Hay
Date
July 23, 2025, 2:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.229416] ==================================================================
[   18.229611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.229810] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.230092] 
[   18.230144] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.230334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.230399] Hardware name: linux,dummy-virt (DT)
[   18.230479] Call trace:
[   18.230505]  show_stack+0x20/0x38 (C)
[   18.230696]  dump_stack_lvl+0x8c/0xd0
[   18.230997]  print_report+0x118/0x5d0
[   18.231202]  kasan_report+0xdc/0x128
[   18.231427]  __asan_report_store8_noabort+0x20/0x30
[   18.231607]  kasan_atomics_helper+0x3e5c/0x4858
[   18.231687]  kasan_atomics+0x198/0x2e0
[   18.231904]  kunit_try_run_case+0x170/0x3f0
[   18.232129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.232383]  kthread+0x328/0x630
[   18.232626]  ret_from_fork+0x10/0x20
[   18.232740] 
[   18.232823] Allocated by task 265:
[   18.232970]  kasan_save_stack+0x3c/0x68
[   18.233140]  kasan_save_track+0x20/0x40
[   18.233428]  kasan_save_alloc_info+0x40/0x58
[   18.233635]  __kasan_kmalloc+0xd4/0xd8
[   18.233710]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.233900]  kasan_atomics+0xb8/0x2e0
[   18.234011]  kunit_try_run_case+0x170/0x3f0
[   18.234059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.234106]  kthread+0x328/0x630
[   18.234548]  ret_from_fork+0x10/0x20
[   18.234909] 
[   18.234939] The buggy address belongs to the object at fff00000c3f8b900
[   18.234939]  which belongs to the cache kmalloc-64 of size 64
[   18.235007] The buggy address is located 0 bytes to the right of
[   18.235007]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.235676] 
[   18.235845] The buggy address belongs to the physical page:
[   18.236027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.236154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.236530] page_type: f5(slab)
[   18.236703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.236952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.237411] page dumped because: kasan: bad access detected
[   18.237514] 
[   18.237537] Memory state around the buggy address:
[   18.237722]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.237842]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.238032] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.238268]                                      ^
[   18.238329]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.238864]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.238975] ==================================================================
[   18.343440] ==================================================================
[   18.343483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.343529] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.343581] 
[   18.343612] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.343694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.343723] Hardware name: linux,dummy-virt (DT)
[   18.343756] Call trace:
[   18.343778]  show_stack+0x20/0x38 (C)
[   18.343829]  dump_stack_lvl+0x8c/0xd0
[   18.343981]  print_report+0x118/0x5d0
[   18.344541]  kasan_report+0xdc/0x128
[   18.344707]  __asan_report_load8_noabort+0x20/0x30
[   18.345136]  kasan_atomics_helper+0x3f04/0x4858
[   18.345233]  kasan_atomics+0x198/0x2e0
[   18.345307]  kunit_try_run_case+0x170/0x3f0
[   18.346559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.346658]  kthread+0x328/0x630
[   18.346745]  ret_from_fork+0x10/0x20
[   18.346931] 
[   18.347111] Allocated by task 265:
[   18.347184]  kasan_save_stack+0x3c/0x68
[   18.347239]  kasan_save_track+0x20/0x40
[   18.347281]  kasan_save_alloc_info+0x40/0x58
[   18.347505]  __kasan_kmalloc+0xd4/0xd8
[   18.347699]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.347790]  kasan_atomics+0xb8/0x2e0
[   18.348102]  kunit_try_run_case+0x170/0x3f0
[   18.348240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.348336]  kthread+0x328/0x630
[   18.348708]  ret_from_fork+0x10/0x20
[   18.348748] 
[   18.349131] The buggy address belongs to the object at fff00000c3f8b900
[   18.349131]  which belongs to the cache kmalloc-64 of size 64
[   18.349531] The buggy address is located 0 bytes to the right of
[   18.349531]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.349627] 
[   18.349651] The buggy address belongs to the physical page:
[   18.349755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.350018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.350260] page_type: f5(slab)
[   18.350511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.350577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.351127] page dumped because: kasan: bad access detected
[   18.351180] 
[   18.351451] Memory state around the buggy address:
[   18.351646]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.351899]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.352220] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.352436]                                      ^
[   18.352664]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.352842]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.352952] ==================================================================
[   18.193102] ==================================================================
[   18.193155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.193210] Read of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.193641] 
[   18.193872] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.194422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.194757] Hardware name: linux,dummy-virt (DT)
[   18.194884] Call trace:
[   18.194928]  show_stack+0x20/0x38 (C)
[   18.195506]  dump_stack_lvl+0x8c/0xd0
[   18.195675]  print_report+0x118/0x5d0
[   18.195915]  kasan_report+0xdc/0x128
[   18.196087]  __asan_report_load4_noabort+0x20/0x30
[   18.196212]  kasan_atomics_helper+0x3e04/0x4858
[   18.196478]  kasan_atomics+0x198/0x2e0
[   18.196716]  kunit_try_run_case+0x170/0x3f0
[   18.196796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.197163]  kthread+0x328/0x630
[   18.197347]  ret_from_fork+0x10/0x20
[   18.197812] 
[   18.198133] Allocated by task 265:
[   18.198200]  kasan_save_stack+0x3c/0x68
[   18.198250]  kasan_save_track+0x20/0x40
[   18.198310]  kasan_save_alloc_info+0x40/0x58
[   18.198634]  __kasan_kmalloc+0xd4/0xd8
[   18.198726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.199146]  kasan_atomics+0xb8/0x2e0
[   18.199286]  kunit_try_run_case+0x170/0x3f0
[   18.199784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.199860]  kthread+0x328/0x630
[   18.200017]  ret_from_fork+0x10/0x20
[   18.200100] 
[   18.200143] The buggy address belongs to the object at fff00000c3f8b900
[   18.200143]  which belongs to the cache kmalloc-64 of size 64
[   18.200209] The buggy address is located 0 bytes to the right of
[   18.200209]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.200290] 
[   18.200313] The buggy address belongs to the physical page:
[   18.200347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.200405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.200460] page_type: f5(slab)
[   18.200501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.200556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.200609] page dumped because: kasan: bad access detected
[   18.200654] 
[   18.200683] Memory state around the buggy address:
[   18.200728]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.200774]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.200820] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.200890]                                      ^
[   18.200957]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.201846]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.201927] ==================================================================
[   18.431350] ==================================================================
[   18.431666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.431764] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.431834] 
[   18.431943] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.432033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.432063] Hardware name: linux,dummy-virt (DT)
[   18.432095] Call trace:
[   18.432119]  show_stack+0x20/0x38 (C)
[   18.432168]  dump_stack_lvl+0x8c/0xd0
[   18.432216]  print_report+0x118/0x5d0
[   18.432264]  kasan_report+0xdc/0x128
[   18.432312]  kasan_check_range+0x100/0x1a8
[   18.432375]  __kasan_check_write+0x20/0x30
[   18.432422]  kasan_atomics_helper+0x175c/0x4858
[   18.432472]  kasan_atomics+0x198/0x2e0
[   18.432518]  kunit_try_run_case+0x170/0x3f0
[   18.432567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.432621]  kthread+0x328/0x630
[   18.432663]  ret_from_fork+0x10/0x20
[   18.432712] 
[   18.432732] Allocated by task 265:
[   18.432763]  kasan_save_stack+0x3c/0x68
[   18.432806]  kasan_save_track+0x20/0x40
[   18.432873]  kasan_save_alloc_info+0x40/0x58
[   18.432916]  __kasan_kmalloc+0xd4/0xd8
[   18.432956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.433004]  kasan_atomics+0xb8/0x2e0
[   18.433044]  kunit_try_run_case+0x170/0x3f0
[   18.433083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.433130]  kthread+0x328/0x630
[   18.433173]  ret_from_fork+0x10/0x20
[   18.433212] 
[   18.433233] The buggy address belongs to the object at fff00000c3f8b900
[   18.433233]  which belongs to the cache kmalloc-64 of size 64
[   18.433294] The buggy address is located 0 bytes to the right of
[   18.433294]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.433364] 
[   18.433386] The buggy address belongs to the physical page:
[   18.433418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.433473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.433523] page_type: f5(slab)
[   18.433572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.433627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.433681] page dumped because: kasan: bad access detected
[   18.433717] 
[   18.433739] Memory state around the buggy address:
[   18.433773]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.433825]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.433881] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.434111]                                      ^
[   18.434172]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.434380]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.435252] ==================================================================
[   18.407877] ==================================================================
[   18.407944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.407998] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.408052] 
[   18.408092] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.408388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.408443] Hardware name: linux,dummy-virt (DT)
[   18.408476] Call trace:
[   18.408502]  show_stack+0x20/0x38 (C)
[   18.408929]  dump_stack_lvl+0x8c/0xd0
[   18.409268]  print_report+0x118/0x5d0
[   18.409483]  kasan_report+0xdc/0x128
[   18.409537]  __asan_report_load8_noabort+0x20/0x30
[   18.409592]  kasan_atomics_helper+0x3df4/0x4858
[   18.409644]  kasan_atomics+0x198/0x2e0
[   18.409692]  kunit_try_run_case+0x170/0x3f0
[   18.410016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.410170]  kthread+0x328/0x630
[   18.410250]  ret_from_fork+0x10/0x20
[   18.410328] 
[   18.410386] Allocated by task 265:
[   18.410693]  kasan_save_stack+0x3c/0x68
[   18.411043]  kasan_save_track+0x20/0x40
[   18.411175]  kasan_save_alloc_info+0x40/0x58
[   18.411258]  __kasan_kmalloc+0xd4/0xd8
[   18.411383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.411471]  kasan_atomics+0xb8/0x2e0
[   18.411577]  kunit_try_run_case+0x170/0x3f0
[   18.411665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.412016]  kthread+0x328/0x630
[   18.412086]  ret_from_fork+0x10/0x20
[   18.412208] 
[   18.412286] The buggy address belongs to the object at fff00000c3f8b900
[   18.412286]  which belongs to the cache kmalloc-64 of size 64
[   18.412667] The buggy address is located 0 bytes to the right of
[   18.412667]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.412836] 
[   18.412904] The buggy address belongs to the physical page:
[   18.412977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.413166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.413309] page_type: f5(slab)
[   18.413395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.413465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.413513] page dumped because: kasan: bad access detected
[   18.413547] 
[   18.413901] Memory state around the buggy address:
[   18.414295]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.414660]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.414752] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.414942]                                      ^
[   18.415047]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.415376]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.415427] ==================================================================
[   18.258034] ==================================================================
[   18.258164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.258222] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.258276] 
[   18.258363] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.258461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.258504] Hardware name: linux,dummy-virt (DT)
[   18.258538] Call trace:
[   18.258907]  show_stack+0x20/0x38 (C)
[   18.259123]  dump_stack_lvl+0x8c/0xd0
[   18.259218]  print_report+0x118/0x5d0
[   18.259661]  kasan_report+0xdc/0x128
[   18.259752]  kasan_check_range+0x100/0x1a8
[   18.260118]  __kasan_check_write+0x20/0x30
[   18.260318]  kasan_atomics_helper+0xf88/0x4858
[   18.260505]  kasan_atomics+0x198/0x2e0
[   18.260612]  kunit_try_run_case+0x170/0x3f0
[   18.260664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.260964]  kthread+0x328/0x630
[   18.261154]  ret_from_fork+0x10/0x20
[   18.261667] 
[   18.261847] Allocated by task 265:
[   18.261916]  kasan_save_stack+0x3c/0x68
[   18.262290]  kasan_save_track+0x20/0x40
[   18.262546]  kasan_save_alloc_info+0x40/0x58
[   18.262649]  __kasan_kmalloc+0xd4/0xd8
[   18.262885]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.262978]  kasan_atomics+0xb8/0x2e0
[   18.263306]  kunit_try_run_case+0x170/0x3f0
[   18.263356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.263403]  kthread+0x328/0x630
[   18.263439]  ret_from_fork+0x10/0x20
[   18.263687] 
[   18.264090] The buggy address belongs to the object at fff00000c3f8b900
[   18.264090]  which belongs to the cache kmalloc-64 of size 64
[   18.264332] The buggy address is located 0 bytes to the right of
[   18.264332]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.264758] 
[   18.265009] The buggy address belongs to the physical page:
[   18.265058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.265119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.265203] page_type: f5(slab)
[   18.265246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.265301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.265347] page dumped because: kasan: bad access detected
[   18.265383] 
[   18.265411] Memory state around the buggy address:
[   18.265446]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.265503]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.265559] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.265601]                                      ^
[   18.265650]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.265696]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.265736] ==================================================================
[   18.401888] ==================================================================
[   18.402247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.402531] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.402628] 
[   18.402830] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.403022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.403100] Hardware name: linux,dummy-virt (DT)
[   18.403152] Call trace:
[   18.403178]  show_stack+0x20/0x38 (C)
[   18.403583]  dump_stack_lvl+0x8c/0xd0
[   18.403681]  print_report+0x118/0x5d0
[   18.403758]  kasan_report+0xdc/0x128
[   18.404126]  kasan_check_range+0x100/0x1a8
[   18.404318]  __kasan_check_write+0x20/0x30
[   18.404593]  kasan_atomics_helper+0x1644/0x4858
[   18.404817]  kasan_atomics+0x198/0x2e0
[   18.404930]  kunit_try_run_case+0x170/0x3f0
[   18.405027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.405088]  kthread+0x328/0x630
[   18.405136]  ret_from_fork+0x10/0x20
[   18.405191] 
[   18.405218] Allocated by task 265:
[   18.405250]  kasan_save_stack+0x3c/0x68
[   18.405294]  kasan_save_track+0x20/0x40
[   18.405345]  kasan_save_alloc_info+0x40/0x58
[   18.405386]  __kasan_kmalloc+0xd4/0xd8
[   18.405435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.405481]  kasan_atomics+0xb8/0x2e0
[   18.405526]  kunit_try_run_case+0x170/0x3f0
[   18.405567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.405614]  kthread+0x328/0x630
[   18.405649]  ret_from_fork+0x10/0x20
[   18.405686] 
[   18.405708] The buggy address belongs to the object at fff00000c3f8b900
[   18.405708]  which belongs to the cache kmalloc-64 of size 64
[   18.405780] The buggy address is located 0 bytes to the right of
[   18.405780]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.405870] 
[   18.405895] The buggy address belongs to the physical page:
[   18.405937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.405993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.406044] page_type: f5(slab)
[   18.406090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.406151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.406197] page dumped because: kasan: bad access detected
[   18.406232] 
[   18.406263] Memory state around the buggy address:
[   18.406297]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.406344]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.406392] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.406433]                                      ^
[   18.406475]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.406522]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.406564] ==================================================================
[   18.285704] ==================================================================
[   18.285837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.285955] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.286321] 
[   18.286571] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.286991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.287129] Hardware name: linux,dummy-virt (DT)
[   18.287227] Call trace:
[   18.287350]  show_stack+0x20/0x38 (C)
[   18.287423]  dump_stack_lvl+0x8c/0xd0
[   18.287607]  print_report+0x118/0x5d0
[   18.287665]  kasan_report+0xdc/0x128
[   18.287721]  kasan_check_range+0x100/0x1a8
[   18.288010]  __kasan_check_write+0x20/0x30
[   18.288118]  kasan_atomics_helper+0x10c0/0x4858
[   18.288453]  kasan_atomics+0x198/0x2e0
[   18.288657]  kunit_try_run_case+0x170/0x3f0
[   18.288828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.288915]  kthread+0x328/0x630
[   18.288992]  ret_from_fork+0x10/0x20
[   18.289364] 
[   18.289750] Allocated by task 265:
[   18.289822]  kasan_save_stack+0x3c/0x68
[   18.289985]  kasan_save_track+0x20/0x40
[   18.290049]  kasan_save_alloc_info+0x40/0x58
[   18.290100]  __kasan_kmalloc+0xd4/0xd8
[   18.290138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.290180]  kasan_atomics+0xb8/0x2e0
[   18.290218]  kunit_try_run_case+0x170/0x3f0
[   18.290259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.290304]  kthread+0x328/0x630
[   18.290383]  ret_from_fork+0x10/0x20
[   18.290425] 
[   18.290453] The buggy address belongs to the object at fff00000c3f8b900
[   18.290453]  which belongs to the cache kmalloc-64 of size 64
[   18.290517] The buggy address is located 0 bytes to the right of
[   18.290517]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.290899] 
[   18.290925] The buggy address belongs to the physical page:
[   18.291881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.291957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.292481] page_type: f5(slab)
[   18.292583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.292862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.293355] page dumped because: kasan: bad access detected
[   18.293439] 
[   18.293699] Memory state around the buggy address:
[   18.293778]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.294287]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.294606] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.294776]                                      ^
[   18.294917]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.294980]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.295036] ==================================================================
[   18.301397] ==================================================================
[   18.301450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.301500] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.301554] 
[   18.301584] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.301668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.301696] Hardware name: linux,dummy-virt (DT)
[   18.301730] Call trace:
[   18.301789]  show_stack+0x20/0x38 (C)
[   18.301844]  dump_stack_lvl+0x8c/0xd0
[   18.302880]  print_report+0x118/0x5d0
[   18.302936]  kasan_report+0xdc/0x128
[   18.303547]  kasan_check_range+0x100/0x1a8
[   18.303836]  __kasan_check_write+0x20/0x30
[   18.303932]  kasan_atomics_helper+0x1190/0x4858
[   18.304040]  kasan_atomics+0x198/0x2e0
[   18.304107]  kunit_try_run_case+0x170/0x3f0
[   18.304212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.304378]  kthread+0x328/0x630
[   18.304846]  ret_from_fork+0x10/0x20
[   18.304969] 
[   18.305064] Allocated by task 265:
[   18.305143]  kasan_save_stack+0x3c/0x68
[   18.305274]  kasan_save_track+0x20/0x40
[   18.305341]  kasan_save_alloc_info+0x40/0x58
[   18.305478]  __kasan_kmalloc+0xd4/0xd8
[   18.305519]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.305883]  kasan_atomics+0xb8/0x2e0
[   18.306288]  kunit_try_run_case+0x170/0x3f0
[   18.306390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.306473]  kthread+0x328/0x630
[   18.306541]  ret_from_fork+0x10/0x20
[   18.306596] 
[   18.306890] The buggy address belongs to the object at fff00000c3f8b900
[   18.306890]  which belongs to the cache kmalloc-64 of size 64
[   18.306971] The buggy address is located 0 bytes to the right of
[   18.306971]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.307088] 
[   18.307345] The buggy address belongs to the physical page:
[   18.307397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.307482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.307560] page_type: f5(slab)
[   18.307827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.308006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.308566] page dumped because: kasan: bad access detected
[   18.308619] 
[   18.308674] Memory state around the buggy address:
[   18.308734]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.308930]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.309212] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.309411]                                      ^
[   18.309648]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.309970]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.310344] ==================================================================
[   18.265976] ==================================================================
[   18.266027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.266088] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.266141] 
[   18.266170] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.266263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.266291] Hardware name: linux,dummy-virt (DT)
[   18.266324] Call trace:
[   18.266347]  show_stack+0x20/0x38 (C)
[   18.266397]  dump_stack_lvl+0x8c/0xd0
[   18.266449]  print_report+0x118/0x5d0
[   18.266504]  kasan_report+0xdc/0x128
[   18.266551]  kasan_check_range+0x100/0x1a8
[   18.266629]  __kasan_check_write+0x20/0x30
[   18.267310]  kasan_atomics_helper+0xff0/0x4858
[   18.267756]  kasan_atomics+0x198/0x2e0
[   18.267834]  kunit_try_run_case+0x170/0x3f0
[   18.267932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.268222]  kthread+0x328/0x630
[   18.268363]  ret_from_fork+0x10/0x20
[   18.268784] 
[   18.268819] Allocated by task 265:
[   18.268870]  kasan_save_stack+0x3c/0x68
[   18.269192]  kasan_save_track+0x20/0x40
[   18.269553]  kasan_save_alloc_info+0x40/0x58
[   18.269734]  __kasan_kmalloc+0xd4/0xd8
[   18.269812]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.269934]  kasan_atomics+0xb8/0x2e0
[   18.270021]  kunit_try_run_case+0x170/0x3f0
[   18.270189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.270250]  kthread+0x328/0x630
[   18.270464]  ret_from_fork+0x10/0x20
[   18.270690] 
[   18.270977] The buggy address belongs to the object at fff00000c3f8b900
[   18.270977]  which belongs to the cache kmalloc-64 of size 64
[   18.271181] The buggy address is located 0 bytes to the right of
[   18.271181]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.271601] 
[   18.271640] The buggy address belongs to the physical page:
[   18.271818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.272036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.272095] page_type: f5(slab)
[   18.272301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.272541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.272916] page dumped because: kasan: bad access detected
[   18.272994] 
[   18.273174] Memory state around the buggy address:
[   18.273307]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.273551]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.273916] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.274007]                                      ^
[   18.274440]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.274520]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.274562] ==================================================================
[   18.320987] ==================================================================
[   18.321079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.321132] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.321526] 
[   18.321686] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.321786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.321896] Hardware name: linux,dummy-virt (DT)
[   18.321931] Call trace:
[   18.321957]  show_stack+0x20/0x38 (C)
[   18.322136]  dump_stack_lvl+0x8c/0xd0
[   18.322475]  print_report+0x118/0x5d0
[   18.322656]  kasan_report+0xdc/0x128
[   18.322866]  kasan_check_range+0x100/0x1a8
[   18.323010]  __kasan_check_write+0x20/0x30
[   18.323061]  kasan_atomics_helper+0x126c/0x4858
[   18.323111]  kasan_atomics+0x198/0x2e0
[   18.323157]  kunit_try_run_case+0x170/0x3f0
[   18.323206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.323261]  kthread+0x328/0x630
[   18.323304]  ret_from_fork+0x10/0x20
[   18.323352] 
[   18.323373] Allocated by task 265:
[   18.323404]  kasan_save_stack+0x3c/0x68
[   18.323446]  kasan_save_track+0x20/0x40
[   18.323885]  kasan_save_alloc_info+0x40/0x58
[   18.324345]  __kasan_kmalloc+0xd4/0xd8
[   18.324450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.324494]  kasan_atomics+0xb8/0x2e0
[   18.324534]  kunit_try_run_case+0x170/0x3f0
[   18.324575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.324626]  kthread+0x328/0x630
[   18.324669]  ret_from_fork+0x10/0x20
[   18.324707] 
[   18.324747] The buggy address belongs to the object at fff00000c3f8b900
[   18.324747]  which belongs to the cache kmalloc-64 of size 64
[   18.324813] The buggy address is located 0 bytes to the right of
[   18.324813]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.324892] 
[   18.324930] The buggy address belongs to the physical page:
[   18.324973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.325029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.325088] page_type: f5(slab)
[   18.325128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.325204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.325260] page dumped because: kasan: bad access detected
[   18.325302] 
[   18.325323] Memory state around the buggy address:
[   18.325357]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.325405]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.325487] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.325532]                                      ^
[   18.325569]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.325619]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.325665] ==================================================================
[   18.326716] ==================================================================
[   18.326772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.327298] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.327361] 
[   18.327569] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.328179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.328231] Hardware name: linux,dummy-virt (DT)
[   18.328412] Call trace:
[   18.328574]  show_stack+0x20/0x38 (C)
[   18.329047]  dump_stack_lvl+0x8c/0xd0
[   18.329248]  print_report+0x118/0x5d0
[   18.329307]  kasan_report+0xdc/0x128
[   18.329374]  kasan_check_range+0x100/0x1a8
[   18.329672]  __kasan_check_write+0x20/0x30
[   18.329782]  kasan_atomics_helper+0x12d8/0x4858
[   18.330207]  kasan_atomics+0x198/0x2e0
[   18.330374]  kunit_try_run_case+0x170/0x3f0
[   18.330514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.330575]  kthread+0x328/0x630
[   18.331003]  ret_from_fork+0x10/0x20
[   18.331421] 
[   18.331479] Allocated by task 265:
[   18.331533]  kasan_save_stack+0x3c/0x68
[   18.331703]  kasan_save_track+0x20/0x40
[   18.331780]  kasan_save_alloc_info+0x40/0x58
[   18.331997]  __kasan_kmalloc+0xd4/0xd8
[   18.332206]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.332288]  kasan_atomics+0xb8/0x2e0
[   18.332806]  kunit_try_run_case+0x170/0x3f0
[   18.332920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.333270]  kthread+0x328/0x630
[   18.333324]  ret_from_fork+0x10/0x20
[   18.333737] 
[   18.334186] The buggy address belongs to the object at fff00000c3f8b900
[   18.334186]  which belongs to the cache kmalloc-64 of size 64
[   18.334403] The buggy address is located 0 bytes to the right of
[   18.334403]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.334953] 
[   18.335057] The buggy address belongs to the physical page:
[   18.335131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.335197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.335251] page_type: f5(slab)
[   18.335755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.336119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.336222] page dumped because: kasan: bad access detected
[   18.336328] 
[   18.336351] Memory state around the buggy address:
[   18.336816]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.337128]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.337281] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.337676]                                      ^
[   18.338118]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.338215]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.338462] ==================================================================
[   18.354114] ==================================================================
[   18.354207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.354578] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.354699] 
[   18.354812] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.355260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.355325] Hardware name: linux,dummy-virt (DT)
[   18.355406] Call trace:
[   18.355501]  show_stack+0x20/0x38 (C)
[   18.355592]  dump_stack_lvl+0x8c/0xd0
[   18.355644]  print_report+0x118/0x5d0
[   18.355700]  kasan_report+0xdc/0x128
[   18.356035]  kasan_check_range+0x100/0x1a8
[   18.356395]  __kasan_check_write+0x20/0x30
[   18.356527]  kasan_atomics_helper+0x1414/0x4858
[   18.356626]  kasan_atomics+0x198/0x2e0
[   18.356747]  kunit_try_run_case+0x170/0x3f0
[   18.356866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.357011]  kthread+0x328/0x630
[   18.357062]  ret_from_fork+0x10/0x20
[   18.357393] 
[   18.357450] Allocated by task 265:
[   18.357607]  kasan_save_stack+0x3c/0x68
[   18.357780]  kasan_save_track+0x20/0x40
[   18.357923]  kasan_save_alloc_info+0x40/0x58
[   18.358057]  __kasan_kmalloc+0xd4/0xd8
[   18.358167]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.358288]  kasan_atomics+0xb8/0x2e0
[   18.358331]  kunit_try_run_case+0x170/0x3f0
[   18.358407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.358755]  kthread+0x328/0x630
[   18.358819]  ret_from_fork+0x10/0x20
[   18.358994] 
[   18.359029] The buggy address belongs to the object at fff00000c3f8b900
[   18.359029]  which belongs to the cache kmalloc-64 of size 64
[   18.359303] The buggy address is located 0 bytes to the right of
[   18.359303]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.359758] 
[   18.359801] The buggy address belongs to the physical page:
[   18.359871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.360288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.360406] page_type: f5(slab)
[   18.360482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.360789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.360886] page dumped because: kasan: bad access detected
[   18.361030] 
[   18.361091] Memory state around the buggy address:
[   18.361153]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.361202]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.361473] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.361607]                                      ^
[   18.361971]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.362089]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.362173] ==================================================================
[   18.363431] ==================================================================
[   18.363496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.363550] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.363604] 
[   18.363639] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.363723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.363751] Hardware name: linux,dummy-virt (DT)
[   18.363785] Call trace:
[   18.363867]  show_stack+0x20/0x38 (C)
[   18.363926]  dump_stack_lvl+0x8c/0xd0
[   18.363976]  print_report+0x118/0x5d0
[   18.364032]  kasan_report+0xdc/0x128
[   18.364081]  kasan_check_range+0x100/0x1a8
[   18.364138]  __kasan_check_write+0x20/0x30
[   18.364186]  kasan_atomics_helper+0x147c/0x4858
[   18.364237]  kasan_atomics+0x198/0x2e0
[   18.364284]  kunit_try_run_case+0x170/0x3f0
[   18.364333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.364393]  kthread+0x328/0x630
[   18.364436]  ret_from_fork+0x10/0x20
[   18.364489] 
[   18.364511] Allocated by task 265:
[   18.364545]  kasan_save_stack+0x3c/0x68
[   18.364590]  kasan_save_track+0x20/0x40
[   18.364635]  kasan_save_alloc_info+0x40/0x58
[   18.364678]  __kasan_kmalloc+0xd4/0xd8
[   18.364716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.364758]  kasan_atomics+0xb8/0x2e0
[   18.364801]  kunit_try_run_case+0x170/0x3f0
[   18.364842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.365549]  kthread+0x328/0x630
[   18.365842]  ret_from_fork+0x10/0x20
[   18.365917] 
[   18.365964] The buggy address belongs to the object at fff00000c3f8b900
[   18.365964]  which belongs to the cache kmalloc-64 of size 64
[   18.366263] The buggy address is located 0 bytes to the right of
[   18.366263]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.366409] 
[   18.366441] The buggy address belongs to the physical page:
[   18.366477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.366814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.366923] page_type: f5(slab)
[   18.366979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.367392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.367494] page dumped because: kasan: bad access detected
[   18.367596] 
[   18.367732] Memory state around the buggy address:
[   18.367925]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.368070]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.368148] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.368516]                                      ^
[   18.368672]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.368768]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.369041] ==================================================================
[   18.424071] ==================================================================
[   18.424139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.424192] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.424253] 
[   18.424286] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.424370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.424398] Hardware name: linux,dummy-virt (DT)
[   18.424431] Call trace:
[   18.424453]  show_stack+0x20/0x38 (C)
[   18.424504]  dump_stack_lvl+0x8c/0xd0
[   18.424551]  print_report+0x118/0x5d0
[   18.424601]  kasan_report+0xdc/0x128
[   18.425194]  __asan_report_load8_noabort+0x20/0x30
[   18.425468]  kasan_atomics_helper+0x3e10/0x4858
[   18.425623]  kasan_atomics+0x198/0x2e0
[   18.425928]  kunit_try_run_case+0x170/0x3f0
[   18.426091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.426162]  kthread+0x328/0x630
[   18.426206]  ret_from_fork+0x10/0x20
[   18.426274] 
[   18.426324] Allocated by task 265:
[   18.426383]  kasan_save_stack+0x3c/0x68
[   18.426753]  kasan_save_track+0x20/0x40
[   18.426893]  kasan_save_alloc_info+0x40/0x58
[   18.426969]  __kasan_kmalloc+0xd4/0xd8
[   18.427308]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.427392]  kasan_atomics+0xb8/0x2e0
[   18.427466]  kunit_try_run_case+0x170/0x3f0
[   18.427609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.427696]  kthread+0x328/0x630
[   18.428002]  ret_from_fork+0x10/0x20
[   18.428062] 
[   18.428084] The buggy address belongs to the object at fff00000c3f8b900
[   18.428084]  which belongs to the cache kmalloc-64 of size 64
[   18.428147] The buggy address is located 0 bytes to the right of
[   18.428147]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.428217] 
[   18.428239] The buggy address belongs to the physical page:
[   18.428272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.428442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.428610] page_type: f5(slab)
[   18.428685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.429035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.429119] page dumped because: kasan: bad access detected
[   18.429176] 
[   18.429198] Memory state around the buggy address:
[   18.429235]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.429586]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.429689] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.430009]                                      ^
[   18.430091]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.430455]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.430525] ==================================================================
[   18.184159] ==================================================================
[   18.184213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.184266] Write of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.184319] 
[   18.184760] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.184930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.184979] Hardware name: linux,dummy-virt (DT)
[   18.185014] Call trace:
[   18.185039]  show_stack+0x20/0x38 (C)
[   18.185375]  dump_stack_lvl+0x8c/0xd0
[   18.185726]  print_report+0x118/0x5d0
[   18.185802]  kasan_report+0xdc/0x128
[   18.185864]  kasan_check_range+0x100/0x1a8
[   18.185956]  __kasan_check_write+0x20/0x30
[   18.186012]  kasan_atomics_helper+0xd3c/0x4858
[   18.186063]  kasan_atomics+0x198/0x2e0
[   18.186180]  kunit_try_run_case+0x170/0x3f0
[   18.186231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.186288]  kthread+0x328/0x630
[   18.186511]  ret_from_fork+0x10/0x20
[   18.186749] 
[   18.187078] Allocated by task 265:
[   18.187183]  kasan_save_stack+0x3c/0x68
[   18.187280]  kasan_save_track+0x20/0x40
[   18.187459]  kasan_save_alloc_info+0x40/0x58
[   18.187507]  __kasan_kmalloc+0xd4/0xd8
[   18.187942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.188032]  kasan_atomics+0xb8/0x2e0
[   18.188094]  kunit_try_run_case+0x170/0x3f0
[   18.188434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.188501]  kthread+0x328/0x630
[   18.189131]  ret_from_fork+0x10/0x20
[   18.189378] 
[   18.189496] The buggy address belongs to the object at fff00000c3f8b900
[   18.189496]  which belongs to the cache kmalloc-64 of size 64
[   18.189705] The buggy address is located 0 bytes to the right of
[   18.189705]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.190135] 
[   18.190198] The buggy address belongs to the physical page:
[   18.190279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.190521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.190940] page_type: f5(slab)
[   18.191011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.191260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.191423] page dumped because: kasan: bad access detected
[   18.191556] 
[   18.191794] Memory state around the buggy address:
[   18.191838]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.192163]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.192344] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.192484]                                      ^
[   18.192553]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.192610]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.192652] ==================================================================
[   18.085102] ==================================================================
[   18.085163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   18.085214] Read of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.085267] 
[   18.085296] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.085378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.085636] Hardware name: linux,dummy-virt (DT)
[   18.085737] Call trace:
[   18.085764]  show_stack+0x20/0x38 (C)
[   18.086024]  dump_stack_lvl+0x8c/0xd0
[   18.086078]  print_report+0x118/0x5d0
[   18.086577]  kasan_atomics_helper+0x42d8/0x4858
[   18.087580]  kasan_save_track+0x20/0x40
[   18.087628]  kasan_save_alloc_info+0x40/0x58
[   18.088210]  kunit_try_run_case+0x170/0x3f0
[   18.088831] The buggy address is located 0 bytes to the right of
[   18.088831]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.091089] ==================================================================
[   18.379696] ==================================================================
[   18.379919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.379993] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.380048] 
[   18.380091] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.380177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.380220] Hardware name: linux,dummy-virt (DT)
[   18.380263] Call trace:
[   18.380287]  show_stack+0x20/0x38 (C)
[   18.380339]  dump_stack_lvl+0x8c/0xd0
[   18.380393]  print_report+0x118/0x5d0
[   18.380442]  kasan_report+0xdc/0x128
[   18.380496]  kasan_check_range+0x100/0x1a8
[   18.380546]  __kasan_check_write+0x20/0x30
[   18.380597]  kasan_atomics_helper+0x154c/0x4858
[   18.380647]  kasan_atomics+0x198/0x2e0
[   18.380695]  kunit_try_run_case+0x170/0x3f0
[   18.380744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.380800]  kthread+0x328/0x630
[   18.380842]  ret_from_fork+0x10/0x20
[   18.380902] 
[   18.380924] Allocated by task 265:
[   18.380953]  kasan_save_stack+0x3c/0x68
[   18.380997]  kasan_save_track+0x20/0x40
[   18.381036]  kasan_save_alloc_info+0x40/0x58
[   18.381079]  __kasan_kmalloc+0xd4/0xd8
[   18.381127]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.381177]  kasan_atomics+0xb8/0x2e0
[   18.381215]  kunit_try_run_case+0x170/0x3f0
[   18.381256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.381301]  kthread+0x328/0x630
[   18.381344]  ret_from_fork+0x10/0x20
[   18.381384] 
[   18.381416] The buggy address belongs to the object at fff00000c3f8b900
[   18.381416]  which belongs to the cache kmalloc-64 of size 64
[   18.381480] The buggy address is located 0 bytes to the right of
[   18.381480]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.381557] 
[   18.381587] The buggy address belongs to the physical page:
[   18.381623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.381678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.381728] page_type: f5(slab)
[   18.381768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.381823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.381877] page dumped because: kasan: bad access detected
[   18.381911] 
[   18.382876] Memory state around the buggy address:
[   18.382946]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.383030]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.383098] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.383158]                                      ^
[   18.383217]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.383287]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.383375] ==================================================================
[   18.369903] ==================================================================
[   18.370091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.370176] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.370397] 
[   18.370447] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.370535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.370609] Hardware name: linux,dummy-virt (DT)
[   18.370704] Call trace:
[   18.370799]  show_stack+0x20/0x38 (C)
[   18.370867]  dump_stack_lvl+0x8c/0xd0
[   18.371109]  print_report+0x118/0x5d0
[   18.371379]  kasan_report+0xdc/0x128
[   18.371487]  kasan_check_range+0x100/0x1a8
[   18.371861]  __kasan_check_write+0x20/0x30
[   18.371997]  kasan_atomics_helper+0x14e4/0x4858
[   18.372107]  kasan_atomics+0x198/0x2e0
[   18.372290]  kunit_try_run_case+0x170/0x3f0
[   18.372345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.372793]  kthread+0x328/0x630
[   18.373201]  ret_from_fork+0x10/0x20
[   18.373389] 
[   18.373519] Allocated by task 265:
[   18.373647]  kasan_save_stack+0x3c/0x68
[   18.373716]  kasan_save_track+0x20/0x40
[   18.373797]  kasan_save_alloc_info+0x40/0x58
[   18.374096]  __kasan_kmalloc+0xd4/0xd8
[   18.374452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.374598]  kasan_atomics+0xb8/0x2e0
[   18.374672]  kunit_try_run_case+0x170/0x3f0
[   18.374799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.374889]  kthread+0x328/0x630
[   18.374997]  ret_from_fork+0x10/0x20
[   18.375039] 
[   18.375063] The buggy address belongs to the object at fff00000c3f8b900
[   18.375063]  which belongs to the cache kmalloc-64 of size 64
[   18.375358] The buggy address is located 0 bytes to the right of
[   18.375358]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.375944] 
[   18.375985] The buggy address belongs to the physical page:
[   18.376065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.376126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.376491] page_type: f5(slab)
[   18.376892] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.377058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.377234] page dumped because: kasan: bad access detected
[   18.377271] 
[   18.377569] Memory state around the buggy address:
[   18.377889]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.377973]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.378136] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.378182]                                      ^
[   18.378586]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378651]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378816] ==================================================================
[   18.275682] ==================================================================
[   18.275883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.275947] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.276056] 
[   18.276092] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.276318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.276351] Hardware name: linux,dummy-virt (DT)
[   18.276409] Call trace:
[   18.276466]  show_stack+0x20/0x38 (C)
[   18.276520]  dump_stack_lvl+0x8c/0xd0
[   18.276738]  print_report+0x118/0x5d0
[   18.277044]  kasan_report+0xdc/0x128
[   18.277105]  kasan_check_range+0x100/0x1a8
[   18.277280]  __kasan_check_write+0x20/0x30
[   18.277522]  kasan_atomics_helper+0x1058/0x4858
[   18.277592]  kasan_atomics+0x198/0x2e0
[   18.277977]  kunit_try_run_case+0x170/0x3f0
[   18.278242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.278536]  kthread+0x328/0x630
[   18.278645]  ret_from_fork+0x10/0x20
[   18.278840] 
[   18.279000] Allocated by task 265:
[   18.279034]  kasan_save_stack+0x3c/0x68
[   18.279080]  kasan_save_track+0x20/0x40
[   18.279295]  kasan_save_alloc_info+0x40/0x58
[   18.279746]  __kasan_kmalloc+0xd4/0xd8
[   18.279998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.280173]  kasan_atomics+0xb8/0x2e0
[   18.280262]  kunit_try_run_case+0x170/0x3f0
[   18.280375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.280424]  kthread+0x328/0x630
[   18.280580]  ret_from_fork+0x10/0x20
[   18.281035] 
[   18.281124] The buggy address belongs to the object at fff00000c3f8b900
[   18.281124]  which belongs to the cache kmalloc-64 of size 64
[   18.281425] The buggy address is located 0 bytes to the right of
[   18.281425]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.281806] 
[   18.281971] The buggy address belongs to the physical page:
[   18.282081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.282339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.282583] page_type: f5(slab)
[   18.282645] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.283176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.283241] page dumped because: kasan: bad access detected
[   18.283278] 
[   18.283525] Memory state around the buggy address:
[   18.283612]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.283696]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.284057] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.284158]                                      ^
[   18.284200]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.284870]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.284940] ==================================================================
[   18.240180] ==================================================================
[   18.240236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.240290] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.240344] 
[   18.240565] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.240767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.240799] Hardware name: linux,dummy-virt (DT)
[   18.240833] Call trace:
[   18.240870]  show_stack+0x20/0x38 (C)
[   18.240923]  dump_stack_lvl+0x8c/0xd0
[   18.240970]  print_report+0x118/0x5d0
[   18.241038]  kasan_report+0xdc/0x128
[   18.241085]  kasan_check_range+0x100/0x1a8
[   18.241135]  __kasan_check_write+0x20/0x30
[   18.241182]  kasan_atomics_helper+0xeb8/0x4858
[   18.241240]  kasan_atomics+0x198/0x2e0
[   18.241291]  kunit_try_run_case+0x170/0x3f0
[   18.241343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.241398]  kthread+0x328/0x630
[   18.241442]  ret_from_fork+0x10/0x20
[   18.241490] 
[   18.241511] Allocated by task 265:
[   18.241544]  kasan_save_stack+0x3c/0x68
[   18.241590]  kasan_save_track+0x20/0x40
[   18.241633]  kasan_save_alloc_info+0x40/0x58
[   18.241674]  __kasan_kmalloc+0xd4/0xd8
[   18.241726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.241771]  kasan_atomics+0xb8/0x2e0
[   18.241809]  kunit_try_run_case+0x170/0x3f0
[   18.242019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.242204]  kthread+0x328/0x630
[   18.242410]  ret_from_fork+0x10/0x20
[   18.242926] 
[   18.243256] The buggy address belongs to the object at fff00000c3f8b900
[   18.243256]  which belongs to the cache kmalloc-64 of size 64
[   18.243332] The buggy address is located 0 bytes to the right of
[   18.243332]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.243403] 
[   18.243424] The buggy address belongs to the physical page:
[   18.243458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.244207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.244283] page_type: f5(slab)
[   18.244327] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.244667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.244964] page dumped because: kasan: bad access detected
[   18.245253] 
[   18.245669] Memory state around the buggy address:
[   18.245765]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.246219]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.246342] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.246597]                                      ^
[   18.246787]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.246843]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.246896] ==================================================================
[   18.416190] ==================================================================
[   18.416402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.416493] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.416559] 
[   18.416641] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.416731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.416759] Hardware name: linux,dummy-virt (DT)
[   18.416808] Call trace:
[   18.416833]  show_stack+0x20/0x38 (C)
[   18.416895]  dump_stack_lvl+0x8c/0xd0
[   18.416942]  print_report+0x118/0x5d0
[   18.417241]  kasan_report+0xdc/0x128
[   18.417583]  kasan_check_range+0x100/0x1a8
[   18.417656]  __kasan_check_write+0x20/0x30
[   18.417713]  kasan_atomics_helper+0x16d0/0x4858
[   18.418220]  kasan_atomics+0x198/0x2e0
[   18.418305]  kunit_try_run_case+0x170/0x3f0
[   18.418357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.418478]  kthread+0x328/0x630
[   18.418549]  ret_from_fork+0x10/0x20
[   18.418715] 
[   18.418743] Allocated by task 265:
[   18.418773]  kasan_save_stack+0x3c/0x68
[   18.418843]  kasan_save_track+0x20/0x40
[   18.418894]  kasan_save_alloc_info+0x40/0x58
[   18.419237]  __kasan_kmalloc+0xd4/0xd8
[   18.419457]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.419613]  kasan_atomics+0xb8/0x2e0
[   18.419696]  kunit_try_run_case+0x170/0x3f0
[   18.419813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.419889]  kthread+0x328/0x630
[   18.419979]  ret_from_fork+0x10/0x20
[   18.420125] 
[   18.420185] The buggy address belongs to the object at fff00000c3f8b900
[   18.420185]  which belongs to the cache kmalloc-64 of size 64
[   18.420434] The buggy address is located 0 bytes to the right of
[   18.420434]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.420636] 
[   18.420686] The buggy address belongs to the physical page:
[   18.421012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.421080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.421134] page_type: f5(slab)
[   18.421485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.421830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.421920] page dumped because: kasan: bad access detected
[   18.421975] 
[   18.422068] Memory state around the buggy address:
[   18.422177]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.422226]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.422533] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.422675]                                      ^
[   18.422738]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.423091]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.423369] ==================================================================
[   18.383996] ==================================================================
[   18.384050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.384102] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.384389] 
[   18.384865] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.384973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.385018] Hardware name: linux,dummy-virt (DT)
[   18.385053] Call trace:
[   18.385128]  show_stack+0x20/0x38 (C)
[   18.385203]  dump_stack_lvl+0x8c/0xd0
[   18.385253]  print_report+0x118/0x5d0
[   18.385318]  kasan_report+0xdc/0x128
[   18.385369]  kasan_check_range+0x100/0x1a8
[   18.385699]  __kasan_check_write+0x20/0x30
[   18.385786]  kasan_atomics_helper+0x15b4/0x4858
[   18.386126]  kasan_atomics+0x198/0x2e0
[   18.386223]  kunit_try_run_case+0x170/0x3f0
[   18.386275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.386330]  kthread+0x328/0x630
[   18.386483]  ret_from_fork+0x10/0x20
[   18.386538] 
[   18.386582] Allocated by task 265:
[   18.386612]  kasan_save_stack+0x3c/0x68
[   18.386963]  kasan_save_track+0x20/0x40
[   18.387038]  kasan_save_alloc_info+0x40/0x58
[   18.387450]  __kasan_kmalloc+0xd4/0xd8
[   18.387585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.387664]  kasan_atomics+0xb8/0x2e0
[   18.387815]  kunit_try_run_case+0x170/0x3f0
[   18.388146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.388291]  kthread+0x328/0x630
[   18.388624]  ret_from_fork+0x10/0x20
[   18.388824] 
[   18.389151] The buggy address belongs to the object at fff00000c3f8b900
[   18.389151]  which belongs to the cache kmalloc-64 of size 64
[   18.389722] The buggy address is located 0 bytes to the right of
[   18.389722]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.390088] 
[   18.390511] The buggy address belongs to the physical page:
[   18.390595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.390696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.390753] page_type: f5(slab)
[   18.390796] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.390870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.390917] page dumped because: kasan: bad access detected
[   18.391230] 
[   18.391307] Memory state around the buggy address:
[   18.391635]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.391772]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.391987] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.392175]                                      ^
[   18.392544]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.392650]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.392726] ==================================================================
[   18.310934] ==================================================================
[   18.311266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.311338] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.311562] 
[   18.311730] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.311881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.311917] Hardware name: linux,dummy-virt (DT)
[   18.311996] Call trace:
[   18.312161]  show_stack+0x20/0x38 (C)
[   18.312353]  dump_stack_lvl+0x8c/0xd0
[   18.312438]  print_report+0x118/0x5d0
[   18.312491]  kasan_report+0xdc/0x128
[   18.312537]  kasan_check_range+0x100/0x1a8
[   18.312890]  __kasan_check_write+0x20/0x30
[   18.312963]  kasan_atomics_helper+0x11f8/0x4858
[   18.313017]  kasan_atomics+0x198/0x2e0
[   18.313063]  kunit_try_run_case+0x170/0x3f0
[   18.313660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.313746]  kthread+0x328/0x630
[   18.313894]  ret_from_fork+0x10/0x20
[   18.313955] 
[   18.313982] Allocated by task 265:
[   18.314066]  kasan_save_stack+0x3c/0x68
[   18.314114]  kasan_save_track+0x20/0x40
[   18.314864]  kasan_save_alloc_info+0x40/0x58
[   18.315017]  __kasan_kmalloc+0xd4/0xd8
[   18.315147]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.315273]  kasan_atomics+0xb8/0x2e0
[   18.315375]  kunit_try_run_case+0x170/0x3f0
[   18.315437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.315605]  kthread+0x328/0x630
[   18.315791]  ret_from_fork+0x10/0x20
[   18.315872] 
[   18.316006] The buggy address belongs to the object at fff00000c3f8b900
[   18.316006]  which belongs to the cache kmalloc-64 of size 64
[   18.316118] The buggy address is located 0 bytes to the right of
[   18.316118]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.316413] 
[   18.316511] The buggy address belongs to the physical page:
[   18.316837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.316969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.317066] page_type: f5(slab)
[   18.317369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.317526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.317872] page dumped because: kasan: bad access detected
[   18.318354] 
[   18.318402] Memory state around the buggy address:
[   18.318616]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.318993]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.319309] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.319483]                                      ^
[   18.319578]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.319792]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.320014] ==================================================================
[   18.247907] ==================================================================
[   18.247963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.248016] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.248070] 
[   18.248100] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.248626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.248886] Hardware name: linux,dummy-virt (DT)
[   18.248937] Call trace:
[   18.249083]  show_stack+0x20/0x38 (C)
[   18.249144]  dump_stack_lvl+0x8c/0xd0
[   18.249191]  print_report+0x118/0x5d0
[   18.249446]  kasan_report+0xdc/0x128
[   18.249816]  kasan_check_range+0x100/0x1a8
[   18.249907]  __kasan_check_write+0x20/0x30
[   18.250159]  kasan_atomics_helper+0xf20/0x4858
[   18.250229]  kasan_atomics+0x198/0x2e0
[   18.250449]  kunit_try_run_case+0x170/0x3f0
[   18.250640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.251178]  kthread+0x328/0x630
[   18.251340]  ret_from_fork+0x10/0x20
[   18.251531] 
[   18.251592] Allocated by task 265:
[   18.251624]  kasan_save_stack+0x3c/0x68
[   18.251675]  kasan_save_track+0x20/0x40
[   18.251716]  kasan_save_alloc_info+0x40/0x58
[   18.252090]  __kasan_kmalloc+0xd4/0xd8
[   18.252326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.252421]  kasan_atomics+0xb8/0x2e0
[   18.252642]  kunit_try_run_case+0x170/0x3f0
[   18.252739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.252901]  kthread+0x328/0x630
[   18.252941]  ret_from_fork+0x10/0x20
[   18.253326] 
[   18.253573] The buggy address belongs to the object at fff00000c3f8b900
[   18.253573]  which belongs to the cache kmalloc-64 of size 64
[   18.253884] The buggy address is located 0 bytes to the right of
[   18.253884]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.254171] 
[   18.254208] The buggy address belongs to the physical page:
[   18.254382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.254589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.254651] page_type: f5(slab)
[   18.254693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.254750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.254993] page dumped because: kasan: bad access detected
[   18.255343] 
[   18.255454] Memory state around the buggy address:
[   18.255609]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.255661]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.255940] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.256390]                                      ^
[   18.256606]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.256923]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.257252] ==================================================================
[   18.339688] ==================================================================
[   18.339824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.339894] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.339955] 
[   18.340056] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.340146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.340176] Hardware name: linux,dummy-virt (DT)
[   18.340328] Call trace:
[   18.340408]  show_stack+0x20/0x38 (C)
[   18.340571]  dump_stack_lvl+0x8c/0xd0
[   18.340633]  print_report+0x118/0x5d0
[   18.340867]  kasan_report+0xdc/0x128
[   18.341040]  kasan_check_range+0x100/0x1a8
[   18.341158]  __kasan_check_write+0x20/0x30
[   18.341231]  kasan_atomics_helper+0x1384/0x4858
[   18.341419]  kasan_atomics+0x198/0x2e0
[   18.341472]  kunit_try_run_case+0x170/0x3f0
[   18.341553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.341875]  kthread+0x328/0x630
[   18.341940]  ret_from_fork+0x10/0x20
[   18.341992] 
[   18.342013] Allocated by task 265:
[   18.342044]  kasan_save_stack+0x3c/0x68
[   18.342087]  kasan_save_track+0x20/0x40
[   18.342128]  kasan_save_alloc_info+0x40/0x58
[   18.342169]  __kasan_kmalloc+0xd4/0xd8
[   18.342209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.342249]  kasan_atomics+0xb8/0x2e0
[   18.342287]  kunit_try_run_case+0x170/0x3f0
[   18.342344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.342395]  kthread+0x328/0x630
[   18.342428]  ret_from_fork+0x10/0x20
[   18.342479] 
[   18.342512] The buggy address belongs to the object at fff00000c3f8b900
[   18.342512]  which belongs to the cache kmalloc-64 of size 64
[   18.342584] The buggy address is located 0 bytes to the right of
[   18.342584]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.342656] 
[   18.342688] The buggy address belongs to the physical page:
[   18.342722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.342777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.342833] page_type: f5(slab)
[   18.342885] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.342941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.342986] page dumped because: kasan: bad access detected
[   18.343020] 
[   18.343042] Memory state around the buggy address:
[   18.343085]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.343132]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.343178] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.343220]                                      ^
[   18.343265]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.343310]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.343351] ==================================================================
[   18.444431] ==================================================================
[   18.444515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.444887] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.444971] 
[   18.445006] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.445191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.445227] Hardware name: linux,dummy-virt (DT)
[   18.445297] Call trace:
[   18.445323]  show_stack+0x20/0x38 (C)
[   18.445385]  dump_stack_lvl+0x8c/0xd0
[   18.445431]  print_report+0x118/0x5d0
[   18.445479]  kasan_report+0xdc/0x128
[   18.445525]  kasan_check_range+0x100/0x1a8
[   18.445878]  __kasan_check_write+0x20/0x30
[   18.446289]  kasan_atomics_helper+0x17ec/0x4858
[   18.446368]  kasan_atomics+0x198/0x2e0
[   18.446536]  kunit_try_run_case+0x170/0x3f0
[   18.446933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.447111]  kthread+0x328/0x630
[   18.447198]  ret_from_fork+0x10/0x20
[   18.447385] 
[   18.447537] Allocated by task 265:
[   18.447569]  kasan_save_stack+0x3c/0x68
[   18.447742]  kasan_save_track+0x20/0x40
[   18.447872]  kasan_save_alloc_info+0x40/0x58
[   18.448142]  __kasan_kmalloc+0xd4/0xd8
[   18.448273]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.448350]  kasan_atomics+0xb8/0x2e0
[   18.448500]  kunit_try_run_case+0x170/0x3f0
[   18.448569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.448658]  kthread+0x328/0x630
[   18.448793]  ret_from_fork+0x10/0x20
[   18.448865] 
[   18.448903] The buggy address belongs to the object at fff00000c3f8b900
[   18.448903]  which belongs to the cache kmalloc-64 of size 64
[   18.449279] The buggy address is located 0 bytes to the right of
[   18.449279]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.449659] 
[   18.449714] The buggy address belongs to the physical page:
[   18.449767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.449939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.450056] page_type: f5(slab)
[   18.450210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.450365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.450416] page dumped because: kasan: bad access detected
[   18.450459] 
[   18.450481] Memory state around the buggy address:
[   18.450551]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.450917]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.450986] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.451207]                                      ^
[   18.451255]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.451475]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.451576] ==================================================================
[   18.214396] ==================================================================
[   18.214570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.214771] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.214894] 
[   18.214939] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.215050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.215080] Hardware name: linux,dummy-virt (DT)
[   18.215112] Call trace:
[   18.215135]  show_stack+0x20/0x38 (C)
[   18.215199]  dump_stack_lvl+0x8c/0xd0
[   18.215257]  print_report+0x118/0x5d0
[   18.215319]  kasan_report+0xdc/0x128
[   18.215369]  __asan_report_load8_noabort+0x20/0x30
[   18.215433]  kasan_atomics_helper+0x3f58/0x4858
[   18.215489]  kasan_atomics+0x198/0x2e0
[   18.215538]  kunit_try_run_case+0x170/0x3f0
[   18.215589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.215654]  kthread+0x328/0x630
[   18.215710]  ret_from_fork+0x10/0x20
[   18.215779] 
[   18.215823] Allocated by task 265:
[   18.215870]  kasan_save_stack+0x3c/0x68
[   18.215925]  kasan_save_track+0x20/0x40
[   18.215965]  kasan_save_alloc_info+0x40/0x58
[   18.216020]  __kasan_kmalloc+0xd4/0xd8
[   18.216065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.216119]  kasan_atomics+0xb8/0x2e0
[   18.216183]  kunit_try_run_case+0x170/0x3f0
[   18.216226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.216273]  kthread+0x328/0x630
[   18.216308]  ret_from_fork+0x10/0x20
[   18.216357] 
[   18.216393] The buggy address belongs to the object at fff00000c3f8b900
[   18.216393]  which belongs to the cache kmalloc-64 of size 64
[   18.216465] The buggy address is located 0 bytes to the right of
[   18.216465]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.216536] 
[   18.216567] The buggy address belongs to the physical page:
[   18.216609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.216676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.216727] page_type: f5(slab)
[   18.216768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.216824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.217896] page dumped because: kasan: bad access detected
[   18.217964] 
[   18.218031] Memory state around the buggy address:
[   18.218097]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.218182]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.218240] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.218520]                                      ^
[   18.218705]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.218761]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.218803] ==================================================================
[   18.202639] ==================================================================
[   18.202963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.203419] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.203547] 
[   18.203646] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.203812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.203841] Hardware name: linux,dummy-virt (DT)
[   18.203899] Call trace:
[   18.204305]  show_stack+0x20/0x38 (C)
[   18.204712]  dump_stack_lvl+0x8c/0xd0
[   18.204877]  print_report+0x118/0x5d0
[   18.205167]  kasan_report+0xdc/0x128
[   18.205488]  kasan_check_range+0x100/0x1a8
[   18.205795]  __kasan_check_read+0x20/0x30
[   18.205888]  kasan_atomics_helper+0xdd4/0x4858
[   18.206077]  kasan_atomics+0x198/0x2e0
[   18.206139]  kunit_try_run_case+0x170/0x3f0
[   18.206396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.206752]  kthread+0x328/0x630
[   18.207065]  ret_from_fork+0x10/0x20
[   18.207232] 
[   18.207313] Allocated by task 265:
[   18.207458]  kasan_save_stack+0x3c/0x68
[   18.207525]  kasan_save_track+0x20/0x40
[   18.207566]  kasan_save_alloc_info+0x40/0x58
[   18.207616]  __kasan_kmalloc+0xd4/0xd8
[   18.207843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.208050]  kasan_atomics+0xb8/0x2e0
[   18.208444]  kunit_try_run_case+0x170/0x3f0
[   18.208775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.209017]  kthread+0x328/0x630
[   18.209252]  ret_from_fork+0x10/0x20
[   18.209354] 
[   18.209382] The buggy address belongs to the object at fff00000c3f8b900
[   18.209382]  which belongs to the cache kmalloc-64 of size 64
[   18.209793] The buggy address is located 0 bytes to the right of
[   18.209793]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.210009] 
[   18.210148] The buggy address belongs to the physical page:
[   18.210430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.210893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.211075] page_type: f5(slab)
[   18.211123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.211199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.211244] page dumped because: kasan: bad access detected
[   18.211605] 
[   18.211687] Memory state around the buggy address:
[   18.211956]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.212015]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.212492] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.212685]                                      ^
[   18.213033]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.213116]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.213364] ==================================================================
[   18.393812] ==================================================================
[   18.394153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.394234] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.394289] 
[   18.394323] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.394494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.394571] Hardware name: linux,dummy-virt (DT)
[   18.394634] Call trace:
[   18.394728]  show_stack+0x20/0x38 (C)
[   18.394797]  dump_stack_lvl+0x8c/0xd0
[   18.394884]  print_report+0x118/0x5d0
[   18.394934]  kasan_report+0xdc/0x128
[   18.395271]  __asan_report_load8_noabort+0x20/0x30
[   18.395623]  kasan_atomics_helper+0x3db0/0x4858
[   18.395787]  kasan_atomics+0x198/0x2e0
[   18.395916]  kunit_try_run_case+0x170/0x3f0
[   18.396014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.396111]  kthread+0x328/0x630
[   18.396214]  ret_from_fork+0x10/0x20
[   18.396266] 
[   18.396618] Allocated by task 265:
[   18.396981]  kasan_save_stack+0x3c/0x68
[   18.397089]  kasan_save_track+0x20/0x40
[   18.397164]  kasan_save_alloc_info+0x40/0x58
[   18.397288]  __kasan_kmalloc+0xd4/0xd8
[   18.397376]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.397484]  kasan_atomics+0xb8/0x2e0
[   18.397523]  kunit_try_run_case+0x170/0x3f0
[   18.397594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.397928]  kthread+0x328/0x630
[   18.398334]  ret_from_fork+0x10/0x20
[   18.398416] 
[   18.398484] The buggy address belongs to the object at fff00000c3f8b900
[   18.398484]  which belongs to the cache kmalloc-64 of size 64
[   18.398847] The buggy address is located 0 bytes to the right of
[   18.398847]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.399006] 
[   18.399101] The buggy address belongs to the physical page:
[   18.399136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.399203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.399255] page_type: f5(slab)
[   18.399623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.399955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.400059] page dumped because: kasan: bad access detected
[   18.400168] 
[   18.400239] Memory state around the buggy address:
[   18.400360]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.400412]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.400484] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.400788]                                      ^
[   18.400992]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.401206]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.401331] ==================================================================
[   18.219014] ==================================================================
[   18.219063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.219780] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.219936] 
[   18.219972] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.220140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.220188] Hardware name: linux,dummy-virt (DT)
[   18.220225] Call trace:
[   18.220329]  show_stack+0x20/0x38 (C)
[   18.220386]  dump_stack_lvl+0x8c/0xd0
[   18.220452]  print_report+0x118/0x5d0
[   18.220793]  kasan_report+0xdc/0x128
[   18.220864]  kasan_check_range+0x100/0x1a8
[   18.220918]  __kasan_check_write+0x20/0x30
[   18.221386]  kasan_atomics_helper+0xe44/0x4858
[   18.221620]  kasan_atomics+0x198/0x2e0
[   18.221706]  kunit_try_run_case+0x170/0x3f0
[   18.221914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.222039]  kthread+0x328/0x630
[   18.222240]  ret_from_fork+0x10/0x20
[   18.222303] 
[   18.222352] Allocated by task 265:
[   18.222385]  kasan_save_stack+0x3c/0x68
[   18.222443]  kasan_save_track+0x20/0x40
[   18.222671]  kasan_save_alloc_info+0x40/0x58
[   18.222841]  __kasan_kmalloc+0xd4/0xd8
[   18.223109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.223408]  kasan_atomics+0xb8/0x2e0
[   18.223493]  kunit_try_run_case+0x170/0x3f0
[   18.223968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.224285]  kthread+0x328/0x630
[   18.224398]  ret_from_fork+0x10/0x20
[   18.224749] 
[   18.225009] The buggy address belongs to the object at fff00000c3f8b900
[   18.225009]  which belongs to the cache kmalloc-64 of size 64
[   18.225374] The buggy address is located 0 bytes to the right of
[   18.225374]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.225695] 
[   18.225747] The buggy address belongs to the physical page:
[   18.226083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.226350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.226511] page_type: f5(slab)
[   18.227012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.227249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.227324] page dumped because: kasan: bad access detected
[   18.227475] 
[   18.227507] Memory state around the buggy address:
[   18.227713]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.227842]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.228059] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.228213]                                      ^
[   18.228525]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.228698]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.228910] ==================================================================
[   18.098466] ==================================================================
[   18.098529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   18.098848] Write of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.099073] 
[   18.099144] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.099351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.099409] Hardware name: linux,dummy-virt (DT)
[   18.099449] Call trace:
[   18.099598]  show_stack+0x20/0x38 (C)
[   18.099812]  dump_stack_lvl+0x8c/0xd0
[   18.099969]  print_report+0x118/0x5d0
[   18.100041]  kasan_report+0xdc/0x128
[   18.100317]  kasan_check_range+0x100/0x1a8
[   18.100419]  __kasan_check_write+0x20/0x30
[   18.100563]  kasan_atomics_helper+0x99c/0x4858
[   18.100625]  kasan_atomics+0x198/0x2e0
[   18.100870]  kunit_try_run_case+0x170/0x3f0
[   18.100998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.101203]  kthread+0x328/0x630
[   18.101254]  ret_from_fork+0x10/0x20
[   18.101470] 
[   18.101508] Allocated by task 265:
[   18.101682]  kasan_save_stack+0x3c/0x68
[   18.101920]  kasan_save_track+0x20/0x40
[   18.102073]  kasan_save_alloc_info+0x40/0x58
[   18.102216]  __kasan_kmalloc+0xd4/0xd8
[   18.102313]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.102392]  kasan_atomics+0xb8/0x2e0
[   18.102583]  kunit_try_run_case+0x170/0x3f0
[   18.102679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.102904]  kthread+0x328/0x630
[   18.103033]  ret_from_fork+0x10/0x20
[   18.103111] 
[   18.103140] The buggy address belongs to the object at fff00000c3f8b900
[   18.103140]  which belongs to the cache kmalloc-64 of size 64
[   18.103205] The buggy address is located 0 bytes to the right of
[   18.103205]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.103488] 
[   18.103535] The buggy address belongs to the physical page:
[   18.103579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.103647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.103707] page_type: f5(slab)
[   18.103748] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.103818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.103872] page dumped because: kasan: bad access detected
[   18.103926] 
[   18.103960] Memory state around the buggy address:
[   18.103993]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.104051]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.104098] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.104138]                                      ^
[   18.104175]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.105600] ==================================================================
[   18.112473] ==================================================================
[   18.112648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   18.112709] Write of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.112817] 
[   18.112863] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.112949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.113148] Hardware name: linux,dummy-virt (DT)
[   18.113286] Call trace:
[   18.113344]  show_stack+0x20/0x38 (C)
[   18.113462]  dump_stack_lvl+0x8c/0xd0
[   18.113536]  print_report+0x118/0x5d0
[   18.113685]  kasan_report+0xdc/0x128
[   18.113739]  kasan_check_range+0x100/0x1a8
[   18.113791]  __kasan_check_write+0x20/0x30
[   18.113844]  kasan_atomics_helper+0xa6c/0x4858
[   18.113904]  kasan_atomics+0x198/0x2e0
[   18.113950]  kunit_try_run_case+0x170/0x3f0
[   18.114223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.114317]  kthread+0x328/0x630
[   18.114416]  ret_from_fork+0x10/0x20
[   18.114477] 
[   18.114538] Allocated by task 265:
[   18.114628]  kasan_save_stack+0x3c/0x68
[   18.114697]  kasan_save_track+0x20/0x40
[   18.114744]  kasan_save_alloc_info+0x40/0x58
[   18.114795]  __kasan_kmalloc+0xd4/0xd8
[   18.114834]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.114886]  kasan_atomics+0xb8/0x2e0
[   18.114925]  kunit_try_run_case+0x170/0x3f0
[   18.114966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.115014]  kthread+0x328/0x630
[   18.115049]  ret_from_fork+0x10/0x20
[   18.115279] 
[   18.115541] The buggy address belongs to the object at fff00000c3f8b900
[   18.115541]  which belongs to the cache kmalloc-64 of size 64
[   18.115780] The buggy address is located 0 bytes to the right of
[   18.115780]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.116003] 
[   18.116047] The buggy address belongs to the physical page:
[   18.116082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.116294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.116423] page_type: f5(slab)
[   18.116496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.116552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.116616] page dumped because: kasan: bad access detected
[   18.116651] 
[   18.116671] Memory state around the buggy address:
[   18.116712]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.116770]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.116830] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.116888]                                      ^
[   18.116925]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.117219] ==================================================================
[   18.435583] ==================================================================
[   18.435640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.435707] Read of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.435982] 
[   18.436028] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.436122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.436467] Hardware name: linux,dummy-virt (DT)
[   18.436538] Call trace:
[   18.436588]  show_stack+0x20/0x38 (C)
[   18.436649]  dump_stack_lvl+0x8c/0xd0
[   18.436789]  print_report+0x118/0x5d0
[   18.436885]  kasan_report+0xdc/0x128
[   18.436940]  __asan_report_load8_noabort+0x20/0x30
[   18.437292]  kasan_atomics_helper+0x3e20/0x4858
[   18.437373]  kasan_atomics+0x198/0x2e0
[   18.437433]  kunit_try_run_case+0x170/0x3f0
[   18.437490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.437557]  kthread+0x328/0x630
[   18.437614]  ret_from_fork+0x10/0x20
[   18.437916] 
[   18.437960] Allocated by task 265:
[   18.438002]  kasan_save_stack+0x3c/0x68
[   18.438059]  kasan_save_track+0x20/0x40
[   18.438392]  kasan_save_alloc_info+0x40/0x58
[   18.438483]  __kasan_kmalloc+0xd4/0xd8
[   18.438557]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.438895]  kasan_atomics+0xb8/0x2e0
[   18.439079]  kunit_try_run_case+0x170/0x3f0
[   18.439174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.439398]  kthread+0x328/0x630
[   18.439502]  ret_from_fork+0x10/0x20
[   18.439553] 
[   18.439576] The buggy address belongs to the object at fff00000c3f8b900
[   18.439576]  which belongs to the cache kmalloc-64 of size 64
[   18.439638] The buggy address is located 0 bytes to the right of
[   18.439638]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.440433] 
[   18.440520] The buggy address belongs to the physical page:
[   18.440591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.440960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.441037] page_type: f5(slab)
[   18.441119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.441456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.441818] page dumped because: kasan: bad access detected
[   18.442321] 
[   18.442389] Memory state around the buggy address:
[   18.442449]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.442511]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.443272] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.443338]                                      ^
[   18.443381]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.443436]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.443479] ==================================================================
[   18.295997] ==================================================================
[   18.296061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.296114] Write of size 8 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.296216] 
[   18.296267] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.296354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.296413] Hardware name: linux,dummy-virt (DT)
[   18.296447] Call trace:
[   18.296471]  show_stack+0x20/0x38 (C)
[   18.296523]  dump_stack_lvl+0x8c/0xd0
[   18.296729]  print_report+0x118/0x5d0
[   18.297060]  kasan_report+0xdc/0x128
[   18.297126]  kasan_check_range+0x100/0x1a8
[   18.297178]  __kasan_check_write+0x20/0x30
[   18.297235]  kasan_atomics_helper+0x1128/0x4858
[   18.297421]  kasan_atomics+0x198/0x2e0
[   18.297787]  kunit_try_run_case+0x170/0x3f0
[   18.297922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.298154]  kthread+0x328/0x630
[   18.298341]  ret_from_fork+0x10/0x20
[   18.298413] 
[   18.298442] Allocated by task 265:
[   18.298471]  kasan_save_stack+0x3c/0x68
[   18.298561]  kasan_save_track+0x20/0x40
[   18.298667]  kasan_save_alloc_info+0x40/0x58
[   18.298888]  __kasan_kmalloc+0xd4/0xd8
[   18.299110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.299236]  kasan_atomics+0xb8/0x2e0
[   18.299572]  kunit_try_run_case+0x170/0x3f0
[   18.299641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.299833]  kthread+0x328/0x630
[   18.300019]  ret_from_fork+0x10/0x20
[   18.300075] 
[   18.300098] The buggy address belongs to the object at fff00000c3f8b900
[   18.300098]  which belongs to the cache kmalloc-64 of size 64
[   18.300169] The buggy address is located 0 bytes to the right of
[   18.300169]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.300270] 
[   18.300313] The buggy address belongs to the physical page:
[   18.300349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.300406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.300469] page_type: f5(slab)
[   18.300509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.300565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.300611] page dumped because: kasan: bad access detected
[   18.300646] 
[   18.300686] Memory state around the buggy address:
[   18.300730]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.300797]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.300861] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.300905]                                      ^
[   18.300954]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.301019]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.301059] ==================================================================
[   18.172801] ==================================================================
[   18.172891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.172957] Read of size 4 at addr fff00000c3f8b930 by task kunit_try_catch/265
[   18.173536] 
[   18.174131] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.174236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.174276] Hardware name: linux,dummy-virt (DT)
[   18.174311] Call trace:
[   18.174342]  show_stack+0x20/0x38 (C)
[   18.174612]  dump_stack_lvl+0x8c/0xd0
[   18.174780]  print_report+0x118/0x5d0
[   18.175081]  kasan_report+0xdc/0x128
[   18.175360]  __asan_report_load4_noabort+0x20/0x30
[   18.175475]  kasan_atomics_helper+0x3dd8/0x4858
[   18.175637]  kasan_atomics+0x198/0x2e0
[   18.175690]  kunit_try_run_case+0x170/0x3f0
[   18.175738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.175995]  kthread+0x328/0x630
[   18.176346]  ret_from_fork+0x10/0x20
[   18.176723] 
[   18.176787] Allocated by task 265:
[   18.177055]  kasan_save_stack+0x3c/0x68
[   18.177237]  kasan_save_track+0x20/0x40
[   18.177323]  kasan_save_alloc_info+0x40/0x58
[   18.177451]  __kasan_kmalloc+0xd4/0xd8
[   18.177541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.177582]  kasan_atomics+0xb8/0x2e0
[   18.177829]  kunit_try_run_case+0x170/0x3f0
[   18.178209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.178480]  kthread+0x328/0x630
[   18.178729]  ret_from_fork+0x10/0x20
[   18.178986] 
[   18.179167] The buggy address belongs to the object at fff00000c3f8b900
[   18.179167]  which belongs to the cache kmalloc-64 of size 64
[   18.179355] The buggy address is located 0 bytes to the right of
[   18.179355]  allocated 48-byte region [fff00000c3f8b900, fff00000c3f8b930)
[   18.179437] 
[   18.179723] The buggy address belongs to the physical page:
[   18.179901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f8b
[   18.180000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.180344] page_type: f5(slab)
[   18.180548] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.180899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.181357] page dumped because: kasan: bad access detected
[   18.181760] 
[   18.182356] Memory state around the buggy address:
[   18.182427]  fff00000c3f8b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.182753]  fff00000c3f8b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.183003] >fff00000c3f8b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.183116]                                      ^
[   18.183195]  fff00000c3f8b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.183447]  fff00000c3f8ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.183575] ==================================================================

[   15.649297] ==================================================================
[   15.649576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.650289] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.650972] 
[   15.651178] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.651225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.651248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.651271] Call Trace:
[   15.651290]  <TASK>
[   15.651318]  dump_stack_lvl+0x73/0xb0
[   15.651347]  print_report+0xd1/0x610
[   15.651369]  ? __virt_addr_valid+0x1db/0x2d0
[   15.651393]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.651414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.651437]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.651469]  kasan_report+0x141/0x180
[   15.651492]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.651519]  kasan_check_range+0x10c/0x1c0
[   15.651553]  __kasan_check_read+0x15/0x20
[   15.651573]  kasan_atomics_helper+0x13b5/0x5450
[   15.651597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.651621]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.651647]  ? kasan_atomics+0x152/0x310
[   15.651674]  kasan_atomics+0x1dc/0x310
[   15.651698]  ? __pfx_kasan_atomics+0x10/0x10
[   15.651723]  ? __pfx_read_tsc+0x10/0x10
[   15.651744]  ? ktime_get_ts64+0x86/0x230
[   15.651768]  kunit_try_run_case+0x1a5/0x480
[   15.651794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.651836]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.651861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.651886]  ? __kthread_parkme+0x82/0x180
[   15.651917]  ? preempt_count_sub+0x50/0x80
[   15.651941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.651967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.651991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.652025]  kthread+0x337/0x6f0
[   15.652046]  ? trace_preempt_on+0x20/0xc0
[   15.652069]  ? __pfx_kthread+0x10/0x10
[   15.652111]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.652135]  ? calculate_sigpending+0x7b/0xa0
[   15.652161]  ? __pfx_kthread+0x10/0x10
[   15.652183]  ret_from_fork+0x116/0x1d0
[   15.652204]  ? __pfx_kthread+0x10/0x10
[   15.652225]  ret_from_fork_asm+0x1a/0x30
[   15.652257]  </TASK>
[   15.652269] 
[   15.659695] Allocated by task 282:
[   15.659885]  kasan_save_stack+0x45/0x70
[   15.660120]  kasan_save_track+0x18/0x40
[   15.660316]  kasan_save_alloc_info+0x3b/0x50
[   15.660530]  __kasan_kmalloc+0xb7/0xc0
[   15.660747]  __kmalloc_cache_noprof+0x189/0x420
[   15.660965]  kasan_atomics+0x95/0x310
[   15.661230]  kunit_try_run_case+0x1a5/0x480
[   15.661417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661634]  kthread+0x337/0x6f0
[   15.661833]  ret_from_fork+0x116/0x1d0
[   15.662000]  ret_from_fork_asm+0x1a/0x30
[   15.662227] 
[   15.662301] The buggy address belongs to the object at ffff8881025e4100
[   15.662301]  which belongs to the cache kmalloc-64 of size 64
[   15.662783] The buggy address is located 0 bytes to the right of
[   15.662783]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.663333] 
[   15.663408] The buggy address belongs to the physical page:
[   15.663583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.663840] flags: 0x200000000000000(node=0|zone=2)
[   15.664007] page_type: f5(slab)
[   15.664129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.664743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.665115] page dumped because: kasan: bad access detected
[   15.665369] 
[   15.665464] Memory state around the buggy address:
[   15.665622]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.665852]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.666075] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.666392]                                      ^
[   15.666590]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.667547]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.668343] ==================================================================
[   15.181266] ==================================================================
[   15.181625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.181929] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.182261] 
[   15.182372] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.182416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.182429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.182450] Call Trace:
[   15.182464]  <TASK>
[   15.182478]  dump_stack_lvl+0x73/0xb0
[   15.182507]  print_report+0xd1/0x610
[   15.182528]  ? __virt_addr_valid+0x1db/0x2d0
[   15.182551]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.182572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.182596]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.182618]  kasan_report+0x141/0x180
[   15.182640]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.182666]  kasan_check_range+0x10c/0x1c0
[   15.182690]  __kasan_check_write+0x18/0x20
[   15.182710]  kasan_atomics_helper+0x7c7/0x5450
[   15.182733]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.182755]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.182781]  ? kasan_atomics+0x152/0x310
[   15.182808]  kasan_atomics+0x1dc/0x310
[   15.182842]  ? __pfx_kasan_atomics+0x10/0x10
[   15.182867]  ? __pfx_read_tsc+0x10/0x10
[   15.182888]  ? ktime_get_ts64+0x86/0x230
[   15.182913]  kunit_try_run_case+0x1a5/0x480
[   15.182938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.182961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.182986]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.183010]  ? __kthread_parkme+0x82/0x180
[   15.183031]  ? preempt_count_sub+0x50/0x80
[   15.183056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.183081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.183116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.183141]  kthread+0x337/0x6f0
[   15.183161]  ? trace_preempt_on+0x20/0xc0
[   15.183185]  ? __pfx_kthread+0x10/0x10
[   15.183206]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.183229]  ? calculate_sigpending+0x7b/0xa0
[   15.183254]  ? __pfx_kthread+0x10/0x10
[   15.183276]  ret_from_fork+0x116/0x1d0
[   15.183295]  ? __pfx_kthread+0x10/0x10
[   15.183317]  ret_from_fork_asm+0x1a/0x30
[   15.183347]  </TASK>
[   15.183358] 
[   15.190642] Allocated by task 282:
[   15.190809]  kasan_save_stack+0x45/0x70
[   15.190993]  kasan_save_track+0x18/0x40
[   15.191235]  kasan_save_alloc_info+0x3b/0x50
[   15.191391]  __kasan_kmalloc+0xb7/0xc0
[   15.191525]  __kmalloc_cache_noprof+0x189/0x420
[   15.191684]  kasan_atomics+0x95/0x310
[   15.191830]  kunit_try_run_case+0x1a5/0x480
[   15.191994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.192220]  kthread+0x337/0x6f0
[   15.192404]  ret_from_fork+0x116/0x1d0
[   15.192591]  ret_from_fork_asm+0x1a/0x30
[   15.192786] 
[   15.192901] The buggy address belongs to the object at ffff8881025e4100
[   15.192901]  which belongs to the cache kmalloc-64 of size 64
[   15.193709] The buggy address is located 0 bytes to the right of
[   15.193709]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.194242] 
[   15.194342] The buggy address belongs to the physical page:
[   15.194596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.194922] flags: 0x200000000000000(node=0|zone=2)
[   15.195152] page_type: f5(slab)
[   15.195277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.195593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.195919] page dumped because: kasan: bad access detected
[   15.196196] 
[   15.196269] Memory state around the buggy address:
[   15.196492]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.196770]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.197011] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.197581]                                      ^
[   15.197775]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.198180]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.198487] ==================================================================
[   15.419827] ==================================================================
[   15.420361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.420650] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.420905] 
[   15.421017] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.421059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.421071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.421093] Call Trace:
[   15.421107]  <TASK>
[   15.421122]  dump_stack_lvl+0x73/0xb0
[   15.421149]  print_report+0xd1/0x610
[   15.421172]  ? __virt_addr_valid+0x1db/0x2d0
[   15.421194]  ? kasan_atomics_helper+0xf10/0x5450
[   15.421216]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.421239]  ? kasan_atomics_helper+0xf10/0x5450
[   15.421261]  kasan_report+0x141/0x180
[   15.421284]  ? kasan_atomics_helper+0xf10/0x5450
[   15.421309]  kasan_check_range+0x10c/0x1c0
[   15.421333]  __kasan_check_write+0x18/0x20
[   15.421353]  kasan_atomics_helper+0xf10/0x5450
[   15.421378]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.421403]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.421429]  ? kasan_atomics+0x152/0x310
[   15.421455]  kasan_atomics+0x1dc/0x310
[   15.421479]  ? __pfx_kasan_atomics+0x10/0x10
[   15.421504]  ? __pfx_read_tsc+0x10/0x10
[   15.421526]  ? ktime_get_ts64+0x86/0x230
[   15.421551]  kunit_try_run_case+0x1a5/0x480
[   15.421575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.421598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.421622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.421647]  ? __kthread_parkme+0x82/0x180
[   15.421668]  ? preempt_count_sub+0x50/0x80
[   15.421692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.421717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.421741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.421765]  kthread+0x337/0x6f0
[   15.421785]  ? trace_preempt_on+0x20/0xc0
[   15.421809]  ? __pfx_kthread+0x10/0x10
[   15.421840]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.421862]  ? calculate_sigpending+0x7b/0xa0
[   15.421886]  ? __pfx_kthread+0x10/0x10
[   15.421908]  ret_from_fork+0x116/0x1d0
[   15.421927]  ? __pfx_kthread+0x10/0x10
[   15.421947]  ret_from_fork_asm+0x1a/0x30
[   15.421978]  </TASK>
[   15.421990] 
[   15.429865] Allocated by task 282:
[   15.430003]  kasan_save_stack+0x45/0x70
[   15.430223]  kasan_save_track+0x18/0x40
[   15.430483]  kasan_save_alloc_info+0x3b/0x50
[   15.430683]  __kasan_kmalloc+0xb7/0xc0
[   15.430856]  __kmalloc_cache_noprof+0x189/0x420
[   15.431047]  kasan_atomics+0x95/0x310
[   15.431323]  kunit_try_run_case+0x1a5/0x480
[   15.431503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.431713]  kthread+0x337/0x6f0
[   15.431884]  ret_from_fork+0x116/0x1d0
[   15.432047]  ret_from_fork_asm+0x1a/0x30
[   15.432359] 
[   15.432436] The buggy address belongs to the object at ffff8881025e4100
[   15.432436]  which belongs to the cache kmalloc-64 of size 64
[   15.432927] The buggy address is located 0 bytes to the right of
[   15.432927]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.433298] 
[   15.433372] The buggy address belongs to the physical page:
[   15.433548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.433793] flags: 0x200000000000000(node=0|zone=2)
[   15.433967] page_type: f5(slab)
[   15.434089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.434325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.434582] page dumped because: kasan: bad access detected
[   15.434924] 
[   15.435019] Memory state around the buggy address:
[   15.435450]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.435768]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.436107] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.436421]                                      ^
[   15.436581]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.436800]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.437032] ==================================================================
[   15.477444] ==================================================================
[   15.477679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.479043] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.479585] 
[   15.479707] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.479754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.479768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.479790] Call Trace:
[   15.479808]  <TASK>
[   15.479834]  dump_stack_lvl+0x73/0xb0
[   15.479864]  print_report+0xd1/0x610
[   15.479886]  ? __virt_addr_valid+0x1db/0x2d0
[   15.479908]  ? kasan_atomics_helper+0x1079/0x5450
[   15.479931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.479954]  ? kasan_atomics_helper+0x1079/0x5450
[   15.479976]  kasan_report+0x141/0x180
[   15.479998]  ? kasan_atomics_helper+0x1079/0x5450
[   15.480025]  kasan_check_range+0x10c/0x1c0
[   15.480049]  __kasan_check_write+0x18/0x20
[   15.480070]  kasan_atomics_helper+0x1079/0x5450
[   15.480321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.480346]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.480373]  ? kasan_atomics+0x152/0x310
[   15.480401]  kasan_atomics+0x1dc/0x310
[   15.480460]  ? __pfx_kasan_atomics+0x10/0x10
[   15.480484]  ? __pfx_read_tsc+0x10/0x10
[   15.480506]  ? ktime_get_ts64+0x86/0x230
[   15.480532]  kunit_try_run_case+0x1a5/0x480
[   15.480558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.480581]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.480607]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.480631]  ? __kthread_parkme+0x82/0x180
[   15.480651]  ? preempt_count_sub+0x50/0x80
[   15.480675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.480701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.480724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.480749]  kthread+0x337/0x6f0
[   15.480769]  ? trace_preempt_on+0x20/0xc0
[   15.480793]  ? __pfx_kthread+0x10/0x10
[   15.480825]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.480853]  ? calculate_sigpending+0x7b/0xa0
[   15.480878]  ? __pfx_kthread+0x10/0x10
[   15.480900]  ret_from_fork+0x116/0x1d0
[   15.480919]  ? __pfx_kthread+0x10/0x10
[   15.480941]  ret_from_fork_asm+0x1a/0x30
[   15.480971]  </TASK>
[   15.480982] 
[   15.492485] Allocated by task 282:
[   15.492737]  kasan_save_stack+0x45/0x70
[   15.492940]  kasan_save_track+0x18/0x40
[   15.493419]  kasan_save_alloc_info+0x3b/0x50
[   15.493701]  __kasan_kmalloc+0xb7/0xc0
[   15.494024]  __kmalloc_cache_noprof+0x189/0x420
[   15.494565]  kasan_atomics+0x95/0x310
[   15.494805]  kunit_try_run_case+0x1a5/0x480
[   15.495023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.495746]  kthread+0x337/0x6f0
[   15.495986]  ret_from_fork+0x116/0x1d0
[   15.496418]  ret_from_fork_asm+0x1a/0x30
[   15.496614] 
[   15.496709] The buggy address belongs to the object at ffff8881025e4100
[   15.496709]  which belongs to the cache kmalloc-64 of size 64
[   15.497611] The buggy address is located 0 bytes to the right of
[   15.497611]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.498607] 
[   15.498708] The buggy address belongs to the physical page:
[   15.498965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.499553] flags: 0x200000000000000(node=0|zone=2)
[   15.500025] page_type: f5(slab)
[   15.500359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.500688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.501019] page dumped because: kasan: bad access detected
[   15.501695] 
[   15.501791] Memory state around the buggy address:
[   15.502495]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.502935]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.503390] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.503687]                                      ^
[   15.503908]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.504571]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.505010] ==================================================================
[   16.288261] ==================================================================
[   16.288583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.288954] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.289344] 
[   16.289450] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.289529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.289543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.289563] Call Trace:
[   16.289578]  <TASK>
[   16.289594]  dump_stack_lvl+0x73/0xb0
[   16.289622]  print_report+0xd1/0x610
[   16.289644]  ? __virt_addr_valid+0x1db/0x2d0
[   16.289713]  ? kasan_atomics_helper+0x5115/0x5450
[   16.289737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.289759]  ? kasan_atomics_helper+0x5115/0x5450
[   16.289782]  kasan_report+0x141/0x180
[   16.289805]  ? kasan_atomics_helper+0x5115/0x5450
[   16.289844]  __asan_report_load8_noabort+0x18/0x20
[   16.289869]  kasan_atomics_helper+0x5115/0x5450
[   16.289893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.289915]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.289941]  ? kasan_atomics+0x152/0x310
[   16.290000]  kasan_atomics+0x1dc/0x310
[   16.290024]  ? __pfx_kasan_atomics+0x10/0x10
[   16.290049]  ? __pfx_read_tsc+0x10/0x10
[   16.290070]  ? ktime_get_ts64+0x86/0x230
[   16.290116]  kunit_try_run_case+0x1a5/0x480
[   16.290168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.290191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.290215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.290240]  ? __kthread_parkme+0x82/0x180
[   16.290261]  ? preempt_count_sub+0x50/0x80
[   16.290285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.290310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.290334]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.290359]  kthread+0x337/0x6f0
[   16.290380]  ? trace_preempt_on+0x20/0xc0
[   16.290402]  ? __pfx_kthread+0x10/0x10
[   16.290424]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.290446]  ? calculate_sigpending+0x7b/0xa0
[   16.290470]  ? __pfx_kthread+0x10/0x10
[   16.290492]  ret_from_fork+0x116/0x1d0
[   16.290511]  ? __pfx_kthread+0x10/0x10
[   16.290533]  ret_from_fork_asm+0x1a/0x30
[   16.290564]  </TASK>
[   16.290574] 
[   16.297943] Allocated by task 282:
[   16.298096]  kasan_save_stack+0x45/0x70
[   16.298290]  kasan_save_track+0x18/0x40
[   16.298486]  kasan_save_alloc_info+0x3b/0x50
[   16.298721]  __kasan_kmalloc+0xb7/0xc0
[   16.298919]  __kmalloc_cache_noprof+0x189/0x420
[   16.299179]  kasan_atomics+0x95/0x310
[   16.299376]  kunit_try_run_case+0x1a5/0x480
[   16.299581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.299833]  kthread+0x337/0x6f0
[   16.300012]  ret_from_fork+0x116/0x1d0
[   16.300229]  ret_from_fork_asm+0x1a/0x30
[   16.300416] 
[   16.300492] The buggy address belongs to the object at ffff8881025e4100
[   16.300492]  which belongs to the cache kmalloc-64 of size 64
[   16.301014] The buggy address is located 0 bytes to the right of
[   16.301014]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.301530] 
[   16.301632] The buggy address belongs to the physical page:
[   16.301848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.302097] flags: 0x200000000000000(node=0|zone=2)
[   16.302263] page_type: f5(slab)
[   16.302387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.302733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.303157] page dumped because: kasan: bad access detected
[   16.303409] 
[   16.303491] Memory state around the buggy address:
[   16.303649]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.303878]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.304122] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.304387]                                      ^
[   16.304634]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.304995]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.305366] ==================================================================
[   15.944864] ==================================================================
[   15.945603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.946292] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.946682] 
[   15.946771] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.946825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.946839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.946861] Call Trace:
[   15.946878]  <TASK>
[   15.946895]  dump_stack_lvl+0x73/0xb0
[   15.946924]  print_report+0xd1/0x610
[   15.946947]  ? __virt_addr_valid+0x1db/0x2d0
[   15.946969]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.946991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.947014]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.947037]  kasan_report+0x141/0x180
[   15.947060]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.947094]  kasan_check_range+0x10c/0x1c0
[   15.947119]  __kasan_check_write+0x18/0x20
[   15.947139]  kasan_atomics_helper+0x1a7f/0x5450
[   15.947163]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.947186]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.947211]  ? kasan_atomics+0x152/0x310
[   15.947239]  kasan_atomics+0x1dc/0x310
[   15.947262]  ? __pfx_kasan_atomics+0x10/0x10
[   15.947288]  ? __pfx_read_tsc+0x10/0x10
[   15.947310]  ? ktime_get_ts64+0x86/0x230
[   15.947335]  kunit_try_run_case+0x1a5/0x480
[   15.947360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.947384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.947408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.947432]  ? __kthread_parkme+0x82/0x180
[   15.947453]  ? preempt_count_sub+0x50/0x80
[   15.947478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.947503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.947527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.947553]  kthread+0x337/0x6f0
[   15.947573]  ? trace_preempt_on+0x20/0xc0
[   15.947596]  ? __pfx_kthread+0x10/0x10
[   15.947617]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.947640]  ? calculate_sigpending+0x7b/0xa0
[   15.947663]  ? __pfx_kthread+0x10/0x10
[   15.947686]  ret_from_fork+0x116/0x1d0
[   15.947705]  ? __pfx_kthread+0x10/0x10
[   15.947727]  ret_from_fork_asm+0x1a/0x30
[   15.947757]  </TASK>
[   15.947768] 
[   15.958894] Allocated by task 282:
[   15.959074]  kasan_save_stack+0x45/0x70
[   15.959221]  kasan_save_track+0x18/0x40
[   15.959567]  kasan_save_alloc_info+0x3b/0x50
[   15.959779]  __kasan_kmalloc+0xb7/0xc0
[   15.959991]  __kmalloc_cache_noprof+0x189/0x420
[   15.960209]  kasan_atomics+0x95/0x310
[   15.960421]  kunit_try_run_case+0x1a5/0x480
[   15.960643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.960928]  kthread+0x337/0x6f0
[   15.961096]  ret_from_fork+0x116/0x1d0
[   15.961338]  ret_from_fork_asm+0x1a/0x30
[   15.961537] 
[   15.961636] The buggy address belongs to the object at ffff8881025e4100
[   15.961636]  which belongs to the cache kmalloc-64 of size 64
[   15.962155] The buggy address is located 0 bytes to the right of
[   15.962155]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.962627] 
[   15.962727] The buggy address belongs to the physical page:
[   15.963014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.963361] flags: 0x200000000000000(node=0|zone=2)
[   15.963622] page_type: f5(slab)
[   15.963786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.964119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.964475] page dumped because: kasan: bad access detected
[   15.964744] 
[   15.964934] Memory state around the buggy address:
[   15.965173]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.965543]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.965766] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.966108]                                      ^
[   15.966361]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.966726]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.967004] ==================================================================
[   16.184412] ==================================================================
[   16.184769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.185088] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.185352] 
[   16.185439] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.185482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.185495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.185516] Call Trace:
[   16.185530]  <TASK>
[   16.185546]  dump_stack_lvl+0x73/0xb0
[   16.185574]  print_report+0xd1/0x610
[   16.185596]  ? __virt_addr_valid+0x1db/0x2d0
[   16.185619]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.185641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.185663]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.185686]  kasan_report+0x141/0x180
[   16.185707]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.185734]  kasan_check_range+0x10c/0x1c0
[   16.185757]  __kasan_check_write+0x18/0x20
[   16.185777]  kasan_atomics_helper+0x20c8/0x5450
[   16.185800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.186140]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.186173]  ? kasan_atomics+0x152/0x310
[   16.186201]  kasan_atomics+0x1dc/0x310
[   16.186226]  ? __pfx_kasan_atomics+0x10/0x10
[   16.186251]  ? __pfx_read_tsc+0x10/0x10
[   16.186273]  ? ktime_get_ts64+0x86/0x230
[   16.186297]  kunit_try_run_case+0x1a5/0x480
[   16.186322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.186345]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.186371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.186395]  ? __kthread_parkme+0x82/0x180
[   16.186416]  ? preempt_count_sub+0x50/0x80
[   16.186441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.186465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.186489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.186514]  kthread+0x337/0x6f0
[   16.186534]  ? trace_preempt_on+0x20/0xc0
[   16.186557]  ? __pfx_kthread+0x10/0x10
[   16.186579]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.186600]  ? calculate_sigpending+0x7b/0xa0
[   16.186624]  ? __pfx_kthread+0x10/0x10
[   16.186647]  ret_from_fork+0x116/0x1d0
[   16.186666]  ? __pfx_kthread+0x10/0x10
[   16.186687]  ret_from_fork_asm+0x1a/0x30
[   16.186718]  </TASK>
[   16.186729] 
[   16.194981] Allocated by task 282:
[   16.195211]  kasan_save_stack+0x45/0x70
[   16.195423]  kasan_save_track+0x18/0x40
[   16.195605]  kasan_save_alloc_info+0x3b/0x50
[   16.195831]  __kasan_kmalloc+0xb7/0xc0
[   16.195967]  __kmalloc_cache_noprof+0x189/0x420
[   16.196310]  kasan_atomics+0x95/0x310
[   16.196611]  kunit_try_run_case+0x1a5/0x480
[   16.196827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.197104]  kthread+0x337/0x6f0
[   16.197271]  ret_from_fork+0x116/0x1d0
[   16.197455]  ret_from_fork_asm+0x1a/0x30
[   16.197646] 
[   16.197741] The buggy address belongs to the object at ffff8881025e4100
[   16.197741]  which belongs to the cache kmalloc-64 of size 64
[   16.198290] The buggy address is located 0 bytes to the right of
[   16.198290]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.198791] 
[   16.198898] The buggy address belongs to the physical page:
[   16.199180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.199531] flags: 0x200000000000000(node=0|zone=2)
[   16.199756] page_type: f5(slab)
[   16.199951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.200315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.200668] page dumped because: kasan: bad access detected
[   16.200917] 
[   16.201042] Memory state around the buggy address:
[   16.201300]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.201627]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.201948] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.202296]                                      ^
[   16.202513]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.202811]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.203029] ==================================================================
[   15.706558] ==================================================================
[   15.706966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.707593] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.708170] 
[   15.708285] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.708330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.708343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.708365] Call Trace:
[   15.708380]  <TASK>
[   15.708396]  dump_stack_lvl+0x73/0xb0
[   15.708422]  print_report+0xd1/0x610
[   15.708444]  ? __virt_addr_valid+0x1db/0x2d0
[   15.708467]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.708488]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.708511]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.708533]  kasan_report+0x141/0x180
[   15.708556]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.708583]  __asan_report_store8_noabort+0x1b/0x30
[   15.708608]  kasan_atomics_helper+0x50d4/0x5450
[   15.708632]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.708654]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.708680]  ? kasan_atomics+0x152/0x310
[   15.708707]  kasan_atomics+0x1dc/0x310
[   15.708730]  ? __pfx_kasan_atomics+0x10/0x10
[   15.708755]  ? __pfx_read_tsc+0x10/0x10
[   15.708776]  ? ktime_get_ts64+0x86/0x230
[   15.708800]  kunit_try_run_case+0x1a5/0x480
[   15.708837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.708863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.708888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.708912]  ? __kthread_parkme+0x82/0x180
[   15.708933]  ? preempt_count_sub+0x50/0x80
[   15.708956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.708981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.709005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.709029]  kthread+0x337/0x6f0
[   15.709049]  ? trace_preempt_on+0x20/0xc0
[   15.709072]  ? __pfx_kthread+0x10/0x10
[   15.709114]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.709136]  ? calculate_sigpending+0x7b/0xa0
[   15.709160]  ? __pfx_kthread+0x10/0x10
[   15.709195]  ret_from_fork+0x116/0x1d0
[   15.709215]  ? __pfx_kthread+0x10/0x10
[   15.709247]  ret_from_fork_asm+0x1a/0x30
[   15.709277]  </TASK>
[   15.709288] 
[   15.717202] Allocated by task 282:
[   15.717386]  kasan_save_stack+0x45/0x70
[   15.717567]  kasan_save_track+0x18/0x40
[   15.717726]  kasan_save_alloc_info+0x3b/0x50
[   15.717976]  __kasan_kmalloc+0xb7/0xc0
[   15.718187]  __kmalloc_cache_noprof+0x189/0x420
[   15.718384]  kasan_atomics+0x95/0x310
[   15.718566]  kunit_try_run_case+0x1a5/0x480
[   15.718777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.719004]  kthread+0x337/0x6f0
[   15.719260]  ret_from_fork+0x116/0x1d0
[   15.719405]  ret_from_fork_asm+0x1a/0x30
[   15.719548] 
[   15.719621] The buggy address belongs to the object at ffff8881025e4100
[   15.719621]  which belongs to the cache kmalloc-64 of size 64
[   15.719992] The buggy address is located 0 bytes to the right of
[   15.719992]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.720905] 
[   15.721030] The buggy address belongs to the physical page:
[   15.721318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.721696] flags: 0x200000000000000(node=0|zone=2)
[   15.721874] page_type: f5(slab)
[   15.721996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.722612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.722998] page dumped because: kasan: bad access detected
[   15.723297] 
[   15.723389] Memory state around the buggy address:
[   15.723632]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.723925]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.724256] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.724550]                                      ^
[   15.724781]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.725115]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.725417] ==================================================================
[   15.840691] ==================================================================
[   15.842031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.842572] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.842805] 
[   15.842906] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.842952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.842966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.842988] Call Trace:
[   15.843005]  <TASK>
[   15.843022]  dump_stack_lvl+0x73/0xb0
[   15.843051]  print_report+0xd1/0x610
[   15.843075]  ? __virt_addr_valid+0x1db/0x2d0
[   15.843098]  ? kasan_atomics_helper+0x1818/0x5450
[   15.843120]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.843143]  ? kasan_atomics_helper+0x1818/0x5450
[   15.843166]  kasan_report+0x141/0x180
[   15.843188]  ? kasan_atomics_helper+0x1818/0x5450
[   15.843216]  kasan_check_range+0x10c/0x1c0
[   15.843289]  __kasan_check_write+0x18/0x20
[   15.843311]  kasan_atomics_helper+0x1818/0x5450
[   15.843334]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.843408]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.843435]  ? kasan_atomics+0x152/0x310
[   15.843473]  kasan_atomics+0x1dc/0x310
[   15.843497]  ? __pfx_kasan_atomics+0x10/0x10
[   15.843522]  ? __pfx_read_tsc+0x10/0x10
[   15.843545]  ? ktime_get_ts64+0x86/0x230
[   15.843570]  kunit_try_run_case+0x1a5/0x480
[   15.843596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.843620]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.843645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.843715]  ? __kthread_parkme+0x82/0x180
[   15.843736]  ? preempt_count_sub+0x50/0x80
[   15.843770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.843794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.843827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.843851]  kthread+0x337/0x6f0
[   15.843872]  ? trace_preempt_on+0x20/0xc0
[   15.843895]  ? __pfx_kthread+0x10/0x10
[   15.843917]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.843939]  ? calculate_sigpending+0x7b/0xa0
[   15.843963]  ? __pfx_kthread+0x10/0x10
[   15.843986]  ret_from_fork+0x116/0x1d0
[   15.844005]  ? __pfx_kthread+0x10/0x10
[   15.844026]  ret_from_fork_asm+0x1a/0x30
[   15.844056]  </TASK>
[   15.844068] 
[   15.857784] Allocated by task 282:
[   15.857970]  kasan_save_stack+0x45/0x70
[   15.858561]  kasan_save_track+0x18/0x40
[   15.858760]  kasan_save_alloc_info+0x3b/0x50
[   15.858975]  __kasan_kmalloc+0xb7/0xc0
[   15.859486]  __kmalloc_cache_noprof+0x189/0x420
[   15.859727]  kasan_atomics+0x95/0x310
[   15.859912]  kunit_try_run_case+0x1a5/0x480
[   15.860337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.860773]  kthread+0x337/0x6f0
[   15.861039]  ret_from_fork+0x116/0x1d0
[   15.861364]  ret_from_fork_asm+0x1a/0x30
[   15.861547] 
[   15.861641] The buggy address belongs to the object at ffff8881025e4100
[   15.861641]  which belongs to the cache kmalloc-64 of size 64
[   15.862054] The buggy address is located 0 bytes to the right of
[   15.862054]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.862711] 
[   15.862788] The buggy address belongs to the physical page:
[   15.863049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.863437] flags: 0x200000000000000(node=0|zone=2)
[   15.863647] page_type: f5(slab)
[   15.863808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.864173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.864527] page dumped because: kasan: bad access detected
[   15.864772] 
[   15.864884] Memory state around the buggy address:
[   15.865104]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.865428]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.865646] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.866166]                                      ^
[   15.866396]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.866685]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.866922] ==================================================================
[   15.315425] ==================================================================
[   15.315707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.315954] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.316182] 
[   15.316270] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.316313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.316326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.316349] Call Trace:
[   15.316368]  <TASK>
[   15.316383]  dump_stack_lvl+0x73/0xb0
[   15.316412]  print_report+0xd1/0x610
[   15.316557]  ? __virt_addr_valid+0x1db/0x2d0
[   15.316584]  ? kasan_atomics_helper+0xc70/0x5450
[   15.316607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.316631]  ? kasan_atomics_helper+0xc70/0x5450
[   15.316655]  kasan_report+0x141/0x180
[   15.316678]  ? kasan_atomics_helper+0xc70/0x5450
[   15.316705]  kasan_check_range+0x10c/0x1c0
[   15.316730]  __kasan_check_write+0x18/0x20
[   15.316750]  kasan_atomics_helper+0xc70/0x5450
[   15.316773]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.316796]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.316835]  ? kasan_atomics+0x152/0x310
[   15.316867]  kasan_atomics+0x1dc/0x310
[   15.316891]  ? __pfx_kasan_atomics+0x10/0x10
[   15.316916]  ? __pfx_read_tsc+0x10/0x10
[   15.316938]  ? ktime_get_ts64+0x86/0x230
[   15.316963]  kunit_try_run_case+0x1a5/0x480
[   15.316988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.317012]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.317037]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.317061]  ? __kthread_parkme+0x82/0x180
[   15.317082]  ? preempt_count_sub+0x50/0x80
[   15.317115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.317140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.317166]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.317191]  kthread+0x337/0x6f0
[   15.317211]  ? trace_preempt_on+0x20/0xc0
[   15.317235]  ? __pfx_kthread+0x10/0x10
[   15.317256]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.317278]  ? calculate_sigpending+0x7b/0xa0
[   15.317304]  ? __pfx_kthread+0x10/0x10
[   15.317326]  ret_from_fork+0x116/0x1d0
[   15.317346]  ? __pfx_kthread+0x10/0x10
[   15.317367]  ret_from_fork_asm+0x1a/0x30
[   15.317398]  </TASK>
[   15.317409] 
[   15.325145] Allocated by task 282:
[   15.325514]  kasan_save_stack+0x45/0x70
[   15.325668]  kasan_save_track+0x18/0x40
[   15.325807]  kasan_save_alloc_info+0x3b/0x50
[   15.326033]  __kasan_kmalloc+0xb7/0xc0
[   15.326383]  __kmalloc_cache_noprof+0x189/0x420
[   15.326575]  kasan_atomics+0x95/0x310
[   15.326730]  kunit_try_run_case+0x1a5/0x480
[   15.326892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.327072]  kthread+0x337/0x6f0
[   15.327196]  ret_from_fork+0x116/0x1d0
[   15.327333]  ret_from_fork_asm+0x1a/0x30
[   15.327475] 
[   15.327547] The buggy address belongs to the object at ffff8881025e4100
[   15.327547]  which belongs to the cache kmalloc-64 of size 64
[   15.327960] The buggy address is located 0 bytes to the right of
[   15.327960]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.328518] 
[   15.328630] The buggy address belongs to the physical page:
[   15.328901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.329489] flags: 0x200000000000000(node=0|zone=2)
[   15.329730] page_type: f5(slab)
[   15.329912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.330339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.330654] page dumped because: kasan: bad access detected
[   15.330880] 
[   15.330982] Memory state around the buggy address:
[   15.331219]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.331532]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.331753] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.332060]                                      ^
[   15.332514]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.332733]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.332964] ==================================================================
[   16.242669] ==================================================================
[   16.243007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.243418] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.243753] 
[   16.243888] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.243935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.243947] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.243969] Call Trace:
[   16.243987]  <TASK>
[   16.244003]  dump_stack_lvl+0x73/0xb0
[   16.244061]  print_report+0xd1/0x610
[   16.244105]  ? __virt_addr_valid+0x1db/0x2d0
[   16.244127]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.244149]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.244201]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.244223]  kasan_report+0x141/0x180
[   16.244246]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.244274]  __asan_report_load8_noabort+0x18/0x20
[   16.244300]  kasan_atomics_helper+0x4fa5/0x5450
[   16.244350]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.244373]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.244397]  ? kasan_atomics+0x152/0x310
[   16.244425]  kasan_atomics+0x1dc/0x310
[   16.244448]  ? __pfx_kasan_atomics+0x10/0x10
[   16.244473]  ? __pfx_read_tsc+0x10/0x10
[   16.244523]  ? ktime_get_ts64+0x86/0x230
[   16.244547]  kunit_try_run_case+0x1a5/0x480
[   16.244572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.244595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.244619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.244670]  ? __kthread_parkme+0x82/0x180
[   16.244692]  ? preempt_count_sub+0x50/0x80
[   16.244715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.244740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.244764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.244788]  kthread+0x337/0x6f0
[   16.244809]  ? trace_preempt_on+0x20/0xc0
[   16.244841]  ? __pfx_kthread+0x10/0x10
[   16.244866]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.244889]  ? calculate_sigpending+0x7b/0xa0
[   16.244913]  ? __pfx_kthread+0x10/0x10
[   16.244936]  ret_from_fork+0x116/0x1d0
[   16.244955]  ? __pfx_kthread+0x10/0x10
[   16.244977]  ret_from_fork_asm+0x1a/0x30
[   16.245008]  </TASK>
[   16.245019] 
[   16.252798] Allocated by task 282:
[   16.253272]  kasan_save_stack+0x45/0x70
[   16.253425]  kasan_save_track+0x18/0x40
[   16.253600]  kasan_save_alloc_info+0x3b/0x50
[   16.254739]  __kasan_kmalloc+0xb7/0xc0
[   16.254955]  __kmalloc_cache_noprof+0x189/0x420
[   16.255268]  kasan_atomics+0x95/0x310
[   16.255549]  kunit_try_run_case+0x1a5/0x480
[   16.256040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.256646]  kthread+0x337/0x6f0
[   16.257105]  ret_from_fork+0x116/0x1d0
[   16.257562]  ret_from_fork_asm+0x1a/0x30
[   16.258031] 
[   16.258342] The buggy address belongs to the object at ffff8881025e4100
[   16.258342]  which belongs to the cache kmalloc-64 of size 64
[   16.259585] The buggy address is located 0 bytes to the right of
[   16.259585]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.260384] 
[   16.260669] The buggy address belongs to the physical page:
[   16.261281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.261526] flags: 0x200000000000000(node=0|zone=2)
[   16.261689] page_type: f5(slab)
[   16.261824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.262053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.263120] page dumped because: kasan: bad access detected
[   16.263711] 
[   16.263998] Memory state around the buggy address:
[   16.264553]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.265321]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.266048] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.266596]                                      ^
[   16.266758]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.267068]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.267575] ==================================================================
[   15.891483] ==================================================================
[   15.891811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.892305] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.892679] 
[   15.892778] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.892835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.892853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.892875] Call Trace:
[   15.892891]  <TASK>
[   15.892907]  dump_stack_lvl+0x73/0xb0
[   15.892937]  print_report+0xd1/0x610
[   15.892960]  ? __virt_addr_valid+0x1db/0x2d0
[   15.892982]  ? kasan_atomics_helper+0x194a/0x5450
[   15.893004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.893027]  ? kasan_atomics_helper+0x194a/0x5450
[   15.893049]  kasan_report+0x141/0x180
[   15.893073]  ? kasan_atomics_helper+0x194a/0x5450
[   15.893349]  kasan_check_range+0x10c/0x1c0
[   15.893380]  __kasan_check_write+0x18/0x20
[   15.893401]  kasan_atomics_helper+0x194a/0x5450
[   15.893424]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.893448]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.893474]  ? kasan_atomics+0x152/0x310
[   15.893502]  kasan_atomics+0x1dc/0x310
[   15.893526]  ? __pfx_kasan_atomics+0x10/0x10
[   15.893551]  ? __pfx_read_tsc+0x10/0x10
[   15.893572]  ? ktime_get_ts64+0x86/0x230
[   15.893597]  kunit_try_run_case+0x1a5/0x480
[   15.893622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.893646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.893670]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.893695]  ? __kthread_parkme+0x82/0x180
[   15.893717]  ? preempt_count_sub+0x50/0x80
[   15.893744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.893769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.893794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.893828]  kthread+0x337/0x6f0
[   15.893850]  ? trace_preempt_on+0x20/0xc0
[   15.893873]  ? __pfx_kthread+0x10/0x10
[   15.893894]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.893918]  ? calculate_sigpending+0x7b/0xa0
[   15.893942]  ? __pfx_kthread+0x10/0x10
[   15.893965]  ret_from_fork+0x116/0x1d0
[   15.893985]  ? __pfx_kthread+0x10/0x10
[   15.894008]  ret_from_fork_asm+0x1a/0x30
[   15.894039]  </TASK>
[   15.894050] 
[   15.904921] Allocated by task 282:
[   15.905112]  kasan_save_stack+0x45/0x70
[   15.905731]  kasan_save_track+0x18/0x40
[   15.906034]  kasan_save_alloc_info+0x3b/0x50
[   15.906231]  __kasan_kmalloc+0xb7/0xc0
[   15.906423]  __kmalloc_cache_noprof+0x189/0x420
[   15.906633]  kasan_atomics+0x95/0x310
[   15.906811]  kunit_try_run_case+0x1a5/0x480
[   15.907018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.907592]  kthread+0x337/0x6f0
[   15.907742]  ret_from_fork+0x116/0x1d0
[   15.908160]  ret_from_fork_asm+0x1a/0x30
[   15.908482] 
[   15.908587] The buggy address belongs to the object at ffff8881025e4100
[   15.908587]  which belongs to the cache kmalloc-64 of size 64
[   15.909178] The buggy address is located 0 bytes to the right of
[   15.909178]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.909566] 
[   15.909648] The buggy address belongs to the physical page:
[   15.909837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.910352] flags: 0x200000000000000(node=0|zone=2)
[   15.910527] page_type: f5(slab)
[   15.910652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.911058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.911750] page dumped because: kasan: bad access detected
[   15.912276] 
[   15.912436] Memory state around the buggy address:
[   15.912889]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.913488]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.913710] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.913936]                                      ^
[   15.914134]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.914780]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.915429] ==================================================================
[   15.437935] ==================================================================
[   15.438548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.438846] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.439122] 
[   15.439231] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.439273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.439286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.439307] Call Trace:
[   15.439320]  <TASK>
[   15.439334]  dump_stack_lvl+0x73/0xb0
[   15.439360]  print_report+0xd1/0x610
[   15.439384]  ? __virt_addr_valid+0x1db/0x2d0
[   15.439411]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.439434]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.439459]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.439483]  kasan_report+0x141/0x180
[   15.439506]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.439534]  kasan_check_range+0x10c/0x1c0
[   15.439559]  __kasan_check_write+0x18/0x20
[   15.439579]  kasan_atomics_helper+0xfa9/0x5450
[   15.439602]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.439624]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.439650]  ? kasan_atomics+0x152/0x310
[   15.439679]  kasan_atomics+0x1dc/0x310
[   15.439703]  ? __pfx_kasan_atomics+0x10/0x10
[   15.439729]  ? __pfx_read_tsc+0x10/0x10
[   15.439749]  ? ktime_get_ts64+0x86/0x230
[   15.439773]  kunit_try_run_case+0x1a5/0x480
[   15.439798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.439831]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.439856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.439880]  ? __kthread_parkme+0x82/0x180
[   15.439900]  ? preempt_count_sub+0x50/0x80
[   15.439924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.439948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.439973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.439996]  kthread+0x337/0x6f0
[   15.440017]  ? trace_preempt_on+0x20/0xc0
[   15.440041]  ? __pfx_kthread+0x10/0x10
[   15.440062]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.440084]  ? calculate_sigpending+0x7b/0xa0
[   15.440120]  ? __pfx_kthread+0x10/0x10
[   15.440143]  ret_from_fork+0x116/0x1d0
[   15.440162]  ? __pfx_kthread+0x10/0x10
[   15.440183]  ret_from_fork_asm+0x1a/0x30
[   15.440213]  </TASK>
[   15.440225] 
[   15.447965] Allocated by task 282:
[   15.448195]  kasan_save_stack+0x45/0x70
[   15.448380]  kasan_save_track+0x18/0x40
[   15.448594]  kasan_save_alloc_info+0x3b/0x50
[   15.448787]  __kasan_kmalloc+0xb7/0xc0
[   15.448969]  __kmalloc_cache_noprof+0x189/0x420
[   15.449219]  kasan_atomics+0x95/0x310
[   15.449408]  kunit_try_run_case+0x1a5/0x480
[   15.449797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.450036]  kthread+0x337/0x6f0
[   15.450206]  ret_from_fork+0x116/0x1d0
[   15.450375]  ret_from_fork_asm+0x1a/0x30
[   15.450578] 
[   15.450691] The buggy address belongs to the object at ffff8881025e4100
[   15.450691]  which belongs to the cache kmalloc-64 of size 64
[   15.451196] The buggy address is located 0 bytes to the right of
[   15.451196]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.451628] 
[   15.451703] The buggy address belongs to the physical page:
[   15.451888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.452238] flags: 0x200000000000000(node=0|zone=2)
[   15.452474] page_type: f5(slab)
[   15.452641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.452999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.453502] page dumped because: kasan: bad access detected
[   15.453759] 
[   15.453860] Memory state around the buggy address:
[   15.454031]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.454251]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.454471] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.454788]                                      ^
[   15.455029]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.455450]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.455924] ==================================================================
[   15.567473] ==================================================================
[   15.567836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.568171] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.568505] 
[   15.568608] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.568652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.568665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.568687] Call Trace:
[   15.568705]  <TASK>
[   15.568722]  dump_stack_lvl+0x73/0xb0
[   15.568750]  print_report+0xd1/0x610
[   15.568772]  ? __virt_addr_valid+0x1db/0x2d0
[   15.568795]  ? kasan_atomics_helper+0x1217/0x5450
[   15.568828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.568856]  ? kasan_atomics_helper+0x1217/0x5450
[   15.568878]  kasan_report+0x141/0x180
[   15.568901]  ? kasan_atomics_helper+0x1217/0x5450
[   15.568928]  kasan_check_range+0x10c/0x1c0
[   15.568952]  __kasan_check_write+0x18/0x20
[   15.568972]  kasan_atomics_helper+0x1217/0x5450
[   15.568997]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.569019]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.569046]  ? kasan_atomics+0x152/0x310
[   15.569073]  kasan_atomics+0x1dc/0x310
[   15.569108]  ? __pfx_kasan_atomics+0x10/0x10
[   15.569133]  ? __pfx_read_tsc+0x10/0x10
[   15.569155]  ? ktime_get_ts64+0x86/0x230
[   15.569179]  kunit_try_run_case+0x1a5/0x480
[   15.569215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.569239]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.569274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.569307]  ? __kthread_parkme+0x82/0x180
[   15.569328]  ? preempt_count_sub+0x50/0x80
[   15.569352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.569388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.569413]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.569438]  kthread+0x337/0x6f0
[   15.569459]  ? trace_preempt_on+0x20/0xc0
[   15.569482]  ? __pfx_kthread+0x10/0x10
[   15.569503]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.569526]  ? calculate_sigpending+0x7b/0xa0
[   15.569550]  ? __pfx_kthread+0x10/0x10
[   15.569573]  ret_from_fork+0x116/0x1d0
[   15.569601]  ? __pfx_kthread+0x10/0x10
[   15.569623]  ret_from_fork_asm+0x1a/0x30
[   15.569654]  </TASK>
[   15.569676] 
[   15.577616] Allocated by task 282:
[   15.577800]  kasan_save_stack+0x45/0x70
[   15.578010]  kasan_save_track+0x18/0x40
[   15.578229]  kasan_save_alloc_info+0x3b/0x50
[   15.578410]  __kasan_kmalloc+0xb7/0xc0
[   15.578625]  __kmalloc_cache_noprof+0x189/0x420
[   15.578822]  kasan_atomics+0x95/0x310
[   15.579020]  kunit_try_run_case+0x1a5/0x480
[   15.579174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.579350]  kthread+0x337/0x6f0
[   15.579473]  ret_from_fork+0x116/0x1d0
[   15.579608]  ret_from_fork_asm+0x1a/0x30
[   15.579750] 
[   15.579834] The buggy address belongs to the object at ffff8881025e4100
[   15.579834]  which belongs to the cache kmalloc-64 of size 64
[   15.580189] The buggy address is located 0 bytes to the right of
[   15.580189]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.580912] 
[   15.581034] The buggy address belongs to the physical page:
[   15.581564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.581926] flags: 0x200000000000000(node=0|zone=2)
[   15.582160] page_type: f5(slab)
[   15.582326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.582743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.582990] page dumped because: kasan: bad access detected
[   15.583387] 
[   15.583484] Memory state around the buggy address:
[   15.583712]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.584026]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.584453] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.584748]                                      ^
[   15.584923]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.585142]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.585694] ==================================================================
[   16.078568] ==================================================================
[   16.078865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.079099] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.079577] 
[   16.079699] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.079742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.079755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.079776] Call Trace:
[   16.079792]  <TASK>
[   16.079808]  dump_stack_lvl+0x73/0xb0
[   16.079847]  print_report+0xd1/0x610
[   16.079869]  ? __virt_addr_valid+0x1db/0x2d0
[   16.079892]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.079914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.079937]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.079960]  kasan_report+0x141/0x180
[   16.079983]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.080009]  kasan_check_range+0x10c/0x1c0
[   16.080034]  __kasan_check_write+0x18/0x20
[   16.080054]  kasan_atomics_helper+0x1eaa/0x5450
[   16.080078]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.080111]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.080136]  ? kasan_atomics+0x152/0x310
[   16.080164]  kasan_atomics+0x1dc/0x310
[   16.080187]  ? __pfx_kasan_atomics+0x10/0x10
[   16.080212]  ? __pfx_read_tsc+0x10/0x10
[   16.080234]  ? ktime_get_ts64+0x86/0x230
[   16.080259]  kunit_try_run_case+0x1a5/0x480
[   16.080284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.080308]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.080333]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.080358]  ? __kthread_parkme+0x82/0x180
[   16.080378]  ? preempt_count_sub+0x50/0x80
[   16.080403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.080427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.080452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.080477]  kthread+0x337/0x6f0
[   16.080498]  ? trace_preempt_on+0x20/0xc0
[   16.080522]  ? __pfx_kthread+0x10/0x10
[   16.080545]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.080567]  ? calculate_sigpending+0x7b/0xa0
[   16.080592]  ? __pfx_kthread+0x10/0x10
[   16.080614]  ret_from_fork+0x116/0x1d0
[   16.080634]  ? __pfx_kthread+0x10/0x10
[   16.080656]  ret_from_fork_asm+0x1a/0x30
[   16.080687]  </TASK>
[   16.080698] 
[   16.088301] Allocated by task 282:
[   16.088480]  kasan_save_stack+0x45/0x70
[   16.088667]  kasan_save_track+0x18/0x40
[   16.088858]  kasan_save_alloc_info+0x3b/0x50
[   16.089070]  __kasan_kmalloc+0xb7/0xc0
[   16.089223]  __kmalloc_cache_noprof+0x189/0x420
[   16.089427]  kasan_atomics+0x95/0x310
[   16.089599]  kunit_try_run_case+0x1a5/0x480
[   16.089780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.090001]  kthread+0x337/0x6f0
[   16.090203]  ret_from_fork+0x116/0x1d0
[   16.090339]  ret_from_fork_asm+0x1a/0x30
[   16.090479] 
[   16.090551] The buggy address belongs to the object at ffff8881025e4100
[   16.090551]  which belongs to the cache kmalloc-64 of size 64
[   16.090992] The buggy address is located 0 bytes to the right of
[   16.090992]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.091790] 
[   16.091873] The buggy address belongs to the physical page:
[   16.092047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.092667] flags: 0x200000000000000(node=0|zone=2)
[   16.092868] page_type: f5(slab)
[   16.092994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.093392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.093739] page dumped because: kasan: bad access detected
[   16.094015] 
[   16.094112] Memory state around the buggy address:
[   16.094322]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.094650]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.094960] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.095178]                                      ^
[   16.095490]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.095789]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.096095] ==================================================================
[   15.333542] ==================================================================
[   15.333904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.334468] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.334759] 
[   15.334875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.334917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.334931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.334952] Call Trace:
[   15.334967]  <TASK>
[   15.334981]  dump_stack_lvl+0x73/0xb0
[   15.335009]  print_report+0xd1/0x610
[   15.335031]  ? __virt_addr_valid+0x1db/0x2d0
[   15.335054]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.335076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.335099]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.335122]  kasan_report+0x141/0x180
[   15.335144]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.335171]  __asan_report_load4_noabort+0x18/0x20
[   15.335196]  kasan_atomics_helper+0x4a84/0x5450
[   15.335219]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.335242]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.335267]  ? kasan_atomics+0x152/0x310
[   15.335294]  kasan_atomics+0x1dc/0x310
[   15.335317]  ? __pfx_kasan_atomics+0x10/0x10
[   15.335342]  ? __pfx_read_tsc+0x10/0x10
[   15.335364]  ? ktime_get_ts64+0x86/0x230
[   15.335388]  kunit_try_run_case+0x1a5/0x480
[   15.335412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.335436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.335460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.335484]  ? __kthread_parkme+0x82/0x180
[   15.335505]  ? preempt_count_sub+0x50/0x80
[   15.335529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.335554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.335589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.335614]  kthread+0x337/0x6f0
[   15.335635]  ? trace_preempt_on+0x20/0xc0
[   15.335659]  ? __pfx_kthread+0x10/0x10
[   15.335680]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.335703]  ? calculate_sigpending+0x7b/0xa0
[   15.335727]  ? __pfx_kthread+0x10/0x10
[   15.335749]  ret_from_fork+0x116/0x1d0
[   15.335769]  ? __pfx_kthread+0x10/0x10
[   15.335790]  ret_from_fork_asm+0x1a/0x30
[   15.335831]  </TASK>
[   15.335845] 
[   15.344545] Allocated by task 282:
[   15.344859]  kasan_save_stack+0x45/0x70
[   15.345286]  kasan_save_track+0x18/0x40
[   15.345547]  kasan_save_alloc_info+0x3b/0x50
[   15.345706]  __kasan_kmalloc+0xb7/0xc0
[   15.345863]  __kmalloc_cache_noprof+0x189/0x420
[   15.346733]  kasan_atomics+0x95/0x310
[   15.346944]  kunit_try_run_case+0x1a5/0x480
[   15.347349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.347941]  kthread+0x337/0x6f0
[   15.348077]  ret_from_fork+0x116/0x1d0
[   15.348285]  ret_from_fork_asm+0x1a/0x30
[   15.348467] 
[   15.348564] The buggy address belongs to the object at ffff8881025e4100
[   15.348564]  which belongs to the cache kmalloc-64 of size 64
[   15.349075] The buggy address is located 0 bytes to the right of
[   15.349075]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.349918] 
[   15.350089] The buggy address belongs to the physical page:
[   15.350398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.350779] flags: 0x200000000000000(node=0|zone=2)
[   15.351090] page_type: f5(slab)
[   15.351263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.351672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.352085] page dumped because: kasan: bad access detected
[   15.352303] 
[   15.352400] Memory state around the buggy address:
[   15.352603]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.352929]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.353503] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.353874]                                      ^
[   15.354104]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.354527]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.354891] ==================================================================
[   15.013368] ==================================================================
[   15.013657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.013979] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.014313] 
[   15.014415] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.014458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.014470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.014491] Call Trace:
[   15.014504]  <TASK>
[   15.014517]  dump_stack_lvl+0x73/0xb0
[   15.014545]  print_report+0xd1/0x610
[   15.014566]  ? __virt_addr_valid+0x1db/0x2d0
[   15.014586]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.014607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.014629]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.014649]  kasan_report+0x141/0x180
[   15.014671]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.014696]  __asan_report_store4_noabort+0x1b/0x30
[   15.014720]  kasan_atomics_helper+0x4b6e/0x5450
[   15.014742]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.014762]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.014786]  ? kasan_atomics+0x152/0x310
[   15.014824]  kasan_atomics+0x1dc/0x310
[   15.014845]  ? __pfx_kasan_atomics+0x10/0x10
[   15.014869]  ? __pfx_read_tsc+0x10/0x10
[   15.014888]  ? ktime_get_ts64+0x86/0x230
[   15.014911]  kunit_try_run_case+0x1a5/0x480
[   15.014935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.014956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.014979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.015003]  ? __kthread_parkme+0x82/0x180
[   15.015126]  ? preempt_count_sub+0x50/0x80
[   15.015152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.015194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.015219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.015243]  kthread+0x337/0x6f0
[   15.015263]  ? trace_preempt_on+0x20/0xc0
[   15.015433]  ? __pfx_kthread+0x10/0x10
[   15.015459]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.015482]  ? calculate_sigpending+0x7b/0xa0
[   15.015506]  ? __pfx_kthread+0x10/0x10
[   15.015529]  ret_from_fork+0x116/0x1d0
[   15.015548]  ? __pfx_kthread+0x10/0x10
[   15.015569]  ret_from_fork_asm+0x1a/0x30
[   15.015600]  </TASK>
[   15.015612] 
[   15.023293] Allocated by task 282:
[   15.023479]  kasan_save_stack+0x45/0x70
[   15.023626]  kasan_save_track+0x18/0x40
[   15.023765]  kasan_save_alloc_info+0x3b/0x50
[   15.023929]  __kasan_kmalloc+0xb7/0xc0
[   15.024093]  __kmalloc_cache_noprof+0x189/0x420
[   15.024323]  kasan_atomics+0x95/0x310
[   15.024511]  kunit_try_run_case+0x1a5/0x480
[   15.024717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.024986]  kthread+0x337/0x6f0
[   15.025153]  ret_from_fork+0x116/0x1d0
[   15.025339]  ret_from_fork_asm+0x1a/0x30
[   15.025481] 
[   15.025554] The buggy address belongs to the object at ffff8881025e4100
[   15.025554]  which belongs to the cache kmalloc-64 of size 64
[   15.026106] The buggy address is located 0 bytes to the right of
[   15.026106]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.026530] 
[   15.026603] The buggy address belongs to the physical page:
[   15.026776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.027027] flags: 0x200000000000000(node=0|zone=2)
[   15.027321] page_type: f5(slab)
[   15.027487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.027836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.028269] page dumped because: kasan: bad access detected
[   15.028524] 
[   15.028617] Memory state around the buggy address:
[   15.028838]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.029060]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.029395] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.029710]                                      ^
[   15.029926]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.030224]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.030454] ==================================================================
[   15.787347] ==================================================================
[   15.787677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.788087] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.788768] 
[   15.788903] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.788961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.788975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.788997] Call Trace:
[   15.789013]  <TASK>
[   15.789028]  dump_stack_lvl+0x73/0xb0
[   15.789066]  print_report+0xd1/0x610
[   15.789089]  ? __virt_addr_valid+0x1db/0x2d0
[   15.789123]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.789157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.789189]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.789212]  kasan_report+0x141/0x180
[   15.789235]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.789272]  kasan_check_range+0x10c/0x1c0
[   15.789296]  __kasan_check_write+0x18/0x20
[   15.789316]  kasan_atomics_helper+0x16e7/0x5450
[   15.789339]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.789361]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.789387]  ? kasan_atomics+0x152/0x310
[   15.789414]  kasan_atomics+0x1dc/0x310
[   15.789437]  ? __pfx_kasan_atomics+0x10/0x10
[   15.790009]  ? __pfx_read_tsc+0x10/0x10
[   15.790042]  ? ktime_get_ts64+0x86/0x230
[   15.790081]  kunit_try_run_case+0x1a5/0x480
[   15.790122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.790577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.790615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.790654]  ? __kthread_parkme+0x82/0x180
[   15.790675]  ? preempt_count_sub+0x50/0x80
[   15.790699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.790997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.791023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.791047]  kthread+0x337/0x6f0
[   15.791069]  ? trace_preempt_on+0x20/0xc0
[   15.791092]  ? __pfx_kthread+0x10/0x10
[   15.791114]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.791136]  ? calculate_sigpending+0x7b/0xa0
[   15.791160]  ? __pfx_kthread+0x10/0x10
[   15.791182]  ret_from_fork+0x116/0x1d0
[   15.791201]  ? __pfx_kthread+0x10/0x10
[   15.791222]  ret_from_fork_asm+0x1a/0x30
[   15.791253]  </TASK>
[   15.791264] 
[   15.802069] Allocated by task 282:
[   15.802240]  kasan_save_stack+0x45/0x70
[   15.802446]  kasan_save_track+0x18/0x40
[   15.802630]  kasan_save_alloc_info+0x3b/0x50
[   15.802838]  __kasan_kmalloc+0xb7/0xc0
[   15.803022]  __kmalloc_cache_noprof+0x189/0x420
[   15.803507]  kasan_atomics+0x95/0x310
[   15.803777]  kunit_try_run_case+0x1a5/0x480
[   15.803969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.804346]  kthread+0x337/0x6f0
[   15.804511]  ret_from_fork+0x116/0x1d0
[   15.804844]  ret_from_fork_asm+0x1a/0x30
[   15.805129] 
[   15.805294] The buggy address belongs to the object at ffff8881025e4100
[   15.805294]  which belongs to the cache kmalloc-64 of size 64
[   15.805800] The buggy address is located 0 bytes to the right of
[   15.805800]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.806531] 
[   15.806803] The buggy address belongs to the physical page:
[   15.807053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.807529] flags: 0x200000000000000(node=0|zone=2)
[   15.807864] page_type: f5(slab)
[   15.808033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.808552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.808887] page dumped because: kasan: bad access detected
[   15.809294] 
[   15.809387] Memory state around the buggy address:
[   15.809578]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.810013]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.810405] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.810843]                                      ^
[   15.811047]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.811650]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.812024] ==================================================================
[   15.669255] ==================================================================
[   15.669998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.670836] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.671424] 
[   15.671540] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.671586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.671599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.671622] Call Trace:
[   15.671636]  <TASK>
[   15.671652]  dump_stack_lvl+0x73/0xb0
[   15.671682]  print_report+0xd1/0x610
[   15.671706]  ? __virt_addr_valid+0x1db/0x2d0
[   15.671730]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.671752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.671775]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.671799]  kasan_report+0x141/0x180
[   15.671836]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.671863]  __asan_report_load8_noabort+0x18/0x20
[   15.671888]  kasan_atomics_helper+0x4eae/0x5450
[   15.671912]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.671936]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.671961]  ? kasan_atomics+0x152/0x310
[   15.671988]  kasan_atomics+0x1dc/0x310
[   15.672011]  ? __pfx_kasan_atomics+0x10/0x10
[   15.672049]  ? __pfx_read_tsc+0x10/0x10
[   15.672071]  ? ktime_get_ts64+0x86/0x230
[   15.672095]  kunit_try_run_case+0x1a5/0x480
[   15.672132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.672156]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.672181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.672216]  ? __kthread_parkme+0x82/0x180
[   15.672236]  ? preempt_count_sub+0x50/0x80
[   15.672260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.672285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.672309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.672333]  kthread+0x337/0x6f0
[   15.672354]  ? trace_preempt_on+0x20/0xc0
[   15.672377]  ? __pfx_kthread+0x10/0x10
[   15.672398]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.672421]  ? calculate_sigpending+0x7b/0xa0
[   15.672445]  ? __pfx_kthread+0x10/0x10
[   15.672467]  ret_from_fork+0x116/0x1d0
[   15.672486]  ? __pfx_kthread+0x10/0x10
[   15.672507]  ret_from_fork_asm+0x1a/0x30
[   15.672537]  </TASK>
[   15.672549] 
[   15.680087] Allocated by task 282:
[   15.680419]  kasan_save_stack+0x45/0x70
[   15.680618]  kasan_save_track+0x18/0x40
[   15.680872]  kasan_save_alloc_info+0x3b/0x50
[   15.681023]  __kasan_kmalloc+0xb7/0xc0
[   15.681158]  __kmalloc_cache_noprof+0x189/0x420
[   15.681359]  kasan_atomics+0x95/0x310
[   15.681551]  kunit_try_run_case+0x1a5/0x480
[   15.681784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.682074]  kthread+0x337/0x6f0
[   15.682257]  ret_from_fork+0x116/0x1d0
[   15.682447]  ret_from_fork_asm+0x1a/0x30
[   15.682647] 
[   15.682769] The buggy address belongs to the object at ffff8881025e4100
[   15.682769]  which belongs to the cache kmalloc-64 of size 64
[   15.683364] The buggy address is located 0 bytes to the right of
[   15.683364]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.683920] 
[   15.684021] The buggy address belongs to the physical page:
[   15.684370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.684710] flags: 0x200000000000000(node=0|zone=2)
[   15.684949] page_type: f5(slab)
[   15.685138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.685474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.685778] page dumped because: kasan: bad access detected
[   15.686076] 
[   15.686158] Memory state around the buggy address:
[   15.686382]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.686678]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.687004] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.687331]                                      ^
[   15.687492]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.687712]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.688066] ==================================================================
[   16.268630] ==================================================================
[   16.268971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.269529] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.270337] 
[   16.270480] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.270527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.270540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.270562] Call Trace:
[   16.270578]  <TASK>
[   16.270593]  dump_stack_lvl+0x73/0xb0
[   16.270623]  print_report+0xd1/0x610
[   16.270645]  ? __virt_addr_valid+0x1db/0x2d0
[   16.270668]  ? kasan_atomics_helper+0x224c/0x5450
[   16.270690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.270712]  ? kasan_atomics_helper+0x224c/0x5450
[   16.270734]  kasan_report+0x141/0x180
[   16.270757]  ? kasan_atomics_helper+0x224c/0x5450
[   16.270784]  kasan_check_range+0x10c/0x1c0
[   16.270809]  __kasan_check_write+0x18/0x20
[   16.270876]  kasan_atomics_helper+0x224c/0x5450
[   16.270900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.270922]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.270947]  ? kasan_atomics+0x152/0x310
[   16.270975]  kasan_atomics+0x1dc/0x310
[   16.270998]  ? __pfx_kasan_atomics+0x10/0x10
[   16.271023]  ? __pfx_read_tsc+0x10/0x10
[   16.271044]  ? ktime_get_ts64+0x86/0x230
[   16.271069]  kunit_try_run_case+0x1a5/0x480
[   16.271117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.271142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.271167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.271192]  ? __kthread_parkme+0x82/0x180
[   16.271214]  ? preempt_count_sub+0x50/0x80
[   16.271238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.271263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.271286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.271311]  kthread+0x337/0x6f0
[   16.271331]  ? trace_preempt_on+0x20/0xc0
[   16.271355]  ? __pfx_kthread+0x10/0x10
[   16.271377]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.271399]  ? calculate_sigpending+0x7b/0xa0
[   16.271423]  ? __pfx_kthread+0x10/0x10
[   16.271445]  ret_from_fork+0x116/0x1d0
[   16.271465]  ? __pfx_kthread+0x10/0x10
[   16.271486]  ret_from_fork_asm+0x1a/0x30
[   16.271517]  </TASK>
[   16.271528] 
[   16.279272] Allocated by task 282:
[   16.279462]  kasan_save_stack+0x45/0x70
[   16.279662]  kasan_save_track+0x18/0x40
[   16.279904]  kasan_save_alloc_info+0x3b/0x50
[   16.280118]  __kasan_kmalloc+0xb7/0xc0
[   16.280311]  __kmalloc_cache_noprof+0x189/0x420
[   16.280558]  kasan_atomics+0x95/0x310
[   16.280750]  kunit_try_run_case+0x1a5/0x480
[   16.280999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.281277]  kthread+0x337/0x6f0
[   16.281479]  ret_from_fork+0x116/0x1d0
[   16.281686]  ret_from_fork_asm+0x1a/0x30
[   16.281891] 
[   16.281975] The buggy address belongs to the object at ffff8881025e4100
[   16.281975]  which belongs to the cache kmalloc-64 of size 64
[   16.282401] The buggy address is located 0 bytes to the right of
[   16.282401]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.282771] 
[   16.282878] The buggy address belongs to the physical page:
[   16.283185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.283531] flags: 0x200000000000000(node=0|zone=2)
[   16.283759] page_type: f5(slab)
[   16.283944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.284245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.284487] page dumped because: kasan: bad access detected
[   16.284704] 
[   16.284792] Memory state around the buggy address:
[   16.285808]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.286057]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.286372] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.286721]                                      ^
[   16.286937]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.287284]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.287607] ==================================================================
[   15.725941] ==================================================================
[   15.726396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.726712] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.726957] 
[   15.727047] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.727090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.727103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.727125] Call Trace:
[   15.727142]  <TASK>
[   15.727157]  dump_stack_lvl+0x73/0xb0
[   15.727184]  print_report+0xd1/0x610
[   15.727218]  ? __virt_addr_valid+0x1db/0x2d0
[   15.727240]  ? kasan_atomics_helper+0x151d/0x5450
[   15.727261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.727296]  ? kasan_atomics_helper+0x151d/0x5450
[   15.727319]  kasan_report+0x141/0x180
[   15.727342]  ? kasan_atomics_helper+0x151d/0x5450
[   15.727368]  kasan_check_range+0x10c/0x1c0
[   15.727392]  __kasan_check_write+0x18/0x20
[   15.727411]  kasan_atomics_helper+0x151d/0x5450
[   15.727436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.727460]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.727486]  ? kasan_atomics+0x152/0x310
[   15.727514]  kasan_atomics+0x1dc/0x310
[   15.727537]  ? __pfx_kasan_atomics+0x10/0x10
[   15.727562]  ? __pfx_read_tsc+0x10/0x10
[   15.727583]  ? ktime_get_ts64+0x86/0x230
[   15.727606]  kunit_try_run_case+0x1a5/0x480
[   15.727631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.727654]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.727678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.727702]  ? __kthread_parkme+0x82/0x180
[   15.727732]  ? preempt_count_sub+0x50/0x80
[   15.727756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.727780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.727822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.727847]  kthread+0x337/0x6f0
[   15.727867]  ? trace_preempt_on+0x20/0xc0
[   15.727899]  ? __pfx_kthread+0x10/0x10
[   15.727920]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.727943]  ? calculate_sigpending+0x7b/0xa0
[   15.727977]  ? __pfx_kthread+0x10/0x10
[   15.728000]  ret_from_fork+0x116/0x1d0
[   15.728019]  ? __pfx_kthread+0x10/0x10
[   15.728040]  ret_from_fork_asm+0x1a/0x30
[   15.728071]  </TASK>
[   15.728081] 
[   15.735765] Allocated by task 282:
[   15.735919]  kasan_save_stack+0x45/0x70
[   15.736147]  kasan_save_track+0x18/0x40
[   15.736315]  kasan_save_alloc_info+0x3b/0x50
[   15.736519]  __kasan_kmalloc+0xb7/0xc0
[   15.736704]  __kmalloc_cache_noprof+0x189/0x420
[   15.736901]  kasan_atomics+0x95/0x310
[   15.737094]  kunit_try_run_case+0x1a5/0x480
[   15.737330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.737571]  kthread+0x337/0x6f0
[   15.737744]  ret_from_fork+0x116/0x1d0
[   15.737939]  ret_from_fork_asm+0x1a/0x30
[   15.738163] 
[   15.738265] The buggy address belongs to the object at ffff8881025e4100
[   15.738265]  which belongs to the cache kmalloc-64 of size 64
[   15.738769] The buggy address is located 0 bytes to the right of
[   15.738769]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.739334] 
[   15.739458] The buggy address belongs to the physical page:
[   15.739686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.740028] flags: 0x200000000000000(node=0|zone=2)
[   15.740243] page_type: f5(slab)
[   15.740426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.740707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.740993] page dumped because: kasan: bad access detected
[   15.741302] 
[   15.741400] Memory state around the buggy address:
[   15.741623]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.741948]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.742267] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.742649]                                      ^
[   15.742808]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.743036]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.743701] ==================================================================
[   16.059779] ==================================================================
[   16.060029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.060381] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.060645] 
[   16.060730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.060772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.060785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.060807] Call Trace:
[   16.060831]  <TASK>
[   16.060869]  dump_stack_lvl+0x73/0xb0
[   16.060897]  print_report+0xd1/0x610
[   16.060919]  ? __virt_addr_valid+0x1db/0x2d0
[   16.060941]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.060963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.060986]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.061008]  kasan_report+0x141/0x180
[   16.061031]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.061059]  kasan_check_range+0x10c/0x1c0
[   16.061082]  __kasan_check_write+0x18/0x20
[   16.061113]  kasan_atomics_helper+0x1e12/0x5450
[   16.061163]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.061186]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.061212]  ? kasan_atomics+0x152/0x310
[   16.061238]  kasan_atomics+0x1dc/0x310
[   16.061262]  ? __pfx_kasan_atomics+0x10/0x10
[   16.061287]  ? __pfx_read_tsc+0x10/0x10
[   16.061307]  ? ktime_get_ts64+0x86/0x230
[   16.061332]  kunit_try_run_case+0x1a5/0x480
[   16.061357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.061381]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.061405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.061431]  ? __kthread_parkme+0x82/0x180
[   16.061452]  ? preempt_count_sub+0x50/0x80
[   16.061477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.061505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.061533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.061559]  kthread+0x337/0x6f0
[   16.061601]  ? trace_preempt_on+0x20/0xc0
[   16.061626]  ? __pfx_kthread+0x10/0x10
[   16.061648]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.061670]  ? calculate_sigpending+0x7b/0xa0
[   16.061696]  ? __pfx_kthread+0x10/0x10
[   16.061719]  ret_from_fork+0x116/0x1d0
[   16.061739]  ? __pfx_kthread+0x10/0x10
[   16.061762]  ret_from_fork_asm+0x1a/0x30
[   16.061793]  </TASK>
[   16.061805] 
[   16.070229] Allocated by task 282:
[   16.070426]  kasan_save_stack+0x45/0x70
[   16.070627]  kasan_save_track+0x18/0x40
[   16.070766]  kasan_save_alloc_info+0x3b/0x50
[   16.070930]  __kasan_kmalloc+0xb7/0xc0
[   16.071066]  __kmalloc_cache_noprof+0x189/0x420
[   16.071456]  kasan_atomics+0x95/0x310
[   16.071646]  kunit_try_run_case+0x1a5/0x480
[   16.071943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.072192]  kthread+0x337/0x6f0
[   16.072317]  ret_from_fork+0x116/0x1d0
[   16.072453]  ret_from_fork_asm+0x1a/0x30
[   16.072636] 
[   16.072734] The buggy address belongs to the object at ffff8881025e4100
[   16.072734]  which belongs to the cache kmalloc-64 of size 64
[   16.073496] The buggy address is located 0 bytes to the right of
[   16.073496]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.073994] 
[   16.074083] The buggy address belongs to the physical page:
[   16.074306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.074577] flags: 0x200000000000000(node=0|zone=2)
[   16.074745] page_type: f5(slab)
[   16.074879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.075225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.075560] page dumped because: kasan: bad access detected
[   16.075788] 
[   16.075869] Memory state around the buggy address:
[   16.076026]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.076675]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.076964] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.077290]                                      ^
[   16.077501]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.077791]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.078070] ==================================================================
[   15.526062] ==================================================================
[   15.526664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.527037] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.527300] 
[   15.527412] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.527458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.527472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.527493] Call Trace:
[   15.527508]  <TASK>
[   15.527525]  dump_stack_lvl+0x73/0xb0
[   15.527554]  print_report+0xd1/0x610
[   15.527576]  ? __virt_addr_valid+0x1db/0x2d0
[   15.527598]  ? kasan_atomics_helper+0x1148/0x5450
[   15.527620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.527643]  ? kasan_atomics_helper+0x1148/0x5450
[   15.527666]  kasan_report+0x141/0x180
[   15.527689]  ? kasan_atomics_helper+0x1148/0x5450
[   15.527716]  kasan_check_range+0x10c/0x1c0
[   15.527740]  __kasan_check_write+0x18/0x20
[   15.527760]  kasan_atomics_helper+0x1148/0x5450
[   15.527783]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.527806]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.527842]  ? kasan_atomics+0x152/0x310
[   15.527870]  kasan_atomics+0x1dc/0x310
[   15.527893]  ? __pfx_kasan_atomics+0x10/0x10
[   15.527918]  ? __pfx_read_tsc+0x10/0x10
[   15.527939]  ? ktime_get_ts64+0x86/0x230
[   15.527963]  kunit_try_run_case+0x1a5/0x480
[   15.527989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.528012]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.528036]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.528061]  ? __kthread_parkme+0x82/0x180
[   15.528082]  ? preempt_count_sub+0x50/0x80
[   15.528127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.528152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.528175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.528200]  kthread+0x337/0x6f0
[   15.528220]  ? trace_preempt_on+0x20/0xc0
[   15.528242]  ? __pfx_kthread+0x10/0x10
[   15.528264]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.528286]  ? calculate_sigpending+0x7b/0xa0
[   15.528310]  ? __pfx_kthread+0x10/0x10
[   15.528332]  ret_from_fork+0x116/0x1d0
[   15.528351]  ? __pfx_kthread+0x10/0x10
[   15.528372]  ret_from_fork_asm+0x1a/0x30
[   15.528403]  </TASK>
[   15.528414] 
[   15.536338] Allocated by task 282:
[   15.536506]  kasan_save_stack+0x45/0x70
[   15.536718]  kasan_save_track+0x18/0x40
[   15.536873]  kasan_save_alloc_info+0x3b/0x50
[   15.537051]  __kasan_kmalloc+0xb7/0xc0
[   15.537364]  __kmalloc_cache_noprof+0x189/0x420
[   15.537592]  kasan_atomics+0x95/0x310
[   15.537802]  kunit_try_run_case+0x1a5/0x480
[   15.538022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.538247]  kthread+0x337/0x6f0
[   15.538414]  ret_from_fork+0x116/0x1d0
[   15.538593]  ret_from_fork_asm+0x1a/0x30
[   15.538826] 
[   15.538949] The buggy address belongs to the object at ffff8881025e4100
[   15.538949]  which belongs to the cache kmalloc-64 of size 64
[   15.539472] The buggy address is located 0 bytes to the right of
[   15.539472]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.540066] 
[   15.540252] The buggy address belongs to the physical page:
[   15.540505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.540888] flags: 0x200000000000000(node=0|zone=2)
[   15.541153] page_type: f5(slab)
[   15.541322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.541668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.541991] page dumped because: kasan: bad access detected
[   15.542975] 
[   15.543582] Memory state around the buggy address:
[   15.544056]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.544635]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.545264] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.545782]                                      ^
[   15.546355]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.546891]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.547498] ==================================================================
[   15.604858] ==================================================================
[   15.605211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.605825] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.606192] 
[   15.606325] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.606368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.606381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.606402] Call Trace:
[   15.606416]  <TASK>
[   15.606429]  dump_stack_lvl+0x73/0xb0
[   15.606457]  print_report+0xd1/0x610
[   15.606480]  ? __virt_addr_valid+0x1db/0x2d0
[   15.606502]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.606524]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.606547]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.606569]  kasan_report+0x141/0x180
[   15.606593]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.606621]  kasan_check_range+0x10c/0x1c0
[   15.606645]  __kasan_check_write+0x18/0x20
[   15.606665]  kasan_atomics_helper+0x12e6/0x5450
[   15.606688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.606711]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.606736]  ? kasan_atomics+0x152/0x310
[   15.606763]  kasan_atomics+0x1dc/0x310
[   15.606787]  ? __pfx_kasan_atomics+0x10/0x10
[   15.606823]  ? __pfx_read_tsc+0x10/0x10
[   15.606844]  ? ktime_get_ts64+0x86/0x230
[   15.606868]  kunit_try_run_case+0x1a5/0x480
[   15.606903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.606927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.606951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.606987]  ? __kthread_parkme+0x82/0x180
[   15.607008]  ? preempt_count_sub+0x50/0x80
[   15.607032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.607057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.607091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.607123]  kthread+0x337/0x6f0
[   15.607155]  ? trace_preempt_on+0x20/0xc0
[   15.607181]  ? __pfx_kthread+0x10/0x10
[   15.607204]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.607229]  ? calculate_sigpending+0x7b/0xa0
[   15.607255]  ? __pfx_kthread+0x10/0x10
[   15.607286]  ret_from_fork+0x116/0x1d0
[   15.607306]  ? __pfx_kthread+0x10/0x10
[   15.607329]  ret_from_fork_asm+0x1a/0x30
[   15.607370]  </TASK>
[   15.607381] 
[   15.615445] Allocated by task 282:
[   15.615625]  kasan_save_stack+0x45/0x70
[   15.615804]  kasan_save_track+0x18/0x40
[   15.615952]  kasan_save_alloc_info+0x3b/0x50
[   15.616313]  __kasan_kmalloc+0xb7/0xc0
[   15.616497]  __kmalloc_cache_noprof+0x189/0x420
[   15.616713]  kasan_atomics+0x95/0x310
[   15.616908]  kunit_try_run_case+0x1a5/0x480
[   15.617145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.617382]  kthread+0x337/0x6f0
[   15.617508]  ret_from_fork+0x116/0x1d0
[   15.617644]  ret_from_fork_asm+0x1a/0x30
[   15.617786] 
[   15.617869] The buggy address belongs to the object at ffff8881025e4100
[   15.617869]  which belongs to the cache kmalloc-64 of size 64
[   15.618301] The buggy address is located 0 bytes to the right of
[   15.618301]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.619155] 
[   15.619280] The buggy address belongs to the physical page:
[   15.619494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.619772] flags: 0x200000000000000(node=0|zone=2)
[   15.620188] page_type: f5(slab)
[   15.620384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.620763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.621166] page dumped because: kasan: bad access detected
[   15.621436] 
[   15.621511] Memory state around the buggy address:
[   15.621693]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.622054]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.622428] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.622713]                                      ^
[   15.622965]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.623312]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.623600] ==================================================================
[   15.867774] ==================================================================
[   15.868087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.868761] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.869334] 
[   15.869429] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.869476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.869489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.869511] Call Trace:
[   15.869526]  <TASK>
[   15.869686]  dump_stack_lvl+0x73/0xb0
[   15.869723]  print_report+0xd1/0x610
[   15.869747]  ? __virt_addr_valid+0x1db/0x2d0
[   15.869770]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.869791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.869824]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.869848]  kasan_report+0x141/0x180
[   15.869881]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.869908]  kasan_check_range+0x10c/0x1c0
[   15.869932]  __kasan_check_write+0x18/0x20
[   15.869963]  kasan_atomics_helper+0x18b1/0x5450
[   15.869987]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.870010]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.870035]  ? kasan_atomics+0x152/0x310
[   15.870072]  kasan_atomics+0x1dc/0x310
[   15.870096]  ? __pfx_kasan_atomics+0x10/0x10
[   15.870121]  ? __pfx_read_tsc+0x10/0x10
[   15.870164]  ? ktime_get_ts64+0x86/0x230
[   15.870189]  kunit_try_run_case+0x1a5/0x480
[   15.870214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.870237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.870261]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.870286]  ? __kthread_parkme+0x82/0x180
[   15.870308]  ? preempt_count_sub+0x50/0x80
[   15.870332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.870357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.870380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.870405]  kthread+0x337/0x6f0
[   15.870425]  ? trace_preempt_on+0x20/0xc0
[   15.870448]  ? __pfx_kthread+0x10/0x10
[   15.870470]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.870491]  ? calculate_sigpending+0x7b/0xa0
[   15.870524]  ? __pfx_kthread+0x10/0x10
[   15.870546]  ret_from_fork+0x116/0x1d0
[   15.870566]  ? __pfx_kthread+0x10/0x10
[   15.870597]  ret_from_fork_asm+0x1a/0x30
[   15.870628]  </TASK>
[   15.870639] 
[   15.881597] Allocated by task 282:
[   15.881735]  kasan_save_stack+0x45/0x70
[   15.881950]  kasan_save_track+0x18/0x40
[   15.882153]  kasan_save_alloc_info+0x3b/0x50
[   15.882345]  __kasan_kmalloc+0xb7/0xc0
[   15.882481]  __kmalloc_cache_noprof+0x189/0x420
[   15.882790]  kasan_atomics+0x95/0x310
[   15.882990]  kunit_try_run_case+0x1a5/0x480
[   15.883274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.883489]  kthread+0x337/0x6f0
[   15.883664]  ret_from_fork+0x116/0x1d0
[   15.883856]  ret_from_fork_asm+0x1a/0x30
[   15.884049] 
[   15.884185] The buggy address belongs to the object at ffff8881025e4100
[   15.884185]  which belongs to the cache kmalloc-64 of size 64
[   15.884691] The buggy address is located 0 bytes to the right of
[   15.884691]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.885209] 
[   15.885330] The buggy address belongs to the physical page:
[   15.885548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.885793] flags: 0x200000000000000(node=0|zone=2)
[   15.885969] page_type: f5(slab)
[   15.886131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.886532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.886891] page dumped because: kasan: bad access detected
[   15.887172] 
[   15.887248] Memory state around the buggy address:
[   15.887408]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.887697]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.888056] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.888516]                                      ^
[   15.888741]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.889395]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.889940] ==================================================================
[   15.967493] ==================================================================
[   15.967964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.968377] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.968605] 
[   15.968691] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.968735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.968748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.968770] Call Trace:
[   15.968785]  <TASK>
[   15.968835]  dump_stack_lvl+0x73/0xb0
[   15.968870]  print_report+0xd1/0x610
[   15.968893]  ? __virt_addr_valid+0x1db/0x2d0
[   15.968917]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.968939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.968962]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.968985]  kasan_report+0x141/0x180
[   15.969008]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.969054]  kasan_check_range+0x10c/0x1c0
[   15.969078]  __kasan_check_write+0x18/0x20
[   15.969099]  kasan_atomics_helper+0x1b22/0x5450
[   15.969137]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.969167]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.969193]  ? kasan_atomics+0x152/0x310
[   15.969221]  kasan_atomics+0x1dc/0x310
[   15.969261]  ? __pfx_kasan_atomics+0x10/0x10
[   15.969287]  ? __pfx_read_tsc+0x10/0x10
[   15.969309]  ? ktime_get_ts64+0x86/0x230
[   15.969334]  kunit_try_run_case+0x1a5/0x480
[   15.969360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.969435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.969461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.969485]  ? __kthread_parkme+0x82/0x180
[   15.969507]  ? preempt_count_sub+0x50/0x80
[   15.969530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.969556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.969580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.969606]  kthread+0x337/0x6f0
[   15.969626]  ? trace_preempt_on+0x20/0xc0
[   15.969650]  ? __pfx_kthread+0x10/0x10
[   15.969671]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.969693]  ? calculate_sigpending+0x7b/0xa0
[   15.969718]  ? __pfx_kthread+0x10/0x10
[   15.969740]  ret_from_fork+0x116/0x1d0
[   15.969759]  ? __pfx_kthread+0x10/0x10
[   15.969781]  ret_from_fork_asm+0x1a/0x30
[   15.969822]  </TASK>
[   15.969833] 
[   15.977859] Allocated by task 282:
[   15.978019]  kasan_save_stack+0x45/0x70
[   15.978223]  kasan_save_track+0x18/0x40
[   15.978419]  kasan_save_alloc_info+0x3b/0x50
[   15.978629]  __kasan_kmalloc+0xb7/0xc0
[   15.978934]  __kmalloc_cache_noprof+0x189/0x420
[   15.979105]  kasan_atomics+0x95/0x310
[   15.979295]  kunit_try_run_case+0x1a5/0x480
[   15.979504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.979748]  kthread+0x337/0x6f0
[   15.979904]  ret_from_fork+0x116/0x1d0
[   15.980075]  ret_from_fork_asm+0x1a/0x30
[   15.980308] 
[   15.980416] The buggy address belongs to the object at ffff8881025e4100
[   15.980416]  which belongs to the cache kmalloc-64 of size 64
[   15.980881] The buggy address is located 0 bytes to the right of
[   15.980881]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.981547] 
[   15.981628] The buggy address belongs to the physical page:
[   15.981895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.982350] flags: 0x200000000000000(node=0|zone=2)
[   15.982614] page_type: f5(slab)
[   15.982780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.983080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.983417] page dumped because: kasan: bad access detected
[   15.983669] 
[   15.983773] Memory state around the buggy address:
[   15.984015]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.984361]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.984707] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.985047]                                      ^
[   15.985346]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.985673]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.985938] ==================================================================
[   16.165051] ==================================================================
[   16.165401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.165770] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.166140] 
[   16.166288] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.166332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.166345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.166367] Call Trace:
[   16.166383]  <TASK>
[   16.166425]  dump_stack_lvl+0x73/0xb0
[   16.166454]  print_report+0xd1/0x610
[   16.166478]  ? __virt_addr_valid+0x1db/0x2d0
[   16.166501]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.166523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.166545]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.166568]  kasan_report+0x141/0x180
[   16.166591]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.166617]  __asan_report_load8_noabort+0x18/0x20
[   16.166642]  kasan_atomics_helper+0x4f98/0x5450
[   16.166665]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.166688]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.166713]  ? kasan_atomics+0x152/0x310
[   16.166740]  kasan_atomics+0x1dc/0x310
[   16.166763]  ? __pfx_kasan_atomics+0x10/0x10
[   16.166788]  ? __pfx_read_tsc+0x10/0x10
[   16.166810]  ? ktime_get_ts64+0x86/0x230
[   16.166876]  kunit_try_run_case+0x1a5/0x480
[   16.166902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.166926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.166950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.166974]  ? __kthread_parkme+0x82/0x180
[   16.166995]  ? preempt_count_sub+0x50/0x80
[   16.167019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.167043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.167067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.167111]  kthread+0x337/0x6f0
[   16.167132]  ? trace_preempt_on+0x20/0xc0
[   16.167156]  ? __pfx_kthread+0x10/0x10
[   16.167178]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.167200]  ? calculate_sigpending+0x7b/0xa0
[   16.167224]  ? __pfx_kthread+0x10/0x10
[   16.167247]  ret_from_fork+0x116/0x1d0
[   16.167266]  ? __pfx_kthread+0x10/0x10
[   16.167287]  ret_from_fork_asm+0x1a/0x30
[   16.167370]  </TASK>
[   16.167381] 
[   16.175262] Allocated by task 282:
[   16.175476]  kasan_save_stack+0x45/0x70
[   16.175687]  kasan_save_track+0x18/0x40
[   16.175876]  kasan_save_alloc_info+0x3b/0x50
[   16.176163]  __kasan_kmalloc+0xb7/0xc0
[   16.176343]  __kmalloc_cache_noprof+0x189/0x420
[   16.176592]  kasan_atomics+0x95/0x310
[   16.176734]  kunit_try_run_case+0x1a5/0x480
[   16.176910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.177195]  kthread+0x337/0x6f0
[   16.177370]  ret_from_fork+0x116/0x1d0
[   16.177528]  ret_from_fork_asm+0x1a/0x30
[   16.177721] 
[   16.177850] The buggy address belongs to the object at ffff8881025e4100
[   16.177850]  which belongs to the cache kmalloc-64 of size 64
[   16.178407] The buggy address is located 0 bytes to the right of
[   16.178407]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.178974] 
[   16.179130] The buggy address belongs to the physical page:
[   16.179391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.179736] flags: 0x200000000000000(node=0|zone=2)
[   16.179991] page_type: f5(slab)
[   16.180242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.180581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.180922] page dumped because: kasan: bad access detected
[   16.181200] 
[   16.181331] Memory state around the buggy address:
[   16.181555]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.181783]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.182205] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.182517]                                      ^
[   16.182761]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.183146]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.183429] ==================================================================
[   16.126021] ==================================================================
[   16.126476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.126867] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.127238] 
[   16.127378] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.127424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.127437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.127458] Call Trace:
[   16.127475]  <TASK>
[   16.127492]  dump_stack_lvl+0x73/0xb0
[   16.127520]  print_report+0xd1/0x610
[   16.127570]  ? __virt_addr_valid+0x1db/0x2d0
[   16.127592]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.127614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.127637]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.127659]  kasan_report+0x141/0x180
[   16.127683]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.127710]  __asan_report_load8_noabort+0x18/0x20
[   16.127735]  kasan_atomics_helper+0x4f71/0x5450
[   16.127759]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.127783]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.127808]  ? kasan_atomics+0x152/0x310
[   16.127850]  kasan_atomics+0x1dc/0x310
[   16.127873]  ? __pfx_kasan_atomics+0x10/0x10
[   16.127898]  ? __pfx_read_tsc+0x10/0x10
[   16.127919]  ? ktime_get_ts64+0x86/0x230
[   16.127944]  kunit_try_run_case+0x1a5/0x480
[   16.127969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.127993]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.128017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.128041]  ? __kthread_parkme+0x82/0x180
[   16.128062]  ? preempt_count_sub+0x50/0x80
[   16.128136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.128164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.128189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.128213]  kthread+0x337/0x6f0
[   16.128234]  ? trace_preempt_on+0x20/0xc0
[   16.128258]  ? __pfx_kthread+0x10/0x10
[   16.128279]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.128302]  ? calculate_sigpending+0x7b/0xa0
[   16.128326]  ? __pfx_kthread+0x10/0x10
[   16.128349]  ret_from_fork+0x116/0x1d0
[   16.128368]  ? __pfx_kthread+0x10/0x10
[   16.128390]  ret_from_fork_asm+0x1a/0x30
[   16.128421]  </TASK>
[   16.128432] 
[   16.136402] Allocated by task 282:
[   16.136552]  kasan_save_stack+0x45/0x70
[   16.136701]  kasan_save_track+0x18/0x40
[   16.136864]  kasan_save_alloc_info+0x3b/0x50
[   16.137127]  __kasan_kmalloc+0xb7/0xc0
[   16.137320]  __kmalloc_cache_noprof+0x189/0x420
[   16.137574]  kasan_atomics+0x95/0x310
[   16.137768]  kunit_try_run_case+0x1a5/0x480
[   16.138017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.138305]  kthread+0x337/0x6f0
[   16.138487]  ret_from_fork+0x116/0x1d0
[   16.138672]  ret_from_fork_asm+0x1a/0x30
[   16.138869] 
[   16.138951] The buggy address belongs to the object at ffff8881025e4100
[   16.138951]  which belongs to the cache kmalloc-64 of size 64
[   16.139490] The buggy address is located 0 bytes to the right of
[   16.139490]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.139992] 
[   16.140123] The buggy address belongs to the physical page:
[   16.140395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.140756] flags: 0x200000000000000(node=0|zone=2)
[   16.141027] page_type: f5(slab)
[   16.141253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.141627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.141995] page dumped because: kasan: bad access detected
[   16.142288] 
[   16.142379] Memory state around the buggy address:
[   16.142612]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.142941]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.143339] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.143787]                                      ^
[   16.144022]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.144384]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.144698] ==================================================================
[   15.744375] ==================================================================
[   15.744713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.745048] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.745449] 
[   15.745559] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.745602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.745616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.745648] Call Trace:
[   15.745665]  <TASK>
[   15.745679]  dump_stack_lvl+0x73/0xb0
[   15.745707]  print_report+0xd1/0x610
[   15.745738]  ? __virt_addr_valid+0x1db/0x2d0
[   15.745761]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.745783]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.745825]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.745847]  kasan_report+0x141/0x180
[   15.745870]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.745896]  kasan_check_range+0x10c/0x1c0
[   15.745921]  __kasan_check_write+0x18/0x20
[   15.745940]  kasan_atomics_helper+0x15b6/0x5450
[   15.745963]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.745985]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.746010]  ? kasan_atomics+0x152/0x310
[   15.746037]  kasan_atomics+0x1dc/0x310
[   15.746059]  ? __pfx_kasan_atomics+0x10/0x10
[   15.746084]  ? __pfx_read_tsc+0x10/0x10
[   15.746115]  ? ktime_get_ts64+0x86/0x230
[   15.746139]  kunit_try_run_case+0x1a5/0x480
[   15.746173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.746196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.746232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.746256]  ? __kthread_parkme+0x82/0x180
[   15.746277]  ? preempt_count_sub+0x50/0x80
[   15.746312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.746336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.746360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.746384]  kthread+0x337/0x6f0
[   15.746404]  ? trace_preempt_on+0x20/0xc0
[   15.746428]  ? __pfx_kthread+0x10/0x10
[   15.746449]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.746472]  ? calculate_sigpending+0x7b/0xa0
[   15.746497]  ? __pfx_kthread+0x10/0x10
[   15.746520]  ret_from_fork+0x116/0x1d0
[   15.746539]  ? __pfx_kthread+0x10/0x10
[   15.746560]  ret_from_fork_asm+0x1a/0x30
[   15.746592]  </TASK>
[   15.746602] 
[   15.754562] Allocated by task 282:
[   15.754741]  kasan_save_stack+0x45/0x70
[   15.754896]  kasan_save_track+0x18/0x40
[   15.755123]  kasan_save_alloc_info+0x3b/0x50
[   15.755321]  __kasan_kmalloc+0xb7/0xc0
[   15.755459]  __kmalloc_cache_noprof+0x189/0x420
[   15.755683]  kasan_atomics+0x95/0x310
[   15.755871]  kunit_try_run_case+0x1a5/0x480
[   15.756110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.756301]  kthread+0x337/0x6f0
[   15.756424]  ret_from_fork+0x116/0x1d0
[   15.756558]  ret_from_fork_asm+0x1a/0x30
[   15.756699] 
[   15.756771] The buggy address belongs to the object at ffff8881025e4100
[   15.756771]  which belongs to the cache kmalloc-64 of size 64
[   15.757313] The buggy address is located 0 bytes to the right of
[   15.757313]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.758049] 
[   15.758124] The buggy address belongs to the physical page:
[   15.758296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.758538] flags: 0x200000000000000(node=0|zone=2)
[   15.759437] page_type: f5(slab)
[   15.759740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.761039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.762320] page dumped because: kasan: bad access detected
[   15.763141] 
[   15.763312] Memory state around the buggy address:
[   15.763703]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.763939]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.764379] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.764973]                                      ^
[   15.765393]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765985]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.766593] ==================================================================
[   15.145800] ==================================================================
[   15.146602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.146890] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.147235] 
[   15.147327] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.147371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.147384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.147406] Call Trace:
[   15.147424]  <TASK>
[   15.147441]  dump_stack_lvl+0x73/0xb0
[   15.147468]  print_report+0xd1/0x610
[   15.147490]  ? __virt_addr_valid+0x1db/0x2d0
[   15.147513]  ? kasan_atomics_helper+0x697/0x5450
[   15.147535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.147558]  ? kasan_atomics_helper+0x697/0x5450
[   15.147581]  kasan_report+0x141/0x180
[   15.147604]  ? kasan_atomics_helper+0x697/0x5450
[   15.147630]  kasan_check_range+0x10c/0x1c0
[   15.147654]  __kasan_check_write+0x18/0x20
[   15.147674]  kasan_atomics_helper+0x697/0x5450
[   15.147697]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.147721]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.147747]  ? kasan_atomics+0x152/0x310
[   15.147775]  kasan_atomics+0x1dc/0x310
[   15.147798]  ? __pfx_kasan_atomics+0x10/0x10
[   15.147835]  ? __pfx_read_tsc+0x10/0x10
[   15.147856]  ? ktime_get_ts64+0x86/0x230
[   15.147881]  kunit_try_run_case+0x1a5/0x480
[   15.147906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.147929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.147953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.147978]  ? __kthread_parkme+0x82/0x180
[   15.147998]  ? preempt_count_sub+0x50/0x80
[   15.148023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.148047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.148072]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.148105]  kthread+0x337/0x6f0
[   15.148125]  ? trace_preempt_on+0x20/0xc0
[   15.148148]  ? __pfx_kthread+0x10/0x10
[   15.148169]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.148192]  ? calculate_sigpending+0x7b/0xa0
[   15.148216]  ? __pfx_kthread+0x10/0x10
[   15.148238]  ret_from_fork+0x116/0x1d0
[   15.148257]  ? __pfx_kthread+0x10/0x10
[   15.148279]  ret_from_fork_asm+0x1a/0x30
[   15.148310]  </TASK>
[   15.148322] 
[   15.155597] Allocated by task 282:
[   15.155746]  kasan_save_stack+0x45/0x70
[   15.155959]  kasan_save_track+0x18/0x40
[   15.156141]  kasan_save_alloc_info+0x3b/0x50
[   15.156340]  __kasan_kmalloc+0xb7/0xc0
[   15.156484]  __kmalloc_cache_noprof+0x189/0x420
[   15.156715]  kasan_atomics+0x95/0x310
[   15.156867]  kunit_try_run_case+0x1a5/0x480
[   15.157017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.157194]  kthread+0x337/0x6f0
[   15.157317]  ret_from_fork+0x116/0x1d0
[   15.157453]  ret_from_fork_asm+0x1a/0x30
[   15.157595] 
[   15.157668] The buggy address belongs to the object at ffff8881025e4100
[   15.157668]  which belongs to the cache kmalloc-64 of size 64
[   15.158181] The buggy address is located 0 bytes to the right of
[   15.158181]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.158728] 
[   15.158904] The buggy address belongs to the physical page:
[   15.159240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.159591] flags: 0x200000000000000(node=0|zone=2)
[   15.159833] page_type: f5(slab)
[   15.160001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.160268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.160497] page dumped because: kasan: bad access detected
[   15.160671] 
[   15.160742] Memory state around the buggy address:
[   15.161121]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.161450]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.161779] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.162080]                                      ^
[   15.162301]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.162521]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.162737] ==================================================================
[   15.293057] ==================================================================
[   15.293795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.294420] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.295048] 
[   15.295222] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.295266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.295280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.295302] Call Trace:
[   15.295318]  <TASK>
[   15.295333]  dump_stack_lvl+0x73/0xb0
[   15.295362]  print_report+0xd1/0x610
[   15.295385]  ? __virt_addr_valid+0x1db/0x2d0
[   15.295408]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.295429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.295453]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.295475]  kasan_report+0x141/0x180
[   15.295498]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.295524]  kasan_check_range+0x10c/0x1c0
[   15.295549]  __kasan_check_write+0x18/0x20
[   15.295569]  kasan_atomics_helper+0xb6a/0x5450
[   15.295592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.295615]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.295641]  ? kasan_atomics+0x152/0x310
[   15.295668]  kasan_atomics+0x1dc/0x310
[   15.295691]  ? __pfx_kasan_atomics+0x10/0x10
[   15.295716]  ? __pfx_read_tsc+0x10/0x10
[   15.295737]  ? ktime_get_ts64+0x86/0x230
[   15.295761]  kunit_try_run_case+0x1a5/0x480
[   15.295786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.295810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.295845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.295869]  ? __kthread_parkme+0x82/0x180
[   15.295890]  ? preempt_count_sub+0x50/0x80
[   15.295913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.295938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.295962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.295986]  kthread+0x337/0x6f0
[   15.296006]  ? trace_preempt_on+0x20/0xc0
[   15.296030]  ? __pfx_kthread+0x10/0x10
[   15.296051]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.296073]  ? calculate_sigpending+0x7b/0xa0
[   15.296109]  ? __pfx_kthread+0x10/0x10
[   15.296132]  ret_from_fork+0x116/0x1d0
[   15.296151]  ? __pfx_kthread+0x10/0x10
[   15.296172]  ret_from_fork_asm+0x1a/0x30
[   15.296202]  </TASK>
[   15.296213] 
[   15.307164] Allocated by task 282:
[   15.307327]  kasan_save_stack+0x45/0x70
[   15.307483]  kasan_save_track+0x18/0x40
[   15.307682]  kasan_save_alloc_info+0x3b/0x50
[   15.307907]  __kasan_kmalloc+0xb7/0xc0
[   15.308071]  __kmalloc_cache_noprof+0x189/0x420
[   15.308277]  kasan_atomics+0x95/0x310
[   15.308453]  kunit_try_run_case+0x1a5/0x480
[   15.308635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.308882]  kthread+0x337/0x6f0
[   15.309031]  ret_from_fork+0x116/0x1d0
[   15.309242]  ret_from_fork_asm+0x1a/0x30
[   15.309428] 
[   15.309530] The buggy address belongs to the object at ffff8881025e4100
[   15.309530]  which belongs to the cache kmalloc-64 of size 64
[   15.309971] The buggy address is located 0 bytes to the right of
[   15.309971]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.310594] 
[   15.310694] The buggy address belongs to the physical page:
[   15.310970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.311355] flags: 0x200000000000000(node=0|zone=2)
[   15.311586] page_type: f5(slab)
[   15.311737] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.312056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.312382] page dumped because: kasan: bad access detected
[   15.312606] 
[   15.312694] Memory state around the buggy address:
[   15.312901]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.313241]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.313525] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.313796]                                      ^
[   15.313998]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.314494]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.314781] ==================================================================
[   15.624080] ==================================================================
[   15.624422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.624669] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.625034] 
[   15.625142] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.625185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.625198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.625219] Call Trace:
[   15.625235]  <TASK>
[   15.625249]  dump_stack_lvl+0x73/0xb0
[   15.625276]  print_report+0xd1/0x610
[   15.625299]  ? __virt_addr_valid+0x1db/0x2d0
[   15.625322]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.625345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.625368]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.625392]  kasan_report+0x141/0x180
[   15.625428]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.625455]  __asan_report_load4_noabort+0x18/0x20
[   15.625479]  kasan_atomics_helper+0x49ce/0x5450
[   15.625503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.625526]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.625551]  ? kasan_atomics+0x152/0x310
[   15.625589]  kasan_atomics+0x1dc/0x310
[   15.625613]  ? __pfx_kasan_atomics+0x10/0x10
[   15.625642]  ? __pfx_read_tsc+0x10/0x10
[   15.625678]  ? ktime_get_ts64+0x86/0x230
[   15.625702]  kunit_try_run_case+0x1a5/0x480
[   15.625727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.625752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.625777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.625801]  ? __kthread_parkme+0x82/0x180
[   15.625831]  ? preempt_count_sub+0x50/0x80
[   15.625854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.625880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.625905]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.625929]  kthread+0x337/0x6f0
[   15.625950]  ? trace_preempt_on+0x20/0xc0
[   15.625973]  ? __pfx_kthread+0x10/0x10
[   15.625994]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.626016]  ? calculate_sigpending+0x7b/0xa0
[   15.626041]  ? __pfx_kthread+0x10/0x10
[   15.626063]  ret_from_fork+0x116/0x1d0
[   15.626083]  ? __pfx_kthread+0x10/0x10
[   15.626114]  ret_from_fork_asm+0x1a/0x30
[   15.626144]  </TASK>
[   15.626155] 
[   15.633728] Allocated by task 282:
[   15.634194]  kasan_save_stack+0x45/0x70
[   15.634605]  kasan_save_track+0x18/0x40
[   15.634755]  kasan_save_alloc_info+0x3b/0x50
[   15.636154]  __kasan_kmalloc+0xb7/0xc0
[   15.636500]  __kmalloc_cache_noprof+0x189/0x420
[   15.636939]  kasan_atomics+0x95/0x310
[   15.637268]  kunit_try_run_case+0x1a5/0x480
[   15.637630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.638060]  kthread+0x337/0x6f0
[   15.638413]  ret_from_fork+0x116/0x1d0
[   15.638742]  ret_from_fork_asm+0x1a/0x30
[   15.638902] 
[   15.638979] The buggy address belongs to the object at ffff8881025e4100
[   15.638979]  which belongs to the cache kmalloc-64 of size 64
[   15.639786] The buggy address is located 0 bytes to the right of
[   15.639786]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.641092] 
[   15.641295] The buggy address belongs to the physical page:
[   15.641824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.642604] flags: 0x200000000000000(node=0|zone=2)
[   15.642938] page_type: f5(slab)
[   15.643063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.643734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.644451] page dumped because: kasan: bad access detected
[   15.644874] 
[   15.644947] Memory state around the buggy address:
[   15.645123]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.645644]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.646107] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.646738]                                      ^
[   15.646960]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.647839]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.648282] ==================================================================
[   15.986479] ==================================================================
[   15.986860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.987358] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.987923] 
[   15.988029] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.988072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.988085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.988107] Call Trace:
[   15.988125]  <TASK>
[   15.988142]  dump_stack_lvl+0x73/0xb0
[   15.988171]  print_report+0xd1/0x610
[   15.988194]  ? __virt_addr_valid+0x1db/0x2d0
[   15.988231]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.988254]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.988277]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.988299]  kasan_report+0x141/0x180
[   15.988322]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.988349]  kasan_check_range+0x10c/0x1c0
[   15.988373]  __kasan_check_write+0x18/0x20
[   15.988393]  kasan_atomics_helper+0x1c18/0x5450
[   15.988417]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.988440]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.988465]  ? kasan_atomics+0x152/0x310
[   15.988514]  kasan_atomics+0x1dc/0x310
[   15.988538]  ? __pfx_kasan_atomics+0x10/0x10
[   15.988563]  ? __pfx_read_tsc+0x10/0x10
[   15.988586]  ? ktime_get_ts64+0x86/0x230
[   15.988610]  kunit_try_run_case+0x1a5/0x480
[   15.988636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.988661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.988686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.988728]  ? __kthread_parkme+0x82/0x180
[   15.988749]  ? preempt_count_sub+0x50/0x80
[   15.988774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.988799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.988862]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.988888]  kthread+0x337/0x6f0
[   15.988909]  ? trace_preempt_on+0x20/0xc0
[   15.988969]  ? __pfx_kthread+0x10/0x10
[   15.988992]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.989014]  ? calculate_sigpending+0x7b/0xa0
[   15.989038]  ? __pfx_kthread+0x10/0x10
[   15.989060]  ret_from_fork+0x116/0x1d0
[   15.989079]  ? __pfx_kthread+0x10/0x10
[   15.989111]  ret_from_fork_asm+0x1a/0x30
[   15.989144]  </TASK>
[   15.989155] 
[   15.997597] Allocated by task 282:
[   15.997808]  kasan_save_stack+0x45/0x70
[   15.998019]  kasan_save_track+0x18/0x40
[   15.998211]  kasan_save_alloc_info+0x3b/0x50
[   15.998421]  __kasan_kmalloc+0xb7/0xc0
[   15.998691]  __kmalloc_cache_noprof+0x189/0x420
[   15.998860]  kasan_atomics+0x95/0x310
[   15.999056]  kunit_try_run_case+0x1a5/0x480
[   15.999274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.999538]  kthread+0x337/0x6f0
[   15.999728]  ret_from_fork+0x116/0x1d0
[   15.999951]  ret_from_fork_asm+0x1a/0x30
[   16.000153] 
[   16.000267] The buggy address belongs to the object at ffff8881025e4100
[   16.000267]  which belongs to the cache kmalloc-64 of size 64
[   16.000767] The buggy address is located 0 bytes to the right of
[   16.000767]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.001334] 
[   16.001434] The buggy address belongs to the physical page:
[   16.001707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.002063] flags: 0x200000000000000(node=0|zone=2)
[   16.002325] page_type: f5(slab)
[   16.002502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.002809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.003054] page dumped because: kasan: bad access detected
[   16.003465] 
[   16.003561] Memory state around the buggy address:
[   16.003785]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.004083]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.004426] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.004685]                                      ^
[   16.004965]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.005335]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.005648] ==================================================================
[   15.688584] ==================================================================
[   15.688931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.689311] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.689655] 
[   15.689751] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.689795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.689808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.689841] Call Trace:
[   15.689854]  <TASK>
[   15.689869]  dump_stack_lvl+0x73/0xb0
[   15.689896]  print_report+0xd1/0x610
[   15.689918]  ? __virt_addr_valid+0x1db/0x2d0
[   15.689941]  ? kasan_atomics_helper+0x1467/0x5450
[   15.689963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.689986]  ? kasan_atomics_helper+0x1467/0x5450
[   15.690009]  kasan_report+0x141/0x180
[   15.690032]  ? kasan_atomics_helper+0x1467/0x5450
[   15.690058]  kasan_check_range+0x10c/0x1c0
[   15.690083]  __kasan_check_write+0x18/0x20
[   15.690103]  kasan_atomics_helper+0x1467/0x5450
[   15.690126]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.690149]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.690174]  ? kasan_atomics+0x152/0x310
[   15.690200]  kasan_atomics+0x1dc/0x310
[   15.690234]  ? __pfx_kasan_atomics+0x10/0x10
[   15.690258]  ? __pfx_read_tsc+0x10/0x10
[   15.690279]  ? ktime_get_ts64+0x86/0x230
[   15.690315]  kunit_try_run_case+0x1a5/0x480
[   15.690340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.690364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.690388]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.690412]  ? __kthread_parkme+0x82/0x180
[   15.690444]  ? preempt_count_sub+0x50/0x80
[   15.690477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.690501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.690525]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.690560]  kthread+0x337/0x6f0
[   15.690581]  ? trace_preempt_on+0x20/0xc0
[   15.690604]  ? __pfx_kthread+0x10/0x10
[   15.690625]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.690647]  ? calculate_sigpending+0x7b/0xa0
[   15.690671]  ? __pfx_kthread+0x10/0x10
[   15.690693]  ret_from_fork+0x116/0x1d0
[   15.690712]  ? __pfx_kthread+0x10/0x10
[   15.690733]  ret_from_fork_asm+0x1a/0x30
[   15.690763]  </TASK>
[   15.690774] 
[   15.698871] Allocated by task 282:
[   15.699070]  kasan_save_stack+0x45/0x70
[   15.699293]  kasan_save_track+0x18/0x40
[   15.699483]  kasan_save_alloc_info+0x3b/0x50
[   15.699674]  __kasan_kmalloc+0xb7/0xc0
[   15.699884]  __kmalloc_cache_noprof+0x189/0x420
[   15.700075]  kasan_atomics+0x95/0x310
[   15.700283]  kunit_try_run_case+0x1a5/0x480
[   15.700452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.700710]  kthread+0x337/0x6f0
[   15.700858]  ret_from_fork+0x116/0x1d0
[   15.701064]  ret_from_fork_asm+0x1a/0x30
[   15.701260] 
[   15.701362] The buggy address belongs to the object at ffff8881025e4100
[   15.701362]  which belongs to the cache kmalloc-64 of size 64
[   15.701738] The buggy address is located 0 bytes to the right of
[   15.701738]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.702119] 
[   15.702195] The buggy address belongs to the physical page:
[   15.702370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.702614] flags: 0x200000000000000(node=0|zone=2)
[   15.702779] page_type: f5(slab)
[   15.702949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.703609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.703957] page dumped because: kasan: bad access detected
[   15.704206] 
[   15.704301] Memory state around the buggy address:
[   15.704523]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.704856]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.705242] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.705464]                                      ^
[   15.705622]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.705851]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.706066] ==================================================================
[   15.456606] ==================================================================
[   15.456974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.457309] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.457726] 
[   15.457835] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.457881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.457896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.457917] Call Trace:
[   15.457933]  <TASK>
[   15.457947]  dump_stack_lvl+0x73/0xb0
[   15.457976]  print_report+0xd1/0x610
[   15.457998]  ? __virt_addr_valid+0x1db/0x2d0
[   15.458021]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.458042]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.458065]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.458088]  kasan_report+0x141/0x180
[   15.458123]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.458150]  __asan_report_load4_noabort+0x18/0x20
[   15.458175]  kasan_atomics_helper+0x4a36/0x5450
[   15.458197]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.458220]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.458271]  ? kasan_atomics+0x152/0x310
[   15.458298]  kasan_atomics+0x1dc/0x310
[   15.458321]  ? __pfx_kasan_atomics+0x10/0x10
[   15.458364]  ? __pfx_read_tsc+0x10/0x10
[   15.458384]  ? ktime_get_ts64+0x86/0x230
[   15.458408]  kunit_try_run_case+0x1a5/0x480
[   15.458450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.458474]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.458498]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.458521]  ? __kthread_parkme+0x82/0x180
[   15.458542]  ? preempt_count_sub+0x50/0x80
[   15.458566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.458590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.458632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.458656]  kthread+0x337/0x6f0
[   15.458677]  ? trace_preempt_on+0x20/0xc0
[   15.458700]  ? __pfx_kthread+0x10/0x10
[   15.458721]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.458744]  ? calculate_sigpending+0x7b/0xa0
[   15.458767]  ? __pfx_kthread+0x10/0x10
[   15.458807]  ret_from_fork+0x116/0x1d0
[   15.458836]  ? __pfx_kthread+0x10/0x10
[   15.458857]  ret_from_fork_asm+0x1a/0x30
[   15.458888]  </TASK>
[   15.458899] 
[   15.467027] Allocated by task 282:
[   15.467199]  kasan_save_stack+0x45/0x70
[   15.467426]  kasan_save_track+0x18/0x40
[   15.467609]  kasan_save_alloc_info+0x3b/0x50
[   15.467823]  __kasan_kmalloc+0xb7/0xc0
[   15.468005]  __kmalloc_cache_noprof+0x189/0x420
[   15.468192]  kasan_atomics+0x95/0x310
[   15.468385]  kunit_try_run_case+0x1a5/0x480
[   15.468601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.469015]  kthread+0x337/0x6f0
[   15.469215]  ret_from_fork+0x116/0x1d0
[   15.469371]  ret_from_fork_asm+0x1a/0x30
[   15.469583] 
[   15.469699] The buggy address belongs to the object at ffff8881025e4100
[   15.469699]  which belongs to the cache kmalloc-64 of size 64
[   15.470271] The buggy address is located 0 bytes to the right of
[   15.470271]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.470843] 
[   15.470945] The buggy address belongs to the physical page:
[   15.471327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.471626] flags: 0x200000000000000(node=0|zone=2)
[   15.471791] page_type: f5(slab)
[   15.472125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.472454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.472767] page dumped because: kasan: bad access detected
[   15.473022] 
[   15.474005] Memory state around the buggy address:
[   15.474200]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.474435]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.474660] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.476199]                                      ^
[   15.476543]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.476767]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.477001] ==================================================================
[   16.223043] ==================================================================
[   16.223480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.223807] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.224243] 
[   16.224373] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.224418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.224431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.224453] Call Trace:
[   16.224468]  <TASK>
[   16.224485]  dump_stack_lvl+0x73/0xb0
[   16.224543]  print_report+0xd1/0x610
[   16.224565]  ? __virt_addr_valid+0x1db/0x2d0
[   16.224587]  ? kasan_atomics_helper+0x218a/0x5450
[   16.224609]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.224632]  ? kasan_atomics_helper+0x218a/0x5450
[   16.224654]  kasan_report+0x141/0x180
[   16.224676]  ? kasan_atomics_helper+0x218a/0x5450
[   16.224733]  kasan_check_range+0x10c/0x1c0
[   16.224758]  __kasan_check_write+0x18/0x20
[   16.224801]  kasan_atomics_helper+0x218a/0x5450
[   16.224862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.224910]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.224936]  ? kasan_atomics+0x152/0x310
[   16.224964]  kasan_atomics+0x1dc/0x310
[   16.224987]  ? __pfx_kasan_atomics+0x10/0x10
[   16.225012]  ? __pfx_read_tsc+0x10/0x10
[   16.225033]  ? ktime_get_ts64+0x86/0x230
[   16.225057]  kunit_try_run_case+0x1a5/0x480
[   16.225102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.225126]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.225151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.225175]  ? __kthread_parkme+0x82/0x180
[   16.225196]  ? preempt_count_sub+0x50/0x80
[   16.225220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.225245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.225269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.225326]  kthread+0x337/0x6f0
[   16.225347]  ? trace_preempt_on+0x20/0xc0
[   16.225370]  ? __pfx_kthread+0x10/0x10
[   16.225394]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.225420]  ? calculate_sigpending+0x7b/0xa0
[   16.225474]  ? __pfx_kthread+0x10/0x10
[   16.225498]  ret_from_fork+0x116/0x1d0
[   16.225517]  ? __pfx_kthread+0x10/0x10
[   16.225539]  ret_from_fork_asm+0x1a/0x30
[   16.225570]  </TASK>
[   16.225581] 
[   16.233910] Allocated by task 282:
[   16.234124]  kasan_save_stack+0x45/0x70
[   16.234327]  kasan_save_track+0x18/0x40
[   16.234518]  kasan_save_alloc_info+0x3b/0x50
[   16.234726]  __kasan_kmalloc+0xb7/0xc0
[   16.234920]  __kmalloc_cache_noprof+0x189/0x420
[   16.235161]  kasan_atomics+0x95/0x310
[   16.235349]  kunit_try_run_case+0x1a5/0x480
[   16.235561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.235792]  kthread+0x337/0x6f0
[   16.235928]  ret_from_fork+0x116/0x1d0
[   16.236063]  ret_from_fork_asm+0x1a/0x30
[   16.236318] 
[   16.236417] The buggy address belongs to the object at ffff8881025e4100
[   16.236417]  which belongs to the cache kmalloc-64 of size 64
[   16.236974] The buggy address is located 0 bytes to the right of
[   16.236974]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.237550] 
[   16.237640] The buggy address belongs to the physical page:
[   16.237925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.238310] flags: 0x200000000000000(node=0|zone=2)
[   16.238553] page_type: f5(slab)
[   16.238729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.239126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.239456] page dumped because: kasan: bad access detected
[   16.239712] 
[   16.239810] Memory state around the buggy address:
[   16.239981]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.240307]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.240667] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.241001]                                      ^
[   16.241189]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.241477]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.241870] ==================================================================
[   15.253065] ==================================================================
[   15.253308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.253629] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.253979] 
[   15.254085] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.254128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.254141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.254163] Call Trace:
[   15.254178]  <TASK>
[   15.254194]  dump_stack_lvl+0x73/0xb0
[   15.254220]  print_report+0xd1/0x610
[   15.254242]  ? __virt_addr_valid+0x1db/0x2d0
[   15.254265]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.254287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.254310]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.254331]  kasan_report+0x141/0x180
[   15.254353]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.254379]  kasan_check_range+0x10c/0x1c0
[   15.254417]  __kasan_check_write+0x18/0x20
[   15.254436]  kasan_atomics_helper+0xa2b/0x5450
[   15.254459]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.254483]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.254509]  ? kasan_atomics+0x152/0x310
[   15.254536]  kasan_atomics+0x1dc/0x310
[   15.254559]  ? __pfx_kasan_atomics+0x10/0x10
[   15.254584]  ? __pfx_read_tsc+0x10/0x10
[   15.254605]  ? ktime_get_ts64+0x86/0x230
[   15.254630]  kunit_try_run_case+0x1a5/0x480
[   15.254654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.254678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.254703]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.254727]  ? __kthread_parkme+0x82/0x180
[   15.254747]  ? preempt_count_sub+0x50/0x80
[   15.254771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.254795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.254828]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.254854]  kthread+0x337/0x6f0
[   15.254874]  ? trace_preempt_on+0x20/0xc0
[   15.254898]  ? __pfx_kthread+0x10/0x10
[   15.254918]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.254941]  ? calculate_sigpending+0x7b/0xa0
[   15.254964]  ? __pfx_kthread+0x10/0x10
[   15.254987]  ret_from_fork+0x116/0x1d0
[   15.255006]  ? __pfx_kthread+0x10/0x10
[   15.255027]  ret_from_fork_asm+0x1a/0x30
[   15.255057]  </TASK>
[   15.255068] 
[   15.262504] Allocated by task 282:
[   15.262678]  kasan_save_stack+0x45/0x70
[   15.262882]  kasan_save_track+0x18/0x40
[   15.263024]  kasan_save_alloc_info+0x3b/0x50
[   15.263393]  __kasan_kmalloc+0xb7/0xc0
[   15.263534]  __kmalloc_cache_noprof+0x189/0x420
[   15.263692]  kasan_atomics+0x95/0x310
[   15.263837]  kunit_try_run_case+0x1a5/0x480
[   15.264043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.264582]  kthread+0x337/0x6f0
[   15.264741]  ret_from_fork+0x116/0x1d0
[   15.264934]  ret_from_fork_asm+0x1a/0x30
[   15.265146] 
[   15.265226] The buggy address belongs to the object at ffff8881025e4100
[   15.265226]  which belongs to the cache kmalloc-64 of size 64
[   15.265685] The buggy address is located 0 bytes to the right of
[   15.265685]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.266189] 
[   15.266289] The buggy address belongs to the physical page:
[   15.266551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.266801] flags: 0x200000000000000(node=0|zone=2)
[   15.266976] page_type: f5(slab)
[   15.267179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.267525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.267881] page dumped because: kasan: bad access detected
[   15.268185] 
[   15.268279] Memory state around the buggy address:
[   15.268488]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.268715]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.269048] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.269350]                                      ^
[   15.269571]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.269851]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.270165] ==================================================================
[   15.104787] ==================================================================
[   15.105603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.106259] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.106886] 
[   15.107061] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.107105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.107118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.107139] Call Trace:
[   15.107155]  <TASK>
[   15.107171]  dump_stack_lvl+0x73/0xb0
[   15.107199]  print_report+0xd1/0x610
[   15.107221]  ? __virt_addr_valid+0x1db/0x2d0
[   15.107243]  ? kasan_atomics_helper+0x565/0x5450
[   15.107264]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.107288]  ? kasan_atomics_helper+0x565/0x5450
[   15.107310]  kasan_report+0x141/0x180
[   15.107332]  ? kasan_atomics_helper+0x565/0x5450
[   15.107359]  kasan_check_range+0x10c/0x1c0
[   15.107383]  __kasan_check_write+0x18/0x20
[   15.107403]  kasan_atomics_helper+0x565/0x5450
[   15.107426]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.107449]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.107474]  ? kasan_atomics+0x152/0x310
[   15.107501]  kasan_atomics+0x1dc/0x310
[   15.107524]  ? __pfx_kasan_atomics+0x10/0x10
[   15.107549]  ? __pfx_read_tsc+0x10/0x10
[   15.107570]  ? ktime_get_ts64+0x86/0x230
[   15.107594]  kunit_try_run_case+0x1a5/0x480
[   15.107619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.107667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.107692]  ? __kthread_parkme+0x82/0x180
[   15.107713]  ? preempt_count_sub+0x50/0x80
[   15.107737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.107786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.107821]  kthread+0x337/0x6f0
[   15.107842]  ? trace_preempt_on+0x20/0xc0
[   15.107865]  ? __pfx_kthread+0x10/0x10
[   15.107887]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.107909]  ? calculate_sigpending+0x7b/0xa0
[   15.107934]  ? __pfx_kthread+0x10/0x10
[   15.107956]  ret_from_fork+0x116/0x1d0
[   15.107975]  ? __pfx_kthread+0x10/0x10
[   15.107997]  ret_from_fork_asm+0x1a/0x30
[   15.108028]  </TASK>
[   15.108040] 
[   15.119791] Allocated by task 282:
[   15.119988]  kasan_save_stack+0x45/0x70
[   15.120267]  kasan_save_track+0x18/0x40
[   15.120448]  kasan_save_alloc_info+0x3b/0x50
[   15.120631]  __kasan_kmalloc+0xb7/0xc0
[   15.120798]  __kmalloc_cache_noprof+0x189/0x420
[   15.120999]  kasan_atomics+0x95/0x310
[   15.121242]  kunit_try_run_case+0x1a5/0x480
[   15.121391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.121568]  kthread+0x337/0x6f0
[   15.121696]  ret_from_fork+0x116/0x1d0
[   15.121892]  ret_from_fork_asm+0x1a/0x30
[   15.122092] 
[   15.122190] The buggy address belongs to the object at ffff8881025e4100
[   15.122190]  which belongs to the cache kmalloc-64 of size 64
[   15.122926] The buggy address is located 0 bytes to the right of
[   15.122926]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.123420] 
[   15.123513] The buggy address belongs to the physical page:
[   15.123688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.123946] flags: 0x200000000000000(node=0|zone=2)
[   15.124222] page_type: f5(slab)
[   15.124391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.124738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.125044] page dumped because: kasan: bad access detected
[   15.125301] 
[   15.125382] Memory state around the buggy address:
[   15.125605]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.125878]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.126223] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.126494]                                      ^
[   15.126688]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.126973]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.127281] ==================================================================
[   15.066792] ==================================================================
[   15.067344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.067639] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.067910] 
[   15.068000] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.068044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.068058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.068080] Call Trace:
[   15.068098]  <TASK>
[   15.068113]  dump_stack_lvl+0x73/0xb0
[   15.068140]  print_report+0xd1/0x610
[   15.068162]  ? __virt_addr_valid+0x1db/0x2d0
[   15.068185]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.068207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.068230]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.068252]  kasan_report+0x141/0x180
[   15.068275]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.068301]  kasan_check_range+0x10c/0x1c0
[   15.068325]  __kasan_check_write+0x18/0x20
[   15.068345]  kasan_atomics_helper+0x4a0/0x5450
[   15.068369]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.068392]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.068417]  ? kasan_atomics+0x152/0x310
[   15.068444]  kasan_atomics+0x1dc/0x310
[   15.068467]  ? __pfx_kasan_atomics+0x10/0x10
[   15.068493]  ? __pfx_read_tsc+0x10/0x10
[   15.068514]  ? ktime_get_ts64+0x86/0x230
[   15.068539]  kunit_try_run_case+0x1a5/0x480
[   15.068563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.068587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.068611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.068635]  ? __kthread_parkme+0x82/0x180
[   15.068655]  ? preempt_count_sub+0x50/0x80
[   15.068679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.068703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.068727]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.068751]  kthread+0x337/0x6f0
[   15.068772]  ? trace_preempt_on+0x20/0xc0
[   15.068795]  ? __pfx_kthread+0x10/0x10
[   15.068825]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.068853]  ? calculate_sigpending+0x7b/0xa0
[   15.068877]  ? __pfx_kthread+0x10/0x10
[   15.068899]  ret_from_fork+0x116/0x1d0
[   15.068918]  ? __pfx_kthread+0x10/0x10
[   15.068938]  ret_from_fork_asm+0x1a/0x30
[   15.068969]  </TASK>
[   15.068981] 
[   15.076436] Allocated by task 282:
[   15.076564]  kasan_save_stack+0x45/0x70
[   15.076707]  kasan_save_track+0x18/0x40
[   15.076860]  kasan_save_alloc_info+0x3b/0x50
[   15.077012]  __kasan_kmalloc+0xb7/0xc0
[   15.077146]  __kmalloc_cache_noprof+0x189/0x420
[   15.077543]  kasan_atomics+0x95/0x310
[   15.077736]  kunit_try_run_case+0x1a5/0x480
[   15.077954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.078364]  kthread+0x337/0x6f0
[   15.078536]  ret_from_fork+0x116/0x1d0
[   15.078727]  ret_from_fork_asm+0x1a/0x30
[   15.078938] 
[   15.079040] The buggy address belongs to the object at ffff8881025e4100
[   15.079040]  which belongs to the cache kmalloc-64 of size 64
[   15.079967] The buggy address is located 0 bytes to the right of
[   15.079967]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.080381] 
[   15.080456] The buggy address belongs to the physical page:
[   15.080631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.080915] flags: 0x200000000000000(node=0|zone=2)
[   15.081156] page_type: f5(slab)
[   15.081325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.081665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.081944] page dumped because: kasan: bad access detected
[   15.082120] 
[   15.082192] Memory state around the buggy address:
[   15.082348]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.082568]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.083235] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.083560]                                      ^
[   15.083786]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.084123]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.084398] ==================================================================
[   16.024145] ==================================================================
[   16.024851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.025208] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.025543] 
[   16.025646] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.025689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.025702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.025745] Call Trace:
[   16.025759]  <TASK>
[   16.025774]  dump_stack_lvl+0x73/0xb0
[   16.025801]  print_report+0xd1/0x610
[   16.025835]  ? __virt_addr_valid+0x1db/0x2d0
[   16.025858]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.025879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.025904]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.025946]  kasan_report+0x141/0x180
[   16.025968]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.025996]  kasan_check_range+0x10c/0x1c0
[   16.026020]  __kasan_check_write+0x18/0x20
[   16.026040]  kasan_atomics_helper+0x1ce1/0x5450
[   16.026064]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.026087]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.026125]  ? kasan_atomics+0x152/0x310
[   16.026153]  kasan_atomics+0x1dc/0x310
[   16.026177]  ? __pfx_kasan_atomics+0x10/0x10
[   16.026202]  ? __pfx_read_tsc+0x10/0x10
[   16.026224]  ? ktime_get_ts64+0x86/0x230
[   16.026248]  kunit_try_run_case+0x1a5/0x480
[   16.026274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.026297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.026322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.026347]  ? __kthread_parkme+0x82/0x180
[   16.026369]  ? preempt_count_sub+0x50/0x80
[   16.026393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.026419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.026443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.026468]  kthread+0x337/0x6f0
[   16.026489]  ? trace_preempt_on+0x20/0xc0
[   16.026513]  ? __pfx_kthread+0x10/0x10
[   16.026535]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.026558]  ? calculate_sigpending+0x7b/0xa0
[   16.026584]  ? __pfx_kthread+0x10/0x10
[   16.026609]  ret_from_fork+0x116/0x1d0
[   16.026629]  ? __pfx_kthread+0x10/0x10
[   16.026654]  ret_from_fork_asm+0x1a/0x30
[   16.026687]  </TASK>
[   16.026698] 
[   16.034045] Allocated by task 282:
[   16.034299]  kasan_save_stack+0x45/0x70
[   16.034441]  kasan_save_track+0x18/0x40
[   16.034575]  kasan_save_alloc_info+0x3b/0x50
[   16.034747]  __kasan_kmalloc+0xb7/0xc0
[   16.034942]  __kmalloc_cache_noprof+0x189/0x420
[   16.035160]  kasan_atomics+0x95/0x310
[   16.035500]  kunit_try_run_case+0x1a5/0x480
[   16.035655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.035846]  kthread+0x337/0x6f0
[   16.036038]  ret_from_fork+0x116/0x1d0
[   16.036392]  ret_from_fork_asm+0x1a/0x30
[   16.036593] 
[   16.036695] The buggy address belongs to the object at ffff8881025e4100
[   16.036695]  which belongs to the cache kmalloc-64 of size 64
[   16.037066] The buggy address is located 0 bytes to the right of
[   16.037066]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.037601] 
[   16.037700] The buggy address belongs to the physical page:
[   16.037891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.038220] flags: 0x200000000000000(node=0|zone=2)
[   16.038458] page_type: f5(slab)
[   16.038641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.038914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.039137] page dumped because: kasan: bad access detected
[   16.039309] 
[   16.039379] Memory state around the buggy address:
[   16.039531]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.039834]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.040144] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.040451]                                      ^
[   16.040669]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.041305]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.041518] ==================================================================
[   15.048578] ==================================================================
[   15.049073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.049712] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.049999] 
[   15.050087] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.050139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.050152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.050174] Call Trace:
[   15.050191]  <TASK>
[   15.050207]  dump_stack_lvl+0x73/0xb0
[   15.050234]  print_report+0xd1/0x610
[   15.050256]  ? __virt_addr_valid+0x1db/0x2d0
[   15.050279]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.050301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.050324]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.050347]  kasan_report+0x141/0x180
[   15.050371]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.050397]  __asan_report_load4_noabort+0x18/0x20
[   15.050423]  kasan_atomics_helper+0x4b54/0x5450
[   15.050446]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.050469]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.050495]  ? kasan_atomics+0x152/0x310
[   15.050522]  kasan_atomics+0x1dc/0x310
[   15.050546]  ? __pfx_kasan_atomics+0x10/0x10
[   15.050571]  ? __pfx_read_tsc+0x10/0x10
[   15.050591]  ? ktime_get_ts64+0x86/0x230
[   15.050616]  kunit_try_run_case+0x1a5/0x480
[   15.050642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.050664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.050689]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.050714]  ? __kthread_parkme+0x82/0x180
[   15.050735]  ? preempt_count_sub+0x50/0x80
[   15.050760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.050784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.050808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.050843]  kthread+0x337/0x6f0
[   15.050863]  ? trace_preempt_on+0x20/0xc0
[   15.050886]  ? __pfx_kthread+0x10/0x10
[   15.050908]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.050930]  ? calculate_sigpending+0x7b/0xa0
[   15.050955]  ? __pfx_kthread+0x10/0x10
[   15.050979]  ret_from_fork+0x116/0x1d0
[   15.051001]  ? __pfx_kthread+0x10/0x10
[   15.051022]  ret_from_fork_asm+0x1a/0x30
[   15.051054]  </TASK>
[   15.051064] 
[   15.058358] Allocated by task 282:
[   15.058540]  kasan_save_stack+0x45/0x70
[   15.058744]  kasan_save_track+0x18/0x40
[   15.058947]  kasan_save_alloc_info+0x3b/0x50
[   15.059199]  __kasan_kmalloc+0xb7/0xc0
[   15.059339]  __kmalloc_cache_noprof+0x189/0x420
[   15.059527]  kasan_atomics+0x95/0x310
[   15.059717]  kunit_try_run_case+0x1a5/0x480
[   15.059937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.060187]  kthread+0x337/0x6f0
[   15.060343]  ret_from_fork+0x116/0x1d0
[   15.060501]  ret_from_fork_asm+0x1a/0x30
[   15.060702] 
[   15.060794] The buggy address belongs to the object at ffff8881025e4100
[   15.060794]  which belongs to the cache kmalloc-64 of size 64
[   15.061299] The buggy address is located 0 bytes to the right of
[   15.061299]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.061782] 
[   15.061890] The buggy address belongs to the physical page:
[   15.062147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.062442] flags: 0x200000000000000(node=0|zone=2)
[   15.062690] page_type: f5(slab)
[   15.062847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.063196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.063508] page dumped because: kasan: bad access detected
[   15.063717] 
[   15.063825] Memory state around the buggy address:
[   15.064020]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.064340]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.064589] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.064805]                                      ^
[   15.065045]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.065590]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.065871] ==================================================================
[   15.812764] ==================================================================
[   15.813173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.813907] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.814508] 
[   15.814722] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.814850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.814865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.814887] Call Trace:
[   15.814905]  <TASK>
[   15.814923]  dump_stack_lvl+0x73/0xb0
[   15.814952]  print_report+0xd1/0x610
[   15.814975]  ? __virt_addr_valid+0x1db/0x2d0
[   15.814998]  ? kasan_atomics_helper+0x177f/0x5450
[   15.815019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.815043]  ? kasan_atomics_helper+0x177f/0x5450
[   15.815066]  kasan_report+0x141/0x180
[   15.815088]  ? kasan_atomics_helper+0x177f/0x5450
[   15.815115]  kasan_check_range+0x10c/0x1c0
[   15.815139]  __kasan_check_write+0x18/0x20
[   15.815159]  kasan_atomics_helper+0x177f/0x5450
[   15.815183]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.815206]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.815231]  ? kasan_atomics+0x152/0x310
[   15.815258]  kasan_atomics+0x1dc/0x310
[   15.815282]  ? __pfx_kasan_atomics+0x10/0x10
[   15.815307]  ? __pfx_read_tsc+0x10/0x10
[   15.815328]  ? ktime_get_ts64+0x86/0x230
[   15.815352]  kunit_try_run_case+0x1a5/0x480
[   15.815377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.815399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.815423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.815447]  ? __kthread_parkme+0x82/0x180
[   15.815468]  ? preempt_count_sub+0x50/0x80
[   15.815491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.815516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.815541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.815565]  kthread+0x337/0x6f0
[   15.815585]  ? trace_preempt_on+0x20/0xc0
[   15.815608]  ? __pfx_kthread+0x10/0x10
[   15.815631]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.815654]  ? calculate_sigpending+0x7b/0xa0
[   15.815679]  ? __pfx_kthread+0x10/0x10
[   15.815701]  ret_from_fork+0x116/0x1d0
[   15.815720]  ? __pfx_kthread+0x10/0x10
[   15.815741]  ret_from_fork_asm+0x1a/0x30
[   15.815772]  </TASK>
[   15.815783] 
[   15.825725] Allocated by task 282:
[   15.826006]  kasan_save_stack+0x45/0x70
[   15.826295]  kasan_save_track+0x18/0x40
[   15.826461]  kasan_save_alloc_info+0x3b/0x50
[   15.826682]  __kasan_kmalloc+0xb7/0xc0
[   15.827036]  __kmalloc_cache_noprof+0x189/0x420
[   15.827224]  kasan_atomics+0x95/0x310
[   15.827560]  kunit_try_run_case+0x1a5/0x480
[   15.827737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.828156]  kthread+0x337/0x6f0
[   15.828397]  ret_from_fork+0x116/0x1d0
[   15.828548]  ret_from_fork_asm+0x1a/0x30
[   15.828748] 
[   15.828860] The buggy address belongs to the object at ffff8881025e4100
[   15.828860]  which belongs to the cache kmalloc-64 of size 64
[   15.829546] The buggy address is located 0 bytes to the right of
[   15.829546]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.830190] 
[   15.830431] The buggy address belongs to the physical page:
[   15.831360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.831618] flags: 0x200000000000000(node=0|zone=2)
[   15.831790] page_type: f5(slab)
[   15.831945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.832190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.832423] page dumped because: kasan: bad access detected
[   15.832600] 
[   15.832675] Memory state around the buggy address:
[   15.833375]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.834502]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.835613] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.836560]                                      ^
[   15.837289]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.838337]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.839297] ==================================================================
[   14.941328] ==================================================================
[   14.942739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.943963] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   14.944883] 
[   14.945353] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.945406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.945420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.945442] Call Trace:
[   14.945457]  <TASK>
[   14.945472]  dump_stack_lvl+0x73/0xb0
[   14.945504]  print_report+0xd1/0x610
[   14.945525]  ? __virt_addr_valid+0x1db/0x2d0
[   14.945548]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.945569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.945591]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.945613]  kasan_report+0x141/0x180
[   14.945634]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.945659]  __asan_report_load4_noabort+0x18/0x20
[   14.945683]  kasan_atomics_helper+0x4bbc/0x5450
[   14.945705]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.945725]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.945750]  ? kasan_atomics+0x152/0x310
[   14.945776]  kasan_atomics+0x1dc/0x310
[   14.945797]  ? __pfx_kasan_atomics+0x10/0x10
[   14.946116]  ? __pfx_read_tsc+0x10/0x10
[   14.946144]  ? ktime_get_ts64+0x86/0x230
[   14.946171]  kunit_try_run_case+0x1a5/0x480
[   14.946246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.946270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.946295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.946319]  ? __kthread_parkme+0x82/0x180
[   14.946339]  ? preempt_count_sub+0x50/0x80
[   14.946362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.946385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.946408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.946431]  kthread+0x337/0x6f0
[   14.946450]  ? trace_preempt_on+0x20/0xc0
[   14.946473]  ? __pfx_kthread+0x10/0x10
[   14.946492]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.946513]  ? calculate_sigpending+0x7b/0xa0
[   14.946536]  ? __pfx_kthread+0x10/0x10
[   14.946557]  ret_from_fork+0x116/0x1d0
[   14.946575]  ? __pfx_kthread+0x10/0x10
[   14.946595]  ret_from_fork_asm+0x1a/0x30
[   14.946626]  </TASK>
[   14.946636] 
[   14.960521] Allocated by task 282:
[   14.960789]  kasan_save_stack+0x45/0x70
[   14.960961]  kasan_save_track+0x18/0x40
[   14.961109]  kasan_save_alloc_info+0x3b/0x50
[   14.961650]  __kasan_kmalloc+0xb7/0xc0
[   14.962025]  __kmalloc_cache_noprof+0x189/0x420
[   14.962514]  kasan_atomics+0x95/0x310
[   14.962877]  kunit_try_run_case+0x1a5/0x480
[   14.963314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.963794]  kthread+0x337/0x6f0
[   14.963944]  ret_from_fork+0x116/0x1d0
[   14.964078]  ret_from_fork_asm+0x1a/0x30
[   14.964221] 
[   14.964388] The buggy address belongs to the object at ffff8881025e4100
[   14.964388]  which belongs to the cache kmalloc-64 of size 64
[   14.965682] The buggy address is located 0 bytes to the right of
[   14.965682]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   14.966931] 
[   14.967098] The buggy address belongs to the physical page:
[   14.967436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   14.967689] flags: 0x200000000000000(node=0|zone=2)
[   14.967873] page_type: f5(slab)
[   14.967997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.968251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.968718] page dumped because: kasan: bad access detected
[   14.968950] 
[   14.969051] Memory state around the buggy address:
[   14.969234]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.969668]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.970018] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.970431]                                      ^
[   14.970646]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.970955]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.971240] ==================================================================
[   15.401871] ==================================================================
[   15.402246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.402534] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.402844] 
[   15.403027] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.403074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.403088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.403110] Call Trace:
[   15.403130]  <TASK>
[   15.403148]  dump_stack_lvl+0x73/0xb0
[   15.403177]  print_report+0xd1/0x610
[   15.403201]  ? __virt_addr_valid+0x1db/0x2d0
[   15.403224]  ? kasan_atomics_helper+0xe78/0x5450
[   15.403246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.403268]  ? kasan_atomics_helper+0xe78/0x5450
[   15.403290]  kasan_report+0x141/0x180
[   15.403313]  ? kasan_atomics_helper+0xe78/0x5450
[   15.403339]  kasan_check_range+0x10c/0x1c0
[   15.403363]  __kasan_check_write+0x18/0x20
[   15.403383]  kasan_atomics_helper+0xe78/0x5450
[   15.403406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.403428]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.403454]  ? kasan_atomics+0x152/0x310
[   15.403481]  kasan_atomics+0x1dc/0x310
[   15.403505]  ? __pfx_kasan_atomics+0x10/0x10
[   15.403529]  ? __pfx_read_tsc+0x10/0x10
[   15.403552]  ? ktime_get_ts64+0x86/0x230
[   15.403576]  kunit_try_run_case+0x1a5/0x480
[   15.403601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.403624]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.403648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.403672]  ? __kthread_parkme+0x82/0x180
[   15.403693]  ? preempt_count_sub+0x50/0x80
[   15.403717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.403742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.403766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.403790]  kthread+0x337/0x6f0
[   15.403823]  ? trace_preempt_on+0x20/0xc0
[   15.403848]  ? __pfx_kthread+0x10/0x10
[   15.403869]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.403892]  ? calculate_sigpending+0x7b/0xa0
[   15.403917]  ? __pfx_kthread+0x10/0x10
[   15.403940]  ret_from_fork+0x116/0x1d0
[   15.403960]  ? __pfx_kthread+0x10/0x10
[   15.403981]  ret_from_fork_asm+0x1a/0x30
[   15.404012]  </TASK>
[   15.404024] 
[   15.412076] Allocated by task 282:
[   15.412272]  kasan_save_stack+0x45/0x70
[   15.412471]  kasan_save_track+0x18/0x40
[   15.412648]  kasan_save_alloc_info+0x3b/0x50
[   15.412868]  __kasan_kmalloc+0xb7/0xc0
[   15.413043]  __kmalloc_cache_noprof+0x189/0x420
[   15.413260]  kasan_atomics+0x95/0x310
[   15.413444]  kunit_try_run_case+0x1a5/0x480
[   15.413627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.413880]  kthread+0x337/0x6f0
[   15.414051]  ret_from_fork+0x116/0x1d0
[   15.414273]  ret_from_fork_asm+0x1a/0x30
[   15.414469] 
[   15.414557] The buggy address belongs to the object at ffff8881025e4100
[   15.414557]  which belongs to the cache kmalloc-64 of size 64
[   15.415040] The buggy address is located 0 bytes to the right of
[   15.415040]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.415556] 
[   15.415640] The buggy address belongs to the physical page:
[   15.415879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.416269] flags: 0x200000000000000(node=0|zone=2)
[   15.416472] page_type: f5(slab)
[   15.416635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.416929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.417290] page dumped because: kasan: bad access detected
[   15.417500] 
[   15.417600] Memory state around the buggy address:
[   15.417790]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.418112]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.418345] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.418563]                                      ^
[   15.418720]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.419010]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.419321] ==================================================================
[   15.217107] ==================================================================
[   15.217493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.217794] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.218043] 
[   15.218132] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.218174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.218186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.218208] Call Trace:
[   15.218224]  <TASK>
[   15.218239]  dump_stack_lvl+0x73/0xb0
[   15.218265]  print_report+0xd1/0x610
[   15.218288]  ? __virt_addr_valid+0x1db/0x2d0
[   15.218310]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.218332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.218355]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.218378]  kasan_report+0x141/0x180
[   15.218403]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.218429]  kasan_check_range+0x10c/0x1c0
[   15.218453]  __kasan_check_write+0x18/0x20
[   15.218474]  kasan_atomics_helper+0x8f9/0x5450
[   15.218496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.218519]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.218545]  ? kasan_atomics+0x152/0x310
[   15.218573]  kasan_atomics+0x1dc/0x310
[   15.218596]  ? __pfx_kasan_atomics+0x10/0x10
[   15.218621]  ? __pfx_read_tsc+0x10/0x10
[   15.218642]  ? ktime_get_ts64+0x86/0x230
[   15.218667]  kunit_try_run_case+0x1a5/0x480
[   15.218692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.218717]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.218743]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.218771]  ? __kthread_parkme+0x82/0x180
[   15.218792]  ? preempt_count_sub+0x50/0x80
[   15.218826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.218852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.218878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.218902]  kthread+0x337/0x6f0
[   15.218934]  ? trace_preempt_on+0x20/0xc0
[   15.218958]  ? __pfx_kthread+0x10/0x10
[   15.218979]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.219001]  ? calculate_sigpending+0x7b/0xa0
[   15.219027]  ? __pfx_kthread+0x10/0x10
[   15.219049]  ret_from_fork+0x116/0x1d0
[   15.219069]  ? __pfx_kthread+0x10/0x10
[   15.219091]  ret_from_fork_asm+0x1a/0x30
[   15.219122]  </TASK>
[   15.219134] 
[   15.226717] Allocated by task 282:
[   15.226876]  kasan_save_stack+0x45/0x70
[   15.227083]  kasan_save_track+0x18/0x40
[   15.227294]  kasan_save_alloc_info+0x3b/0x50
[   15.227517]  __kasan_kmalloc+0xb7/0xc0
[   15.227709]  __kmalloc_cache_noprof+0x189/0x420
[   15.227943]  kasan_atomics+0x95/0x310
[   15.228162]  kunit_try_run_case+0x1a5/0x480
[   15.228386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.228617]  kthread+0x337/0x6f0
[   15.228770]  ret_from_fork+0x116/0x1d0
[   15.228921]  ret_from_fork_asm+0x1a/0x30
[   15.229065] 
[   15.229139] The buggy address belongs to the object at ffff8881025e4100
[   15.229139]  which belongs to the cache kmalloc-64 of size 64
[   15.229852] The buggy address is located 0 bytes to the right of
[   15.229852]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.230594] 
[   15.230699] The buggy address belongs to the physical page:
[   15.230885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.231130] flags: 0x200000000000000(node=0|zone=2)
[   15.231293] page_type: f5(slab)
[   15.231472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.231822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.232247] page dumped because: kasan: bad access detected
[   15.232499] 
[   15.232594] Memory state around the buggy address:
[   15.232826]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.233114]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.233380] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.233596]                                      ^
[   15.233832]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.234253]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.234550] ==================================================================
[   15.548712] ==================================================================
[   15.549059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.549707] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.550202] 
[   15.550330] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.550377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.550390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.550412] Call Trace:
[   15.550428]  <TASK>
[   15.550443]  dump_stack_lvl+0x73/0xb0
[   15.550472]  print_report+0xd1/0x610
[   15.550494]  ? __virt_addr_valid+0x1db/0x2d0
[   15.550517]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.550539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.550562]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.550584]  kasan_report+0x141/0x180
[   15.550607]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.550634]  __asan_report_load4_noabort+0x18/0x20
[   15.550659]  kasan_atomics_helper+0x4a02/0x5450
[   15.550683]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.550706]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.550731]  ? kasan_atomics+0x152/0x310
[   15.550759]  kasan_atomics+0x1dc/0x310
[   15.550782]  ? __pfx_kasan_atomics+0x10/0x10
[   15.550808]  ? __pfx_read_tsc+0x10/0x10
[   15.550841]  ? ktime_get_ts64+0x86/0x230
[   15.550866]  kunit_try_run_case+0x1a5/0x480
[   15.550893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.550915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.550940]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.550964]  ? __kthread_parkme+0x82/0x180
[   15.550985]  ? preempt_count_sub+0x50/0x80
[   15.551009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.551034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.551057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.551082]  kthread+0x337/0x6f0
[   15.551103]  ? trace_preempt_on+0x20/0xc0
[   15.551126]  ? __pfx_kthread+0x10/0x10
[   15.551147]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.551170]  ? calculate_sigpending+0x7b/0xa0
[   15.551193]  ? __pfx_kthread+0x10/0x10
[   15.551215]  ret_from_fork+0x116/0x1d0
[   15.551234]  ? __pfx_kthread+0x10/0x10
[   15.551255]  ret_from_fork_asm+0x1a/0x30
[   15.551286]  </TASK>
[   15.551308] 
[   15.559120] Allocated by task 282:
[   15.559318]  kasan_save_stack+0x45/0x70
[   15.559520]  kasan_save_track+0x18/0x40
[   15.559721]  kasan_save_alloc_info+0x3b/0x50
[   15.559967]  __kasan_kmalloc+0xb7/0xc0
[   15.560218]  __kmalloc_cache_noprof+0x189/0x420
[   15.560470]  kasan_atomics+0x95/0x310
[   15.560608]  kunit_try_run_case+0x1a5/0x480
[   15.560826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.561062]  kthread+0x337/0x6f0
[   15.561319]  ret_from_fork+0x116/0x1d0
[   15.561458]  ret_from_fork_asm+0x1a/0x30
[   15.561642] 
[   15.561739] The buggy address belongs to the object at ffff8881025e4100
[   15.561739]  which belongs to the cache kmalloc-64 of size 64
[   15.562291] The buggy address is located 0 bytes to the right of
[   15.562291]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.562834] 
[   15.562939] The buggy address belongs to the physical page:
[   15.563199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.563537] flags: 0x200000000000000(node=0|zone=2)
[   15.563782] page_type: f5(slab)
[   15.563973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.564323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.564653] page dumped because: kasan: bad access detected
[   15.564843] 
[   15.564922] Memory state around the buggy address:
[   15.565085]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.565308]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.565528] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.565906]                                      ^
[   15.566192]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.566509]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.566836] ==================================================================
[   14.971869] ==================================================================
[   14.972360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.972648] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   14.972969] 
[   14.973071] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.973116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.973128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.973151] Call Trace:
[   14.973163]  <TASK>
[   14.973179]  dump_stack_lvl+0x73/0xb0
[   14.973206]  print_report+0xd1/0x610
[   14.973228]  ? __virt_addr_valid+0x1db/0x2d0
[   14.973249]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.973270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.973292]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.973313]  kasan_report+0x141/0x180
[   14.973334]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.973360]  __asan_report_store4_noabort+0x1b/0x30
[   14.973384]  kasan_atomics_helper+0x4ba2/0x5450
[   14.973405]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.973427]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.973451]  ? kasan_atomics+0x152/0x310
[   14.973477]  kasan_atomics+0x1dc/0x310
[   14.973499]  ? __pfx_kasan_atomics+0x10/0x10
[   14.973522]  ? __pfx_read_tsc+0x10/0x10
[   14.973542]  ? ktime_get_ts64+0x86/0x230
[   14.973565]  kunit_try_run_case+0x1a5/0x480
[   14.973588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.973611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.973633]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.973657]  ? __kthread_parkme+0x82/0x180
[   14.973676]  ? preempt_count_sub+0x50/0x80
[   14.973698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.973722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.973744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.973768]  kthread+0x337/0x6f0
[   14.973787]  ? trace_preempt_on+0x20/0xc0
[   14.973809]  ? __pfx_kthread+0x10/0x10
[   14.973994]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.974016]  ? calculate_sigpending+0x7b/0xa0
[   14.974039]  ? __pfx_kthread+0x10/0x10
[   14.974060]  ret_from_fork+0x116/0x1d0
[   14.974078]  ? __pfx_kthread+0x10/0x10
[   14.974111]  ret_from_fork_asm+0x1a/0x30
[   14.974140]  </TASK>
[   14.974150] 
[   14.982269] Allocated by task 282:
[   14.982448]  kasan_save_stack+0x45/0x70
[   14.982623]  kasan_save_track+0x18/0x40
[   14.982796]  kasan_save_alloc_info+0x3b/0x50
[   14.983000]  __kasan_kmalloc+0xb7/0xc0
[   14.983168]  __kmalloc_cache_noprof+0x189/0x420
[   14.983431]  kasan_atomics+0x95/0x310
[   14.983601]  kunit_try_run_case+0x1a5/0x480
[   14.983750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.983994]  kthread+0x337/0x6f0
[   14.984198]  ret_from_fork+0x116/0x1d0
[   14.984389]  ret_from_fork_asm+0x1a/0x30
[   14.984529] 
[   14.984701] The buggy address belongs to the object at ffff8881025e4100
[   14.984701]  which belongs to the cache kmalloc-64 of size 64
[   14.985184] The buggy address is located 0 bytes to the right of
[   14.985184]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   14.985795] 
[   14.985888] The buggy address belongs to the physical page:
[   14.986063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   14.986306] flags: 0x200000000000000(node=0|zone=2)
[   14.986471] page_type: f5(slab)
[   14.986635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.987006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.987605] page dumped because: kasan: bad access detected
[   14.987782] 
[   14.987864] Memory state around the buggy address:
[   14.988019]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.988691]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.989045] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.989634]                                      ^
[   14.989789]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.990217]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.990723] ==================================================================
[   15.767390] ==================================================================
[   15.768077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.768681] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.769779] 
[   15.769975] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.770034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.770047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.770069] Call Trace:
[   15.770085]  <TASK>
[   15.770100]  dump_stack_lvl+0x73/0xb0
[   15.770140]  print_report+0xd1/0x610
[   15.770162]  ? __virt_addr_valid+0x1db/0x2d0
[   15.770183]  ? kasan_atomics_helper+0x164f/0x5450
[   15.770216]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.770238]  ? kasan_atomics_helper+0x164f/0x5450
[   15.770261]  kasan_report+0x141/0x180
[   15.770283]  ? kasan_atomics_helper+0x164f/0x5450
[   15.770309]  kasan_check_range+0x10c/0x1c0
[   15.770333]  __kasan_check_write+0x18/0x20
[   15.770354]  kasan_atomics_helper+0x164f/0x5450
[   15.770386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.770408]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.770433]  ? kasan_atomics+0x152/0x310
[   15.770471]  kasan_atomics+0x1dc/0x310
[   15.770495]  ? __pfx_kasan_atomics+0x10/0x10
[   15.770520]  ? __pfx_read_tsc+0x10/0x10
[   15.770541]  ? ktime_get_ts64+0x86/0x230
[   15.770574]  kunit_try_run_case+0x1a5/0x480
[   15.770598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.770632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.770657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.770680]  ? __kthread_parkme+0x82/0x180
[   15.770701]  ? preempt_count_sub+0x50/0x80
[   15.770725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.770750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.770774]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.770798]  kthread+0x337/0x6f0
[   15.770826]  ? trace_preempt_on+0x20/0xc0
[   15.770850]  ? __pfx_kthread+0x10/0x10
[   15.770871]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.770894]  ? calculate_sigpending+0x7b/0xa0
[   15.770917]  ? __pfx_kthread+0x10/0x10
[   15.770940]  ret_from_fork+0x116/0x1d0
[   15.770958]  ? __pfx_kthread+0x10/0x10
[   15.770979]  ret_from_fork_asm+0x1a/0x30
[   15.771010]  </TASK>
[   15.771021] 
[   15.778906] Allocated by task 282:
[   15.779045]  kasan_save_stack+0x45/0x70
[   15.779458]  kasan_save_track+0x18/0x40
[   15.779617]  kasan_save_alloc_info+0x3b/0x50
[   15.779843]  __kasan_kmalloc+0xb7/0xc0
[   15.779979]  __kmalloc_cache_noprof+0x189/0x420
[   15.780138]  kasan_atomics+0x95/0x310
[   15.780295]  kunit_try_run_case+0x1a5/0x480
[   15.780529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.780922]  kthread+0x337/0x6f0
[   15.781095]  ret_from_fork+0x116/0x1d0
[   15.781314]  ret_from_fork_asm+0x1a/0x30
[   15.781511] 
[   15.781597] The buggy address belongs to the object at ffff8881025e4100
[   15.781597]  which belongs to the cache kmalloc-64 of size 64
[   15.782086] The buggy address is located 0 bytes to the right of
[   15.782086]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.782619] 
[   15.782719] The buggy address belongs to the physical page:
[   15.782959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.783327] flags: 0x200000000000000(node=0|zone=2)
[   15.783556] page_type: f5(slab)
[   15.783736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.784060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.784467] page dumped because: kasan: bad access detected
[   15.784711] 
[   15.784830] Memory state around the buggy address:
[   15.785053]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.785349]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.785568] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.785786]                                      ^
[   15.786045]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.786568]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.786950] ==================================================================
[   15.378835] ==================================================================
[   15.379515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.379916] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.380307] 
[   15.380408] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.380454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.380531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.380554] Call Trace:
[   15.380619]  <TASK>
[   15.380637]  dump_stack_lvl+0x73/0xb0
[   15.380668]  print_report+0xd1/0x610
[   15.380690]  ? __virt_addr_valid+0x1db/0x2d0
[   15.380712]  ? kasan_atomics_helper+0xde0/0x5450
[   15.380735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.380757]  ? kasan_atomics_helper+0xde0/0x5450
[   15.380779]  kasan_report+0x141/0x180
[   15.380801]  ? kasan_atomics_helper+0xde0/0x5450
[   15.380839]  kasan_check_range+0x10c/0x1c0
[   15.380868]  __kasan_check_write+0x18/0x20
[   15.380888]  kasan_atomics_helper+0xde0/0x5450
[   15.380911]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.380935]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.380961]  ? kasan_atomics+0x152/0x310
[   15.380988]  kasan_atomics+0x1dc/0x310
[   15.381011]  ? __pfx_kasan_atomics+0x10/0x10
[   15.381035]  ? __pfx_read_tsc+0x10/0x10
[   15.381057]  ? ktime_get_ts64+0x86/0x230
[   15.381081]  kunit_try_run_case+0x1a5/0x480
[   15.381207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.381231]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.381256]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.381281]  ? __kthread_parkme+0x82/0x180
[   15.381302]  ? preempt_count_sub+0x50/0x80
[   15.381326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.381351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.381375]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.381400]  kthread+0x337/0x6f0
[   15.381420]  ? trace_preempt_on+0x20/0xc0
[   15.381444]  ? __pfx_kthread+0x10/0x10
[   15.381466]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.381488]  ? calculate_sigpending+0x7b/0xa0
[   15.381513]  ? __pfx_kthread+0x10/0x10
[   15.381535]  ret_from_fork+0x116/0x1d0
[   15.381554]  ? __pfx_kthread+0x10/0x10
[   15.381575]  ret_from_fork_asm+0x1a/0x30
[   15.381608]  </TASK>
[   15.381619] 
[   15.391214] Allocated by task 282:
[   15.391394]  kasan_save_stack+0x45/0x70
[   15.391573]  kasan_save_track+0x18/0x40
[   15.391766]  kasan_save_alloc_info+0x3b/0x50
[   15.391985]  __kasan_kmalloc+0xb7/0xc0
[   15.392682]  __kmalloc_cache_noprof+0x189/0x420
[   15.392902]  kasan_atomics+0x95/0x310
[   15.393094]  kunit_try_run_case+0x1a5/0x480
[   15.393473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.393829]  kthread+0x337/0x6f0
[   15.394008]  ret_from_fork+0x116/0x1d0
[   15.394311]  ret_from_fork_asm+0x1a/0x30
[   15.394477] 
[   15.394692] The buggy address belongs to the object at ffff8881025e4100
[   15.394692]  which belongs to the cache kmalloc-64 of size 64
[   15.395317] The buggy address is located 0 bytes to the right of
[   15.395317]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.395992] 
[   15.396103] The buggy address belongs to the physical page:
[   15.396302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.396783] flags: 0x200000000000000(node=0|zone=2)
[   15.397113] page_type: f5(slab)
[   15.397357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.397764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.398175] page dumped because: kasan: bad access detected
[   15.398413] 
[   15.398626] Memory state around the buggy address:
[   15.398834]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.399228]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.399499] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.399753]                                      ^
[   15.399990]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.400292]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.400625] ==================================================================
[   15.916359] ==================================================================
[   15.917103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.917687] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.917931] 
[   15.918022] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.918066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.918108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.918129] Call Trace:
[   15.918146]  <TASK>
[   15.918161]  dump_stack_lvl+0x73/0xb0
[   15.918212]  print_report+0xd1/0x610
[   15.918236]  ? __virt_addr_valid+0x1db/0x2d0
[   15.918259]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.918281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.918304]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.918327]  kasan_report+0x141/0x180
[   15.918349]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.918377]  kasan_check_range+0x10c/0x1c0
[   15.918423]  __kasan_check_write+0x18/0x20
[   15.918443]  kasan_atomics_helper+0x19e3/0x5450
[   15.918466]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.918490]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.918517]  ? kasan_atomics+0x152/0x310
[   15.918544]  kasan_atomics+0x1dc/0x310
[   15.918568]  ? __pfx_kasan_atomics+0x10/0x10
[   15.918611]  ? __pfx_read_tsc+0x10/0x10
[   15.918633]  ? ktime_get_ts64+0x86/0x230
[   15.918659]  kunit_try_run_case+0x1a5/0x480
[   15.918685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918708]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.918732]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.918756]  ? __kthread_parkme+0x82/0x180
[   15.918777]  ? preempt_count_sub+0x50/0x80
[   15.918801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.918877]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.918903]  kthread+0x337/0x6f0
[   15.918923]  ? trace_preempt_on+0x20/0xc0
[   15.918946]  ? __pfx_kthread+0x10/0x10
[   15.918967]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.918989]  ? calculate_sigpending+0x7b/0xa0
[   15.919014]  ? __pfx_kthread+0x10/0x10
[   15.919051]  ret_from_fork+0x116/0x1d0
[   15.919071]  ? __pfx_kthread+0x10/0x10
[   15.919110]  ret_from_fork_asm+0x1a/0x30
[   15.919141]  </TASK>
[   15.919152] 
[   15.931662] Allocated by task 282:
[   15.931797]  kasan_save_stack+0x45/0x70
[   15.932264]  kasan_save_track+0x18/0x40
[   15.932624]  kasan_save_alloc_info+0x3b/0x50
[   15.933032]  __kasan_kmalloc+0xb7/0xc0
[   15.933408]  __kmalloc_cache_noprof+0x189/0x420
[   15.933834]  kasan_atomics+0x95/0x310
[   15.934210]  kunit_try_run_case+0x1a5/0x480
[   15.934601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.935014]  kthread+0x337/0x6f0
[   15.935299]  ret_from_fork+0x116/0x1d0
[   15.935648]  ret_from_fork_asm+0x1a/0x30
[   15.935861] 
[   15.935938] The buggy address belongs to the object at ffff8881025e4100
[   15.935938]  which belongs to the cache kmalloc-64 of size 64
[   15.936807] The buggy address is located 0 bytes to the right of
[   15.936807]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.937697] 
[   15.937780] The buggy address belongs to the physical page:
[   15.937969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.938561] flags: 0x200000000000000(node=0|zone=2)
[   15.939016] page_type: f5(slab)
[   15.939353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.940020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.940668] page dumped because: kasan: bad access detected
[   15.940863] 
[   15.940938] Memory state around the buggy address:
[   15.941129]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.941777]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.942429] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.943058]                                      ^
[   15.943419]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.943643]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.943962] ==================================================================
[   16.203645] ==================================================================
[   16.204009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.204838] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.205214] 
[   16.205328] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.205372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.205384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.205406] Call Trace:
[   16.205420]  <TASK>
[   16.205436]  dump_stack_lvl+0x73/0xb0
[   16.205463]  print_report+0xd1/0x610
[   16.205486]  ? __virt_addr_valid+0x1db/0x2d0
[   16.205508]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.205570]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.205595]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.205617]  kasan_report+0x141/0x180
[   16.205640]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.205667]  __asan_report_load8_noabort+0x18/0x20
[   16.205723]  kasan_atomics_helper+0x4fb2/0x5450
[   16.205748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.205771]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.205797]  ? kasan_atomics+0x152/0x310
[   16.205834]  kasan_atomics+0x1dc/0x310
[   16.205859]  ? __pfx_kasan_atomics+0x10/0x10
[   16.205915]  ? __pfx_read_tsc+0x10/0x10
[   16.205937]  ? ktime_get_ts64+0x86/0x230
[   16.205961]  kunit_try_run_case+0x1a5/0x480
[   16.205986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.206009]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.206063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.206107]  ? __kthread_parkme+0x82/0x180
[   16.206130]  ? preempt_count_sub+0x50/0x80
[   16.206153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.206206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.206230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.206255]  kthread+0x337/0x6f0
[   16.206276]  ? trace_preempt_on+0x20/0xc0
[   16.206299]  ? __pfx_kthread+0x10/0x10
[   16.206320]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.206343]  ? calculate_sigpending+0x7b/0xa0
[   16.206366]  ? __pfx_kthread+0x10/0x10
[   16.206389]  ret_from_fork+0x116/0x1d0
[   16.206408]  ? __pfx_kthread+0x10/0x10
[   16.206429]  ret_from_fork_asm+0x1a/0x30
[   16.206460]  </TASK>
[   16.206501] 
[   16.214439] Allocated by task 282:
[   16.214621]  kasan_save_stack+0x45/0x70
[   16.214867]  kasan_save_track+0x18/0x40
[   16.215064]  kasan_save_alloc_info+0x3b/0x50
[   16.215305]  __kasan_kmalloc+0xb7/0xc0
[   16.215514]  __kmalloc_cache_noprof+0x189/0x420
[   16.215766]  kasan_atomics+0x95/0x310
[   16.215960]  kunit_try_run_case+0x1a5/0x480
[   16.216208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.216460]  kthread+0x337/0x6f0
[   16.216642]  ret_from_fork+0x116/0x1d0
[   16.216781]  ret_from_fork_asm+0x1a/0x30
[   16.216940] 
[   16.217017] The buggy address belongs to the object at ffff8881025e4100
[   16.217017]  which belongs to the cache kmalloc-64 of size 64
[   16.217528] The buggy address is located 0 bytes to the right of
[   16.217528]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.218161] 
[   16.218244] The buggy address belongs to the physical page:
[   16.218422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.218670] flags: 0x200000000000000(node=0|zone=2)
[   16.218951] page_type: f5(slab)
[   16.219185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.219530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.219908] page dumped because: kasan: bad access detected
[   16.220203] 
[   16.220332] Memory state around the buggy address:
[   16.220552]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.220889]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.221261] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.221539]                                      ^
[   16.221698]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.222017]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.222369] ==================================================================
[   16.096844] ==================================================================
[   16.097097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.097331] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.097559] 
[   16.097644] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.098773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.098795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.098842] Call Trace:
[   16.098860]  <TASK>
[   16.098876]  dump_stack_lvl+0x73/0xb0
[   16.098914]  print_report+0xd1/0x610
[   16.098937]  ? __virt_addr_valid+0x1db/0x2d0
[   16.098960]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.098982]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.099005]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.099027]  kasan_report+0x141/0x180
[   16.099051]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.099579]  kasan_check_range+0x10c/0x1c0
[   16.099635]  __kasan_check_write+0x18/0x20
[   16.099661]  kasan_atomics_helper+0x1f43/0x5450
[   16.099685]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.099709]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.099736]  ? kasan_atomics+0x152/0x310
[   16.099764]  kasan_atomics+0x1dc/0x310
[   16.099787]  ? __pfx_kasan_atomics+0x10/0x10
[   16.099812]  ? __pfx_read_tsc+0x10/0x10
[   16.099843]  ? ktime_get_ts64+0x86/0x230
[   16.099867]  kunit_try_run_case+0x1a5/0x480
[   16.099892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.099915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.099940]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.099964]  ? __kthread_parkme+0x82/0x180
[   16.099984]  ? preempt_count_sub+0x50/0x80
[   16.100009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.100034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.100058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.100106]  kthread+0x337/0x6f0
[   16.100127]  ? trace_preempt_on+0x20/0xc0
[   16.100150]  ? __pfx_kthread+0x10/0x10
[   16.100172]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.100194]  ? calculate_sigpending+0x7b/0xa0
[   16.100219]  ? __pfx_kthread+0x10/0x10
[   16.100241]  ret_from_fork+0x116/0x1d0
[   16.100260]  ? __pfx_kthread+0x10/0x10
[   16.100282]  ret_from_fork_asm+0x1a/0x30
[   16.100313]  </TASK>
[   16.100324] 
[   16.117402] Allocated by task 282:
[   16.117597]  kasan_save_stack+0x45/0x70
[   16.117789]  kasan_save_track+0x18/0x40
[   16.118028]  kasan_save_alloc_info+0x3b/0x50
[   16.118299]  __kasan_kmalloc+0xb7/0xc0
[   16.118437]  __kmalloc_cache_noprof+0x189/0x420
[   16.118664]  kasan_atomics+0x95/0x310
[   16.118868]  kunit_try_run_case+0x1a5/0x480
[   16.119049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.119366]  kthread+0x337/0x6f0
[   16.119497]  ret_from_fork+0x116/0x1d0
[   16.119629]  ret_from_fork_asm+0x1a/0x30
[   16.119840] 
[   16.119974] The buggy address belongs to the object at ffff8881025e4100
[   16.119974]  which belongs to the cache kmalloc-64 of size 64
[   16.120580] The buggy address is located 0 bytes to the right of
[   16.120580]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.121164] 
[   16.121264] The buggy address belongs to the physical page:
[   16.121470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.121868] flags: 0x200000000000000(node=0|zone=2)
[   16.122068] page_type: f5(slab)
[   16.122294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.122655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.122990] page dumped because: kasan: bad access detected
[   16.123273] 
[   16.123374] Memory state around the buggy address:
[   16.123630]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.123877]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.124179] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.124497]                                      ^
[   16.124696]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.125057]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.125289] ==================================================================
[   15.586196] ==================================================================
[   15.586739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.587014] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.587514] 
[   15.587614] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.587657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.587682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.587703] Call Trace:
[   15.587717]  <TASK>
[   15.587733]  dump_stack_lvl+0x73/0xb0
[   15.587771]  print_report+0xd1/0x610
[   15.587794]  ? __virt_addr_valid+0x1db/0x2d0
[   15.587827]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.587849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.587872]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.587894]  kasan_report+0x141/0x180
[   15.587917]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.587944]  __asan_report_load4_noabort+0x18/0x20
[   15.587969]  kasan_atomics_helper+0x49e8/0x5450
[   15.587993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.588016]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.588041]  ? kasan_atomics+0x152/0x310
[   15.588068]  kasan_atomics+0x1dc/0x310
[   15.588091]  ? __pfx_kasan_atomics+0x10/0x10
[   15.588116]  ? __pfx_read_tsc+0x10/0x10
[   15.588138]  ? ktime_get_ts64+0x86/0x230
[   15.588163]  kunit_try_run_case+0x1a5/0x480
[   15.588188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.588211]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.588235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.588270]  ? __kthread_parkme+0x82/0x180
[   15.588291]  ? preempt_count_sub+0x50/0x80
[   15.588315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.588351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.588374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.588399]  kthread+0x337/0x6f0
[   15.588420]  ? trace_preempt_on+0x20/0xc0
[   15.588453]  ? __pfx_kthread+0x10/0x10
[   15.588475]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.588498]  ? calculate_sigpending+0x7b/0xa0
[   15.588532]  ? __pfx_kthread+0x10/0x10
[   15.588555]  ret_from_fork+0x116/0x1d0
[   15.588574]  ? __pfx_kthread+0x10/0x10
[   15.588595]  ret_from_fork_asm+0x1a/0x30
[   15.588634]  </TASK>
[   15.588645] 
[   15.596666] Allocated by task 282:
[   15.596799]  kasan_save_stack+0x45/0x70
[   15.596981]  kasan_save_track+0x18/0x40
[   15.597270]  kasan_save_alloc_info+0x3b/0x50
[   15.597511]  __kasan_kmalloc+0xb7/0xc0
[   15.597683]  __kmalloc_cache_noprof+0x189/0x420
[   15.597903]  kasan_atomics+0x95/0x310
[   15.598111]  kunit_try_run_case+0x1a5/0x480
[   15.598310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.598532]  kthread+0x337/0x6f0
[   15.598721]  ret_from_fork+0x116/0x1d0
[   15.598891]  ret_from_fork_asm+0x1a/0x30
[   15.599102] 
[   15.599195] The buggy address belongs to the object at ffff8881025e4100
[   15.599195]  which belongs to the cache kmalloc-64 of size 64
[   15.599550] The buggy address is located 0 bytes to the right of
[   15.599550]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.600004] 
[   15.600111] The buggy address belongs to the physical page:
[   15.600367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.600723] flags: 0x200000000000000(node=0|zone=2)
[   15.600975] page_type: f5(slab)
[   15.601240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.601591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.601946] page dumped because: kasan: bad access detected
[   15.602261] 
[   15.602335] Memory state around the buggy address:
[   15.602492]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.602712]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.603038] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.603408]                                      ^
[   15.603663]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.603994]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.604365] ==================================================================
[   15.127671] ==================================================================
[   15.128101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.128766] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.129119] 
[   15.129229] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.129272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.129285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.129307] Call Trace:
[   15.129322]  <TASK>
[   15.129336]  dump_stack_lvl+0x73/0xb0
[   15.129363]  print_report+0xd1/0x610
[   15.129384]  ? __virt_addr_valid+0x1db/0x2d0
[   15.129407]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.129428]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.129452]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.129474]  kasan_report+0x141/0x180
[   15.129497]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.129523]  kasan_check_range+0x10c/0x1c0
[   15.129547]  __kasan_check_write+0x18/0x20
[   15.129567]  kasan_atomics_helper+0x5fe/0x5450
[   15.129590]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.129613]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.129638]  ? kasan_atomics+0x152/0x310
[   15.129665]  kasan_atomics+0x1dc/0x310
[   15.129688]  ? __pfx_kasan_atomics+0x10/0x10
[   15.129713]  ? __pfx_read_tsc+0x10/0x10
[   15.129734]  ? ktime_get_ts64+0x86/0x230
[   15.129759]  kunit_try_run_case+0x1a5/0x480
[   15.129784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.129807]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.129842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.129866]  ? __kthread_parkme+0x82/0x180
[   15.129887]  ? preempt_count_sub+0x50/0x80
[   15.129911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.129936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.129959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.129984]  kthread+0x337/0x6f0
[   15.130005]  ? trace_preempt_on+0x20/0xc0
[   15.130028]  ? __pfx_kthread+0x10/0x10
[   15.130050]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.130072]  ? calculate_sigpending+0x7b/0xa0
[   15.130104]  ? __pfx_kthread+0x10/0x10
[   15.130126]  ret_from_fork+0x116/0x1d0
[   15.130145]  ? __pfx_kthread+0x10/0x10
[   15.130166]  ret_from_fork_asm+0x1a/0x30
[   15.130197]  </TASK>
[   15.130209] 
[   15.137715] Allocated by task 282:
[   15.137908]  kasan_save_stack+0x45/0x70
[   15.138117]  kasan_save_track+0x18/0x40
[   15.138312]  kasan_save_alloc_info+0x3b/0x50
[   15.138502]  __kasan_kmalloc+0xb7/0xc0
[   15.138678]  __kmalloc_cache_noprof+0x189/0x420
[   15.138886]  kasan_atomics+0x95/0x310
[   15.139073]  kunit_try_run_case+0x1a5/0x480
[   15.139299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.139537]  kthread+0x337/0x6f0
[   15.139664]  ret_from_fork+0x116/0x1d0
[   15.139799]  ret_from_fork_asm+0x1a/0x30
[   15.140003] 
[   15.140109] The buggy address belongs to the object at ffff8881025e4100
[   15.140109]  which belongs to the cache kmalloc-64 of size 64
[   15.140543] The buggy address is located 0 bytes to the right of
[   15.140543]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.141091] 
[   15.141186] The buggy address belongs to the physical page:
[   15.141410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.141736] flags: 0x200000000000000(node=0|zone=2)
[   15.141954] page_type: f5(slab)
[   15.142077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.142430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.142733] page dumped because: kasan: bad access detected
[   15.142938] 
[   15.143023] Memory state around the buggy address:
[   15.143390]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.143688]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.143948] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.144317]                                      ^
[   15.144511]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.144804]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.145111] ==================================================================
[   15.505932] ==================================================================
[   15.506654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.506985] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.507751] 
[   15.508009] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.508057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.508071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.508205] Call Trace:
[   15.508226]  <TASK>
[   15.508245]  dump_stack_lvl+0x73/0xb0
[   15.508276]  print_report+0xd1/0x610
[   15.508300]  ? __virt_addr_valid+0x1db/0x2d0
[   15.508323]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.508345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.508369]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.508392]  kasan_report+0x141/0x180
[   15.508414]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.508440]  __asan_report_load4_noabort+0x18/0x20
[   15.508464]  kasan_atomics_helper+0x4a1c/0x5450
[   15.508488]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.508511]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.508536]  ? kasan_atomics+0x152/0x310
[   15.508563]  kasan_atomics+0x1dc/0x310
[   15.508586]  ? __pfx_kasan_atomics+0x10/0x10
[   15.508610]  ? __pfx_read_tsc+0x10/0x10
[   15.508632]  ? ktime_get_ts64+0x86/0x230
[   15.508657]  kunit_try_run_case+0x1a5/0x480
[   15.508682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.508705]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.508729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.508755]  ? __kthread_parkme+0x82/0x180
[   15.508775]  ? preempt_count_sub+0x50/0x80
[   15.508800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.508839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.508868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.508892]  kthread+0x337/0x6f0
[   15.508913]  ? trace_preempt_on+0x20/0xc0
[   15.508936]  ? __pfx_kthread+0x10/0x10
[   15.508957]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.508980]  ? calculate_sigpending+0x7b/0xa0
[   15.509004]  ? __pfx_kthread+0x10/0x10
[   15.509026]  ret_from_fork+0x116/0x1d0
[   15.509045]  ? __pfx_kthread+0x10/0x10
[   15.509066]  ret_from_fork_asm+0x1a/0x30
[   15.509097]  </TASK>
[   15.509108] 
[   15.516922] Allocated by task 282:
[   15.517110]  kasan_save_stack+0x45/0x70
[   15.517288]  kasan_save_track+0x18/0x40
[   15.517501]  kasan_save_alloc_info+0x3b/0x50
[   15.517718]  __kasan_kmalloc+0xb7/0xc0
[   15.517895]  __kmalloc_cache_noprof+0x189/0x420
[   15.518139]  kasan_atomics+0x95/0x310
[   15.518324]  kunit_try_run_case+0x1a5/0x480
[   15.518540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.518789]  kthread+0x337/0x6f0
[   15.518987]  ret_from_fork+0x116/0x1d0
[   15.519173]  ret_from_fork_asm+0x1a/0x30
[   15.519451] 
[   15.519525] The buggy address belongs to the object at ffff8881025e4100
[   15.519525]  which belongs to the cache kmalloc-64 of size 64
[   15.520206] The buggy address is located 0 bytes to the right of
[   15.520206]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.520772] 
[   15.520981] The buggy address belongs to the physical page:
[   15.521440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.521799] flags: 0x200000000000000(node=0|zone=2)
[   15.522048] page_type: f5(slab)
[   15.522370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.522725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.523064] page dumped because: kasan: bad access detected
[   15.523306] 
[   15.523391] Memory state around the buggy address:
[   15.523556]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.523780]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.524169] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.524518]                                      ^
[   15.524769]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.525135]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.525444] ==================================================================
[   14.991288] ==================================================================
[   14.991585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.992079] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   14.992566] 
[   14.992661] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.992704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.992717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.992738] Call Trace:
[   14.992750]  <TASK>
[   14.992763]  dump_stack_lvl+0x73/0xb0
[   14.992790]  print_report+0xd1/0x610
[   14.992825]  ? __virt_addr_valid+0x1db/0x2d0
[   14.992851]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.992872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.992894]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.992915]  kasan_report+0x141/0x180
[   14.992936]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.992962]  __asan_report_load4_noabort+0x18/0x20
[   14.992986]  kasan_atomics_helper+0x4b88/0x5450
[   14.993007]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.993029]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.993053]  ? kasan_atomics+0x152/0x310
[   14.993078]  kasan_atomics+0x1dc/0x310
[   14.993101]  ? __pfx_kasan_atomics+0x10/0x10
[   14.993124]  ? __pfx_read_tsc+0x10/0x10
[   14.993145]  ? ktime_get_ts64+0x86/0x230
[   14.993168]  kunit_try_run_case+0x1a5/0x480
[   14.993192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993282]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.993306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.993330]  ? __kthread_parkme+0x82/0x180
[   14.993349]  ? preempt_count_sub+0x50/0x80
[   14.993372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.993418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.993442]  kthread+0x337/0x6f0
[   14.993461]  ? trace_preempt_on+0x20/0xc0
[   14.993483]  ? __pfx_kthread+0x10/0x10
[   14.993503]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.993524]  ? calculate_sigpending+0x7b/0xa0
[   14.993547]  ? __pfx_kthread+0x10/0x10
[   14.993569]  ret_from_fork+0x116/0x1d0
[   14.993587]  ? __pfx_kthread+0x10/0x10
[   14.993607]  ret_from_fork_asm+0x1a/0x30
[   14.993636]  </TASK>
[   14.993646] 
[   15.002843] Allocated by task 282:
[   15.003030]  kasan_save_stack+0x45/0x70
[   15.003433]  kasan_save_track+0x18/0x40
[   15.003633]  kasan_save_alloc_info+0x3b/0x50
[   15.003850]  __kasan_kmalloc+0xb7/0xc0
[   15.003986]  __kmalloc_cache_noprof+0x189/0x420
[   15.004144]  kasan_atomics+0x95/0x310
[   15.004307]  kunit_try_run_case+0x1a5/0x480
[   15.005339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.005751]  kthread+0x337/0x6f0
[   15.006066]  ret_from_fork+0x116/0x1d0
[   15.006510]  ret_from_fork_asm+0x1a/0x30
[   15.006962] 
[   15.007070] The buggy address belongs to the object at ffff8881025e4100
[   15.007070]  which belongs to the cache kmalloc-64 of size 64
[   15.007917] The buggy address is located 0 bytes to the right of
[   15.007917]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.008478] 
[   15.008578] The buggy address belongs to the physical page:
[   15.008785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.009157] flags: 0x200000000000000(node=0|zone=2)
[   15.009331] page_type: f5(slab)
[   15.009452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.009791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.010172] page dumped because: kasan: bad access detected
[   15.010456] 
[   15.010556] Memory state around the buggy address:
[   15.010750]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.011039]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.011408] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.011622]                                      ^
[   15.011996]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.012529]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.012808] ==================================================================
[   16.145361] ==================================================================
[   16.145719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.146084] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.146347] 
[   16.146434] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.146476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.146490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.146512] Call Trace:
[   16.146529]  <TASK>
[   16.146544]  dump_stack_lvl+0x73/0xb0
[   16.146569]  print_report+0xd1/0x610
[   16.146591]  ? __virt_addr_valid+0x1db/0x2d0
[   16.146613]  ? kasan_atomics_helper+0x2006/0x5450
[   16.146635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.146657]  ? kasan_atomics_helper+0x2006/0x5450
[   16.146679]  kasan_report+0x141/0x180
[   16.146702]  ? kasan_atomics_helper+0x2006/0x5450
[   16.146728]  kasan_check_range+0x10c/0x1c0
[   16.146751]  __kasan_check_write+0x18/0x20
[   16.146771]  kasan_atomics_helper+0x2006/0x5450
[   16.146794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.147235]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.147276]  ? kasan_atomics+0x152/0x310
[   16.147305]  kasan_atomics+0x1dc/0x310
[   16.147330]  ? __pfx_kasan_atomics+0x10/0x10
[   16.147355]  ? __pfx_read_tsc+0x10/0x10
[   16.147376]  ? ktime_get_ts64+0x86/0x230
[   16.147401]  kunit_try_run_case+0x1a5/0x480
[   16.147426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.147449]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.147474]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.147499]  ? __kthread_parkme+0x82/0x180
[   16.147520]  ? preempt_count_sub+0x50/0x80
[   16.147544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.147568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.147592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.147617]  kthread+0x337/0x6f0
[   16.147638]  ? trace_preempt_on+0x20/0xc0
[   16.147661]  ? __pfx_kthread+0x10/0x10
[   16.147682]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.147704]  ? calculate_sigpending+0x7b/0xa0
[   16.147729]  ? __pfx_kthread+0x10/0x10
[   16.147751]  ret_from_fork+0x116/0x1d0
[   16.147771]  ? __pfx_kthread+0x10/0x10
[   16.147792]  ret_from_fork_asm+0x1a/0x30
[   16.147840]  </TASK>
[   16.147852] 
[   16.156262] Allocated by task 282:
[   16.156453]  kasan_save_stack+0x45/0x70
[   16.156691]  kasan_save_track+0x18/0x40
[   16.156940]  kasan_save_alloc_info+0x3b/0x50
[   16.157185]  __kasan_kmalloc+0xb7/0xc0
[   16.157377]  __kmalloc_cache_noprof+0x189/0x420
[   16.157612]  kasan_atomics+0x95/0x310
[   16.157843]  kunit_try_run_case+0x1a5/0x480
[   16.158032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.158317]  kthread+0x337/0x6f0
[   16.158493]  ret_from_fork+0x116/0x1d0
[   16.158664]  ret_from_fork_asm+0x1a/0x30
[   16.158807] 
[   16.158963] The buggy address belongs to the object at ffff8881025e4100
[   16.158963]  which belongs to the cache kmalloc-64 of size 64
[   16.159520] The buggy address is located 0 bytes to the right of
[   16.159520]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.160009] 
[   16.160163] The buggy address belongs to the physical page:
[   16.160444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.160767] flags: 0x200000000000000(node=0|zone=2)
[   16.161048] page_type: f5(slab)
[   16.161264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.161595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.161962] page dumped because: kasan: bad access detected
[   16.162251] 
[   16.162365] Memory state around the buggy address:
[   16.162571]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.162912]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.163280] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.163658]                                      ^
[   16.163845]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.164150]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.164465] ==================================================================
[   15.198903] ==================================================================
[   15.199143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.199371] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.199596] 
[   15.199679] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.199721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.199734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.199756] Call Trace:
[   15.199770]  <TASK>
[   15.199785]  dump_stack_lvl+0x73/0xb0
[   15.199923]  print_report+0xd1/0x610
[   15.199951]  ? __virt_addr_valid+0x1db/0x2d0
[   15.199974]  ? kasan_atomics_helper+0x860/0x5450
[   15.200004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.200028]  ? kasan_atomics_helper+0x860/0x5450
[   15.200051]  kasan_report+0x141/0x180
[   15.200074]  ? kasan_atomics_helper+0x860/0x5450
[   15.200101]  kasan_check_range+0x10c/0x1c0
[   15.200125]  __kasan_check_write+0x18/0x20
[   15.200145]  kasan_atomics_helper+0x860/0x5450
[   15.200168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.200191]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.200216]  ? kasan_atomics+0x152/0x310
[   15.200244]  kasan_atomics+0x1dc/0x310
[   15.200267]  ? __pfx_kasan_atomics+0x10/0x10
[   15.200291]  ? __pfx_read_tsc+0x10/0x10
[   15.200313]  ? ktime_get_ts64+0x86/0x230
[   15.200337]  kunit_try_run_case+0x1a5/0x480
[   15.200361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.200385]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.200409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.200434]  ? __kthread_parkme+0x82/0x180
[   15.200455]  ? preempt_count_sub+0x50/0x80
[   15.200478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.200503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.200527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.200552]  kthread+0x337/0x6f0
[   15.200573]  ? trace_preempt_on+0x20/0xc0
[   15.200596]  ? __pfx_kthread+0x10/0x10
[   15.200617]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.200639]  ? calculate_sigpending+0x7b/0xa0
[   15.200663]  ? __pfx_kthread+0x10/0x10
[   15.200686]  ret_from_fork+0x116/0x1d0
[   15.200705]  ? __pfx_kthread+0x10/0x10
[   15.200727]  ret_from_fork_asm+0x1a/0x30
[   15.200757]  </TASK>
[   15.200768] 
[   15.208954] Allocated by task 282:
[   15.209091]  kasan_save_stack+0x45/0x70
[   15.209291]  kasan_save_track+0x18/0x40
[   15.209485]  kasan_save_alloc_info+0x3b/0x50
[   15.209675]  __kasan_kmalloc+0xb7/0xc0
[   15.209855]  __kmalloc_cache_noprof+0x189/0x420
[   15.210077]  kasan_atomics+0x95/0x310
[   15.210246]  kunit_try_run_case+0x1a5/0x480
[   15.210436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.210642]  kthread+0x337/0x6f0
[   15.210765]  ret_from_fork+0x116/0x1d0
[   15.210913]  ret_from_fork_asm+0x1a/0x30
[   15.211055] 
[   15.211212] The buggy address belongs to the object at ffff8881025e4100
[   15.211212]  which belongs to the cache kmalloc-64 of size 64
[   15.211740] The buggy address is located 0 bytes to the right of
[   15.211740]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.212461] 
[   15.212543] The buggy address belongs to the physical page:
[   15.212720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.213026] flags: 0x200000000000000(node=0|zone=2)
[   15.213498] page_type: f5(slab)
[   15.213670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.213982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.214309] page dumped because: kasan: bad access detected
[   15.214547] 
[   15.214622] Memory state around the buggy address:
[   15.214827]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.215133]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.215414] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.215687]                                      ^
[   15.215903]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.216288]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.216564] ==================================================================
[   16.041960] ==================================================================
[   16.042349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.042705] Write of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.043065] 
[   16.043249] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.043292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.043325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.043346] Call Trace:
[   16.043364]  <TASK>
[   16.043380]  dump_stack_lvl+0x73/0xb0
[   16.043407]  print_report+0xd1/0x610
[   16.043430]  ? __virt_addr_valid+0x1db/0x2d0
[   16.043452]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.043474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.043516]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.043539]  kasan_report+0x141/0x180
[   16.043561]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.043589]  kasan_check_range+0x10c/0x1c0
[   16.043612]  __kasan_check_write+0x18/0x20
[   16.043633]  kasan_atomics_helper+0x1d7a/0x5450
[   16.043656]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.043694]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.043720]  ? kasan_atomics+0x152/0x310
[   16.043747]  kasan_atomics+0x1dc/0x310
[   16.043770]  ? __pfx_kasan_atomics+0x10/0x10
[   16.043796]  ? __pfx_read_tsc+0x10/0x10
[   16.043829]  ? ktime_get_ts64+0x86/0x230
[   16.043854]  kunit_try_run_case+0x1a5/0x480
[   16.043879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.043903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.043927]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.043952]  ? __kthread_parkme+0x82/0x180
[   16.043973]  ? preempt_count_sub+0x50/0x80
[   16.043998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.044022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.044047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.044071]  kthread+0x337/0x6f0
[   16.044092]  ? trace_preempt_on+0x20/0xc0
[   16.044115]  ? __pfx_kthread+0x10/0x10
[   16.044137]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.044159]  ? calculate_sigpending+0x7b/0xa0
[   16.044184]  ? __pfx_kthread+0x10/0x10
[   16.044206]  ret_from_fork+0x116/0x1d0
[   16.044226]  ? __pfx_kthread+0x10/0x10
[   16.044248]  ret_from_fork_asm+0x1a/0x30
[   16.044278]  </TASK>
[   16.044289] 
[   16.051636] Allocated by task 282:
[   16.051765]  kasan_save_stack+0x45/0x70
[   16.051917]  kasan_save_track+0x18/0x40
[   16.052050]  kasan_save_alloc_info+0x3b/0x50
[   16.052196]  __kasan_kmalloc+0xb7/0xc0
[   16.052327]  __kmalloc_cache_noprof+0x189/0x420
[   16.052517]  kasan_atomics+0x95/0x310
[   16.052851]  kunit_try_run_case+0x1a5/0x480
[   16.053293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.053543]  kthread+0x337/0x6f0
[   16.053712]  ret_from_fork+0x116/0x1d0
[   16.053906]  ret_from_fork_asm+0x1a/0x30
[   16.054154] 
[   16.054250] The buggy address belongs to the object at ffff8881025e4100
[   16.054250]  which belongs to the cache kmalloc-64 of size 64
[   16.054622] The buggy address is located 0 bytes to the right of
[   16.054622]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.055087] 
[   16.055184] The buggy address belongs to the physical page:
[   16.055442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.055808] flags: 0x200000000000000(node=0|zone=2)
[   16.056038] page_type: f5(slab)
[   16.056293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.056588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.056858] page dumped because: kasan: bad access detected
[   16.057028] 
[   16.057146] Memory state around the buggy address:
[   16.057366]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.057681]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.058011] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.058309]                                      ^
[   16.058462]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.058673]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.059005] ==================================================================
[   16.006164] ==================================================================
[   16.006591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.006929] Read of size 8 at addr ffff8881025e4130 by task kunit_try_catch/282
[   16.007383] 
[   16.007522] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   16.007564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.007578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.007599] Call Trace:
[   16.007614]  <TASK>
[   16.007628]  dump_stack_lvl+0x73/0xb0
[   16.007656]  print_report+0xd1/0x610
[   16.007715]  ? __virt_addr_valid+0x1db/0x2d0
[   16.007738]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.007760]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.007783]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.007806]  kasan_report+0x141/0x180
[   16.007873]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.007900]  __asan_report_load8_noabort+0x18/0x20
[   16.007925]  kasan_atomics_helper+0x4f30/0x5450
[   16.007948]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.007971]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.008027]  ? kasan_atomics+0x152/0x310
[   16.008054]  kasan_atomics+0x1dc/0x310
[   16.008078]  ? __pfx_kasan_atomics+0x10/0x10
[   16.008112]  ? __pfx_read_tsc+0x10/0x10
[   16.008134]  ? ktime_get_ts64+0x86/0x230
[   16.008189]  kunit_try_run_case+0x1a5/0x480
[   16.008215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.008239]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.008264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.008288]  ? __kthread_parkme+0x82/0x180
[   16.008309]  ? preempt_count_sub+0x50/0x80
[   16.008364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.008390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.008414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.008439]  kthread+0x337/0x6f0
[   16.008459]  ? trace_preempt_on+0x20/0xc0
[   16.008507]  ? __pfx_kthread+0x10/0x10
[   16.008529]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.008553]  ? calculate_sigpending+0x7b/0xa0
[   16.008578]  ? __pfx_kthread+0x10/0x10
[   16.008603]  ret_from_fork+0x116/0x1d0
[   16.008623]  ? __pfx_kthread+0x10/0x10
[   16.008646]  ret_from_fork_asm+0x1a/0x30
[   16.008676]  </TASK>
[   16.008687] 
[   16.015736] Allocated by task 282:
[   16.015878]  kasan_save_stack+0x45/0x70
[   16.016021]  kasan_save_track+0x18/0x40
[   16.016323]  kasan_save_alloc_info+0x3b/0x50
[   16.016552]  __kasan_kmalloc+0xb7/0xc0
[   16.016742]  __kmalloc_cache_noprof+0x189/0x420
[   16.016976]  kasan_atomics+0x95/0x310
[   16.017221]  kunit_try_run_case+0x1a5/0x480
[   16.017666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.017928]  kthread+0x337/0x6f0
[   16.018106]  ret_from_fork+0x116/0x1d0
[   16.018296]  ret_from_fork_asm+0x1a/0x30
[   16.018516] 
[   16.018613] The buggy address belongs to the object at ffff8881025e4100
[   16.018613]  which belongs to the cache kmalloc-64 of size 64
[   16.019019] The buggy address is located 0 bytes to the right of
[   16.019019]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   16.019642] 
[   16.019889] The buggy address belongs to the physical page:
[   16.020200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   16.020559] flags: 0x200000000000000(node=0|zone=2)
[   16.020802] page_type: f5(slab)
[   16.020974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.021283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.021588] page dumped because: kasan: bad access detected
[   16.021766] 
[   16.021848] Memory state around the buggy address:
[   16.022006]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.022229]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.022569] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.022893]                                      ^
[   16.023117]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.023433]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.023746] ==================================================================
[   15.031024] ==================================================================
[   15.031490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.031726] Read of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.032056] 
[   15.032165] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.032209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.032222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.032244] Call Trace:
[   15.032257]  <TASK>
[   15.032272]  dump_stack_lvl+0x73/0xb0
[   15.032298]  print_report+0xd1/0x610
[   15.032321]  ? __virt_addr_valid+0x1db/0x2d0
[   15.032343]  ? kasan_atomics_helper+0x3df/0x5450
[   15.032365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.032389]  ? kasan_atomics_helper+0x3df/0x5450
[   15.032411]  kasan_report+0x141/0x180
[   15.032434]  ? kasan_atomics_helper+0x3df/0x5450
[   15.032460]  kasan_check_range+0x10c/0x1c0
[   15.032483]  __kasan_check_read+0x15/0x20
[   15.032503]  kasan_atomics_helper+0x3df/0x5450
[   15.032527]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.032550]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.032575]  ? kasan_atomics+0x152/0x310
[   15.032603]  kasan_atomics+0x1dc/0x310
[   15.032626]  ? __pfx_kasan_atomics+0x10/0x10
[   15.032651]  ? __pfx_read_tsc+0x10/0x10
[   15.032672]  ? ktime_get_ts64+0x86/0x230
[   15.032696]  kunit_try_run_case+0x1a5/0x480
[   15.032720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.032744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.032768]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.032792]  ? __kthread_parkme+0x82/0x180
[   15.032823]  ? preempt_count_sub+0x50/0x80
[   15.032853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.032877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.032901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.032926]  kthread+0x337/0x6f0
[   15.032946]  ? trace_preempt_on+0x20/0xc0
[   15.032969]  ? __pfx_kthread+0x10/0x10
[   15.032990]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.033012]  ? calculate_sigpending+0x7b/0xa0
[   15.033036]  ? __pfx_kthread+0x10/0x10
[   15.033058]  ret_from_fork+0x116/0x1d0
[   15.033077]  ? __pfx_kthread+0x10/0x10
[   15.033110]  ret_from_fork_asm+0x1a/0x30
[   15.033142]  </TASK>
[   15.033152] 
[   15.040742] Allocated by task 282:
[   15.040943]  kasan_save_stack+0x45/0x70
[   15.041207]  kasan_save_track+0x18/0x40
[   15.041377]  kasan_save_alloc_info+0x3b/0x50
[   15.041576]  __kasan_kmalloc+0xb7/0xc0
[   15.041741]  __kmalloc_cache_noprof+0x189/0x420
[   15.041972]  kasan_atomics+0x95/0x310
[   15.042171]  kunit_try_run_case+0x1a5/0x480
[   15.042360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.042566]  kthread+0x337/0x6f0
[   15.042690]  ret_from_fork+0x116/0x1d0
[   15.042895]  ret_from_fork_asm+0x1a/0x30
[   15.043093] 
[   15.043192] The buggy address belongs to the object at ffff8881025e4100
[   15.043192]  which belongs to the cache kmalloc-64 of size 64
[   15.043659] The buggy address is located 0 bytes to the right of
[   15.043659]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.044190] 
[   15.044264] The buggy address belongs to the physical page:
[   15.044503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.044810] flags: 0x200000000000000(node=0|zone=2)
[   15.045040] page_type: f5(slab)
[   15.045322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.045612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.045853] page dumped because: kasan: bad access detected
[   15.046030] 
[   15.046102] Memory state around the buggy address:
[   15.046260]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.046480]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.046698] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.046974]                                      ^
[   15.047333]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.047654]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.047981] ==================================================================
[   15.084876] ==================================================================
[   15.085213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.085546] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.085899] 
[   15.086079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.086123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.086136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.086157] Call Trace:
[   15.086171]  <TASK>
[   15.086186]  dump_stack_lvl+0x73/0xb0
[   15.086213]  print_report+0xd1/0x610
[   15.086236]  ? __virt_addr_valid+0x1db/0x2d0
[   15.086259]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.086281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.086304]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.086327]  kasan_report+0x141/0x180
[   15.086350]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.086377]  __asan_report_store4_noabort+0x1b/0x30
[   15.086403]  kasan_atomics_helper+0x4b3a/0x5450
[   15.086427]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.086450]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.086475]  ? kasan_atomics+0x152/0x310
[   15.086502]  kasan_atomics+0x1dc/0x310
[   15.086526]  ? __pfx_kasan_atomics+0x10/0x10
[   15.086550]  ? __pfx_read_tsc+0x10/0x10
[   15.086572]  ? ktime_get_ts64+0x86/0x230
[   15.086597]  kunit_try_run_case+0x1a5/0x480
[   15.086621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.086645]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.086669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.086694]  ? __kthread_parkme+0x82/0x180
[   15.086716]  ? preempt_count_sub+0x50/0x80
[   15.086741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.086765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.086790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.086825]  kthread+0x337/0x6f0
[   15.086846]  ? trace_preempt_on+0x20/0xc0
[   15.086869]  ? __pfx_kthread+0x10/0x10
[   15.086891]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.086913]  ? calculate_sigpending+0x7b/0xa0
[   15.086937]  ? __pfx_kthread+0x10/0x10
[   15.086959]  ret_from_fork+0x116/0x1d0
[   15.086978]  ? __pfx_kthread+0x10/0x10
[   15.086999]  ret_from_fork_asm+0x1a/0x30
[   15.087029]  </TASK>
[   15.087040] 
[   15.095582] Allocated by task 282:
[   15.095714]  kasan_save_stack+0x45/0x70
[   15.095870]  kasan_save_track+0x18/0x40
[   15.096008]  kasan_save_alloc_info+0x3b/0x50
[   15.096158]  __kasan_kmalloc+0xb7/0xc0
[   15.096292]  __kmalloc_cache_noprof+0x189/0x420
[   15.096472]  kasan_atomics+0x95/0x310
[   15.096610]  kunit_try_run_case+0x1a5/0x480
[   15.096759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.096954]  kthread+0x337/0x6f0
[   15.097081]  ret_from_fork+0x116/0x1d0
[   15.097217]  ret_from_fork_asm+0x1a/0x30
[   15.097359] 
[   15.097431] The buggy address belongs to the object at ffff8881025e4100
[   15.097431]  which belongs to the cache kmalloc-64 of size 64
[   15.097804] The buggy address is located 0 bytes to the right of
[   15.097804]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.098187] 
[   15.098263] The buggy address belongs to the physical page:
[   15.098437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.098680] flags: 0x200000000000000(node=0|zone=2)
[   15.098854] page_type: f5(slab)
[   15.098977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.099212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.099440] page dumped because: kasan: bad access detected
[   15.099701] 
[   15.099871] Memory state around the buggy address:
[   15.100272]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.100869]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.101529] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.102122]                                      ^
[   15.102524]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.103143]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.103767] ==================================================================
[   15.355630] ==================================================================
[   15.356253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.356640] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.357013] 
[   15.357230] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.357341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.357356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.357378] Call Trace:
[   15.357395]  <TASK>
[   15.357410]  dump_stack_lvl+0x73/0xb0
[   15.357439]  print_report+0xd1/0x610
[   15.357588]  ? __virt_addr_valid+0x1db/0x2d0
[   15.357614]  ? kasan_atomics_helper+0xd47/0x5450
[   15.357636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.357660]  ? kasan_atomics_helper+0xd47/0x5450
[   15.357682]  kasan_report+0x141/0x180
[   15.357705]  ? kasan_atomics_helper+0xd47/0x5450
[   15.357731]  kasan_check_range+0x10c/0x1c0
[   15.357755]  __kasan_check_write+0x18/0x20
[   15.357775]  kasan_atomics_helper+0xd47/0x5450
[   15.357798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.357835]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.357861]  ? kasan_atomics+0x152/0x310
[   15.357888]  kasan_atomics+0x1dc/0x310
[   15.357911]  ? __pfx_kasan_atomics+0x10/0x10
[   15.357936]  ? __pfx_read_tsc+0x10/0x10
[   15.357957]  ? ktime_get_ts64+0x86/0x230
[   15.357981]  kunit_try_run_case+0x1a5/0x480
[   15.358006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.358030]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.358055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.358079]  ? __kthread_parkme+0x82/0x180
[   15.358112]  ? preempt_count_sub+0x50/0x80
[   15.358138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.358164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.358189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.358213]  kthread+0x337/0x6f0
[   15.358233]  ? trace_preempt_on+0x20/0xc0
[   15.358257]  ? __pfx_kthread+0x10/0x10
[   15.358278]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.358301]  ? calculate_sigpending+0x7b/0xa0
[   15.358325]  ? __pfx_kthread+0x10/0x10
[   15.358347]  ret_from_fork+0x116/0x1d0
[   15.358366]  ? __pfx_kthread+0x10/0x10
[   15.358388]  ret_from_fork_asm+0x1a/0x30
[   15.358418]  </TASK>
[   15.358429] 
[   15.368131] Allocated by task 282:
[   15.368514]  kasan_save_stack+0x45/0x70
[   15.368790]  kasan_save_track+0x18/0x40
[   15.369001]  kasan_save_alloc_info+0x3b/0x50
[   15.369364]  __kasan_kmalloc+0xb7/0xc0
[   15.369557]  __kmalloc_cache_noprof+0x189/0x420
[   15.369867]  kasan_atomics+0x95/0x310
[   15.370061]  kunit_try_run_case+0x1a5/0x480
[   15.370391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.370642]  kthread+0x337/0x6f0
[   15.370919]  ret_from_fork+0x116/0x1d0
[   15.371069]  ret_from_fork_asm+0x1a/0x30
[   15.371285] 
[   15.371386] The buggy address belongs to the object at ffff8881025e4100
[   15.371386]  which belongs to the cache kmalloc-64 of size 64
[   15.371879] The buggy address is located 0 bytes to the right of
[   15.371879]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.372794] 
[   15.372920] The buggy address belongs to the physical page:
[   15.373327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.373670] flags: 0x200000000000000(node=0|zone=2)
[   15.373974] page_type: f5(slab)
[   15.374176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.374588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.374977] page dumped because: kasan: bad access detected
[   15.375318] 
[   15.375397] Memory state around the buggy address:
[   15.375618]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.376104]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.376472] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.376883]                                      ^
[   15.377228]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.377527]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.377939] ==================================================================
[   15.163157] ==================================================================
[   15.163396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.163635] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.164037] 
[   15.164148] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.164191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.164203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.164225] Call Trace:
[   15.164239]  <TASK>
[   15.164253]  dump_stack_lvl+0x73/0xb0
[   15.164281]  print_report+0xd1/0x610
[   15.164303]  ? __virt_addr_valid+0x1db/0x2d0
[   15.164326]  ? kasan_atomics_helper+0x72f/0x5450
[   15.164347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.164370]  ? kasan_atomics_helper+0x72f/0x5450
[   15.164392]  kasan_report+0x141/0x180
[   15.164415]  ? kasan_atomics_helper+0x72f/0x5450
[   15.164442]  kasan_check_range+0x10c/0x1c0
[   15.164466]  __kasan_check_write+0x18/0x20
[   15.164486]  kasan_atomics_helper+0x72f/0x5450
[   15.164509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.164531]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.164556]  ? kasan_atomics+0x152/0x310
[   15.164583]  kasan_atomics+0x1dc/0x310
[   15.164606]  ? __pfx_kasan_atomics+0x10/0x10
[   15.164631]  ? __pfx_read_tsc+0x10/0x10
[   15.164652]  ? ktime_get_ts64+0x86/0x230
[   15.164677]  kunit_try_run_case+0x1a5/0x480
[   15.164702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.164725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.164749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.164774]  ? __kthread_parkme+0x82/0x180
[   15.164794]  ? preempt_count_sub+0x50/0x80
[   15.164831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.164861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.164885]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.164911]  kthread+0x337/0x6f0
[   15.164931]  ? trace_preempt_on+0x20/0xc0
[   15.164955]  ? __pfx_kthread+0x10/0x10
[   15.164975]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.164998]  ? calculate_sigpending+0x7b/0xa0
[   15.165022]  ? __pfx_kthread+0x10/0x10
[   15.165045]  ret_from_fork+0x116/0x1d0
[   15.165064]  ? __pfx_kthread+0x10/0x10
[   15.165085]  ret_from_fork_asm+0x1a/0x30
[   15.165116]  </TASK>
[   15.165127] 
[   15.172886] Allocated by task 282:
[   15.173019]  kasan_save_stack+0x45/0x70
[   15.173338]  kasan_save_track+0x18/0x40
[   15.173532]  kasan_save_alloc_info+0x3b/0x50
[   15.173726]  __kasan_kmalloc+0xb7/0xc0
[   15.173873]  __kmalloc_cache_noprof+0x189/0x420
[   15.174103]  kasan_atomics+0x95/0x310
[   15.174299]  kunit_try_run_case+0x1a5/0x480
[   15.174476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.174740]  kthread+0x337/0x6f0
[   15.174903]  ret_from_fork+0x116/0x1d0
[   15.175073]  ret_from_fork_asm+0x1a/0x30
[   15.175261] 
[   15.175359] The buggy address belongs to the object at ffff8881025e4100
[   15.175359]  which belongs to the cache kmalloc-64 of size 64
[   15.175782] The buggy address is located 0 bytes to the right of
[   15.175782]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.176323] 
[   15.176421] The buggy address belongs to the physical page:
[   15.176680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.177051] flags: 0x200000000000000(node=0|zone=2)
[   15.177322] page_type: f5(slab)
[   15.177448] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.177766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.178132] page dumped because: kasan: bad access detected
[   15.178358] 
[   15.178436] Memory state around the buggy address:
[   15.178632]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.178914]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.179263] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.179557]                                      ^
[   15.179756]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.180058]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.180356] ==================================================================
[   15.235202] ==================================================================
[   15.235509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.235740] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.235982] 
[   15.236067] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.236111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.236124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.236146] Call Trace:
[   15.236163]  <TASK>
[   15.236180]  dump_stack_lvl+0x73/0xb0
[   15.236206]  print_report+0xd1/0x610
[   15.236227]  ? __virt_addr_valid+0x1db/0x2d0
[   15.236251]  ? kasan_atomics_helper+0x992/0x5450
[   15.236273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.236295]  ? kasan_atomics_helper+0x992/0x5450
[   15.236318]  kasan_report+0x141/0x180
[   15.236341]  ? kasan_atomics_helper+0x992/0x5450
[   15.236367]  kasan_check_range+0x10c/0x1c0
[   15.236391]  __kasan_check_write+0x18/0x20
[   15.236411]  kasan_atomics_helper+0x992/0x5450
[   15.236434]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.236456]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.236482]  ? kasan_atomics+0x152/0x310
[   15.236509]  kasan_atomics+0x1dc/0x310
[   15.236532]  ? __pfx_kasan_atomics+0x10/0x10
[   15.236557]  ? __pfx_read_tsc+0x10/0x10
[   15.236579]  ? ktime_get_ts64+0x86/0x230
[   15.236604]  kunit_try_run_case+0x1a5/0x480
[   15.236628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.236652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.236676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.236700]  ? __kthread_parkme+0x82/0x180
[   15.236721]  ? preempt_count_sub+0x50/0x80
[   15.236746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.236770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.236795]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.236829]  kthread+0x337/0x6f0
[   15.236853]  ? trace_preempt_on+0x20/0xc0
[   15.236876]  ? __pfx_kthread+0x10/0x10
[   15.236897]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.236919]  ? calculate_sigpending+0x7b/0xa0
[   15.236943]  ? __pfx_kthread+0x10/0x10
[   15.236965]  ret_from_fork+0x116/0x1d0
[   15.236984]  ? __pfx_kthread+0x10/0x10
[   15.237006]  ret_from_fork_asm+0x1a/0x30
[   15.237036]  </TASK>
[   15.237047] 
[   15.244780] Allocated by task 282:
[   15.244971]  kasan_save_stack+0x45/0x70
[   15.245173]  kasan_save_track+0x18/0x40
[   15.245366]  kasan_save_alloc_info+0x3b/0x50
[   15.245544]  __kasan_kmalloc+0xb7/0xc0
[   15.245723]  __kmalloc_cache_noprof+0x189/0x420
[   15.245893]  kasan_atomics+0x95/0x310
[   15.246029]  kunit_try_run_case+0x1a5/0x480
[   15.246406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.246663]  kthread+0x337/0x6f0
[   15.246852]  ret_from_fork+0x116/0x1d0
[   15.247047]  ret_from_fork_asm+0x1a/0x30
[   15.247276] 
[   15.247380] The buggy address belongs to the object at ffff8881025e4100
[   15.247380]  which belongs to the cache kmalloc-64 of size 64
[   15.247841] The buggy address is located 0 bytes to the right of
[   15.247841]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.248385] 
[   15.248480] The buggy address belongs to the physical page:
[   15.248667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.248925] flags: 0x200000000000000(node=0|zone=2)
[   15.249154] page_type: f5(slab)
[   15.249418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.249758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.250002] page dumped because: kasan: bad access detected
[   15.250380] 
[   15.250477] Memory state around the buggy address:
[   15.250703]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.251041]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.251514] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.251797]                                      ^
[   15.251986]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.252307]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.252579] ==================================================================
[   15.270669] ==================================================================
[   15.271003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.271350] Write of size 4 at addr ffff8881025e4130 by task kunit_try_catch/282
[   15.271583] 
[   15.271675] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.271725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.271738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.271761] Call Trace:
[   15.271774]  <TASK>
[   15.271790]  dump_stack_lvl+0x73/0xb0
[   15.271829]  print_report+0xd1/0x610
[   15.271852]  ? __virt_addr_valid+0x1db/0x2d0
[   15.271875]  ? kasan_atomics_helper+0xac7/0x5450
[   15.271898]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.271921]  ? kasan_atomics_helper+0xac7/0x5450
[   15.271945]  kasan_report+0x141/0x180
[   15.271968]  ? kasan_atomics_helper+0xac7/0x5450
[   15.271994]  kasan_check_range+0x10c/0x1c0
[   15.272019]  __kasan_check_write+0x18/0x20
[   15.272039]  kasan_atomics_helper+0xac7/0x5450
[   15.272062]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.272085]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.272122]  ? kasan_atomics+0x152/0x310
[   15.272149]  kasan_atomics+0x1dc/0x310
[   15.272172]  ? __pfx_kasan_atomics+0x10/0x10
[   15.272197]  ? __pfx_read_tsc+0x10/0x10
[   15.272218]  ? ktime_get_ts64+0x86/0x230
[   15.272241]  kunit_try_run_case+0x1a5/0x480
[   15.272267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.272290]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.272315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.272338]  ? __kthread_parkme+0x82/0x180
[   15.272358]  ? preempt_count_sub+0x50/0x80
[   15.272382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.272407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.272431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.272455]  kthread+0x337/0x6f0
[   15.272475]  ? trace_preempt_on+0x20/0xc0
[   15.272498]  ? __pfx_kthread+0x10/0x10
[   15.272520]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.272542]  ? calculate_sigpending+0x7b/0xa0
[   15.272565]  ? __pfx_kthread+0x10/0x10
[   15.272588]  ret_from_fork+0x116/0x1d0
[   15.272607]  ? __pfx_kthread+0x10/0x10
[   15.272629]  ret_from_fork_asm+0x1a/0x30
[   15.272659]  </TASK>
[   15.272671] 
[   15.281182] Allocated by task 282:
[   15.281498]  kasan_save_stack+0x45/0x70
[   15.281861]  kasan_save_track+0x18/0x40
[   15.282228]  kasan_save_alloc_info+0x3b/0x50
[   15.282605]  __kasan_kmalloc+0xb7/0xc0
[   15.282943]  __kmalloc_cache_noprof+0x189/0x420
[   15.283161]  kasan_atomics+0x95/0x310
[   15.283296]  kunit_try_run_case+0x1a5/0x480
[   15.283445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.283622]  kthread+0x337/0x6f0
[   15.283763]  ret_from_fork+0x116/0x1d0
[   15.283910]  ret_from_fork_asm+0x1a/0x30
[   15.284054] 
[   15.284128] The buggy address belongs to the object at ffff8881025e4100
[   15.284128]  which belongs to the cache kmalloc-64 of size 64
[   15.284485] The buggy address is located 0 bytes to the right of
[   15.284485]  allocated 48-byte region [ffff8881025e4100, ffff8881025e4130)
[   15.284864] 
[   15.284937] The buggy address belongs to the physical page:
[   15.285111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025e4
[   15.285355] flags: 0x200000000000000(node=0|zone=2)
[   15.285521] page_type: f5(slab)
[   15.285834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.286458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.287228] page dumped because: kasan: bad access detected
[   15.287696] 
[   15.287863] Memory state around the buggy address:
[   15.288296]  ffff8881025e4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.288907]  ffff8881025e4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.289498] >ffff8881025e4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.290099]                                      ^
[   15.290509]  ffff8881025e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.291110]  ffff8881025e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.291691] ==================================================================