x310
[   15.943114]  kunit_try_run_case+0x1a5/0x480
[   15.943324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.943592]  kthread+0x337/0x6f0
[   15.943848]  ret_from_fork+0x116/0x1d0
[   15.943993]  ret_from_fork_asm+0x1a/0x30
[   15.944396] 
[   15.944486] The buggy address belongs to the object at ffff8881038b5600
[   15.944486]  which belongs to the cache kmalloc-64 of size 64
[   15.945043] The buggy address is located 0 bytes to the right of
[   15.945043]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.945624] 
[   15.945721] The buggy address belongs to the physical page:
[   15.946243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.946592] flags: 0x200000000000000(node=0|zone=2)
[   15.946808] page_type: f5(slab)
[   15.946984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.947296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.947622] page dumped because: kasan: bad access detected
[   15.947976] 
[   15.948103] Memory state around the buggy address:
[   15.948315]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.948582]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.948861] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.949570]                                      ^
[   15.949767]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.950201]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.950535] ==================================================================
[   16.544969] ==================================================================
[   16.545556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.546003] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.546394] 
[   16.546544] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.546589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.546603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.546626] Call Trace:
[   16.546644]  <TASK>
[   16.546660]  dump_stack_lvl+0x73/0xb0
[   16.546713]  print_report+0xd1/0x610
[   16.546738]  ? __virt_addr_valid+0x1db/0x2d0
[   16.546797]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.546821]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.546845]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.546869]  kasan_report+0x141/0x180
[   16.546892]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.546920]  kasan_check_range+0x10c/0x1c0
[   16.546945]  __kasan_check_write+0x18/0x20
[   16.546967]  kasan_atomics_helper+0x1b22/0x5450
[   16.546991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.547014]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.547099]  ? kasan_atomics+0x152/0x310
[   16.547151]  kasan_atomics+0x1dc/0x310
[   16.547175]  ? __pfx_kasan_atomics+0x10/0x10
[   16.547202]  ? __pfx_read_tsc+0x10/0x10
[   16.547225]  ? ktime_get_ts64+0x86/0x230
[   16.547251]  kunit_try_run_case+0x1a5/0x480
[   16.547277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.547301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.547345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.547370]  ? __kthread_parkme+0x82/0x180
[   16.547392]  ? preempt_count_sub+0x50/0x80
[   16.547417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.547443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.547478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.547504]  kthread+0x337/0x6f0
[   16.547541]  ? trace_preempt_on+0x20/0xc0
[   16.547568]  ? __pfx_kthread+0x10/0x10
[   16.547604]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.547628]  ? calculate_sigpending+0x7b/0xa0
[   16.547654]  ? __pfx_kthread+0x10/0x10
[   16.547692]  ret_from_fork+0x116/0x1d0
[   16.547712]  ? __pfx_kthread+0x10/0x10
[   16.547747]  ret_from_fork_asm+0x1a/0x30
[   16.547799]  </TASK>
[   16.547810] 
[   16.556696] Allocated by task 283:
[   16.556910]  kasan_save_stack+0x45/0x70
[   16.557155]  kasan_save_track+0x18/0x40
[   16.557376]  kasan_save_alloc_info+0x3b/0x50
[   16.557603]  __kasan_kmalloc+0xb7/0xc0
[   16.557794]  __kmalloc_cache_noprof+0x189/0x420
[   16.558092]  kasan_atomics+0x95/0x310
[   16.558266]  kunit_try_run_case+0x1a5/0x480
[   16.558549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.558818]  kthread+0x337/0x6f0
[   16.558974]  ret_from_fork+0x116/0x1d0
[   16.559252]  ret_from_fork_asm+0x1a/0x30
[   16.559454] 
[   16.559569] The buggy address belongs to the object at ffff8881038b5600
[   16.559569]  which belongs to the cache kmalloc-64 of size 64
[   16.560173] The buggy address is located 0 bytes to the right of
[   16.560173]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.560727] 
[   16.560859] The buggy address belongs to the physical page:
[   16.561345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.561694] flags: 0x200000000000000(node=0|zone=2)
[   16.561913] page_type: f5(slab)
[   16.562226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.562579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.562954] page dumped because: kasan: bad access detected
[   16.563309] 
[   16.563404] Memory state around the buggy address:
[   16.563645]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.564014]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.564257] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.564605]                                      ^
[   16.564846]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.565175]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.565601] ==================================================================
[   16.130795] ==================================================================
[   16.131027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   16.131784] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.132455] 
[   16.132730] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.132776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.132788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.132811] Call Trace:
[   16.132829]  <TASK>
[   16.132871]  dump_stack_lvl+0x73/0xb0
[   16.132903]  print_report+0xd1/0x610
[   16.132928]  ? __virt_addr_valid+0x1db/0x2d0
[   16.132964]  ? kasan_atomics_helper+0x1217/0x5450
[   16.132986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.133010]  ? kasan_atomics_helper+0x1217/0x5450
[   16.133032]  kasan_report+0x141/0x180
[   16.133080]  ? kasan_atomics_helper+0x1217/0x5450
[   16.133107]  kasan_check_range+0x10c/0x1c0
[   16.133131]  __kasan_check_write+0x18/0x20
[   16.133178]  kasan_atomics_helper+0x1217/0x5450
[   16.133203]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.133226]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.133251]  ? kasan_atomics+0x152/0x310
[   16.133280]  kasan_atomics+0x1dc/0x310
[   16.133330]  ? __pfx_kasan_atomics+0x10/0x10
[   16.133355]  ? __pfx_read_tsc+0x10/0x10
[   16.133388]  ? ktime_get_ts64+0x86/0x230
[   16.133414]  kunit_try_run_case+0x1a5/0x480
[   16.133440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.133463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.133499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.133523]  ? __kthread_parkme+0x82/0x180
[   16.133545]  ? preempt_count_sub+0x50/0x80
[   16.133570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.133596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.133620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.133645]  kthread+0x337/0x6f0
[   16.133666]  ? trace_preempt_on+0x20/0xc0
[   16.133690]  ? __pfx_kthread+0x10/0x10
[   16.133711]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.133735]  ? calculate_sigpending+0x7b/0xa0
[   16.133760]  ? __pfx_kthread+0x10/0x10
[   16.133794]  ret_from_fork+0x116/0x1d0
[   16.133815]  ? __pfx_kthread+0x10/0x10
[   16.133836]  ret_from_fork_asm+0x1a/0x30
[   16.133868]  </TASK>
[   16.133879] 
[   16.142751] Allocated by task 283:
[   16.142977]  kasan_save_stack+0x45/0x70
[   16.143204]  kasan_save_track+0x18/0x40
[   16.143562]  kasan_save_alloc_info+0x3b/0x50
[   16.143828]  __kasan_kmalloc+0xb7/0xc0
[   16.144037]  __kmalloc_cache_noprof+0x189/0x420
[   16.144373]  kasan_atomics+0x95/0x310
[   16.144601]  kunit_try_run_case+0x1a5/0x480
[   16.144970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.145235]  kthread+0x337/0x6f0
[   16.145459]  ret_from_fork+0x116/0x1d0
[   16.145674]  ret_from_fork_asm+0x1a/0x30
[   16.145919] 
[   16.146021] The buggy address belongs to the object at ffff8881038b5600
[   16.146021]  which belongs to the cache kmalloc-64 of size 64
[   16.146686] The buggy address is located 0 bytes to the right of
[   16.146686]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.147400] 
[   16.147526] The buggy address belongs to the physical page:
[   16.147869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.148482] flags: 0x200000000000000(node=0|zone=2)
[   16.148745] page_type: f5(slab)
[   16.148934] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.149346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.149684] page dumped because: kasan: bad access detected
[   16.150096] 
[   16.150178] Memory state around the buggy address:
[   16.150424]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.150788]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.151188] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.151408]                                      ^
[   16.151741]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.152074]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.152310] ==================================================================
[   16.676756] ==================================================================
[   16.677168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.677820] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.678146] 
[   16.678273] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.678323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.678336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.678360] Call Trace:
[   16.678379]  <TASK>
[   16.678396]  dump_stack_lvl+0x73/0xb0
[   16.678429]  print_report+0xd1/0x610
[   16.678453]  ? __virt_addr_valid+0x1db/0x2d0
[   16.678491]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.678514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.678538]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.678560]  kasan_report+0x141/0x180
[   16.678583]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.678610]  kasan_check_range+0x10c/0x1c0
[   16.678635]  __kasan_check_write+0x18/0x20
[   16.678656]  kasan_atomics_helper+0x1eaa/0x5450
[   16.678679]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.678702]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.678729]  ? kasan_atomics+0x152/0x310
[   16.678756]  kasan_atomics+0x1dc/0x310
[   16.678780]  ? __pfx_kasan_atomics+0x10/0x10
[   16.678806]  ? __pfx_read_tsc+0x10/0x10
[   16.678828]  ? ktime_get_ts64+0x86/0x230
[   16.678854]  kunit_try_run_case+0x1a5/0x480
[   16.678891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.678914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.678940]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.678966]  ? __kthread_parkme+0x82/0x180
[   16.678988]  ? preempt_count_sub+0x50/0x80
[   16.679013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.679038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.679062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.679087]  kthread+0x337/0x6f0
[   16.679108]  ? trace_preempt_on+0x20/0xc0
[   16.679134]  ? __pfx_kthread+0x10/0x10
[   16.679155]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.679178]  ? calculate_sigpending+0x7b/0xa0
[   16.679203]  ? __pfx_kthread+0x10/0x10
[   16.679226]  ret_from_fork+0x116/0x1d0
[   16.679245]  ? __pfx_kthread+0x10/0x10
[   16.679267]  ret_from_fork_asm+0x1a/0x30
[   16.679299]  </TASK>
[   16.679311] 
[   16.693669] Allocated by task 283:
[   16.693824]  kasan_save_stack+0x45/0x70
[   16.693975]  kasan_save_track+0x18/0x40
[   16.694250]  kasan_save_alloc_info+0x3b/0x50
[   16.694478]  __kasan_kmalloc+0xb7/0xc0
[   16.694667]  __kmalloc_cache_noprof+0x189/0x420
[   16.694829]  kasan_atomics+0x95/0x310
[   16.695036]  kunit_try_run_case+0x1a5/0x480
[   16.695260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.695524]  kthread+0x337/0x6f0
[   16.695668]  ret_from_fork+0x116/0x1d0
[   16.695882]  ret_from_fork_asm+0x1a/0x30
[   16.696075] 
[   16.696151] The buggy address belongs to the object at ffff8881038b5600
[   16.696151]  which belongs to the cache kmalloc-64 of size 64
[   16.696744] The buggy address is located 0 bytes to the right of
[   16.696744]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.697185] 
[   16.697262] The buggy address belongs to the physical page:
[   16.697538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.698046] flags: 0x200000000000000(node=0|zone=2)
[   16.698252] page_type: f5(slab)
[   16.698427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.698736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.699064] page dumped because: kasan: bad access detected
[   16.699299] 
[   16.699373] Memory state around the buggy address:
[   16.699571]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.700042]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.700342] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.700593]                                      ^
[   16.700800]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.701131]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.701443] ==================================================================
[   16.095665] ==================================================================
[   16.096586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   16.096965] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.097307] 
[   16.097425] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.099639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.099663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.099688] Call Trace:
[   16.099708]  <TASK>
[   16.099726]  dump_stack_lvl+0x73/0xb0
[   16.099762]  print_report+0xd1/0x610
[   16.099786]  ? __virt_addr_valid+0x1db/0x2d0
[   16.099809]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.099846]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.099870]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.099895]  kasan_report+0x141/0x180
[   16.099918]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.099945]  __asan_report_load4_noabort+0x18/0x20
[   16.099970]  kasan_atomics_helper+0x4a02/0x5450
[   16.099995]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.100018]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.100046]  ? kasan_atomics+0x152/0x310
[   16.100074]  kasan_atomics+0x1dc/0x310
[   16.100099]  ? __pfx_kasan_atomics+0x10/0x10
[   16.100126]  ? __pfx_read_tsc+0x10/0x10
[   16.100149]  ? ktime_get_ts64+0x86/0x230
[   16.100175]  kunit_try_run_case+0x1a5/0x480
[   16.100200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.100224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.100250]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.100275]  ? __kthread_parkme+0x82/0x180
[   16.100296]  ? preempt_count_sub+0x50/0x80
[   16.100322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.100348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.100373]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.100398]  kthread+0x337/0x6f0
[   16.100419]  ? trace_preempt_on+0x20/0xc0
[   16.100442]  ? __pfx_kthread+0x10/0x10
[   16.100465]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.100499]  ? calculate_sigpending+0x7b/0xa0
[   16.100526]  ? __pfx_kthread+0x10/0x10
[   16.100550]  ret_from_fork+0x116/0x1d0
[   16.100570]  ? __pfx_kthread+0x10/0x10
[   16.100594]  ret_from_fork_asm+0x1a/0x30
[   16.100626]  </TASK>
[   16.100637] 
[   16.115456] Allocated by task 283:
[   16.115847]  kasan_save_stack+0x45/0x70
[   16.116323]  kasan_save_track+0x18/0x40
[   16.116633]  kasan_save_alloc_info+0x3b/0x50
[   16.116822]  __kasan_kmalloc+0xb7/0xc0
[   16.117290]  __kmalloc_cache_noprof+0x189/0x420
[   16.117754]  kasan_atomics+0x95/0x310
[   16.118265]  kunit_try_run_case+0x1a5/0x480
[   16.118579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.118929]  kthread+0x337/0x6f0
[   16.119489]  ret_from_fork+0x116/0x1d0
[   16.119778]  ret_from_fork_asm+0x1a/0x30
[   16.119930] 
[   16.120008] The buggy address belongs to the object at ffff8881038b5600
[   16.120008]  which belongs to the cache kmalloc-64 of size 64
[   16.121252] The buggy address is located 0 bytes to the right of
[   16.121252]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.122636] 
[   16.122844] The buggy address belongs to the physical page:
[   16.123329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.123588] flags: 0x200000000000000(node=0|zone=2)
[   16.123759] page_type: f5(slab)
[   16.124120] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.125024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.125874] page dumped because: kasan: bad access detected
[   16.126388] 
[   16.126571] Memory state around the buggy address:
[   16.127169]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.127661]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.128119] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.128912]                                      ^
[   16.129443]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.130157]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.130388] ==================================================================
[   15.970063] ==================================================================
[   15.970420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.970769] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.971100] 
[   15.971207] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.971249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.971262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.971283] Call Trace:
[   15.971299]  <TASK>
[   15.971314]  dump_stack_lvl+0x73/0xb0
[   15.971343]  print_report+0xd1/0x610
[   15.971366]  ? __virt_addr_valid+0x1db/0x2d0
[   15.971388]  ? kasan_atomics_helper+0xf10/0x5450
[   15.971410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.971434]  ? kasan_atomics_helper+0xf10/0x5450
[   15.971456]  kasan_report+0x141/0x180
[   15.971538]  ? kasan_atomics_helper+0xf10/0x5450
[   15.971568]  kasan_check_range+0x10c/0x1c0
[   15.971593]  __kasan_check_write+0x18/0x20
[   15.971613]  kasan_atomics_helper+0xf10/0x5450
[   15.971636]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.971660]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.971686]  ? kasan_atomics+0x152/0x310
[   15.971713]  kasan_atomics+0x1dc/0x310
[   15.971737]  ? __pfx_kasan_atomics+0x10/0x10
[   15.971762]  ? __pfx_read_tsc+0x10/0x10
[   15.971784]  ? ktime_get_ts64+0x86/0x230
[   15.971810]  kunit_try_run_case+0x1a5/0x480
[   15.971835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.971858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.971884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.971908]  ? __kthread_parkme+0x82/0x180
[   15.971929]  ? preempt_count_sub+0x50/0x80
[   15.971953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.971978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.972003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.972028]  kthread+0x337/0x6f0
[   15.972048]  ? trace_preempt_on+0x20/0xc0
[   15.972073]  ? __pfx_kthread+0x10/0x10
[   15.972095]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.972118]  ? calculate_sigpending+0x7b/0xa0
[   15.972142]  ? __pfx_kthread+0x10/0x10
[   15.972165]  ret_from_fork+0x116/0x1d0
[   15.972186]  ? __pfx_kthread+0x10/0x10
[   15.972207]  ret_from_fork_asm+0x1a/0x30
[   15.972239]  </TASK>
[   15.972250] 
[   15.981479] Allocated by task 283:
[   15.981651]  kasan_save_stack+0x45/0x70
[   15.981868]  kasan_save_track+0x18/0x40
[   15.982053]  kasan_save_alloc_info+0x3b/0x50
[   15.982527]  __kasan_kmalloc+0xb7/0xc0
[   15.982732]  __kmalloc_cache_noprof+0x189/0x420
[   15.982961]  kasan_atomics+0x95/0x310
[   15.983221]  kunit_try_run_case+0x1a5/0x480
[   15.983411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.983675]  kthread+0x337/0x6f0
[   15.983873]  ret_from_fork+0x116/0x1d0
[   15.984092]  ret_from_fork_asm+0x1a/0x30
[   15.984288] 
[   15.984390] The buggy address belongs to the object at ffff8881038b5600
[   15.984390]  which belongs to the cache kmalloc-64 of size 64
[   15.984915] The buggy address is located 0 bytes to the right of
[   15.984915]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.985698] 
[   15.985814] The buggy address belongs to the physical page:
[   15.986108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.986413] flags: 0x200000000000000(node=0|zone=2)
[   15.986669] page_type: f5(slab)
[   15.986889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.987397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.987658] page dumped because: kasan: bad access detected
[   15.987990] 
[   15.988124] Memory state around the buggy address:
[   15.988356]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.988702]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.989188] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.989418]                                      ^
[   15.989598]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990156]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990505] ==================================================================
[   16.269648] ==================================================================
[   16.270119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   16.270462] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.270879] 
[   16.270995] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.271071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.271086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.271107] Call Trace:
[   16.271134]  <TASK>
[   16.271150]  dump_stack_lvl+0x73/0xb0
[   16.271180]  print_report+0xd1/0x610
[   16.271216]  ? __virt_addr_valid+0x1db/0x2d0
[   16.271239]  ? kasan_atomics_helper+0x1467/0x5450
[   16.271262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.271284]  ? kasan_atomics_helper+0x1467/0x5450
[   16.271317]  kasan_report+0x141/0x180
[   16.271339]  ? kasan_atomics_helper+0x1467/0x5450
[   16.271367]  kasan_check_range+0x10c/0x1c0
[   16.271401]  __kasan_check_write+0x18/0x20
[   16.271422]  kasan_atomics_helper+0x1467/0x5450
[   16.271446]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.271488]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.271513]  ? kasan_atomics+0x152/0x310
[   16.271552]  kasan_atomics+0x1dc/0x310
[   16.271576]  ? __pfx_kasan_atomics+0x10/0x10
[   16.271601]  ? __pfx_read_tsc+0x10/0x10
[   16.271623]  ? ktime_get_ts64+0x86/0x230
[   16.271648]  kunit_try_run_case+0x1a5/0x480
[   16.271673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.271698]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.271723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.271747]  ? __kthread_parkme+0x82/0x180
[   16.271769]  ? preempt_count_sub+0x50/0x80
[   16.271812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.271838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.271862]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.271898]  kthread+0x337/0x6f0
[   16.271918]  ? trace_preempt_on+0x20/0xc0
[   16.271942]  ? __pfx_kthread+0x10/0x10
[   16.271965]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.271988]  ? calculate_sigpending+0x7b/0xa0
[   16.272013]  ? __pfx_kthread+0x10/0x10
[   16.272068]  ret_from_fork+0x116/0x1d0
[   16.272092]  ? __pfx_kthread+0x10/0x10
[   16.272115]  ret_from_fork_asm+0x1a/0x30
[   16.272158]  </TASK>
[   16.272171] 
[   16.280872] Allocated by task 283:
[   16.281083]  kasan_save_stack+0x45/0x70
[   16.281366]  kasan_save_track+0x18/0x40
[   16.281602]  kasan_save_alloc_info+0x3b/0x50
[   16.281861]  __kasan_kmalloc+0xb7/0xc0
[   16.282108]  __kmalloc_cache_noprof+0x189/0x420
[   16.282358]  kasan_atomics+0x95/0x310
[   16.282582]  kunit_try_run_case+0x1a5/0x480
[   16.282816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.283009]  kthread+0x337/0x6f0
[   16.283230]  ret_from_fork+0x116/0x1d0
[   16.283454]  ret_from_fork_asm+0x1a/0x30
[   16.283643] 
[   16.283720] The buggy address belongs to the object at ffff8881038b5600
[   16.283720]  which belongs to the cache kmalloc-64 of size 64
[   16.284084] The buggy address is located 0 bytes to the right of
[   16.284084]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.284905] 
[   16.285017] The buggy address belongs to the physical page:
[   16.285280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.285582] flags: 0x200000000000000(node=0|zone=2)
[   16.285753] page_type: f5(slab)
[   16.285879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.286430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.287061] page dumped because: kasan: bad access detected
[   16.287258] 
[   16.287339] Memory state around the buggy address:
[   16.287578]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.287935]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.288339] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.288614]                                      ^
[   16.288777]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.289119]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.289446] ==================================================================
[   15.991117] ==================================================================
[   15.991370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.991741] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.992306] 
[   15.992429] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.992489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.992502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.992524] Call Trace:
[   15.992543]  <TASK>
[   15.992558]  dump_stack_lvl+0x73/0xb0
[   15.992593]  print_report+0xd1/0x610
[   15.992617]  ? __virt_addr_valid+0x1db/0x2d0
[   15.992640]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.992663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.992686]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.992710]  kasan_report+0x141/0x180
[   15.992735]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.992762]  kasan_check_range+0x10c/0x1c0
[   15.992788]  __kasan_check_write+0x18/0x20
[   15.992821]  kasan_atomics_helper+0xfa9/0x5450
[   15.992846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.992869]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.992896]  ? kasan_atomics+0x152/0x310
[   15.992925]  kasan_atomics+0x1dc/0x310
[   15.992950]  ? __pfx_kasan_atomics+0x10/0x10
[   15.992976]  ? __pfx_read_tsc+0x10/0x10
[   15.992998]  ? ktime_get_ts64+0x86/0x230
[   15.993024]  kunit_try_run_case+0x1a5/0x480
[   15.993144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.993199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.993225]  ? __kthread_parkme+0x82/0x180
[   15.993248]  ? preempt_count_sub+0x50/0x80
[   15.993275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.993326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.993352]  kthread+0x337/0x6f0
[   15.993373]  ? trace_preempt_on+0x20/0xc0
[   15.993397]  ? __pfx_kthread+0x10/0x10
[   15.993419]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.993444]  ? calculate_sigpending+0x7b/0xa0
[   15.993482]  ? __pfx_kthread+0x10/0x10
[   15.993505]  ret_from_fork+0x116/0x1d0
[   15.993527]  ? __pfx_kthread+0x10/0x10
[   15.993550]  ret_from_fork_asm+0x1a/0x30
[   15.993583]  </TASK>
[   15.993594] 
[   16.002027] Allocated by task 283:
[   16.002451]  kasan_save_stack+0x45/0x70
[   16.002683]  kasan_save_track+0x18/0x40
[   16.002996]  kasan_save_alloc_info+0x3b/0x50
[   16.003230]  __kasan_kmalloc+0xb7/0xc0
[   16.003372]  __kmalloc_cache_noprof+0x189/0x420
[   16.003574]  kasan_atomics+0x95/0x310
[   16.003765]  kunit_try_run_case+0x1a5/0x480
[   16.003985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.004430]  kthread+0x337/0x6f0
[   16.004572]  ret_from_fork+0x116/0x1d0
[   16.004715]  ret_from_fork_asm+0x1a/0x30
[   16.005107] 
[   16.005211] The buggy address belongs to the object at ffff8881038b5600
[   16.005211]  which belongs to the cache kmalloc-64 of size 64
[   16.005744] The buggy address is located 0 bytes to the right of
[   16.005744]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.006323] 
[   16.006407] The buggy address belongs to the physical page:
[   16.006671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.007061] flags: 0x200000000000000(node=0|zone=2)
[   16.007263] page_type: f5(slab)
[   16.007435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.007751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.008061] page dumped because: kasan: bad access detected
[   16.008296] 
[   16.008369] Memory state around the buggy address:
[   16.008610]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.008926]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.009149] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.009371]                                      ^
[   16.009547]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.009776]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.009997] ==================================================================
[   15.419518] ==================================================================
[   15.419937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.420234] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.420677] 
[   15.420888] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.420939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.420951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.420974] Call Trace:
[   15.420992]  <TASK>
[   15.421008]  dump_stack_lvl+0x73/0xb0
[   15.421040]  print_report+0xd1/0x610
[   15.421064]  ? __virt_addr_valid+0x1db/0x2d0
[   15.421086]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.421166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.421204]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.421227]  kasan_report+0x141/0x180
[   15.421250]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.421277]  __asan_report_load4_noabort+0x18/0x20
[   15.421302]  kasan_atomics_helper+0x4b88/0x5450
[   15.421325]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.421347]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.421374]  ? kasan_atomics+0x152/0x310
[   15.421401]  kasan_atomics+0x1dc/0x310
[   15.421424]  ? __pfx_kasan_atomics+0x10/0x10
[   15.421449]  ? __pfx_read_tsc+0x10/0x10
[   15.421481]  ? ktime_get_ts64+0x86/0x230
[   15.421507]  kunit_try_run_case+0x1a5/0x480
[   15.421532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.421556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.421582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.421606]  ? __kthread_parkme+0x82/0x180
[   15.421627]  ? preempt_count_sub+0x50/0x80
[   15.421653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.421678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.421728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.421753]  kthread+0x337/0x6f0
[   15.421774]  ? trace_preempt_on+0x20/0xc0
[   15.421809]  ? __pfx_kthread+0x10/0x10
[   15.421830]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.421853]  ? calculate_sigpending+0x7b/0xa0
[   15.421907]  ? __pfx_kthread+0x10/0x10
[   15.421930]  ret_from_fork+0x116/0x1d0
[   15.421949]  ? __pfx_kthread+0x10/0x10
[   15.421981]  ret_from_fork_asm+0x1a/0x30
[   15.422013]  </TASK>
[   15.422024] 
[   15.431377] Allocated by task 283:
[   15.431637]  kasan_save_stack+0x45/0x70
[   15.431936]  kasan_save_track+0x18/0x40
[   15.432221]  kasan_save_alloc_info+0x3b/0x50
[   15.432533]  __kasan_kmalloc+0xb7/0xc0
[   15.432734]  __kmalloc_cache_noprof+0x189/0x420
[   15.432926]  kasan_atomics+0x95/0x310
[   15.433432]  kunit_try_run_case+0x1a5/0x480
[   15.433605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.433956]  kthread+0x337/0x6f0
[   15.434218]  ret_from_fork+0x116/0x1d0
[   15.434395]  ret_from_fork_asm+0x1a/0x30
[   15.434553] 
[   15.434656] The buggy address belongs to the object at ffff8881038b5600
[   15.434656]  which belongs to the cache kmalloc-64 of size 64
[   15.435335] The buggy address is located 0 bytes to the right of
[   15.435335]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.435919] 
[   15.436068] The buggy address belongs to the physical page:
[   15.436260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.436541] flags: 0x200000000000000(node=0|zone=2)
[   15.437010] page_type: f5(slab)
[   15.437393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.437801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.438277] page dumped because: kasan: bad access detected
[   15.438528] 
[   15.438605] Memory state around the buggy address:
[   15.438794]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.439252]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.439692] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.440003]                                      ^
[   15.440263]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.440517]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.440852] ==================================================================
[   16.701980] ==================================================================
[   16.702479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.702819] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.703155] 
[   16.703277] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.703322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.703335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.703359] Call Trace:
[   16.703375]  <TASK>
[   16.703392]  dump_stack_lvl+0x73/0xb0
[   16.703422]  print_report+0xd1/0x610
[   16.703446]  ? __virt_addr_valid+0x1db/0x2d0
[   16.703482]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.703505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.703529]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.703552]  kasan_report+0x141/0x180
[   16.703575]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.703603]  kasan_check_range+0x10c/0x1c0
[   16.703627]  __kasan_check_write+0x18/0x20
[   16.703648]  kasan_atomics_helper+0x1f43/0x5450
[   16.703672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.703696]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.703721]  ? kasan_atomics+0x152/0x310
[   16.703750]  kasan_atomics+0x1dc/0x310
[   16.703773]  ? __pfx_kasan_atomics+0x10/0x10
[   16.703799]  ? __pfx_read_tsc+0x10/0x10
[   16.703821]  ? ktime_get_ts64+0x86/0x230
[   16.703847]  kunit_try_run_case+0x1a5/0x480
[   16.703873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.703897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.703923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.703948]  ? __kthread_parkme+0x82/0x180
[   16.703970]  ? preempt_count_sub+0x50/0x80
[   16.703995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.704021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.704046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.704071]  kthread+0x337/0x6f0
[   16.704092]  ? trace_preempt_on+0x20/0xc0
[   16.704117]  ? __pfx_kthread+0x10/0x10
[   16.704138]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.704163]  ? calculate_sigpending+0x7b/0xa0
[   16.704187]  ? __pfx_kthread+0x10/0x10
[   16.704211]  ret_from_fork+0x116/0x1d0
[   16.704231]  ? __pfx_kthread+0x10/0x10
[   16.704252]  ret_from_fork_asm+0x1a/0x30
[   16.704284]  </TASK>
[   16.704295] 
[   16.711931] Allocated by task 283:
[   16.712119]  kasan_save_stack+0x45/0x70
[   16.712325]  kasan_save_track+0x18/0x40
[   16.712533]  kasan_save_alloc_info+0x3b/0x50
[   16.712722]  __kasan_kmalloc+0xb7/0xc0
[   16.712889]  __kmalloc_cache_noprof+0x189/0x420
[   16.713114]  kasan_atomics+0x95/0x310
[   16.713288]  kunit_try_run_case+0x1a5/0x480
[   16.713487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.713724]  kthread+0x337/0x6f0
[   16.713920]  ret_from_fork+0x116/0x1d0
[   16.714061]  ret_from_fork_asm+0x1a/0x30
[   16.714213] 
[   16.714290] The buggy address belongs to the object at ffff8881038b5600
[   16.714290]  which belongs to the cache kmalloc-64 of size 64
[   16.714671] The buggy address is located 0 bytes to the right of
[   16.714671]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.715055] 
[   16.715131] The buggy address belongs to the physical page:
[   16.715395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.715763] flags: 0x200000000000000(node=0|zone=2)
[   16.716276] page_type: f5(slab)
[   16.716450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.716711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.716945] page dumped because: kasan: bad access detected
[   16.717122] 
[   16.717195] Memory state around the buggy address:
[   16.717355]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.717631]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.718202] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.718547]                                      ^
[   16.718778]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.719107]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.719439] ==================================================================
[   16.412838] ==================================================================
[   16.413198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.413596] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.413950] 
[   16.414072] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.414133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.414145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.414169] Call Trace:
[   16.414189]  <TASK>
[   16.414205]  dump_stack_lvl+0x73/0xb0
[   16.414236]  print_report+0xd1/0x610
[   16.414260]  ? __virt_addr_valid+0x1db/0x2d0
[   16.414284]  ? kasan_atomics_helper+0x177f/0x5450
[   16.414306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.414330]  ? kasan_atomics_helper+0x177f/0x5450
[   16.414354]  kasan_report+0x141/0x180
[   16.414392]  ? kasan_atomics_helper+0x177f/0x5450
[   16.414420]  kasan_check_range+0x10c/0x1c0
[   16.414445]  __kasan_check_write+0x18/0x20
[   16.414465]  kasan_atomics_helper+0x177f/0x5450
[   16.414500]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.414524]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.414551]  ? kasan_atomics+0x152/0x310
[   16.414601]  kasan_atomics+0x1dc/0x310
[   16.414650]  ? __pfx_kasan_atomics+0x10/0x10
[   16.414676]  ? __pfx_read_tsc+0x10/0x10
[   16.414728]  ? ktime_get_ts64+0x86/0x230
[   16.414778]  kunit_try_run_case+0x1a5/0x480
[   16.414805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.414830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.414855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.414881]  ? __kthread_parkme+0x82/0x180
[   16.414902]  ? preempt_count_sub+0x50/0x80
[   16.414927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.414952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.414977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.415003]  kthread+0x337/0x6f0
[   16.415024]  ? trace_preempt_on+0x20/0xc0
[   16.415067]  ? __pfx_kthread+0x10/0x10
[   16.415090]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.415114]  ? calculate_sigpending+0x7b/0xa0
[   16.415139]  ? __pfx_kthread+0x10/0x10
[   16.415162]  ret_from_fork+0x116/0x1d0
[   16.415218]  ? __pfx_kthread+0x10/0x10
[   16.415240]  ret_from_fork_asm+0x1a/0x30
[   16.415273]  </TASK>
[   16.415284] 
[   16.427995] Allocated by task 283:
[   16.428438]  kasan_save_stack+0x45/0x70
[   16.428786]  kasan_save_track+0x18/0x40
[   16.429281]  kasan_save_alloc_info+0x3b/0x50
[   16.429516]  __kasan_kmalloc+0xb7/0xc0
[   16.429696]  __kmalloc_cache_noprof+0x189/0x420
[   16.430084]  kasan_atomics+0x95/0x310
[   16.430488]  kunit_try_run_case+0x1a5/0x480
[   16.430705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.431232]  kthread+0x337/0x6f0
[   16.431667]  ret_from_fork+0x116/0x1d0
[   16.431965]  ret_from_fork_asm+0x1a/0x30
[   16.432320] 
[   16.432441] The buggy address belongs to the object at ffff8881038b5600
[   16.432441]  which belongs to the cache kmalloc-64 of size 64
[   16.433302] The buggy address is located 0 bytes to the right of
[   16.433302]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.434233] 
[   16.434359] The buggy address belongs to the physical page:
[   16.434620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.435274] flags: 0x200000000000000(node=0|zone=2)
[   16.435769] page_type: f5(slab)
[   16.436080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.436721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.437127] page dumped because: kasan: bad access detected
[   16.437373] 
[   16.437499] Memory state around the buggy address:
[   16.437712]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.437976]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.438339] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.438595]                                      ^
[   16.438858]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.439171]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.439394] ==================================================================
[   16.719942] ==================================================================
[   16.720638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.721032] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.721324] 
[   16.721409] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.721453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.721465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.721497] Call Trace:
[   16.721512]  <TASK>
[   16.721527]  dump_stack_lvl+0x73/0xb0
[   16.721558]  print_report+0xd1/0x610
[   16.721581]  ? __virt_addr_valid+0x1db/0x2d0
[   16.721605]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.721627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.721650]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.721673]  kasan_report+0x141/0x180
[   16.721696]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.721723]  __asan_report_load8_noabort+0x18/0x20
[   16.721748]  kasan_atomics_helper+0x4f71/0x5450
[   16.721772]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.721805]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.721830]  ? kasan_atomics+0x152/0x310
[   16.721858]  kasan_atomics+0x1dc/0x310
[   16.721881]  ? __pfx_kasan_atomics+0x10/0x10
[   16.721906]  ? __pfx_read_tsc+0x10/0x10
[   16.721929]  ? ktime_get_ts64+0x86/0x230
[   16.721954]  kunit_try_run_case+0x1a5/0x480
[   16.721980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.722004]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.722031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.722055]  ? __kthread_parkme+0x82/0x180
[   16.722077]  ? preempt_count_sub+0x50/0x80
[   16.722109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.722134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.722158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.722183]  kthread+0x337/0x6f0
[   16.722204]  ? trace_preempt_on+0x20/0xc0
[   16.722229]  ? __pfx_kthread+0x10/0x10
[   16.722250]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.722273]  ? calculate_sigpending+0x7b/0xa0
[   16.722298]  ? __pfx_kthread+0x10/0x10
[   16.722321]  ret_from_fork+0x116/0x1d0
[   16.722341]  ? __pfx_kthread+0x10/0x10
[   16.722362]  ret_from_fork_asm+0x1a/0x30
[   16.722394]  </TASK>
[   16.722405] 
[   16.730056] Allocated by task 283:
[   16.730202]  kasan_save_stack+0x45/0x70
[   16.730351]  kasan_save_track+0x18/0x40
[   16.730557]  kasan_save_alloc_info+0x3b/0x50
[   16.730775]  __kasan_kmalloc+0xb7/0xc0
[   16.730969]  __kmalloc_cache_noprof+0x189/0x420
[   16.731139]  kasan_atomics+0x95/0x310
[   16.731277]  kunit_try_run_case+0x1a5/0x480
[   16.731435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.731630]  kthread+0x337/0x6f0
[   16.731756]  ret_from_fork+0x116/0x1d0
[   16.731898]  ret_from_fork_asm+0x1a/0x30
[   16.732048] 
[   16.732125] The buggy address belongs to the object at ffff8881038b5600
[   16.732125]  which belongs to the cache kmalloc-64 of size 64
[   16.733398] The buggy address is located 0 bytes to the right of
[   16.733398]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.735229] 
[   16.735609] The buggy address belongs to the physical page:
[   16.736226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.737190] flags: 0x200000000000000(node=0|zone=2)
[   16.737845] page_type: f5(slab)
[   16.738387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.739386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.740392] page dumped because: kasan: bad access detected
[   16.741170] 
[   16.741505] Memory state around the buggy address:
[   16.741678]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.742442]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.743315] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.743562]                                      ^
[   16.743726]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.744385]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.744624] ==================================================================
[   15.747703] ==================================================================
[   15.748515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.748791] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.749308] 
[   15.749448] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.749507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.749520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.749553] Call Trace:
[   15.749573]  <TASK>
[   15.749590]  dump_stack_lvl+0x73/0xb0
[   15.749635]  print_report+0xd1/0x610
[   15.749660]  ? __virt_addr_valid+0x1db/0x2d0
[   15.749684]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.749707]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.749740]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.749764]  kasan_report+0x141/0x180
[   15.749788]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.749827]  kasan_check_range+0x10c/0x1c0
[   15.749852]  __kasan_check_write+0x18/0x20
[   15.749873]  kasan_atomics_helper+0x8f9/0x5450
[   15.749897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.749922]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.749958]  ? kasan_atomics+0x152/0x310
[   15.749987]  kasan_atomics+0x1dc/0x310
[   15.750022]  ? __pfx_kasan_atomics+0x10/0x10
[   15.750099]  ? __pfx_read_tsc+0x10/0x10
[   15.750133]  ? ktime_get_ts64+0x86/0x230
[   15.750159]  kunit_try_run_case+0x1a5/0x480
[   15.750187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.750224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.750252]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.750289]  ? __kthread_parkme+0x82/0x180
[   15.750312]  ? preempt_count_sub+0x50/0x80
[   15.750338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.750364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.750399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.750425]  kthread+0x337/0x6f0
[   15.750447]  ? trace_preempt_on+0x20/0xc0
[   15.750487]  ? __pfx_kthread+0x10/0x10
[   15.750510]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.750535]  ? calculate_sigpending+0x7b/0xa0
[   15.750561]  ? __pfx_kthread+0x10/0x10
[   15.750595]  ret_from_fork+0x116/0x1d0
[   15.750616]  ? __pfx_kthread+0x10/0x10
[   15.750638]  ret_from_fork_asm+0x1a/0x30
[   15.750682]  </TASK>
[   15.750694] 
[   15.759823] Allocated by task 283:
[   15.759967]  kasan_save_stack+0x45/0x70
[   15.760117]  kasan_save_track+0x18/0x40
[   15.760259]  kasan_save_alloc_info+0x3b/0x50
[   15.760423]  __kasan_kmalloc+0xb7/0xc0
[   15.760626]  __kmalloc_cache_noprof+0x189/0x420
[   15.760853]  kasan_atomics+0x95/0x310
[   15.761558]  kunit_try_run_case+0x1a5/0x480
[   15.761786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.762088]  kthread+0x337/0x6f0
[   15.762276]  ret_from_fork+0x116/0x1d0
[   15.762484]  ret_from_fork_asm+0x1a/0x30
[   15.762685] 
[   15.762792] The buggy address belongs to the object at ffff8881038b5600
[   15.762792]  which belongs to the cache kmalloc-64 of size 64
[   15.763455] The buggy address is located 0 bytes to the right of
[   15.763455]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.764259] 
[   15.764386] The buggy address belongs to the physical page:
[   15.764647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.765030] flags: 0x200000000000000(node=0|zone=2)
[   15.765490] page_type: f5(slab)
[   15.765636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.766008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.766397] page dumped because: kasan: bad access detected
[   15.766672] 
[   15.766763] Memory state around the buggy address:
[   15.767066]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.767305]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.767533] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.767811]                                      ^
[   15.768136]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.768481]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.768810] ==================================================================
[   15.769341] ==================================================================
[   15.769597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.769852] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.770185] 
[   15.770292] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.770337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.770349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.770371] Call Trace:
[   15.770388]  <TASK>
[   15.770403]  dump_stack_lvl+0x73/0xb0
[   15.770433]  print_report+0xd1/0x610
[   15.770456]  ? __virt_addr_valid+0x1db/0x2d0
[   15.770515]  ? kasan_atomics_helper+0x992/0x5450
[   15.770538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.770561]  ? kasan_atomics_helper+0x992/0x5450
[   15.770755]  kasan_report+0x141/0x180
[   15.770783]  ? kasan_atomics_helper+0x992/0x5450
[   15.770821]  kasan_check_range+0x10c/0x1c0
[   15.770846]  __kasan_check_write+0x18/0x20
[   15.770866]  kasan_atomics_helper+0x992/0x5450
[   15.770889]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.770912]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.770953]  ? kasan_atomics+0x152/0x310
[   15.770980]  kasan_atomics+0x1dc/0x310
[   15.771017]  ? __pfx_kasan_atomics+0x10/0x10
[   15.771093]  ? __pfx_read_tsc+0x10/0x10
[   15.771117]  ? ktime_get_ts64+0x86/0x230
[   15.771142]  kunit_try_run_case+0x1a5/0x480
[   15.771169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.771193]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.771218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.771243]  ? __kthread_parkme+0x82/0x180
[   15.771264]  ? preempt_count_sub+0x50/0x80
[   15.771289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.771314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.771339]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.771364]  kthread+0x337/0x6f0
[   15.771386]  ? trace_preempt_on+0x20/0xc0
[   15.771410]  ? __pfx_kthread+0x10/0x10
[   15.771432]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.771465]  ? calculate_sigpending+0x7b/0xa0
[   15.771500]  ? __pfx_kthread+0x10/0x10
[   15.771523]  ret_from_fork+0x116/0x1d0
[   15.771556]  ? __pfx_kthread+0x10/0x10
[   15.771579]  ret_from_fork_asm+0x1a/0x30
[   15.771611]  </TASK>
[   15.771622] 
[   15.780493] Allocated by task 283:
[   15.780637]  kasan_save_stack+0x45/0x70
[   15.781063]  kasan_save_track+0x18/0x40
[   15.781273]  kasan_save_alloc_info+0x3b/0x50
[   15.781503]  __kasan_kmalloc+0xb7/0xc0
[   15.781696]  __kmalloc_cache_noprof+0x189/0x420
[   15.781925]  kasan_atomics+0x95/0x310
[   15.782123]  kunit_try_run_case+0x1a5/0x480
[   15.782336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.782838]  kthread+0x337/0x6f0
[   15.782981]  ret_from_fork+0x116/0x1d0
[   15.783344]  ret_from_fork_asm+0x1a/0x30
[   15.783531] 
[   15.783636] The buggy address belongs to the object at ffff8881038b5600
[   15.783636]  which belongs to the cache kmalloc-64 of size 64
[   15.784316] The buggy address is located 0 bytes to the right of
[   15.784316]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.784934] 
[   15.785037] The buggy address belongs to the physical page:
[   15.785335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.785699] flags: 0x200000000000000(node=0|zone=2)
[   15.786006] page_type: f5(slab)
[   15.786196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.786512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.786752] page dumped because: kasan: bad access detected
[   15.787315] 
[   15.787422] Memory state around the buggy address:
[   15.787683]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.788169]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.788461] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.788849]                                      ^
[   15.789070]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.789410]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.789721] ==================================================================
[   16.566636] ==================================================================
[   16.567311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.567675] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.568024] 
[   16.568159] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.568206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.568219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.568259] Call Trace:
[   16.568273]  <TASK>
[   16.568288]  dump_stack_lvl+0x73/0xb0
[   16.568319]  print_report+0xd1/0x610
[   16.568344]  ? __virt_addr_valid+0x1db/0x2d0
[   16.568368]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.568392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.568416]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.568440]  kasan_report+0x141/0x180
[   16.568491]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.568534]  kasan_check_range+0x10c/0x1c0
[   16.568560]  __kasan_check_write+0x18/0x20
[   16.568594]  kasan_atomics_helper+0x1c18/0x5450
[   16.568633]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.568657]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.568683]  ? kasan_atomics+0x152/0x310
[   16.568712]  kasan_atomics+0x1dc/0x310
[   16.568736]  ? __pfx_kasan_atomics+0x10/0x10
[   16.568806]  ? __pfx_read_tsc+0x10/0x10
[   16.568829]  ? ktime_get_ts64+0x86/0x230
[   16.568855]  kunit_try_run_case+0x1a5/0x480
[   16.568881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.568906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.568931]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.568956]  ? __kthread_parkme+0x82/0x180
[   16.568978]  ? preempt_count_sub+0x50/0x80
[   16.569033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.569063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.569087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.569131]  kthread+0x337/0x6f0
[   16.569154]  ? trace_preempt_on+0x20/0xc0
[   16.569177]  ? __pfx_kthread+0x10/0x10
[   16.569200]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.569225]  ? calculate_sigpending+0x7b/0xa0
[   16.569249]  ? __pfx_kthread+0x10/0x10
[   16.569273]  ret_from_fork+0x116/0x1d0
[   16.569293]  ? __pfx_kthread+0x10/0x10
[   16.569315]  ret_from_fork_asm+0x1a/0x30
[   16.569347]  </TASK>
[   16.569359] 
[   16.577391] Allocated by task 283:
[   16.577575]  kasan_save_stack+0x45/0x70
[   16.577851]  kasan_save_track+0x18/0x40
[   16.578038]  kasan_save_alloc_info+0x3b/0x50
[   16.578296]  __kasan_kmalloc+0xb7/0xc0
[   16.578526]  __kmalloc_cache_noprof+0x189/0x420
[   16.578748]  kasan_atomics+0x95/0x310
[   16.578960]  kunit_try_run_case+0x1a5/0x480
[   16.579170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.579426]  kthread+0x337/0x6f0
[   16.579599]  ret_from_fork+0x116/0x1d0
[   16.579737]  ret_from_fork_asm+0x1a/0x30
[   16.579944] 
[   16.580048] The buggy address belongs to the object at ffff8881038b5600
[   16.580048]  which belongs to the cache kmalloc-64 of size 64
[   16.580594] The buggy address is located 0 bytes to the right of
[   16.580594]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.581160] 
[   16.581268] The buggy address belongs to the physical page:
[   16.581525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.581872] flags: 0x200000000000000(node=0|zone=2)
[   16.582159] page_type: f5(slab)
[   16.582340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.582727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.583090] page dumped because: kasan: bad access detected
[   16.583347] 
[   16.583442] Memory state around the buggy address:
[   16.583700]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.583988]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.584205] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.584456]                                      ^
[   16.584695]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.585059]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.585403] ==================================================================
[   16.523855] ==================================================================
[   16.524339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.524727] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.525149] 
[   16.525263] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.525309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.525322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.525346] Call Trace:
[   16.525364]  <TASK>
[   16.525379]  dump_stack_lvl+0x73/0xb0
[   16.525410]  print_report+0xd1/0x610
[   16.525434]  ? __virt_addr_valid+0x1db/0x2d0
[   16.525458]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.525492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.525516]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.525539]  kasan_report+0x141/0x180
[   16.525563]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.525591]  kasan_check_range+0x10c/0x1c0
[   16.525637]  __kasan_check_write+0x18/0x20
[   16.525658]  kasan_atomics_helper+0x1a7f/0x5450
[   16.525682]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.525723]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.525749]  ? kasan_atomics+0x152/0x310
[   16.525783]  kasan_atomics+0x1dc/0x310
[   16.525808]  ? __pfx_kasan_atomics+0x10/0x10
[   16.525833]  ? __pfx_read_tsc+0x10/0x10
[   16.525855]  ? ktime_get_ts64+0x86/0x230
[   16.525881]  kunit_try_run_case+0x1a5/0x480
[   16.525906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.525929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.525955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.526011]  ? __kthread_parkme+0x82/0x180
[   16.526087]  ? preempt_count_sub+0x50/0x80
[   16.526118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.526166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.526192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.526216]  kthread+0x337/0x6f0
[   16.526237]  ? trace_preempt_on+0x20/0xc0
[   16.526262]  ? __pfx_kthread+0x10/0x10
[   16.526284]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.526308]  ? calculate_sigpending+0x7b/0xa0
[   16.526352]  ? __pfx_kthread+0x10/0x10
[   16.526374]  ret_from_fork+0x116/0x1d0
[   16.526395]  ? __pfx_kthread+0x10/0x10
[   16.526416]  ret_from_fork_asm+0x1a/0x30
[   16.526448]  </TASK>
[   16.526459] 
[   16.535211] Allocated by task 283:
[   16.535389]  kasan_save_stack+0x45/0x70
[   16.535595]  kasan_save_track+0x18/0x40
[   16.535825]  kasan_save_alloc_info+0x3b/0x50
[   16.536145]  __kasan_kmalloc+0xb7/0xc0
[   16.536336]  __kmalloc_cache_noprof+0x189/0x420
[   16.536569]  kasan_atomics+0x95/0x310
[   16.536785]  kunit_try_run_case+0x1a5/0x480
[   16.537100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.537398]  kthread+0x337/0x6f0
[   16.537612]  ret_from_fork+0x116/0x1d0
[   16.537837]  ret_from_fork_asm+0x1a/0x30
[   16.538121] 
[   16.538230] The buggy address belongs to the object at ffff8881038b5600
[   16.538230]  which belongs to the cache kmalloc-64 of size 64
[   16.538807] The buggy address is located 0 bytes to the right of
[   16.538807]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.539380] 
[   16.539495] The buggy address belongs to the physical page:
[   16.539751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.540539] flags: 0x200000000000000(node=0|zone=2)
[   16.540736] page_type: f5(slab)
[   16.540961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.541397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.541751] page dumped because: kasan: bad access detected
[   16.542033] 
[   16.542123] Memory state around the buggy address:
[   16.542441]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.542807]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.543193] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.543507]                                      ^
[   16.543740]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.544139]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.544444] ==================================================================
[   15.669174] ==================================================================
[   15.669555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.669948] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.670408] 
[   15.670639] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.670687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.670700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.670726] Call Trace:
[   15.670746]  <TASK>
[   15.670763]  dump_stack_lvl+0x73/0xb0
[   15.670837]  print_report+0xd1/0x610
[   15.670862]  ? __virt_addr_valid+0x1db/0x2d0
[   15.670886]  ? kasan_atomics_helper+0x72f/0x5450
[   15.670946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.670970]  ? kasan_atomics_helper+0x72f/0x5450
[   15.670993]  kasan_report+0x141/0x180
[   15.671028]  ? kasan_atomics_helper+0x72f/0x5450
[   15.671066]  kasan_check_range+0x10c/0x1c0
[   15.671092]  __kasan_check_write+0x18/0x20
[   15.671141]  kasan_atomics_helper+0x72f/0x5450
[   15.671165]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.671189]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.671227]  ? kasan_atomics+0x152/0x310
[   15.671254]  kasan_atomics+0x1dc/0x310
[   15.671279]  ? __pfx_kasan_atomics+0x10/0x10
[   15.671305]  ? __pfx_read_tsc+0x10/0x10
[   15.671328]  ? ktime_get_ts64+0x86/0x230
[   15.671354]  kunit_try_run_case+0x1a5/0x480
[   15.671379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.671403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.671429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.671490]  ? __kthread_parkme+0x82/0x180
[   15.671514]  ? preempt_count_sub+0x50/0x80
[   15.671538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.671574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.671599]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.671625]  kthread+0x337/0x6f0
[   15.671663]  ? trace_preempt_on+0x20/0xc0
[   15.671697]  ? __pfx_kthread+0x10/0x10
[   15.671719]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.671768]  ? calculate_sigpending+0x7b/0xa0
[   15.671801]  ? __pfx_kthread+0x10/0x10
[   15.671825]  ret_from_fork+0x116/0x1d0
[   15.671847]  ? __pfx_kthread+0x10/0x10
[   15.671879]  ret_from_fork_asm+0x1a/0x30
[   15.671928]  </TASK>
[   15.671940] 
[   15.681411] Allocated by task 283:
[   15.682463]  kasan_save_stack+0x45/0x70
[   15.683173]  kasan_save_track+0x18/0x40
[   15.683684]  kasan_save_alloc_info+0x3b/0x50
[   15.684817]  __kasan_kmalloc+0xb7/0xc0
[   15.685772]  __kmalloc_cache_noprof+0x189/0x420
[   15.685955]  kasan_atomics+0x95/0x310
[   15.686602]  kunit_try_run_case+0x1a5/0x480
[   15.687013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.687465]  kthread+0x337/0x6f0
[   15.687652]  ret_from_fork+0x116/0x1d0
[   15.687923]  ret_from_fork_asm+0x1a/0x30
[   15.688389] 
[   15.688515] The buggy address belongs to the object at ffff8881038b5600
[   15.688515]  which belongs to the cache kmalloc-64 of size 64
[   15.689458] The buggy address is located 0 bytes to the right of
[   15.689458]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.690720] 
[   15.691255] The buggy address belongs to the physical page:
[   15.691532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.692214] flags: 0x200000000000000(node=0|zone=2)
[   15.692592] page_type: f5(slab)
[   15.692951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.693789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.694490] page dumped because: kasan: bad access detected
[   15.694735] 
[   15.695219] Memory state around the buggy address:
[   15.695451]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.695761]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.696442] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.697266]                                      ^
[   15.697572]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698285]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698614] ==================================================================
[   16.623902] ==================================================================
[   16.624281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.624641] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.625037] 
[   16.625157] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.625221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.625247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.625270] Call Trace:
[   16.625297]  <TASK>
[   16.625312]  dump_stack_lvl+0x73/0xb0
[   16.625343]  print_report+0xd1/0x610
[   16.625368]  ? __virt_addr_valid+0x1db/0x2d0
[   16.625391]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.625414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.625437]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.625461]  kasan_report+0x141/0x180
[   16.625494]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.625522]  kasan_check_range+0x10c/0x1c0
[   16.625547]  __kasan_check_write+0x18/0x20
[   16.625567]  kasan_atomics_helper+0x1d7a/0x5450
[   16.625592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.625616]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.625642]  ? kasan_atomics+0x152/0x310
[   16.625670]  kasan_atomics+0x1dc/0x310
[   16.625694]  ? __pfx_kasan_atomics+0x10/0x10
[   16.625719]  ? __pfx_read_tsc+0x10/0x10
[   16.625741]  ? ktime_get_ts64+0x86/0x230
[   16.625786]  kunit_try_run_case+0x1a5/0x480
[   16.625812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.625836]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.625862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.625887]  ? __kthread_parkme+0x82/0x180
[   16.625909]  ? preempt_count_sub+0x50/0x80
[   16.625933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.625959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.625983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.626008]  kthread+0x337/0x6f0
[   16.626045]  ? trace_preempt_on+0x20/0xc0
[   16.626070]  ? __pfx_kthread+0x10/0x10
[   16.626110]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.626147]  ? calculate_sigpending+0x7b/0xa0
[   16.626186]  ? __pfx_kthread+0x10/0x10
[   16.626222]  ret_from_fork+0x116/0x1d0
[   16.626243]  ? __pfx_kthread+0x10/0x10
[   16.626278]  ret_from_fork_asm+0x1a/0x30
[   16.626336]  </TASK>
[   16.626347] 
[   16.634355] Allocated by task 283:
[   16.634530]  kasan_save_stack+0x45/0x70
[   16.634777]  kasan_save_track+0x18/0x40
[   16.634969]  kasan_save_alloc_info+0x3b/0x50
[   16.635163]  __kasan_kmalloc+0xb7/0xc0
[   16.635363]  __kmalloc_cache_noprof+0x189/0x420
[   16.635610]  kasan_atomics+0x95/0x310
[   16.635790]  kunit_try_run_case+0x1a5/0x480
[   16.636008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.636237]  kthread+0x337/0x6f0
[   16.636368]  ret_from_fork+0x116/0x1d0
[   16.636801]  ret_from_fork_asm+0x1a/0x30
[   16.637356] 
[   16.638731] The buggy address belongs to the object at ffff8881038b5600
[   16.638731]  which belongs to the cache kmalloc-64 of size 64
[   16.639271] The buggy address is located 0 bytes to the right of
[   16.639271]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.639675] 
[   16.639757] The buggy address belongs to the physical page:
[   16.640372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.641153] flags: 0x200000000000000(node=0|zone=2)
[   16.641647] page_type: f5(slab)
[   16.642017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.642721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.643510] page dumped because: kasan: bad access detected
[   16.644068] 
[   16.644312] Memory state around the buggy address:
[   16.644581]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.644908]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.645570] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.646252]                                      ^
[   16.646604]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646984]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.647635] ==================================================================
[   16.788625] ==================================================================
[   16.789014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.789353] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.789679] 
[   16.789776] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.789834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.789847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.789871] Call Trace:
[   16.789887]  <TASK>
[   16.789902]  dump_stack_lvl+0x73/0xb0
[   16.789933]  print_report+0xd1/0x610
[   16.789959]  ? __virt_addr_valid+0x1db/0x2d0
[   16.789984]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.790005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.790029]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.790052]  kasan_report+0x141/0x180
[   16.790075]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.790108]  kasan_check_range+0x10c/0x1c0
[   16.790133]  __kasan_check_write+0x18/0x20
[   16.790154]  kasan_atomics_helper+0x20c8/0x5450
[   16.790177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.790201]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.790227]  ? kasan_atomics+0x152/0x310
[   16.790255]  kasan_atomics+0x1dc/0x310
[   16.790279]  ? __pfx_kasan_atomics+0x10/0x10
[   16.790305]  ? __pfx_read_tsc+0x10/0x10
[   16.790327]  ? ktime_get_ts64+0x86/0x230
[   16.790353]  kunit_try_run_case+0x1a5/0x480
[   16.790378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.790402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.790427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.790452]  ? __kthread_parkme+0x82/0x180
[   16.790483]  ? preempt_count_sub+0x50/0x80
[   16.790510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.790535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.790559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.790584]  kthread+0x337/0x6f0
[   16.790605]  ? trace_preempt_on+0x20/0xc0
[   16.790630]  ? __pfx_kthread+0x10/0x10
[   16.790652]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.790677]  ? calculate_sigpending+0x7b/0xa0
[   16.790702]  ? __pfx_kthread+0x10/0x10
[   16.790725]  ret_from_fork+0x116/0x1d0
[   16.790744]  ? __pfx_kthread+0x10/0x10
[   16.790766]  ret_from_fork_asm+0x1a/0x30
[   16.790812]  </TASK>
[   16.790824] 
[   16.798321] Allocated by task 283:
[   16.798457]  kasan_save_stack+0x45/0x70
[   16.798614]  kasan_save_track+0x18/0x40
[   16.798755]  kasan_save_alloc_info+0x3b/0x50
[   16.798910]  __kasan_kmalloc+0xb7/0xc0
[   16.799048]  __kmalloc_cache_noprof+0x189/0x420
[   16.799209]  kasan_atomics+0x95/0x310
[   16.799346]  kunit_try_run_case+0x1a5/0x480
[   16.799518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.799775]  kthread+0x337/0x6f0
[   16.799945]  ret_from_fork+0x116/0x1d0
[   16.800134]  ret_from_fork_asm+0x1a/0x30
[   16.800350] 
[   16.800456] The buggy address belongs to the object at ffff8881038b5600
[   16.800456]  which belongs to the cache kmalloc-64 of size 64
[   16.801303] The buggy address is located 0 bytes to the right of
[   16.801303]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.801783] 
[   16.801881] The buggy address belongs to the physical page:
[   16.802138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.802440] flags: 0x200000000000000(node=0|zone=2)
[   16.802646] page_type: f5(slab)
[   16.802772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.803118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.803429] page dumped because: kasan: bad access detected
[   16.803633] 
[   16.803708] Memory state around the buggy address:
[   16.804095]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.804364]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.804685] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.805065]                                      ^
[   16.805275]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.805515]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.805910] ==================================================================
[   16.806393] ==================================================================
[   16.806657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.806907] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.807218] 
[   16.807344] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.807391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.807403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.807427] Call Trace:
[   16.807444]  <TASK>
[   16.807460]  dump_stack_lvl+0x73/0xb0
[   16.807502]  print_report+0xd1/0x610
[   16.807540]  ? __virt_addr_valid+0x1db/0x2d0
[   16.807565]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.807588]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.807612]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.807635]  kasan_report+0x141/0x180
[   16.807658]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.807686]  __asan_report_load8_noabort+0x18/0x20
[   16.807712]  kasan_atomics_helper+0x4fb2/0x5450
[   16.807737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.807760]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.807786]  ? kasan_atomics+0x152/0x310
[   16.807814]  kasan_atomics+0x1dc/0x310
[   16.807838]  ? __pfx_kasan_atomics+0x10/0x10
[   16.807863]  ? __pfx_read_tsc+0x10/0x10
[   16.807886]  ? ktime_get_ts64+0x86/0x230
[   16.807913]  kunit_try_run_case+0x1a5/0x480
[   16.807938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.807963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.807989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.808014]  ? __kthread_parkme+0x82/0x180
[   16.808036]  ? preempt_count_sub+0x50/0x80
[   16.808061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.808086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.808111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.808136]  kthread+0x337/0x6f0
[   16.808158]  ? trace_preempt_on+0x20/0xc0
[   16.808183]  ? __pfx_kthread+0x10/0x10
[   16.808205]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.808228]  ? calculate_sigpending+0x7b/0xa0
[   16.808253]  ? __pfx_kthread+0x10/0x10
[   16.808276]  ret_from_fork+0x116/0x1d0
[   16.808297]  ? __pfx_kthread+0x10/0x10
[   16.808319]  ret_from_fork_asm+0x1a/0x30
[   16.808351]  </TASK>
[   16.808363] 
[   16.816034] Allocated by task 283:
[   16.816226]  kasan_save_stack+0x45/0x70
[   16.816436]  kasan_save_track+0x18/0x40
[   16.816648]  kasan_save_alloc_info+0x3b/0x50
[   16.816976]  __kasan_kmalloc+0xb7/0xc0
[   16.817150]  __kmalloc_cache_noprof+0x189/0x420
[   16.817376]  kasan_atomics+0x95/0x310
[   16.817524]  kunit_try_run_case+0x1a5/0x480
[   16.817690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.818100]  kthread+0x337/0x6f0
[   16.818286]  ret_from_fork+0x116/0x1d0
[   16.818488]  ret_from_fork_asm+0x1a/0x30
[   16.818660] 
[   16.818758] The buggy address belongs to the object at ffff8881038b5600
[   16.818758]  which belongs to the cache kmalloc-64 of size 64
[   16.819254] The buggy address is located 0 bytes to the right of
[   16.819254]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.819762] 
[   16.821671] The buggy address belongs to the physical page:
[   16.822649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.823624] flags: 0x200000000000000(node=0|zone=2)
[   16.824083] page_type: f5(slab)
[   16.824231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.824501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.825310] page dumped because: kasan: bad access detected
[   16.825857] 
[   16.826063] Memory state around the buggy address:
[   16.826528]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.826979]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.827203] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.827425]                                      ^
[   16.827645]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.828356]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.828595] ==================================================================
[   16.829638] ==================================================================
[   16.830376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.831134] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.831868] 
[   16.832055] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.832104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.832117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.832175] Call Trace:
[   16.832197]  <TASK>
[   16.832229]  dump_stack_lvl+0x73/0xb0
[   16.832264]  print_report+0xd1/0x610
[   16.832291]  ? __virt_addr_valid+0x1db/0x2d0
[   16.832315]  ? kasan_atomics_helper+0x218a/0x5450
[   16.832337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.832361]  ? kasan_atomics_helper+0x218a/0x5450
[   16.832383]  kasan_report+0x141/0x180
[   16.832407]  ? kasan_atomics_helper+0x218a/0x5450
[   16.832436]  kasan_check_range+0x10c/0x1c0
[   16.832462]  __kasan_check_write+0x18/0x20
[   16.832494]  kasan_atomics_helper+0x218a/0x5450
[   16.832518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.832541]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.832569]  ? kasan_atomics+0x152/0x310
[   16.832598]  kasan_atomics+0x1dc/0x310
[   16.832621]  ? __pfx_kasan_atomics+0x10/0x10
[   16.832648]  ? __pfx_read_tsc+0x10/0x10
[   16.832672]  ? ktime_get_ts64+0x86/0x230
[   16.832698]  kunit_try_run_case+0x1a5/0x480
[   16.832724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.832748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.832795]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.832820]  ? __kthread_parkme+0x82/0x180
[   16.832842]  ? preempt_count_sub+0x50/0x80
[   16.832869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.832897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.832923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.832947]  kthread+0x337/0x6f0
[   16.832968]  ? trace_preempt_on+0x20/0xc0
[   16.832993]  ? __pfx_kthread+0x10/0x10
[   16.833016]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.833039]  ? calculate_sigpending+0x7b/0xa0
[   16.833065]  ? __pfx_kthread+0x10/0x10
[   16.833087]  ret_from_fork+0x116/0x1d0
[   16.833107]  ? __pfx_kthread+0x10/0x10
[   16.833129]  ret_from_fork_asm+0x1a/0x30
[   16.833162]  </TASK>
[   16.833174] 
[   16.846015] Allocated by task 283:
[   16.846367]  kasan_save_stack+0x45/0x70
[   16.846797]  kasan_save_track+0x18/0x40
[   16.847176]  kasan_save_alloc_info+0x3b/0x50
[   16.847586]  __kasan_kmalloc+0xb7/0xc0
[   16.847969]  __kmalloc_cache_noprof+0x189/0x420
[   16.848401]  kasan_atomics+0x95/0x310
[   16.848805]  kunit_try_run_case+0x1a5/0x480
[   16.849059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.849556]  kthread+0x337/0x6f0
[   16.849686]  ret_from_fork+0x116/0x1d0
[   16.849988]  ret_from_fork_asm+0x1a/0x30
[   16.850375] 
[   16.850550] The buggy address belongs to the object at ffff8881038b5600
[   16.850550]  which belongs to the cache kmalloc-64 of size 64
[   16.851514] The buggy address is located 0 bytes to the right of
[   16.851514]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.852239] 
[   16.852428] The buggy address belongs to the physical page:
[   16.852962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.853633] flags: 0x200000000000000(node=0|zone=2)
[   16.853815] page_type: f5(slab)
[   16.853943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.854185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.854419] page dumped because: kasan: bad access detected
[   16.854922] 
[   16.855082] Memory state around the buggy address:
[   16.855544]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.856186]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.856839] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.857456]                                      ^
[   16.857922]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.858564]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.859197] ==================================================================
[   16.439893] ==================================================================
[   16.440350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.440615] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.441193] 
[   16.441311] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.441358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.441371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.441393] Call Trace:
[   16.441410]  <TASK>
[   16.441426]  dump_stack_lvl+0x73/0xb0
[   16.441456]  print_report+0xd1/0x610
[   16.441491]  ? __virt_addr_valid+0x1db/0x2d0
[   16.441515]  ? kasan_atomics_helper+0x1818/0x5450
[   16.441538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.441561]  ? kasan_atomics_helper+0x1818/0x5450
[   16.441586]  kasan_report+0x141/0x180
[   16.441610]  ? kasan_atomics_helper+0x1818/0x5450
[   16.441638]  kasan_check_range+0x10c/0x1c0
[   16.441663]  __kasan_check_write+0x18/0x20
[   16.441683]  kasan_atomics_helper+0x1818/0x5450
[   16.441707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.441731]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.441757]  ? kasan_atomics+0x152/0x310
[   16.441785]  kasan_atomics+0x1dc/0x310
[   16.441809]  ? __pfx_kasan_atomics+0x10/0x10
[   16.441835]  ? __pfx_read_tsc+0x10/0x10
[   16.441857]  ? ktime_get_ts64+0x86/0x230
[   16.441882]  kunit_try_run_case+0x1a5/0x480
[   16.441909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.441932]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.441958]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.441983]  ? __kthread_parkme+0x82/0x180
[   16.442003]  ? preempt_count_sub+0x50/0x80
[   16.442028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.442054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.442078]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.442112]  kthread+0x337/0x6f0
[   16.442132]  ? trace_preempt_on+0x20/0xc0
[   16.442157]  ? __pfx_kthread+0x10/0x10
[   16.442179]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.442223]  ? calculate_sigpending+0x7b/0xa0
[   16.442248]  ? __pfx_kthread+0x10/0x10
[   16.442270]  ret_from_fork+0x116/0x1d0
[   16.442291]  ? __pfx_kthread+0x10/0x10
[   16.442313]  ret_from_fork_asm+0x1a/0x30
[   16.442344]  </TASK>
[   16.442355] 
[   16.450867] Allocated by task 283:
[   16.451149]  kasan_save_stack+0x45/0x70
[   16.451388]  kasan_save_track+0x18/0x40
[   16.451603]  kasan_save_alloc_info+0x3b/0x50
[   16.451803]  __kasan_kmalloc+0xb7/0xc0
[   16.451945]  __kmalloc_cache_noprof+0x189/0x420
[   16.452169]  kasan_atomics+0x95/0x310
[   16.452317]  kunit_try_run_case+0x1a5/0x480
[   16.452507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.452791]  kthread+0x337/0x6f0
[   16.452971]  ret_from_fork+0x116/0x1d0
[   16.453269]  ret_from_fork_asm+0x1a/0x30
[   16.453492] 
[   16.453623] The buggy address belongs to the object at ffff8881038b5600
[   16.453623]  which belongs to the cache kmalloc-64 of size 64
[   16.454172] The buggy address is located 0 bytes to the right of
[   16.454172]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.454992] 
[   16.455129] The buggy address belongs to the physical page:
[   16.455412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.455860] flags: 0x200000000000000(node=0|zone=2)
[   16.456189] page_type: f5(slab)
[   16.456407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.456825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.457256] page dumped because: kasan: bad access detected
[   16.457530] 
[   16.457627] Memory state around the buggy address:
[   16.457883]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.458274]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.458606] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.458853]                                      ^
[   16.459084]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.459426]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.459745] ==================================================================
[   15.514907] ==================================================================
[   15.515356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.515688] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.516114] 
[   15.516259] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.516307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.516355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.516378] Call Trace:
[   15.516395]  <TASK>
[   15.516411]  dump_stack_lvl+0x73/0xb0
[   15.516443]  print_report+0xd1/0x610
[   15.516478]  ? __virt_addr_valid+0x1db/0x2d0
[   15.516536]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.516559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.516583]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.516605]  kasan_report+0x141/0x180
[   15.516629]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.516657]  kasan_check_range+0x10c/0x1c0
[   15.516682]  __kasan_check_write+0x18/0x20
[   15.516737]  kasan_atomics_helper+0x4a0/0x5450
[   15.516761]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.516784]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.516811]  ? kasan_atomics+0x152/0x310
[   15.516839]  kasan_atomics+0x1dc/0x310
[   15.516863]  ? __pfx_kasan_atomics+0x10/0x10
[   15.516920]  ? __pfx_read_tsc+0x10/0x10
[   15.516943]  ? ktime_get_ts64+0x86/0x230
[   15.516968]  kunit_try_run_case+0x1a5/0x480
[   15.516994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.517018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.517045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.517102]  ? __kthread_parkme+0x82/0x180
[   15.517124]  ? preempt_count_sub+0x50/0x80
[   15.517150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.517176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.517202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.517226]  kthread+0x337/0x6f0
[   15.517248]  ? trace_preempt_on+0x20/0xc0
[   15.517305]  ? __pfx_kthread+0x10/0x10
[   15.517328]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.517352]  ? calculate_sigpending+0x7b/0xa0
[   15.517376]  ? __pfx_kthread+0x10/0x10
[   15.517400]  ret_from_fork+0x116/0x1d0
[   15.517420]  ? __pfx_kthread+0x10/0x10
[   15.517442]  ret_from_fork_asm+0x1a/0x30
[   15.517482]  </TASK>
[   15.517494] 
[   15.526794] Allocated by task 283:
[   15.526963]  kasan_save_stack+0x45/0x70
[   15.527321]  kasan_save_track+0x18/0x40
[   15.527464]  kasan_save_alloc_info+0x3b/0x50
[   15.527696]  __kasan_kmalloc+0xb7/0xc0
[   15.527935]  __kmalloc_cache_noprof+0x189/0x420
[   15.528200]  kasan_atomics+0x95/0x310
[   15.528438]  kunit_try_run_case+0x1a5/0x480
[   15.528599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.528778]  kthread+0x337/0x6f0
[   15.529131]  ret_from_fork+0x116/0x1d0
[   15.529328]  ret_from_fork_asm+0x1a/0x30
[   15.529546] 
[   15.529680] The buggy address belongs to the object at ffff8881038b5600
[   15.529680]  which belongs to the cache kmalloc-64 of size 64
[   15.530122] The buggy address is located 0 bytes to the right of
[   15.530122]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.531127] 
[   15.531265] The buggy address belongs to the physical page:
[   15.531520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.532130] flags: 0x200000000000000(node=0|zone=2)
[   15.532391] page_type: f5(slab)
[   15.532597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.532952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.533355] page dumped because: kasan: bad access detected
[   15.533567] 
[   15.533668] Memory state around the buggy address:
[   15.533932]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.534304]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.534704] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.535098]                                      ^
[   15.535324]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.535789]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.536210] ==================================================================
[   16.586124] ==================================================================
[   16.586456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.586842] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.587174] 
[   16.587306] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.587353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.587366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.587390] Call Trace:
[   16.587406]  <TASK>
[   16.587440]  dump_stack_lvl+0x73/0xb0
[   16.587484]  print_report+0xd1/0x610
[   16.587508]  ? __virt_addr_valid+0x1db/0x2d0
[   16.587532]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.587555]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.587579]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.587622]  kasan_report+0x141/0x180
[   16.587646]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.587674]  __asan_report_load8_noabort+0x18/0x20
[   16.587700]  kasan_atomics_helper+0x4f30/0x5450
[   16.587725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.587749]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.587809]  ? kasan_atomics+0x152/0x310
[   16.587838]  kasan_atomics+0x1dc/0x310
[   16.587863]  ? __pfx_kasan_atomics+0x10/0x10
[   16.587889]  ? __pfx_read_tsc+0x10/0x10
[   16.587913]  ? ktime_get_ts64+0x86/0x230
[   16.587939]  kunit_try_run_case+0x1a5/0x480
[   16.587964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.587989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.588015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.588040]  ? __kthread_parkme+0x82/0x180
[   16.588062]  ? preempt_count_sub+0x50/0x80
[   16.588104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.588132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.588157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.588182]  kthread+0x337/0x6f0
[   16.588203]  ? trace_preempt_on+0x20/0xc0
[   16.588227]  ? __pfx_kthread+0x10/0x10
[   16.588250]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.588288]  ? calculate_sigpending+0x7b/0xa0
[   16.588329]  ? __pfx_kthread+0x10/0x10
[   16.588366]  ret_from_fork+0x116/0x1d0
[   16.588386]  ? __pfx_kthread+0x10/0x10
[   16.588422]  ret_from_fork_asm+0x1a/0x30
[   16.588477]  </TASK>
[   16.588488] 
[   16.596277] Allocated by task 283:
[   16.596436]  kasan_save_stack+0x45/0x70
[   16.596640]  kasan_save_track+0x18/0x40
[   16.596840]  kasan_save_alloc_info+0x3b/0x50
[   16.597070]  __kasan_kmalloc+0xb7/0xc0
[   16.597268]  __kmalloc_cache_noprof+0x189/0x420
[   16.597498]  kasan_atomics+0x95/0x310
[   16.597653]  kunit_try_run_case+0x1a5/0x480
[   16.597919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.598204]  kthread+0x337/0x6f0
[   16.598360]  ret_from_fork+0x116/0x1d0
[   16.598555]  ret_from_fork_asm+0x1a/0x30
[   16.598804] 
[   16.598886] The buggy address belongs to the object at ffff8881038b5600
[   16.598886]  which belongs to the cache kmalloc-64 of size 64
[   16.599380] The buggy address is located 0 bytes to the right of
[   16.599380]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.599926] 
[   16.600035] The buggy address belongs to the physical page:
[   16.600293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.600639] flags: 0x200000000000000(node=0|zone=2)
[   16.600807] page_type: f5(slab)
[   16.600979] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.601331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.601661] page dumped because: kasan: bad access detected
[   16.601933] 
[   16.602006] Memory state around the buggy address:
[   16.602167]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.602387]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.602744] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.603121]                                      ^
[   16.603366]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.603727]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.604097] ==================================================================
[   16.880267] ==================================================================
[   16.880648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.880985] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.881281] 
[   16.881398] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.881444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.881456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.881985] Call Trace:
[   16.882010]  <TASK>
[   16.882028]  dump_stack_lvl+0x73/0xb0
[   16.882065]  print_report+0xd1/0x610
[   16.882089]  ? __virt_addr_valid+0x1db/0x2d0
[   16.882123]  ? kasan_atomics_helper+0x224c/0x5450
[   16.882146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.882170]  ? kasan_atomics_helper+0x224c/0x5450
[   16.882193]  kasan_report+0x141/0x180
[   16.882217]  ? kasan_atomics_helper+0x224c/0x5450
[   16.882245]  kasan_check_range+0x10c/0x1c0
[   16.882271]  __kasan_check_write+0x18/0x20
[   16.882291]  kasan_atomics_helper+0x224c/0x5450
[   16.882315]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.882339]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.882365]  ? kasan_atomics+0x152/0x310
[   16.882394]  kasan_atomics+0x1dc/0x310
[   16.882418]  ? __pfx_kasan_atomics+0x10/0x10
[   16.882443]  ? __pfx_read_tsc+0x10/0x10
[   16.882480]  ? ktime_get_ts64+0x86/0x230
[   16.882507]  kunit_try_run_case+0x1a5/0x480
[   16.882534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.882557]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.882584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.882610]  ? __kthread_parkme+0x82/0x180
[   16.882632]  ? preempt_count_sub+0x50/0x80
[   16.882659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.882685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.882709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.882734]  kthread+0x337/0x6f0
[   16.882755]  ? trace_preempt_on+0x20/0xc0
[   16.882803]  ? __pfx_kthread+0x10/0x10
[   16.882826]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.882849]  ? calculate_sigpending+0x7b/0xa0
[   16.882875]  ? __pfx_kthread+0x10/0x10
[   16.882898]  ret_from_fork+0x116/0x1d0
[   16.882918]  ? __pfx_kthread+0x10/0x10
[   16.882940]  ret_from_fork_asm+0x1a/0x30
[   16.882973]  </TASK>
[   16.882985] 
[   16.890305] Allocated by task 283:
[   16.890456]  kasan_save_stack+0x45/0x70
[   16.890681]  kasan_save_track+0x18/0x40
[   16.890903]  kasan_save_alloc_info+0x3b/0x50
[   16.891122]  __kasan_kmalloc+0xb7/0xc0
[   16.891314]  __kmalloc_cache_noprof+0x189/0x420
[   16.891550]  kasan_atomics+0x95/0x310
[   16.891744]  kunit_try_run_case+0x1a5/0x480
[   16.891979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.892239]  kthread+0x337/0x6f0
[   16.892412]  ret_from_fork+0x116/0x1d0
[   16.892619]  ret_from_fork_asm+0x1a/0x30
[   16.892837] 
[   16.892939] The buggy address belongs to the object at ffff8881038b5600
[   16.892939]  which belongs to the cache kmalloc-64 of size 64
[   16.893326] The buggy address is located 0 bytes to the right of
[   16.893326]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.893871] 
[   16.893975] The buggy address belongs to the physical page:
[   16.894252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.894608] flags: 0x200000000000000(node=0|zone=2)
[   16.894858] page_type: f5(slab)
[   16.895025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.895330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.895625] page dumped because: kasan: bad access detected
[   16.895917] 
[   16.896018] Memory state around the buggy address:
[   16.896254]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.896533]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.896783] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.897010]                                      ^
[   16.897172]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.897438]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.897781] ==================================================================
[   16.074423] ==================================================================
[   16.074738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   16.075125] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.075429] 
[   16.075531] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.075577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.075590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.075613] Call Trace:
[   16.075631]  <TASK>
[   16.075647]  dump_stack_lvl+0x73/0xb0
[   16.075702]  print_report+0xd1/0x610
[   16.075726]  ? __virt_addr_valid+0x1db/0x2d0
[   16.075749]  ? kasan_atomics_helper+0x1148/0x5450
[   16.075772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.075806]  ? kasan_atomics_helper+0x1148/0x5450
[   16.075829]  kasan_report+0x141/0x180
[   16.075853]  ? kasan_atomics_helper+0x1148/0x5450
[   16.075880]  kasan_check_range+0x10c/0x1c0
[   16.075923]  __kasan_check_write+0x18/0x20
[   16.075944]  kasan_atomics_helper+0x1148/0x5450
[   16.075968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.075991]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.076018]  ? kasan_atomics+0x152/0x310
[   16.076064]  kasan_atomics+0x1dc/0x310
[   16.076089]  ? __pfx_kasan_atomics+0x10/0x10
[   16.076114]  ? __pfx_read_tsc+0x10/0x10
[   16.076136]  ? ktime_get_ts64+0x86/0x230
[   16.076162]  kunit_try_run_case+0x1a5/0x480
[   16.076205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.076229]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.076255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.076280]  ? __kthread_parkme+0x82/0x180
[   16.076303]  ? preempt_count_sub+0x50/0x80
[   16.076328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.076353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.076378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.076420]  kthread+0x337/0x6f0
[   16.076442]  ? trace_preempt_on+0x20/0xc0
[   16.076465]  ? __pfx_kthread+0x10/0x10
[   16.076498]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.076521]  ? calculate_sigpending+0x7b/0xa0
[   16.076547]  ? __pfx_kthread+0x10/0x10
[   16.076569]  ret_from_fork+0x116/0x1d0
[   16.076589]  ? __pfx_kthread+0x10/0x10
[   16.076628]  ret_from_fork_asm+0x1a/0x30
[   16.076661]  </TASK>
[   16.076672] 
[   16.085640] Allocated by task 283:
[   16.085771]  kasan_save_stack+0x45/0x70
[   16.085919]  kasan_save_track+0x18/0x40
[   16.086258]  kasan_save_alloc_info+0x3b/0x50
[   16.086733]  __kasan_kmalloc+0xb7/0xc0
[   16.086912]  __kmalloc_cache_noprof+0x189/0x420
[   16.087274]  kasan_atomics+0x95/0x310
[   16.087432]  kunit_try_run_case+0x1a5/0x480
[   16.087646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.087910]  kthread+0x337/0x6f0
[   16.088109]  ret_from_fork+0x116/0x1d0
[   16.088314]  ret_from_fork_asm+0x1a/0x30
[   16.088536] 
[   16.088654] The buggy address belongs to the object at ffff8881038b5600
[   16.088654]  which belongs to the cache kmalloc-64 of size 64
[   16.089227] The buggy address is located 0 bytes to the right of
[   16.089227]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.089798] 
[   16.089896] The buggy address belongs to the physical page:
[   16.090157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.090883] flags: 0x200000000000000(node=0|zone=2)
[   16.091119] page_type: f5(slab)
[   16.091355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.091720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.092257] page dumped because: kasan: bad access detected
[   16.092430] 
[   16.092511] Memory state around the buggy address:
[   16.092729]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.093049]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.093380] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.093737]                                      ^
[   16.093895]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.094116]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.094329] ==================================================================
[   16.385216] ==================================================================
[   16.385458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.385755] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.386143] 
[   16.386547] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.386617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.386631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.386667] Call Trace:
[   16.386697]  <TASK>
[   16.386712]  dump_stack_lvl+0x73/0xb0
[   16.386758]  print_report+0xd1/0x610
[   16.386805]  ? __virt_addr_valid+0x1db/0x2d0
[   16.386831]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.386853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.386979]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.387010]  kasan_report+0x141/0x180
[   16.387035]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.387064]  kasan_check_range+0x10c/0x1c0
[   16.387089]  __kasan_check_write+0x18/0x20
[   16.387454]  kasan_atomics_helper+0x16e7/0x5450
[   16.387493]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.387518]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.387546]  ? kasan_atomics+0x152/0x310
[   16.387574]  kasan_atomics+0x1dc/0x310
[   16.387598]  ? __pfx_kasan_atomics+0x10/0x10
[   16.387623]  ? __pfx_read_tsc+0x10/0x10
[   16.387645]  ? ktime_get_ts64+0x86/0x230
[   16.387672]  kunit_try_run_case+0x1a5/0x480
[   16.387697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.387721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.387748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.387773]  ? __kthread_parkme+0x82/0x180
[   16.387796]  ? preempt_count_sub+0x50/0x80
[   16.387831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.387857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.387883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.387908]  kthread+0x337/0x6f0
[   16.387929]  ? trace_preempt_on+0x20/0xc0
[   16.387954]  ? __pfx_kthread+0x10/0x10
[   16.387976]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.388000]  ? calculate_sigpending+0x7b/0xa0
[   16.388025]  ? __pfx_kthread+0x10/0x10
[   16.388061]  ret_from_fork+0x116/0x1d0
[   16.388082]  ? __pfx_kthread+0x10/0x10
[   16.388105]  ret_from_fork_asm+0x1a/0x30
[   16.388138]  </TASK>
[   16.388150] 
[   16.400440] Allocated by task 283:
[   16.400654]  kasan_save_stack+0x45/0x70
[   16.401141]  kasan_save_track+0x18/0x40
[   16.401519]  kasan_save_alloc_info+0x3b/0x50
[   16.401765]  __kasan_kmalloc+0xb7/0xc0
[   16.402061]  __kmalloc_cache_noprof+0x189/0x420
[   16.402359]  kasan_atomics+0x95/0x310
[   16.402855]  kunit_try_run_case+0x1a5/0x480
[   16.403185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.403572]  kthread+0x337/0x6f0
[   16.403748]  ret_from_fork+0x116/0x1d0
[   16.403917]  ret_from_fork_asm+0x1a/0x30
[   16.404463] 
[   16.404590] The buggy address belongs to the object at ffff8881038b5600
[   16.404590]  which belongs to the cache kmalloc-64 of size 64
[   16.405356] The buggy address is located 0 bytes to the right of
[   16.405356]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.406144] 
[   16.406240] The buggy address belongs to the physical page:
[   16.406520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.407209] flags: 0x200000000000000(node=0|zone=2)
[   16.407416] page_type: f5(slab)
[   16.407600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.408189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.408767] page dumped because: kasan: bad access detected
[   16.409067] 
[   16.409170] Memory state around the buggy address:
[   16.409648]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.409982]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.410525] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.410923]                                      ^
[   16.411138]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.411751]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.412104] ==================================================================
[   16.770307] ==================================================================
[   16.770716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.771213] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.771619] 
[   16.771718] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.771766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.771779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.771802] Call Trace:
[   16.771820]  <TASK>
[   16.771836]  dump_stack_lvl+0x73/0xb0
[   16.771868]  print_report+0xd1/0x610
[   16.771892]  ? __virt_addr_valid+0x1db/0x2d0
[   16.771917]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.771939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.771963]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.771994]  kasan_report+0x141/0x180
[   16.772017]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.772045]  __asan_report_load8_noabort+0x18/0x20
[   16.772070]  kasan_atomics_helper+0x4f98/0x5450
[   16.772095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.772118]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.772144]  ? kasan_atomics+0x152/0x310
[   16.772172]  kasan_atomics+0x1dc/0x310
[   16.772196]  ? __pfx_kasan_atomics+0x10/0x10
[   16.772222]  ? __pfx_read_tsc+0x10/0x10
[   16.772244]  ? ktime_get_ts64+0x86/0x230
[   16.772270]  kunit_try_run_case+0x1a5/0x480
[   16.772295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.772319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.772346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.772371]  ? __kthread_parkme+0x82/0x180
[   16.772393]  ? preempt_count_sub+0x50/0x80
[   16.772418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.772443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.772478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.772515]  kthread+0x337/0x6f0
[   16.772537]  ? trace_preempt_on+0x20/0xc0
[   16.772562]  ? __pfx_kthread+0x10/0x10
[   16.772583]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.772607]  ? calculate_sigpending+0x7b/0xa0
[   16.772632]  ? __pfx_kthread+0x10/0x10
[   16.772655]  ret_from_fork+0x116/0x1d0
[   16.772675]  ? __pfx_kthread+0x10/0x10
[   16.772698]  ret_from_fork_asm+0x1a/0x30
[   16.772731]  </TASK>
[   16.772741] 
[   16.780231] Allocated by task 283:
[   16.780422]  kasan_save_stack+0x45/0x70
[   16.780606]  kasan_save_track+0x18/0x40
[   16.780803]  kasan_save_alloc_info+0x3b/0x50
[   16.780994]  __kasan_kmalloc+0xb7/0xc0
[   16.781169]  __kmalloc_cache_noprof+0x189/0x420
[   16.781357]  kasan_atomics+0x95/0x310
[   16.781550]  kunit_try_run_case+0x1a5/0x480
[   16.781737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.782058]  kthread+0x337/0x6f0
[   16.782225]  ret_from_fork+0x116/0x1d0
[   16.782374]  ret_from_fork_asm+0x1a/0x30
[   16.782528] 
[   16.782601] The buggy address belongs to the object at ffff8881038b5600
[   16.782601]  which belongs to the cache kmalloc-64 of size 64
[   16.782960] The buggy address is located 0 bytes to the right of
[   16.782960]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.783337] 
[   16.783412] The buggy address belongs to the physical page:
[   16.783656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.784388] flags: 0x200000000000000(node=0|zone=2)
[   16.784633] page_type: f5(slab)
[   16.784806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.785149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.785505] page dumped because: kasan: bad access detected
[   16.785753] 
[   16.785894] Memory state around the buggy address:
[   16.786107]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.786331]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.786564] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.786802]                                      ^
[   16.787033]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.787363]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.787702] ==================================================================
[   15.951021] ==================================================================
[   15.951400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.951721] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.952196] 
[   15.952317] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.952363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.952375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.952398] Call Trace:
[   15.952414]  <TASK>
[   15.952429]  dump_stack_lvl+0x73/0xb0
[   15.952461]  print_report+0xd1/0x610
[   15.952498]  ? __virt_addr_valid+0x1db/0x2d0
[   15.952522]  ? kasan_atomics_helper+0xe78/0x5450
[   15.952545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.952570]  ? kasan_atomics_helper+0xe78/0x5450
[   15.952592]  kasan_report+0x141/0x180
[   15.952616]  ? kasan_atomics_helper+0xe78/0x5450
[   15.952643]  kasan_check_range+0x10c/0x1c0
[   15.952668]  __kasan_check_write+0x18/0x20
[   15.952689]  kasan_atomics_helper+0xe78/0x5450
[   15.952713]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.952736]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.952763]  ? kasan_atomics+0x152/0x310
[   15.952791]  kasan_atomics+0x1dc/0x310
[   15.952815]  ? __pfx_kasan_atomics+0x10/0x10
[   15.952840]  ? __pfx_read_tsc+0x10/0x10
[   15.952862]  ? ktime_get_ts64+0x86/0x230
[   15.952888]  kunit_try_run_case+0x1a5/0x480
[   15.952913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.952937]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.952963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.952988]  ? __kthread_parkme+0x82/0x180
[   15.953010]  ? preempt_count_sub+0x50/0x80
[   15.953035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.953061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.953085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.953110]  kthread+0x337/0x6f0
[   15.953131]  ? trace_preempt_on+0x20/0xc0
[   15.953155]  ? __pfx_kthread+0x10/0x10
[   15.953177]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.953201]  ? calculate_sigpending+0x7b/0xa0
[   15.953225]  ? __pfx_kthread+0x10/0x10
[   15.953248]  ret_from_fork+0x116/0x1d0
[   15.953269]  ? __pfx_kthread+0x10/0x10
[   15.953290]  ret_from_fork_asm+0x1a/0x30
[   15.953322]  </TASK>
[   15.953334] 
[   15.961912] Allocated by task 283:
[   15.962187]  kasan_save_stack+0x45/0x70
[   15.962361]  kasan_save_track+0x18/0x40
[   15.962516]  kasan_save_alloc_info+0x3b/0x50
[   15.962673]  __kasan_kmalloc+0xb7/0xc0
[   15.962889]  __kmalloc_cache_noprof+0x189/0x420
[   15.963232]  kasan_atomics+0x95/0x310
[   15.963424]  kunit_try_run_case+0x1a5/0x480
[   15.963650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.964072]  kthread+0x337/0x6f0
[   15.964252]  ret_from_fork+0x116/0x1d0
[   15.964425]  ret_from_fork_asm+0x1a/0x30
[   15.964594] 
[   15.964696] The buggy address belongs to the object at ffff8881038b5600
[   15.964696]  which belongs to the cache kmalloc-64 of size 64
[   15.965392] The buggy address is located 0 bytes to the right of
[   15.965392]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.965919] 
[   15.966019] The buggy address belongs to the physical page:
[   15.966259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.966562] flags: 0x200000000000000(node=0|zone=2)
[   15.966776] page_type: f5(slab)
[   15.966977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.967543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.967895] page dumped because: kasan: bad access detected
[   15.968159] 
[   15.968234] Memory state around the buggy address:
[   15.968394]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.968630]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.968853] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.969070]                                      ^
[   15.969230]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.969452]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.969683] ==================================================================
[   16.173503] ==================================================================
[   16.173835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   16.174197] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.174572] 
[   16.174730] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.174788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.174800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.174824] Call Trace:
[   16.174839]  <TASK>
[   16.174854]  dump_stack_lvl+0x73/0xb0
[   16.174883]  print_report+0xd1/0x610
[   16.174907]  ? __virt_addr_valid+0x1db/0x2d0
[   16.174930]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.174951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.174975]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.174997]  kasan_report+0x141/0x180
[   16.175019]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.175047]  kasan_check_range+0x10c/0x1c0
[   16.175072]  __kasan_check_write+0x18/0x20
[   16.175092]  kasan_atomics_helper+0x12e6/0x5450
[   16.175116]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.175138]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.175164]  ? kasan_atomics+0x152/0x310
[   16.175191]  kasan_atomics+0x1dc/0x310
[   16.175215]  ? __pfx_kasan_atomics+0x10/0x10
[   16.175239]  ? __pfx_read_tsc+0x10/0x10
[   16.175261]  ? ktime_get_ts64+0x86/0x230
[   16.175285]  kunit_try_run_case+0x1a5/0x480
[   16.175310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.175334]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.175359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.175383]  ? __kthread_parkme+0x82/0x180
[   16.175404]  ? preempt_count_sub+0x50/0x80
[   16.175429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.175454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.175490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.175514]  kthread+0x337/0x6f0
[   16.175535]  ? trace_preempt_on+0x20/0xc0
[   16.175570]  ? __pfx_kthread+0x10/0x10
[   16.175592]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.175614]  ? calculate_sigpending+0x7b/0xa0
[   16.175640]  ? __pfx_kthread+0x10/0x10
[   16.175662]  ret_from_fork+0x116/0x1d0
[   16.175715]  ? __pfx_kthread+0x10/0x10
[   16.175737]  ret_from_fork_asm+0x1a/0x30
[   16.175806]  </TASK>
[   16.175817] 
[   16.185564] Allocated by task 283:
[   16.185961]  kasan_save_stack+0x45/0x70
[   16.186210]  kasan_save_track+0x18/0x40
[   16.186544]  kasan_save_alloc_info+0x3b/0x50
[   16.186721]  __kasan_kmalloc+0xb7/0xc0
[   16.187061]  __kmalloc_cache_noprof+0x189/0x420
[   16.187225]  kasan_atomics+0x95/0x310
[   16.187361]  kunit_try_run_case+0x1a5/0x480
[   16.187535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.187794]  kthread+0x337/0x6f0
[   16.188005]  ret_from_fork+0x116/0x1d0
[   16.188408]  ret_from_fork_asm+0x1a/0x30
[   16.188614] 
[   16.188744] The buggy address belongs to the object at ffff8881038b5600
[   16.188744]  which belongs to the cache kmalloc-64 of size 64
[   16.189188] The buggy address is located 0 bytes to the right of
[   16.189188]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.190269] 
[   16.190367] The buggy address belongs to the physical page:
[   16.190561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.190815] flags: 0x200000000000000(node=0|zone=2)
[   16.190982] page_type: f5(slab)
[   16.191105] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.191340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.191579] page dumped because: kasan: bad access detected
[   16.191764] 
[   16.192813] Memory state around the buggy address:
[   16.193026]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.194326]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.194729] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.195583]                                      ^
[   16.196214]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.197431]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.198337] ==================================================================
[   16.152740] ==================================================================
[   16.153382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   16.153745] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.154198] 
[   16.154308] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.154354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.154366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.154388] Call Trace:
[   16.154405]  <TASK>
[   16.154422]  dump_stack_lvl+0x73/0xb0
[   16.154452]  print_report+0xd1/0x610
[   16.154489]  ? __virt_addr_valid+0x1db/0x2d0
[   16.154513]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.154536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.154592]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.154616]  kasan_report+0x141/0x180
[   16.154638]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.154699]  __asan_report_load4_noabort+0x18/0x20
[   16.154724]  kasan_atomics_helper+0x49e8/0x5450
[   16.154747]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.154791]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.154817]  ? kasan_atomics+0x152/0x310
[   16.154845]  kasan_atomics+0x1dc/0x310
[   16.154868]  ? __pfx_kasan_atomics+0x10/0x10
[   16.154893]  ? __pfx_read_tsc+0x10/0x10
[   16.154915]  ? ktime_get_ts64+0x86/0x230
[   16.154940]  kunit_try_run_case+0x1a5/0x480
[   16.154965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.154989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.155014]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.155038]  ? __kthread_parkme+0x82/0x180
[   16.155059]  ? preempt_count_sub+0x50/0x80
[   16.155084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.155109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.155133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.155158]  kthread+0x337/0x6f0
[   16.155178]  ? trace_preempt_on+0x20/0xc0
[   16.155203]  ? __pfx_kthread+0x10/0x10
[   16.155225]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.155248]  ? calculate_sigpending+0x7b/0xa0
[   16.155273]  ? __pfx_kthread+0x10/0x10
[   16.155295]  ret_from_fork+0x116/0x1d0
[   16.155315]  ? __pfx_kthread+0x10/0x10
[   16.155335]  ret_from_fork_asm+0x1a/0x30
[   16.155367]  </TASK>
[   16.155377] 
[   16.164232] Allocated by task 283:
[   16.164366]  kasan_save_stack+0x45/0x70
[   16.164600]  kasan_save_track+0x18/0x40
[   16.164791]  kasan_save_alloc_info+0x3b/0x50
[   16.165002]  __kasan_kmalloc+0xb7/0xc0
[   16.165189]  __kmalloc_cache_noprof+0x189/0x420
[   16.165409]  kasan_atomics+0x95/0x310
[   16.165601]  kunit_try_run_case+0x1a5/0x480
[   16.165810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.166007]  kthread+0x337/0x6f0
[   16.166138]  ret_from_fork+0x116/0x1d0
[   16.166272]  ret_from_fork_asm+0x1a/0x30
[   16.166411] 
[   16.166620] The buggy address belongs to the object at ffff8881038b5600
[   16.166620]  which belongs to the cache kmalloc-64 of size 64
[   16.167381] The buggy address is located 0 bytes to the right of
[   16.167381]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.167889] 
[   16.167990] The buggy address belongs to the physical page:
[   16.168238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.168661] flags: 0x200000000000000(node=0|zone=2)
[   16.169041] page_type: f5(slab)
[   16.169245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.169647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.169968] page dumped because: kasan: bad access detected
[   16.170249] 
[   16.170349] Memory state around the buggy address:
[   16.170591]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.170920]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.171345] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.171797]                                      ^
[   16.172006]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.172364]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.172852] ==================================================================
[   16.745754] ==================================================================
[   16.746987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.748009] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.748712] 
[   16.748981] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.749042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.749056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.749079] Call Trace:
[   16.749099]  <TASK>
[   16.749118]  dump_stack_lvl+0x73/0xb0
[   16.749154]  print_report+0xd1/0x610
[   16.749178]  ? __virt_addr_valid+0x1db/0x2d0
[   16.749202]  ? kasan_atomics_helper+0x2006/0x5450
[   16.749224]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.749249]  ? kasan_atomics_helper+0x2006/0x5450
[   16.749272]  kasan_report+0x141/0x180
[   16.749295]  ? kasan_atomics_helper+0x2006/0x5450
[   16.749322]  kasan_check_range+0x10c/0x1c0
[   16.749347]  __kasan_check_write+0x18/0x20
[   16.749367]  kasan_atomics_helper+0x2006/0x5450
[   16.749391]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.749414]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.749443]  ? kasan_atomics+0x152/0x310
[   16.749482]  kasan_atomics+0x1dc/0x310
[   16.749506]  ? __pfx_kasan_atomics+0x10/0x10
[   16.749531]  ? __pfx_read_tsc+0x10/0x10
[   16.749555]  ? ktime_get_ts64+0x86/0x230
[   16.749582]  kunit_try_run_case+0x1a5/0x480
[   16.749607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.749632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.749658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.749682]  ? __kthread_parkme+0x82/0x180
[   16.749705]  ? preempt_count_sub+0x50/0x80
[   16.749730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.749755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.749779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.749831]  kthread+0x337/0x6f0
[   16.749852]  ? trace_preempt_on+0x20/0xc0
[   16.749877]  ? __pfx_kthread+0x10/0x10
[   16.749899]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.749923]  ? calculate_sigpending+0x7b/0xa0
[   16.749948]  ? __pfx_kthread+0x10/0x10
[   16.749971]  ret_from_fork+0x116/0x1d0
[   16.749990]  ? __pfx_kthread+0x10/0x10
[   16.750012]  ret_from_fork_asm+0x1a/0x30
[   16.750044]  </TASK>
[   16.750056] 
[   16.762273] Allocated by task 283:
[   16.762411]  kasan_save_stack+0x45/0x70
[   16.762580]  kasan_save_track+0x18/0x40
[   16.762722]  kasan_save_alloc_info+0x3b/0x50
[   16.762922]  __kasan_kmalloc+0xb7/0xc0
[   16.763120]  __kmalloc_cache_noprof+0x189/0x420
[   16.763352]  kasan_atomics+0x95/0x310
[   16.763551]  kunit_try_run_case+0x1a5/0x480
[   16.763727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.763910]  kthread+0x337/0x6f0
[   16.764179]  ret_from_fork+0x116/0x1d0
[   16.764378]  ret_from_fork_asm+0x1a/0x30
[   16.764600] 
[   16.764703] The buggy address belongs to the object at ffff8881038b5600
[   16.764703]  which belongs to the cache kmalloc-64 of size 64
[   16.765110] The buggy address is located 0 bytes to the right of
[   16.765110]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.765634] 
[   16.765724] The buggy address belongs to the physical page:
[   16.765970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.766253] flags: 0x200000000000000(node=0|zone=2)
[   16.766490] page_type: f5(slab)
[   16.766667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.767197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.767524] page dumped because: kasan: bad access detected
[   16.767728] 
[   16.767806] Memory state around the buggy address:
[   16.768041]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.768329]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.768641] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.768949]                                      ^
[   16.769167]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.769390]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.769678] ==================================================================
[   16.010804] ==================================================================
[   16.011368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   16.011739] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.012172] 
[   16.012296] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.012342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.012354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.012376] Call Trace:
[   16.012391]  <TASK>
[   16.012406]  dump_stack_lvl+0x73/0xb0
[   16.012437]  print_report+0xd1/0x610
[   16.012460]  ? __virt_addr_valid+0x1db/0x2d0
[   16.012497]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.012519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.012543]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.012566]  kasan_report+0x141/0x180
[   16.012589]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.012617]  __asan_report_load4_noabort+0x18/0x20
[   16.012642]  kasan_atomics_helper+0x4a36/0x5450
[   16.012665]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.012689]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.012715]  ? kasan_atomics+0x152/0x310
[   16.012744]  kasan_atomics+0x1dc/0x310
[   16.012770]  ? __pfx_kasan_atomics+0x10/0x10
[   16.012797]  ? __pfx_read_tsc+0x10/0x10
[   16.012821]  ? ktime_get_ts64+0x86/0x230
[   16.012846]  kunit_try_run_case+0x1a5/0x480
[   16.012872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.012896]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.012922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.012947]  ? __kthread_parkme+0x82/0x180
[   16.012969]  ? preempt_count_sub+0x50/0x80
[   16.012994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.013019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.013087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.013114]  kthread+0x337/0x6f0
[   16.013135]  ? trace_preempt_on+0x20/0xc0
[   16.013159]  ? __pfx_kthread+0x10/0x10
[   16.013182]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.013205]  ? calculate_sigpending+0x7b/0xa0
[   16.013230]  ? __pfx_kthread+0x10/0x10
[   16.013253]  ret_from_fork+0x116/0x1d0
[   16.013273]  ? __pfx_kthread+0x10/0x10
[   16.013295]  ret_from_fork_asm+0x1a/0x30
[   16.013328]  </TASK>
[   16.013339] 
[   16.022283] Allocated by task 283:
[   16.022491]  kasan_save_stack+0x45/0x70
[   16.022845]  kasan_save_track+0x18/0x40
[   16.023274]  kasan_save_alloc_info+0x3b/0x50
[   16.023517]  __kasan_kmalloc+0xb7/0xc0
[   16.023712]  __kmalloc_cache_noprof+0x189/0x420
[   16.024030]  kasan_atomics+0x95/0x310
[   16.024304]  kunit_try_run_case+0x1a5/0x480
[   16.024464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.024663]  kthread+0x337/0x6f0
[   16.024913]  ret_from_fork+0x116/0x1d0
[   16.025202]  ret_from_fork_asm+0x1a/0x30
[   16.025409] 
[   16.025522] The buggy address belongs to the object at ffff8881038b5600
[   16.025522]  which belongs to the cache kmalloc-64 of size 64
[   16.026272] The buggy address is located 0 bytes to the right of
[   16.026272]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.026769] 
[   16.026873] The buggy address belongs to the physical page:
[   16.027300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.027577] flags: 0x200000000000000(node=0|zone=2)
[   16.027750] page_type: f5(slab)
[   16.027877] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.028119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.028413] page dumped because: kasan: bad access detected
[   16.028682] 
[   16.028918] Memory state around the buggy address:
[   16.029300]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.029622]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.029949] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.030354]                                      ^
[   16.030824]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.031114]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.031442] ==================================================================
[   15.909815] ==================================================================
[   15.910238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.910614] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.911353] 
[   15.911498] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.911547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.911559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.911583] Call Trace:
[   15.911601]  <TASK>
[   15.911617]  dump_stack_lvl+0x73/0xb0
[   15.911649]  print_report+0xd1/0x610
[   15.911673]  ? __virt_addr_valid+0x1db/0x2d0
[   15.911696]  ? kasan_atomics_helper+0xd47/0x5450
[   15.911719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.911743]  ? kasan_atomics_helper+0xd47/0x5450
[   15.911766]  kasan_report+0x141/0x180
[   15.911806]  ? kasan_atomics_helper+0xd47/0x5450
[   15.911835]  kasan_check_range+0x10c/0x1c0
[   15.911860]  __kasan_check_write+0x18/0x20
[   15.911882]  kasan_atomics_helper+0xd47/0x5450
[   15.911907]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.911930]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.911957]  ? kasan_atomics+0x152/0x310
[   15.911985]  kasan_atomics+0x1dc/0x310
[   15.912009]  ? __pfx_kasan_atomics+0x10/0x10
[   15.912035]  ? __pfx_read_tsc+0x10/0x10
[   15.912105]  ? ktime_get_ts64+0x86/0x230
[   15.912132]  kunit_try_run_case+0x1a5/0x480
[   15.912158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.912182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.912209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.912234]  ? __kthread_parkme+0x82/0x180
[   15.912257]  ? preempt_count_sub+0x50/0x80
[   15.912282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.912307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.912332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.912357]  kthread+0x337/0x6f0
[   15.912378]  ? trace_preempt_on+0x20/0xc0
[   15.912403]  ? __pfx_kthread+0x10/0x10
[   15.912425]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.912449]  ? calculate_sigpending+0x7b/0xa0
[   15.912486]  ? __pfx_kthread+0x10/0x10
[   15.912509]  ret_from_fork+0x116/0x1d0
[   15.912529]  ? __pfx_kthread+0x10/0x10
[   15.912551]  ret_from_fork_asm+0x1a/0x30
[   15.912583]  </TASK>
[   15.912593] 
[   15.921406] Allocated by task 283:
[   15.921555]  kasan_save_stack+0x45/0x70
[   15.921708]  kasan_save_track+0x18/0x40
[   15.921850]  kasan_save_alloc_info+0x3b/0x50
[   15.922005]  __kasan_kmalloc+0xb7/0xc0
[   15.922148]  __kmalloc_cache_noprof+0x189/0x420
[   15.922311]  kasan_atomics+0x95/0x310
[   15.922451]  kunit_try_run_case+0x1a5/0x480
[   15.922677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.922935]  kthread+0x337/0x6f0
[   15.923313]  ret_from_fork+0x116/0x1d0
[   15.923544]  ret_from_fork_asm+0x1a/0x30
[   15.923747] 
[   15.923948] The buggy address belongs to the object at ffff8881038b5600
[   15.923948]  which belongs to the cache kmalloc-64 of size 64
[   15.925021] The buggy address is located 0 bytes to the right of
[   15.925021]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.925617] 
[   15.925728] The buggy address belongs to the physical page:
[   15.926309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.926632] flags: 0x200000000000000(node=0|zone=2)
[   15.926892] page_type: f5(slab)
[   15.927112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.927370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.927619] page dumped because: kasan: bad access detected
[   15.927814] 
[   15.927913] Memory state around the buggy address:
[   15.928153]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.928568]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.928905] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.929405]                                      ^
[   15.929627]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.929952]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.930349] ==================================================================
[   15.699842] ==================================================================
[   15.700248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.700596] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.701522] 
[   15.701873] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.701935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.701950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.701975] Call Trace:
[   15.701994]  <TASK>
[   15.702052]  dump_stack_lvl+0x73/0xb0
[   15.702156]  print_report+0xd1/0x610
[   15.702183]  ? __virt_addr_valid+0x1db/0x2d0
[   15.702208]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.702232]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.702258]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.702281]  kasan_report+0x141/0x180
[   15.702305]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.702333]  kasan_check_range+0x10c/0x1c0
[   15.702359]  __kasan_check_write+0x18/0x20
[   15.702380]  kasan_atomics_helper+0x7c7/0x5450
[   15.702405]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.702429]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.702455]  ? kasan_atomics+0x152/0x310
[   15.702495]  kasan_atomics+0x1dc/0x310
[   15.702520]  ? __pfx_kasan_atomics+0x10/0x10
[   15.702546]  ? __pfx_read_tsc+0x10/0x10
[   15.702569]  ? ktime_get_ts64+0x86/0x230
[   15.702596]  kunit_try_run_case+0x1a5/0x480
[   15.702621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.702646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.702672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.702697]  ? __kthread_parkme+0x82/0x180
[   15.702720]  ? preempt_count_sub+0x50/0x80
[   15.702746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.702772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.702796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.702822]  kthread+0x337/0x6f0
[   15.702843]  ? trace_preempt_on+0x20/0xc0
[   15.702867]  ? __pfx_kthread+0x10/0x10
[   15.702890]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.702914]  ? calculate_sigpending+0x7b/0xa0
[   15.702940]  ? __pfx_kthread+0x10/0x10
[   15.702962]  ret_from_fork+0x116/0x1d0
[   15.702983]  ? __pfx_kthread+0x10/0x10
[   15.703005]  ret_from_fork_asm+0x1a/0x30
[   15.703072]  </TASK>
[   15.703085] 
[   15.715285] Allocated by task 283:
[   15.716014]  kasan_save_stack+0x45/0x70
[   15.716479]  kasan_save_track+0x18/0x40
[   15.716913]  kasan_save_alloc_info+0x3b/0x50
[   15.717414]  __kasan_kmalloc+0xb7/0xc0
[   15.717821]  __kmalloc_cache_noprof+0x189/0x420
[   15.718337]  kasan_atomics+0x95/0x310
[   15.718600]  kunit_try_run_case+0x1a5/0x480
[   15.718759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.718943]  kthread+0x337/0x6f0
[   15.719105]  ret_from_fork+0x116/0x1d0
[   15.719339]  ret_from_fork_asm+0x1a/0x30
[   15.719595] 
[   15.719720] The buggy address belongs to the object at ffff8881038b5600
[   15.719720]  which belongs to the cache kmalloc-64 of size 64
[   15.720562] The buggy address is located 0 bytes to the right of
[   15.720562]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.721188] 
[   15.721298] The buggy address belongs to the physical page:
[   15.721624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.722085] flags: 0x200000000000000(node=0|zone=2)
[   15.722439] page_type: f5(slab)
[   15.722658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.723144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.723692] page dumped because: kasan: bad access detected
[   15.724033] 
[   15.724135] Memory state around the buggy address:
[   15.724454]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.724904]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.725318] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.725640]                                      ^
[   15.726052]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726440]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726793] ==================================================================
[   16.502819] ==================================================================
[   16.503272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.503594] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.503969] 
[   16.504151] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.504200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.504213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.504236] Call Trace:
[   16.504276]  <TASK>
[   16.504293]  dump_stack_lvl+0x73/0xb0
[   16.504339]  print_report+0xd1/0x610
[   16.504376]  ? __virt_addr_valid+0x1db/0x2d0
[   16.504414]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.504450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.504499]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.504536]  kasan_report+0x141/0x180
[   16.504574]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.504615]  kasan_check_range+0x10c/0x1c0
[   16.504652]  __kasan_check_write+0x18/0x20
[   16.504673]  kasan_atomics_helper+0x19e3/0x5450
[   16.504697]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.504721]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.504747]  ? kasan_atomics+0x152/0x310
[   16.504775]  kasan_atomics+0x1dc/0x310
[   16.504817]  ? __pfx_kasan_atomics+0x10/0x10
[   16.504844]  ? __pfx_read_tsc+0x10/0x10
[   16.504866]  ? ktime_get_ts64+0x86/0x230
[   16.504891]  kunit_try_run_case+0x1a5/0x480
[   16.504916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.504940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.504966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.504991]  ? __kthread_parkme+0x82/0x180
[   16.505014]  ? preempt_count_sub+0x50/0x80
[   16.505111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.505136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.505161]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.505188]  kthread+0x337/0x6f0
[   16.505210]  ? trace_preempt_on+0x20/0xc0
[   16.505234]  ? __pfx_kthread+0x10/0x10
[   16.505256]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.505279]  ? calculate_sigpending+0x7b/0xa0
[   16.505304]  ? __pfx_kthread+0x10/0x10
[   16.505327]  ret_from_fork+0x116/0x1d0
[   16.505347]  ? __pfx_kthread+0x10/0x10
[   16.505369]  ret_from_fork_asm+0x1a/0x30
[   16.505400]  </TASK>
[   16.505412] 
[   16.514141] Allocated by task 283:
[   16.514372]  kasan_save_stack+0x45/0x70
[   16.514599]  kasan_save_track+0x18/0x40
[   16.514851]  kasan_save_alloc_info+0x3b/0x50
[   16.515135]  __kasan_kmalloc+0xb7/0xc0
[   16.515321]  __kmalloc_cache_noprof+0x189/0x420
[   16.515556]  kasan_atomics+0x95/0x310
[   16.515714]  kunit_try_run_case+0x1a5/0x480
[   16.515891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.516133]  kthread+0x337/0x6f0
[   16.516267]  ret_from_fork+0x116/0x1d0
[   16.516417]  ret_from_fork_asm+0x1a/0x30
[   16.516661] 
[   16.516811] The buggy address belongs to the object at ffff8881038b5600
[   16.516811]  which belongs to the cache kmalloc-64 of size 64
[   16.517681] The buggy address is located 0 bytes to the right of
[   16.517681]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.518380] 
[   16.518490] The buggy address belongs to the physical page:
[   16.518743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.519148] flags: 0x200000000000000(node=0|zone=2)
[   16.519325] page_type: f5(slab)
[   16.519485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.519884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.520358] page dumped because: kasan: bad access detected
[   16.520656] 
[   16.520774] Memory state around the buggy address:
[   16.521076]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.521411]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.521734] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.522006]                                      ^
[   16.522527]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.522913]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523328] ==================================================================
[   15.536917] ==================================================================
[   15.537401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.537729] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.538091] 
[   15.538186] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.538231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.538245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.538270] Call Trace:
[   15.538288]  <TASK>
[   15.538304]  dump_stack_lvl+0x73/0xb0
[   15.538335]  print_report+0xd1/0x610
[   15.538360]  ? __virt_addr_valid+0x1db/0x2d0
[   15.538385]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.538408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.538432]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.538455]  kasan_report+0x141/0x180
[   15.538491]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.538519]  __asan_report_store4_noabort+0x1b/0x30
[   15.538546]  kasan_atomics_helper+0x4b3a/0x5450
[   15.538570]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.538593]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.538620]  ? kasan_atomics+0x152/0x310
[   15.538648]  kasan_atomics+0x1dc/0x310
[   15.538672]  ? __pfx_kasan_atomics+0x10/0x10
[   15.538698]  ? __pfx_read_tsc+0x10/0x10
[   15.538722]  ? ktime_get_ts64+0x86/0x230
[   15.538747]  kunit_try_run_case+0x1a5/0x480
[   15.538779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.538826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.538854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.538879]  ? __kthread_parkme+0x82/0x180
[   15.538900]  ? preempt_count_sub+0x50/0x80
[   15.538927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.538953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.538977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.539003]  kthread+0x337/0x6f0
[   15.539024]  ? trace_preempt_on+0x20/0xc0
[   15.539057]  ? __pfx_kthread+0x10/0x10
[   15.539079]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.539102]  ? calculate_sigpending+0x7b/0xa0
[   15.539129]  ? __pfx_kthread+0x10/0x10
[   15.539151]  ret_from_fork+0x116/0x1d0
[   15.539172]  ? __pfx_kthread+0x10/0x10
[   15.539194]  ret_from_fork_asm+0x1a/0x30
[   15.539226]  </TASK>
[   15.539238] 
[   15.549338] Allocated by task 283:
[   15.549558]  kasan_save_stack+0x45/0x70
[   15.549747]  kasan_save_track+0x18/0x40
[   15.550575]  kasan_save_alloc_info+0x3b/0x50
[   15.550749]  __kasan_kmalloc+0xb7/0xc0
[   15.550891]  __kmalloc_cache_noprof+0x189/0x420
[   15.551065]  kasan_atomics+0x95/0x310
[   15.551204]  kunit_try_run_case+0x1a5/0x480
[   15.551355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.552210]  kthread+0x337/0x6f0
[   15.552414]  ret_from_fork+0x116/0x1d0
[   15.552625]  ret_from_fork_asm+0x1a/0x30
[   15.552829] 
[   15.552930] The buggy address belongs to the object at ffff8881038b5600
[   15.552930]  which belongs to the cache kmalloc-64 of size 64
[   15.553440] The buggy address is located 0 bytes to the right of
[   15.553440]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.555498] 
[   15.555928] The buggy address belongs to the physical page:
[   15.557000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.558080] flags: 0x200000000000000(node=0|zone=2)
[   15.558903] page_type: f5(slab)
[   15.559622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.560541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.561625] page dumped because: kasan: bad access detected
[   15.562687] 
[   15.562918] Memory state around the buggy address:
[   15.563655]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.564536]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.565161] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.566115]                                      ^
[   15.566793]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.567642]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.568520] ==================================================================
[   15.642378] ==================================================================
[   15.642888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.643409] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.644179] 
[   15.644429] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.644486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.644499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.644522] Call Trace:
[   15.644560]  <TASK>
[   15.644587]  dump_stack_lvl+0x73/0xb0
[   15.644619]  print_report+0xd1/0x610
[   15.644656]  ? __virt_addr_valid+0x1db/0x2d0
[   15.644680]  ? kasan_atomics_helper+0x697/0x5450
[   15.644702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.644737]  ? kasan_atomics_helper+0x697/0x5450
[   15.644761]  kasan_report+0x141/0x180
[   15.644785]  ? kasan_atomics_helper+0x697/0x5450
[   15.644812]  kasan_check_range+0x10c/0x1c0
[   15.644837]  __kasan_check_write+0x18/0x20
[   15.644858]  kasan_atomics_helper+0x697/0x5450
[   15.644882]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.644906]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.644932]  ? kasan_atomics+0x152/0x310
[   15.644960]  kasan_atomics+0x1dc/0x310
[   15.644984]  ? __pfx_kasan_atomics+0x10/0x10
[   15.645010]  ? __pfx_read_tsc+0x10/0x10
[   15.645042]  ? ktime_get_ts64+0x86/0x230
[   15.645069]  kunit_try_run_case+0x1a5/0x480
[   15.645094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.645117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.645144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.645168]  ? __kthread_parkme+0x82/0x180
[   15.645190]  ? preempt_count_sub+0x50/0x80
[   15.645215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.645240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.645265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.645290]  kthread+0x337/0x6f0
[   15.645311]  ? trace_preempt_on+0x20/0xc0
[   15.645335]  ? __pfx_kthread+0x10/0x10
[   15.645357]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.645380]  ? calculate_sigpending+0x7b/0xa0
[   15.645405]  ? __pfx_kthread+0x10/0x10
[   15.645428]  ret_from_fork+0x116/0x1d0
[   15.645449]  ? __pfx_kthread+0x10/0x10
[   15.645481]  ret_from_fork_asm+0x1a/0x30
[   15.645512]  </TASK>
[   15.645523] 
[   15.658979] Allocated by task 283:
[   15.659230]  kasan_save_stack+0x45/0x70
[   15.659660]  kasan_save_track+0x18/0x40
[   15.659935]  kasan_save_alloc_info+0x3b/0x50
[   15.660135]  __kasan_kmalloc+0xb7/0xc0
[   15.660300]  __kmalloc_cache_noprof+0x189/0x420
[   15.660727]  kasan_atomics+0x95/0x310
[   15.660930]  kunit_try_run_case+0x1a5/0x480
[   15.661083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661393]  kthread+0x337/0x6f0
[   15.661676]  ret_from_fork+0x116/0x1d0
[   15.661945]  ret_from_fork_asm+0x1a/0x30
[   15.662209] 
[   15.662308] The buggy address belongs to the object at ffff8881038b5600
[   15.662308]  which belongs to the cache kmalloc-64 of size 64
[   15.662839] The buggy address is located 0 bytes to the right of
[   15.662839]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.663450] 
[   15.663565] The buggy address belongs to the physical page:
[   15.663987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.664346] flags: 0x200000000000000(node=0|zone=2)
[   15.664647] page_type: f5(slab)
[   15.664838] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.665210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.665561] page dumped because: kasan: bad access detected
[   15.665889] 
[   15.665976] Memory state around the buggy address:
[   15.666233]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.666696]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.667013] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.667537]                                      ^
[   15.667732]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.668130]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.668504] ==================================================================
[   15.790362] ==================================================================
[   15.790696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.791109] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.791596] 
[   15.791695] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.791742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.791754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.791779] Call Trace:
[   15.791796]  <TASK>
[   15.791825]  dump_stack_lvl+0x73/0xb0
[   15.791858]  print_report+0xd1/0x610
[   15.791894]  ? __virt_addr_valid+0x1db/0x2d0
[   15.791919]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.791941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.791965]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.791988]  kasan_report+0x141/0x180
[   15.792011]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.792038]  kasan_check_range+0x10c/0x1c0
[   15.792062]  __kasan_check_write+0x18/0x20
[   15.792083]  kasan_atomics_helper+0xa2b/0x5450
[   15.792107]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.792130]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.792157]  ? kasan_atomics+0x152/0x310
[   15.792184]  kasan_atomics+0x1dc/0x310
[   15.792208]  ? __pfx_kasan_atomics+0x10/0x10
[   15.792234]  ? __pfx_read_tsc+0x10/0x10
[   15.792257]  ? ktime_get_ts64+0x86/0x230
[   15.792282]  kunit_try_run_case+0x1a5/0x480
[   15.792309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.792385]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.792413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.792439]  ? __kthread_parkme+0x82/0x180
[   15.792461]  ? preempt_count_sub+0x50/0x80
[   15.792498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.792534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.792559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.792596]  kthread+0x337/0x6f0
[   15.792617]  ? trace_preempt_on+0x20/0xc0
[   15.792642]  ? __pfx_kthread+0x10/0x10
[   15.792665]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.792688]  ? calculate_sigpending+0x7b/0xa0
[   15.792713]  ? __pfx_kthread+0x10/0x10
[   15.792737]  ret_from_fork+0x116/0x1d0
[   15.792757]  ? __pfx_kthread+0x10/0x10
[   15.792780]  ret_from_fork_asm+0x1a/0x30
[   15.792822]  </TASK>
[   15.792833] 
[   15.802266] Allocated by task 283:
[   15.802445]  kasan_save_stack+0x45/0x70
[   15.802667]  kasan_save_track+0x18/0x40
[   15.802838]  kasan_save_alloc_info+0x3b/0x50
[   15.802988]  __kasan_kmalloc+0xb7/0xc0
[   15.803121]  __kmalloc_cache_noprof+0x189/0x420
[   15.803279]  kasan_atomics+0x95/0x310
[   15.803414]  kunit_try_run_case+0x1a5/0x480
[   15.803987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.804668]  kthread+0x337/0x6f0
[   15.805234]  ret_from_fork+0x116/0x1d0
[   15.805624]  ret_from_fork_asm+0x1a/0x30
[   15.806002] 
[   15.806228] The buggy address belongs to the object at ffff8881038b5600
[   15.806228]  which belongs to the cache kmalloc-64 of size 64
[   15.807540] The buggy address is located 0 bytes to the right of
[   15.807540]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.808429] 
[   15.808645] The buggy address belongs to the physical page:
[   15.809273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.809872] flags: 0x200000000000000(node=0|zone=2)
[   15.810329] page_type: f5(slab)
[   15.810460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.810712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.811493] page dumped because: kasan: bad access detected
[   15.812403] 
[   15.812591] Memory state around the buggy address:
[   15.813154]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.813780]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.814291] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.814633]                                      ^
[   15.815201]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.815891]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.816378] ==================================================================
[   16.248436] ==================================================================
[   16.248778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   16.249393] Read of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.249748] 
[   16.249941] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.249999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.250012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.250046] Call Trace:
[   16.250110]  <TASK>
[   16.250127]  dump_stack_lvl+0x73/0xb0
[   16.250159]  print_report+0xd1/0x610
[   16.250193]  ? __virt_addr_valid+0x1db/0x2d0
[   16.250217]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.250239]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.250275]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.250298]  kasan_report+0x141/0x180
[   16.250322]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.250349]  __asan_report_load8_noabort+0x18/0x20
[   16.250385]  kasan_atomics_helper+0x4eae/0x5450
[   16.250408]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.250432]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.250479]  ? kasan_atomics+0x152/0x310
[   16.250506]  kasan_atomics+0x1dc/0x310
[   16.250530]  ? __pfx_kasan_atomics+0x10/0x10
[   16.250564]  ? __pfx_read_tsc+0x10/0x10
[   16.250586]  ? ktime_get_ts64+0x86/0x230
[   16.250611]  kunit_try_run_case+0x1a5/0x480
[   16.250646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.250671]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.250696]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.250721]  ? __kthread_parkme+0x82/0x180
[   16.250743]  ? preempt_count_sub+0x50/0x80
[   16.250767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.250792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.250817]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.250841]  kthread+0x337/0x6f0
[   16.250862]  ? trace_preempt_on+0x20/0xc0
[   16.250886]  ? __pfx_kthread+0x10/0x10
[   16.250908]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.250932]  ? calculate_sigpending+0x7b/0xa0
[   16.250957]  ? __pfx_kthread+0x10/0x10
[   16.250979]  ret_from_fork+0x116/0x1d0
[   16.251000]  ? __pfx_kthread+0x10/0x10
[   16.251021]  ret_from_fork_asm+0x1a/0x30
[   16.251053]  </TASK>
[   16.251064] 
[   16.259819] Allocated by task 283:
[   16.260008]  kasan_save_stack+0x45/0x70
[   16.260436]  kasan_save_track+0x18/0x40
[   16.260637]  kasan_save_alloc_info+0x3b/0x50
[   16.260822]  __kasan_kmalloc+0xb7/0xc0
[   16.261040]  __kmalloc_cache_noprof+0x189/0x420
[   16.261418]  kasan_atomics+0x95/0x310
[   16.261799]  kunit_try_run_case+0x1a5/0x480
[   16.262025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.262294]  kthread+0x337/0x6f0
[   16.262504]  ret_from_fork+0x116/0x1d0
[   16.262697]  ret_from_fork_asm+0x1a/0x30
[   16.262977] 
[   16.263056] The buggy address belongs to the object at ffff8881038b5600
[   16.263056]  which belongs to the cache kmalloc-64 of size 64
[   16.263421] The buggy address is located 0 bytes to the right of
[   16.263421]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.263817] 
[   16.263896] The buggy address belongs to the physical page:
[   16.264307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.264697] flags: 0x200000000000000(node=0|zone=2)
[   16.265197] page_type: f5(slab)
[   16.265373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.265738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.266637] page dumped because: kasan: bad access detected
[   16.266996] 
[   16.267174] Memory state around the buggy address:
[   16.267380]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.267686]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.268209] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.268552]                                      ^
[   16.268716]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.268938]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.269156] ==================================================================
[   16.460455] ==================================================================
[   16.460847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.461297] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.461635] 
[   16.461726] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.461825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.461839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.461875] Call Trace:
[   16.461904]  <TASK>
[   16.461919]  dump_stack_lvl+0x73/0xb0
[   16.461967]  print_report+0xd1/0x610
[   16.462005]  ? __virt_addr_valid+0x1db/0x2d0
[   16.462108]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.462148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.462185]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.462209]  kasan_report+0x141/0x180
[   16.462233]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.462260]  kasan_check_range+0x10c/0x1c0
[   16.462285]  __kasan_check_write+0x18/0x20
[   16.462305]  kasan_atomics_helper+0x18b1/0x5450
[   16.462330]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.462353]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.462379]  ? kasan_atomics+0x152/0x310
[   16.462407]  kasan_atomics+0x1dc/0x310
[   16.462431]  ? __pfx_kasan_atomics+0x10/0x10
[   16.462457]  ? __pfx_read_tsc+0x10/0x10
[   16.462491]  ? ktime_get_ts64+0x86/0x230
[   16.462517]  kunit_try_run_case+0x1a5/0x480
[   16.462543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.462567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.462593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.462618]  ? __kthread_parkme+0x82/0x180
[   16.462639]  ? preempt_count_sub+0x50/0x80
[   16.462665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.462690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.462714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.462739]  kthread+0x337/0x6f0
[   16.462780]  ? trace_preempt_on+0x20/0xc0
[   16.462804]  ? __pfx_kthread+0x10/0x10
[   16.462827]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.462871]  ? calculate_sigpending+0x7b/0xa0
[   16.462896]  ? __pfx_kthread+0x10/0x10
[   16.462933]  ret_from_fork+0x116/0x1d0
[   16.462954]  ? __pfx_kthread+0x10/0x10
[   16.462990]  ret_from_fork_asm+0x1a/0x30
[   16.463084]  </TASK>
[   16.463114] 
[   16.472300] Allocated by task 283:
[   16.472522]  kasan_save_stack+0x45/0x70
[   16.472700]  kasan_save_track+0x18/0x40
[   16.472901]  kasan_save_alloc_info+0x3b/0x50
[   16.473238]  __kasan_kmalloc+0xb7/0xc0
[   16.473433]  __kmalloc_cache_noprof+0x189/0x420
[   16.473702]  kasan_atomics+0x95/0x310
[   16.473957]  kunit_try_run_case+0x1a5/0x480
[   16.474246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.474524]  kthread+0x337/0x6f0
[   16.474697]  ret_from_fork+0x116/0x1d0
[   16.474910]  ret_from_fork_asm+0x1a/0x30
[   16.475135] 
[   16.475239] The buggy address belongs to the object at ffff8881038b5600
[   16.475239]  which belongs to the cache kmalloc-64 of size 64
[   16.475713] The buggy address is located 0 bytes to the right of
[   16.475713]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.476101] 
[   16.476201] The buggy address belongs to the physical page:
[   16.476464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.477179] flags: 0x200000000000000(node=0|zone=2)
[   16.477439] page_type: f5(slab)
[   16.477649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.478112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.478415] page dumped because: kasan: bad access detected
[   16.478609] 
[   16.478685] Memory state around the buggy address:
[   16.478875]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.479267]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.479653] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.480125]                                      ^
[   16.480401]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.480795]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.481355] ==================================================================
[   15.870495] ==================================================================
[   15.870916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.871480] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.871741] 
[   15.871858] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.871902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.871916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.871938] Call Trace:
[   15.871956]  <TASK>
[   15.871971]  dump_stack_lvl+0x73/0xb0
[   15.872002]  print_report+0xd1/0x610
[   15.872027]  ? __virt_addr_valid+0x1db/0x2d0
[   15.872052]  ? kasan_atomics_helper+0xc70/0x5450
[   15.872074]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.872098]  ? kasan_atomics_helper+0xc70/0x5450
[   15.872121]  kasan_report+0x141/0x180
[   15.872145]  ? kasan_atomics_helper+0xc70/0x5450
[   15.872173]  kasan_check_range+0x10c/0x1c0
[   15.872197]  __kasan_check_write+0x18/0x20
[   15.872218]  kasan_atomics_helper+0xc70/0x5450
[   15.872290]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.872314]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.872340]  ? kasan_atomics+0x152/0x310
[   15.872369]  kasan_atomics+0x1dc/0x310
[   15.872392]  ? __pfx_kasan_atomics+0x10/0x10
[   15.872417]  ? __pfx_read_tsc+0x10/0x10
[   15.872441]  ? ktime_get_ts64+0x86/0x230
[   15.872466]  kunit_try_run_case+0x1a5/0x480
[   15.872504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.872527]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.872554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.872579]  ? __kthread_parkme+0x82/0x180
[   15.872600]  ? preempt_count_sub+0x50/0x80
[   15.872625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.872650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.872674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.872699]  kthread+0x337/0x6f0
[   15.872721]  ? trace_preempt_on+0x20/0xc0
[   15.872745]  ? __pfx_kthread+0x10/0x10
[   15.872767]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.872790]  ? calculate_sigpending+0x7b/0xa0
[   15.872815]  ? __pfx_kthread+0x10/0x10
[   15.872838]  ret_from_fork+0x116/0x1d0
[   15.872859]  ? __pfx_kthread+0x10/0x10
[   15.872890]  ret_from_fork_asm+0x1a/0x30
[   15.872922]  </TASK>
[   15.872933] 
[   15.881403] Allocated by task 283:
[   15.881578]  kasan_save_stack+0x45/0x70
[   15.881729]  kasan_save_track+0x18/0x40
[   15.881871]  kasan_save_alloc_info+0x3b/0x50
[   15.882142]  __kasan_kmalloc+0xb7/0xc0
[   15.882344]  __kmalloc_cache_noprof+0x189/0x420
[   15.882587]  kasan_atomics+0x95/0x310
[   15.882785]  kunit_try_run_case+0x1a5/0x480
[   15.883007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.883413]  kthread+0x337/0x6f0
[   15.883604]  ret_from_fork+0x116/0x1d0
[   15.883760]  ret_from_fork_asm+0x1a/0x30
[   15.883979] 
[   15.884149] The buggy address belongs to the object at ffff8881038b5600
[   15.884149]  which belongs to the cache kmalloc-64 of size 64
[   15.884592] The buggy address is located 0 bytes to the right of
[   15.884592]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.885255] 
[   15.885335] The buggy address belongs to the physical page:
[   15.885590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.886151] flags: 0x200000000000000(node=0|zone=2)
[   15.886372] page_type: f5(slab)
[   15.886527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.886794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.887031] page dumped because: kasan: bad access detected
[   15.887214] 
[   15.887288] Memory state around the buggy address:
[   15.887451]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.887693]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.888018] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.888699]                                      ^
[   15.889279]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.889598]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.889938] ==================================================================
[   16.604830] ==================================================================
[   16.605262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.605655] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.605922] 
[   16.606038] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.606110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.606124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.606145] Call Trace:
[   16.606161]  <TASK>
[   16.606196]  dump_stack_lvl+0x73/0xb0
[   16.606227]  print_report+0xd1/0x610
[   16.606268]  ? __virt_addr_valid+0x1db/0x2d0
[   16.606292]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.606315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.606339]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.606362]  kasan_report+0x141/0x180
[   16.606386]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.606415]  kasan_check_range+0x10c/0x1c0
[   16.606440]  __kasan_check_write+0x18/0x20
[   16.606461]  kasan_atomics_helper+0x1ce1/0x5450
[   16.606496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.606519]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.606562]  ? kasan_atomics+0x152/0x310
[   16.606605]  kasan_atomics+0x1dc/0x310
[   16.606643]  ? __pfx_kasan_atomics+0x10/0x10
[   16.606682]  ? __pfx_read_tsc+0x10/0x10
[   16.606719]  ? ktime_get_ts64+0x86/0x230
[   16.606777]  kunit_try_run_case+0x1a5/0x480
[   16.606832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.606869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.606907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.606946]  ? __kthread_parkme+0x82/0x180
[   16.606981]  ? preempt_count_sub+0x50/0x80
[   16.607019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.607058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.607096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.607135]  kthread+0x337/0x6f0
[   16.607170]  ? trace_preempt_on+0x20/0xc0
[   16.607208]  ? __pfx_kthread+0x10/0x10
[   16.607230]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.607253]  ? calculate_sigpending+0x7b/0xa0
[   16.607278]  ? __pfx_kthread+0x10/0x10
[   16.607301]  ret_from_fork+0x116/0x1d0
[   16.607321]  ? __pfx_kthread+0x10/0x10
[   16.607343]  ret_from_fork_asm+0x1a/0x30
[   16.607375]  </TASK>
[   16.607386] 
[   16.615391] Allocated by task 283:
[   16.615596]  kasan_save_stack+0x45/0x70
[   16.615821]  kasan_save_track+0x18/0x40
[   16.616013]  kasan_save_alloc_info+0x3b/0x50
[   16.616251]  __kasan_kmalloc+0xb7/0xc0
[   16.616445]  __kmalloc_cache_noprof+0x189/0x420
[   16.616697]  kasan_atomics+0x95/0x310
[   16.616920]  kunit_try_run_case+0x1a5/0x480
[   16.617135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.617393]  kthread+0x337/0x6f0
[   16.617579]  ret_from_fork+0x116/0x1d0
[   16.617793]  ret_from_fork_asm+0x1a/0x30
[   16.617994] 
[   16.618093] The buggy address belongs to the object at ffff8881038b5600
[   16.618093]  which belongs to the cache kmalloc-64 of size 64
[   16.618621] The buggy address is located 0 bytes to the right of
[   16.618621]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.619150] 
[   16.619270] The buggy address belongs to the physical page:
[   16.619549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.619929] flags: 0x200000000000000(node=0|zone=2)
[   16.620165] page_type: f5(slab)
[   16.620356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.620618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.620915] page dumped because: kasan: bad access detected
[   16.621192] 
[   16.621309] Memory state around the buggy address:
[   16.621576]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.621944]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.622258] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.622576]                                      ^
[   16.622833]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.623091]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.623314] ==================================================================
[   16.051461] ==================================================================
[   16.051789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   16.052104] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.052631] 
[   16.052744] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.052787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.052800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.052823] Call Trace:
[   16.052838]  <TASK>
[   16.052853]  dump_stack_lvl+0x73/0xb0
[   16.052885]  print_report+0xd1/0x610
[   16.052908]  ? __virt_addr_valid+0x1db/0x2d0
[   16.052932]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.052954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.052979]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.053003]  kasan_report+0x141/0x180
[   16.053026]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.053053]  __asan_report_load4_noabort+0x18/0x20
[   16.053078]  kasan_atomics_helper+0x4a1c/0x5450
[   16.053102]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.053126]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.053152]  ? kasan_atomics+0x152/0x310
[   16.053180]  kasan_atomics+0x1dc/0x310
[   16.053204]  ? __pfx_kasan_atomics+0x10/0x10
[   16.053229]  ? __pfx_read_tsc+0x10/0x10
[   16.053253]  ? ktime_get_ts64+0x86/0x230
[   16.053278]  kunit_try_run_case+0x1a5/0x480
[   16.053304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.053329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.053355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.053380]  ? __kthread_parkme+0x82/0x180
[   16.053402]  ? preempt_count_sub+0x50/0x80
[   16.053428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.053454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.053492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.053517]  kthread+0x337/0x6f0
[   16.053539]  ? trace_preempt_on+0x20/0xc0
[   16.053563]  ? __pfx_kthread+0x10/0x10
[   16.053586]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.053610]  ? calculate_sigpending+0x7b/0xa0
[   16.053636]  ? __pfx_kthread+0x10/0x10
[   16.053659]  ret_from_fork+0x116/0x1d0
[   16.053679]  ? __pfx_kthread+0x10/0x10
[   16.053701]  ret_from_fork_asm+0x1a/0x30
[   16.053733]  </TASK>
[   16.053744] 
[   16.065106] Allocated by task 283:
[   16.065306]  kasan_save_stack+0x45/0x70
[   16.065552]  kasan_save_track+0x18/0x40
[   16.065949]  kasan_save_alloc_info+0x3b/0x50
[   16.066189]  __kasan_kmalloc+0xb7/0xc0
[   16.066385]  __kmalloc_cache_noprof+0x189/0x420
[   16.066627]  kasan_atomics+0x95/0x310
[   16.066998]  kunit_try_run_case+0x1a5/0x480
[   16.067289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.067483]  kthread+0x337/0x6f0
[   16.067611]  ret_from_fork+0x116/0x1d0
[   16.067751]  ret_from_fork_asm+0x1a/0x30
[   16.067962] 
[   16.068083] The buggy address belongs to the object at ffff8881038b5600
[   16.068083]  which belongs to the cache kmalloc-64 of size 64
[   16.068636] The buggy address is located 0 bytes to the right of
[   16.068636]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.069401] 
[   16.069515] The buggy address belongs to the physical page:
[   16.069693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.069938] flags: 0x200000000000000(node=0|zone=2)
[   16.070121] page_type: f5(slab)
[   16.070327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.070721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.071361] page dumped because: kasan: bad access detected
[   16.071554] 
[   16.071672] Memory state around the buggy address:
[   16.071994]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.072384]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.072711] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.073035]                                      ^
[   16.073224]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.073547]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.073864] ==================================================================
[   15.608319] ==================================================================
[   15.608941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.609402] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.610174] 
[   15.610484] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.610567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.610581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.610605] Call Trace:
[   15.610636]  <TASK>
[   15.610654]  dump_stack_lvl+0x73/0xb0
[   15.610688]  print_report+0xd1/0x610
[   15.610712]  ? __virt_addr_valid+0x1db/0x2d0
[   15.610738]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.610762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.610786]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.610809]  kasan_report+0x141/0x180
[   15.610833]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.610862]  kasan_check_range+0x10c/0x1c0
[   15.610887]  __kasan_check_write+0x18/0x20
[   15.610908]  kasan_atomics_helper+0x5fe/0x5450
[   15.610945]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.610969]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.610995]  ? kasan_atomics+0x152/0x310
[   15.611074]  kasan_atomics+0x1dc/0x310
[   15.611116]  ? __pfx_kasan_atomics+0x10/0x10
[   15.611143]  ? __pfx_read_tsc+0x10/0x10
[   15.611167]  ? ktime_get_ts64+0x86/0x230
[   15.611205]  kunit_try_run_case+0x1a5/0x480
[   15.611231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.611267]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.611292]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.611318]  ? __kthread_parkme+0x82/0x180
[   15.611351]  ? preempt_count_sub+0x50/0x80
[   15.611378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.611403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.611438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.611463]  kthread+0x337/0x6f0
[   15.611502]  ? trace_preempt_on+0x20/0xc0
[   15.611526]  ? __pfx_kthread+0x10/0x10
[   15.611548]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.611583]  ? calculate_sigpending+0x7b/0xa0
[   15.611607]  ? __pfx_kthread+0x10/0x10
[   15.611642]  ret_from_fork+0x116/0x1d0
[   15.611663]  ? __pfx_kthread+0x10/0x10
[   15.611685]  ret_from_fork_asm+0x1a/0x30
[   15.611728]  </TASK>
[   15.611740] 
[   15.627262] Allocated by task 283:
[   15.627544]  kasan_save_stack+0x45/0x70
[   15.628022]  kasan_save_track+0x18/0x40
[   15.628503]  kasan_save_alloc_info+0x3b/0x50
[   15.628945]  __kasan_kmalloc+0xb7/0xc0
[   15.629361]  __kmalloc_cache_noprof+0x189/0x420
[   15.629731]  kasan_atomics+0x95/0x310
[   15.629898]  kunit_try_run_case+0x1a5/0x480
[   15.630055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.630642]  kthread+0x337/0x6f0
[   15.631105]  ret_from_fork+0x116/0x1d0
[   15.631499]  ret_from_fork_asm+0x1a/0x30
[   15.631907] 
[   15.632082] The buggy address belongs to the object at ffff8881038b5600
[   15.632082]  which belongs to the cache kmalloc-64 of size 64
[   15.633121] The buggy address is located 0 bytes to the right of
[   15.633121]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.634031] 
[   15.634114] The buggy address belongs to the physical page:
[   15.634777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.635071] flags: 0x200000000000000(node=0|zone=2)
[   15.635521] page_type: f5(slab)
[   15.635807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.636287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.636532] page dumped because: kasan: bad access detected
[   15.636709] 
[   15.636791] Memory state around the buggy address:
[   15.637339]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.638229]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.638959] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.639724]                                      ^
[   15.640300]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.641125]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.641642] ==================================================================
[   15.890613] ==================================================================
[   15.891064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.891422] Read of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.891739] 
[   15.891923] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.891970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.891982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.892004] Call Trace:
[   15.892021]  <TASK>
[   15.892067]  dump_stack_lvl+0x73/0xb0
[   15.892101]  print_report+0xd1/0x610
[   15.892125]  ? __virt_addr_valid+0x1db/0x2d0
[   15.892148]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.892170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.892194]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.892217]  kasan_report+0x141/0x180
[   15.892240]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.892267]  __asan_report_load4_noabort+0x18/0x20
[   15.892293]  kasan_atomics_helper+0x4a84/0x5450
[   15.892318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.892341]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.892367]  ? kasan_atomics+0x152/0x310
[   15.892396]  kasan_atomics+0x1dc/0x310
[   15.892419]  ? __pfx_kasan_atomics+0x10/0x10
[   15.892443]  ? __pfx_read_tsc+0x10/0x10
[   15.892465]  ? ktime_get_ts64+0x86/0x230
[   15.892503]  kunit_try_run_case+0x1a5/0x480
[   15.892530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.892555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.892580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.892604]  ? __kthread_parkme+0x82/0x180
[   15.892626]  ? preempt_count_sub+0x50/0x80
[   15.892651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.892677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.892701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.892726]  kthread+0x337/0x6f0
[   15.892747]  ? trace_preempt_on+0x20/0xc0
[   15.892771]  ? __pfx_kthread+0x10/0x10
[   15.892793]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.892817]  ? calculate_sigpending+0x7b/0xa0
[   15.892841]  ? __pfx_kthread+0x10/0x10
[   15.892863]  ret_from_fork+0x116/0x1d0
[   15.892884]  ? __pfx_kthread+0x10/0x10
[   15.892906]  ret_from_fork_asm+0x1a/0x30
[   15.892937]  </TASK>
[   15.892950] 
[   15.901171] Allocated by task 283:
[   15.901363]  kasan_save_stack+0x45/0x70
[   15.901582]  kasan_save_track+0x18/0x40
[   15.901786]  kasan_save_alloc_info+0x3b/0x50
[   15.901971]  __kasan_kmalloc+0xb7/0xc0
[   15.902341]  __kmalloc_cache_noprof+0x189/0x420
[   15.902555]  kasan_atomics+0x95/0x310
[   15.902741]  kunit_try_run_case+0x1a5/0x480
[   15.902990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.903534]  kthread+0x337/0x6f0
[   15.903714]  ret_from_fork+0x116/0x1d0
[   15.903915]  ret_from_fork_asm+0x1a/0x30
[   15.904169] 
[   15.904273] The buggy address belongs to the object at ffff8881038b5600
[   15.904273]  which belongs to the cache kmalloc-64 of size 64
[   15.904739] The buggy address is located 0 bytes to the right of
[   15.904739]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.905324] 
[   15.905428] The buggy address belongs to the physical page:
[   15.905681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.906062] flags: 0x200000000000000(node=0|zone=2)
[   15.906242] page_type: f5(slab)
[   15.906368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.906621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.906858] page dumped because: kasan: bad access detected
[   15.907039] 
[   15.907113] Memory state around the buggy address:
[   15.907276]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.907650]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.908139] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.908478]                                      ^
[   15.908708]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.909195]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.909423] ==================================================================
[   15.850738] ==================================================================
[   15.851252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.851515] Write of size 4 at addr ffff8881038b5630 by task kunit_try_catch/283
[   15.851753] 
[   15.851844] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.851890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.851904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.851927] Call Trace:
[   15.851945]  <TASK>
[   15.851962]  dump_stack_lvl+0x73/0xb0
[   15.851993]  print_report+0xd1/0x610
[   15.852016]  ? __virt_addr_valid+0x1db/0x2d0
[   15.852039]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.852062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.852085]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.852108]  kasan_report+0x141/0x180
[   15.852131]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.852159]  kasan_check_range+0x10c/0x1c0
[   15.852184]  __kasan_check_write+0x18/0x20
[   15.852204]  kasan_atomics_helper+0xb6a/0x5450
[   15.852240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.852264]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.852290]  ? kasan_atomics+0x152/0x310
[   15.852319]  kasan_atomics+0x1dc/0x310
[   15.852343]  ? __pfx_kasan_atomics+0x10/0x10
[   15.852368]  ? __pfx_read_tsc+0x10/0x10
[   15.852391]  ? ktime_get_ts64+0x86/0x230
[   15.852416]  kunit_try_run_case+0x1a5/0x480
[   15.852441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.852465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.852501]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.852526]  ? __kthread_parkme+0x82/0x180
[   15.852547]  ? preempt_count_sub+0x50/0x80
[   15.852572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.852597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.852622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.852647]  kthread+0x337/0x6f0
[   15.852668]  ? trace_preempt_on+0x20/0xc0
[   15.852692]  ? __pfx_kthread+0x10/0x10
[   15.852715]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.852739]  ? calculate_sigpending+0x7b/0xa0
[   15.852765]  ? __pfx_kthread+0x10/0x10
[   15.852787]  ret_from_fork+0x116/0x1d0
[   15.852808]  ? __pfx_kthread+0x10/0x10
[   15.852877]  ret_from_fork_asm+0x1a/0x30
[   15.852911]  </TASK>
[   15.852922] 
[   15.861478] Allocated by task 283:
[   15.861637]  kasan_save_stack+0x45/0x70
[   15.861793]  kasan_save_track+0x18/0x40
[   15.861937]  kasan_save_alloc_info+0x3b/0x50
[   15.862155]  __kasan_kmalloc+0xb7/0xc0
[   15.862619]  __kmalloc_cache_noprof+0x189/0x420
[   15.862920]  kasan_atomics+0x95/0x310
[   15.863144]  kunit_try_run_case+0x1a5/0x480
[   15.863366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.863607]  kthread+0x337/0x6f0
[   15.863766]  ret_from_fork+0x116/0x1d0
[   15.863975]  ret_from_fork_asm+0x1a/0x30
[   15.864337] 
[   15.864438] The buggy address belongs to the object at ffff8881038b5600
[   15.864438]  which belongs to the cache kmalloc-64 of size 64
[   15.865086] The buggy address is located 0 bytes to the right of
[   15.865086]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   15.865589] 
[   15.865690] The buggy address belongs to the physical page:
[   15.865966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   15.866310] flags: 0x200000000000000(node=0|zone=2)
[   15.866494] page_type: f5(slab)
[   15.866621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.866859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.867155] page dumped because: kasan: bad access detected
[   15.867414] 
[   15.867521] Memory state around the buggy address:
[   15.867749]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.868411]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.868783] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.869238]                                      ^
[   15.869494]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.869733]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.869962] ==================================================================
[   16.336763] ==================================================================
[   16.337228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.337623] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.338082] 
[   16.338255] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.338303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.338315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.338359] Call Trace:
[   16.338376]  <TASK>
[   16.338392]  dump_stack_lvl+0x73/0xb0
[   16.338424]  print_report+0xd1/0x610
[   16.338449]  ? __virt_addr_valid+0x1db/0x2d0
[   16.338483]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.338507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.338531]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.338555]  kasan_report+0x141/0x180
[   16.338578]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.338609]  kasan_check_range+0x10c/0x1c0
[   16.338634]  __kasan_check_write+0x18/0x20
[   16.338655]  kasan_atomics_helper+0x15b6/0x5450
[   16.338680]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.338704]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.338730]  ? kasan_atomics+0x152/0x310
[   16.338758]  kasan_atomics+0x1dc/0x310
[   16.338806]  ? __pfx_kasan_atomics+0x10/0x10
[   16.338833]  ? __pfx_read_tsc+0x10/0x10
[   16.338867]  ? ktime_get_ts64+0x86/0x230
[   16.338893]  kunit_try_run_case+0x1a5/0x480
[   16.338918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.338943]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.338969]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.338994]  ? __kthread_parkme+0x82/0x180
[   16.339016]  ? preempt_count_sub+0x50/0x80
[   16.339041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.339066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.339092]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.339117]  kthread+0x337/0x6f0
[   16.339138]  ? trace_preempt_on+0x20/0xc0
[   16.339162]  ? __pfx_kthread+0x10/0x10
[   16.339185]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.339208]  ? calculate_sigpending+0x7b/0xa0
[   16.339251]  ? __pfx_kthread+0x10/0x10
[   16.339274]  ret_from_fork+0x116/0x1d0
[   16.339309]  ? __pfx_kthread+0x10/0x10
[   16.339331]  ret_from_fork_asm+0x1a/0x30
[   16.339379]  </TASK>
[   16.339404] 
[   16.349666] Allocated by task 283:
[   16.349938]  kasan_save_stack+0x45/0x70
[   16.350298]  kasan_save_track+0x18/0x40
[   16.350515]  kasan_save_alloc_info+0x3b/0x50
[   16.350683]  __kasan_kmalloc+0xb7/0xc0
[   16.350855]  __kmalloc_cache_noprof+0x189/0x420
[   16.351372]  kasan_atomics+0x95/0x310
[   16.351582]  kunit_try_run_case+0x1a5/0x480
[   16.351733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.352017]  kthread+0x337/0x6f0
[   16.352405]  ret_from_fork+0x116/0x1d0
[   16.352846]  ret_from_fork_asm+0x1a/0x30
[   16.353042] 
[   16.353142] The buggy address belongs to the object at ffff8881038b5600
[   16.353142]  which belongs to the cache kmalloc-64 of size 64
[   16.353780] The buggy address is located 0 bytes to the right of
[   16.353780]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.354526] 
[   16.354603] The buggy address belongs to the physical page:
[   16.354780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.355651] flags: 0x200000000000000(node=0|zone=2)
[   16.355955] page_type: f5(slab)
[   16.356271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.356689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.357240] page dumped because: kasan: bad access detected
[   16.357416] 
[   16.357531] Memory state around the buggy address:
[   16.357815]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.358400]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.358746] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.359154]                                      ^
[   16.359490]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.359763]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360373] ==================================================================
[   16.481759] ==================================================================
[   16.482055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.482669] Write of size 8 at addr ffff8881038b5630 by task kunit_try_catch/283
[   16.483132] 
[   16.483250] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.483296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.483309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.483333] Call Trace:
[   16.483352]  <TASK>
[   16.483368]  dump_stack_lvl+0x73/0xb0
[   16.483400]  print_report+0xd1/0x610
[   16.483447]  ? __virt_addr_valid+0x1db/0x2d0
[   16.483481]  ? kasan_atomics_helper+0x194a/0x5450
[   16.483505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.483528]  ? kasan_atomics_helper+0x194a/0x5450
[   16.483551]  kasan_report+0x141/0x180
[   16.483575]  ? kasan_atomics_helper+0x194a/0x5450
[   16.483603]  kasan_check_range+0x10c/0x1c0
[   16.483629]  __kasan_check_write+0x18/0x20
[   16.483650]  kasan_atomics_helper+0x194a/0x5450
[   16.483673]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.483697]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.483744]  ? kasan_atomics+0x152/0x310
[   16.483792]  kasan_atomics+0x1dc/0x310
[   16.483816]  ? __pfx_kasan_atomics+0x10/0x10
[   16.483860]  ? __pfx_read_tsc+0x10/0x10
[   16.483882]  ? ktime_get_ts64+0x86/0x230
[   16.483908]  kunit_try_run_case+0x1a5/0x480
[   16.483934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.483958]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.483983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.484008]  ? __kthread_parkme+0x82/0x180
[   16.484120]  ? preempt_count_sub+0x50/0x80
[   16.484147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.484188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.484213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.484238]  kthread+0x337/0x6f0
[   16.484260]  ? trace_preempt_on+0x20/0xc0
[   16.484284]  ? __pfx_kthread+0x10/0x10
[   16.484306]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.484330]  ? calculate_sigpending+0x7b/0xa0
[   16.484355]  ? __pfx_kthread+0x10/0x10
[   16.484378]  ret_from_fork+0x116/0x1d0
[   16.484398]  ? __pfx_kthread+0x10/0x10
[   16.484420]  ret_from_fork_asm+0x1a/0x30
[   16.484452]  </TASK>
[   16.484464] 
[   16.493658] Allocated by task 283:
[   16.493893]  kasan_save_stack+0x45/0x70
[   16.494174]  kasan_save_track+0x18/0x40
[   16.494326]  kasan_save_alloc_info+0x3b/0x50
[   16.494496]  __kasan_kmalloc+0xb7/0xc0
[   16.494639]  __kmalloc_cache_noprof+0x189/0x420
[   16.494832]  kasan_atomics+0x95/0x310
[   16.494976]  kunit_try_run_case+0x1a5/0x480
[   16.495190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.495381]  kthread+0x337/0x6f0
[   16.495522]  ret_from_fork+0x116/0x1d0
[   16.495695]  ret_from_fork_asm+0x1a/0x30
[   16.495931] 
[   16.496083] The buggy address belongs to the object at ffff8881038b5600
[   16.496083]  which belongs to the cache kmalloc-64 of size 64
[   16.496656] The buggy address is located 0 bytes to the right of
[   16.496656]  allocated 48-byte region [ffff8881038b5600, ffff8881038b5630)
[   16.497537] 
[   16.497646] The buggy address belongs to the physical page:
[   16.497913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038b5
[   16.498307] flags: 0x200000000000000(node=0|zone=2)
[   16.498626] page_type: f5(slab)
[   16.498820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.499164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.499516] page dumped because: kasan: bad access detected
[   16.499757] 
[   16.499946] Memory state around the buggy address:
[   16.500197]  ffff8881038b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.500552]  ffff8881038b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.500890] >ffff8881038b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.501260]                                      ^
[   16.501484]  ffff8881038b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.501784]  ffff8881038b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.502342] ==================================================================