Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   56.955544] ==================================================================
[   56.962501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   56.969786] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   56.977164] 
[   56.978648] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   56.978696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.978713] Hardware name: WinLink E850-96 board (DT)
[   56.978733] Call trace:
[   56.978747]  show_stack+0x20/0x38 (C)
[   56.978780]  dump_stack_lvl+0x8c/0xd0
[   56.978816]  print_report+0x118/0x608
[   56.978851]  kasan_report+0xdc/0x128
[   56.978885]  kasan_check_range+0x100/0x1a8
[   56.978923]  __kasan_check_write+0x20/0x30
[   56.978954]  kasan_atomics_helper+0xf20/0x4858
[   56.978989]  kasan_atomics+0x198/0x2e0
[   56.979019]  kunit_try_run_case+0x170/0x3f0
[   56.979055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.979095]  kthread+0x328/0x630
[   56.979123]  ret_from_fork+0x10/0x20
[   56.979158] 
[   57.048864] Allocated by task 312:
[   57.052250]  kasan_save_stack+0x3c/0x68
[   57.056069]  kasan_save_track+0x20/0x40
[   57.059889]  kasan_save_alloc_info+0x40/0x58
[   57.064142]  __kasan_kmalloc+0xd4/0xd8
[   57.067876]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.072388]  kasan_atomics+0xb8/0x2e0
[   57.076034]  kunit_try_run_case+0x170/0x3f0
[   57.080201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.085669]  kthread+0x328/0x630
[   57.088881]  ret_from_fork+0x10/0x20
[   57.092440] 
[   57.093916] The buggy address belongs to the object at ffff000805f49a00
[   57.093916]  which belongs to the cache kmalloc-64 of size 64
[   57.106242] The buggy address is located 0 bytes to the right of
[   57.106242]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   57.119089] 
[   57.120565] The buggy address belongs to the physical page:
[   57.126122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   57.134110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.140616] page_type: f5(slab)
[   57.143753] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.151475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.159193] page dumped because: kasan: bad access detected
[   57.164748] 
[   57.166224] Memory state around the buggy address:
[   57.171002]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.178207]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.185411] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.192612]                                      ^
[   57.197390]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.204595]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.211796] ==================================================================
[   54.595236] ==================================================================
[   54.602288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   54.609578] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   54.616957] 
[   54.618438] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   54.618483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.618498] Hardware name: WinLink E850-96 board (DT)
[   54.618516] Call trace:
[   54.618527]  show_stack+0x20/0x38 (C)
[   54.618561]  dump_stack_lvl+0x8c/0xd0
[   54.618596]  print_report+0x118/0x608
[   54.618629]  kasan_report+0xdc/0x128
[   54.618663]  kasan_check_range+0x100/0x1a8
[   54.618699]  __kasan_check_write+0x20/0x30
[   54.618731]  kasan_atomics_helper+0xca0/0x4858
[   54.618767]  kasan_atomics+0x198/0x2e0
[   54.618797]  kunit_try_run_case+0x170/0x3f0
[   54.618832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.618870]  kthread+0x328/0x630
[   54.618897]  ret_from_fork+0x10/0x20
[   54.618929] 
[   54.688657] Allocated by task 312:
[   54.692042]  kasan_save_stack+0x3c/0x68
[   54.695862]  kasan_save_track+0x20/0x40
[   54.699681]  kasan_save_alloc_info+0x40/0x58
[   54.703934]  __kasan_kmalloc+0xd4/0xd8
[   54.707667]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.712181]  kasan_atomics+0xb8/0x2e0
[   54.715827]  kunit_try_run_case+0x170/0x3f0
[   54.719993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.725462]  kthread+0x328/0x630
[   54.728674]  ret_from_fork+0x10/0x20
[   54.732233] 
[   54.733708] The buggy address belongs to the object at ffff000805f49a00
[   54.733708]  which belongs to the cache kmalloc-64 of size 64
[   54.746035] The buggy address is located 0 bytes to the right of
[   54.746035]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   54.758881] 
[   54.760357] The buggy address belongs to the physical page:
[   54.765913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   54.773899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.780409] page_type: f5(slab)
[   54.783542] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.791266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.798985] page dumped because: kasan: bad access detected
[   54.804540] 
[   54.806016] Memory state around the buggy address:
[   54.810795]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.817999]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.825204] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.832405]                                      ^
[   54.837183]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.844388]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.851589] ==================================================================
[   56.691730] ==================================================================
[   56.698785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   56.706075] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   56.713453] 
[   56.714933] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   56.714980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.714995] Hardware name: WinLink E850-96 board (DT)
[   56.715012] Call trace:
[   56.715025]  show_stack+0x20/0x38 (C)
[   56.715056]  dump_stack_lvl+0x8c/0xd0
[   56.715093]  print_report+0x118/0x608
[   56.715127]  kasan_report+0xdc/0x128
[   56.715161]  kasan_check_range+0x100/0x1a8
[   56.715195]  __kasan_check_write+0x20/0x30
[   56.715224]  kasan_atomics_helper+0xeb8/0x4858
[   56.715259]  kasan_atomics+0x198/0x2e0
[   56.715290]  kunit_try_run_case+0x170/0x3f0
[   56.715323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.715361]  kthread+0x328/0x630
[   56.715391]  ret_from_fork+0x10/0x20
[   56.715422] 
[   56.785153] Allocated by task 312:
[   56.788539]  kasan_save_stack+0x3c/0x68
[   56.792358]  kasan_save_track+0x20/0x40
[   56.796177]  kasan_save_alloc_info+0x40/0x58
[   56.800430]  __kasan_kmalloc+0xd4/0xd8
[   56.804163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.808677]  kasan_atomics+0xb8/0x2e0
[   56.812323]  kunit_try_run_case+0x170/0x3f0
[   56.816490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.821958]  kthread+0x328/0x630
[   56.825170]  ret_from_fork+0x10/0x20
[   56.828729] 
[   56.830205] The buggy address belongs to the object at ffff000805f49a00
[   56.830205]  which belongs to the cache kmalloc-64 of size 64
[   56.842531] The buggy address is located 0 bytes to the right of
[   56.842531]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   56.855378] 
[   56.856854] The buggy address belongs to the physical page:
[   56.862410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   56.870395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.876905] page_type: f5(slab)
[   56.880039] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.887763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.895482] page dumped because: kasan: bad access detected
[   56.901037] 
[   56.902512] Memory state around the buggy address:
[   56.907291]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.914496]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.921700] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.928901]                                      ^
[   56.933679]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.940884]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.948085] ==================================================================
[   52.759152] ==================================================================
[   52.766205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.773495] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   52.780873] 
[   52.782354] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   52.782401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.782417] Hardware name: WinLink E850-96 board (DT)
[   52.782435] Call trace:
[   52.782448]  show_stack+0x20/0x38 (C)
[   52.782480]  dump_stack_lvl+0x8c/0xd0
[   52.782515]  print_report+0x118/0x608
[   52.782549]  kasan_report+0xdc/0x128
[   52.782582]  kasan_check_range+0x100/0x1a8
[   52.782616]  __kasan_check_write+0x20/0x30
[   52.782647]  kasan_atomics_helper+0xa6c/0x4858
[   52.782682]  kasan_atomics+0x198/0x2e0
[   52.782712]  kunit_try_run_case+0x170/0x3f0
[   52.782746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.782782]  kthread+0x328/0x630
[   52.782810]  ret_from_fork+0x10/0x20
[   52.782840] 
[   52.852573] Allocated by task 312:
[   52.855959]  kasan_save_stack+0x3c/0x68
[   52.859778]  kasan_save_track+0x20/0x40
[   52.863597]  kasan_save_alloc_info+0x40/0x58
[   52.867851]  __kasan_kmalloc+0xd4/0xd8
[   52.871583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.876097]  kasan_atomics+0xb8/0x2e0
[   52.879743]  kunit_try_run_case+0x170/0x3f0
[   52.883910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.889378]  kthread+0x328/0x630
[   52.892590]  ret_from_fork+0x10/0x20
[   52.896149] 
[   52.897624] The buggy address belongs to the object at ffff000805f49a00
[   52.897624]  which belongs to the cache kmalloc-64 of size 64
[   52.909951] The buggy address is located 0 bytes to the right of
[   52.909951]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   52.922798] 
[   52.924274] The buggy address belongs to the physical page:
[   52.929830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   52.937815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.944325] page_type: f5(slab)
[   52.947459] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.955183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.962902] page dumped because: kasan: bad access detected
[   52.968457] 
[   52.969933] Memory state around the buggy address:
[   52.974711]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.981916]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.989120] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.996321]                                      ^
[   53.001099]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.008304]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.015505] ==================================================================
[   47.231269] ==================================================================
[   47.238165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   47.245453] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   47.252831] 
[   47.254315] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   47.254363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.254379] Hardware name: WinLink E850-96 board (DT)
[   47.254399] Call trace:
[   47.254415]  show_stack+0x20/0x38 (C)
[   47.254452]  dump_stack_lvl+0x8c/0xd0
[   47.254489]  print_report+0x118/0x608
[   47.254525]  kasan_report+0xdc/0x128
[   47.254559]  kasan_check_range+0x100/0x1a8
[   47.254598]  __kasan_check_write+0x20/0x30
[   47.254629]  kasan_atomics_helper+0x24c/0x4858
[   47.254663]  kasan_atomics+0x198/0x2e0
[   47.254694]  kunit_try_run_case+0x170/0x3f0
[   47.254730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.254768]  kthread+0x328/0x630
[   47.254793]  ret_from_fork+0x10/0x20
[   47.254827] 
[   47.324531] Allocated by task 312:
[   47.327918]  kasan_save_stack+0x3c/0x68
[   47.331736]  kasan_save_track+0x20/0x40
[   47.335555]  kasan_save_alloc_info+0x40/0x58
[   47.339809]  __kasan_kmalloc+0xd4/0xd8
[   47.343541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.348055]  kasan_atomics+0xb8/0x2e0
[   47.351701]  kunit_try_run_case+0x170/0x3f0
[   47.355868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.361336]  kthread+0x328/0x630
[   47.364548]  ret_from_fork+0x10/0x20
[   47.368107] 
[   47.369583] The buggy address belongs to the object at ffff000805f49a00
[   47.369583]  which belongs to the cache kmalloc-64 of size 64
[   47.381909] The buggy address is located 0 bytes to the right of
[   47.381909]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   47.394756] 
[   47.396233] The buggy address belongs to the physical page:
[   47.401789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   47.409776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.416284] page_type: f5(slab)
[   47.419418] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.427141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.434860] page dumped because: kasan: bad access detected
[   47.440415] 
[   47.441890] Memory state around the buggy address:
[   47.446670]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.453874]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.461078] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.468279]                                      ^
[   47.473057]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.480262]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.487462] ==================================================================
[   48.806785] ==================================================================
[   48.813836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   48.821124] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   48.828502] 
[   48.829985] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   48.830037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.830054] Hardware name: WinLink E850-96 board (DT)
[   48.830073] Call trace:
[   48.830087]  show_stack+0x20/0x38 (C)
[   48.830120]  dump_stack_lvl+0x8c/0xd0
[   48.830156]  print_report+0x118/0x608
[   48.830189]  kasan_report+0xdc/0x128
[   48.830222]  kasan_check_range+0x100/0x1a8
[   48.830256]  __kasan_check_write+0x20/0x30
[   48.830286]  kasan_atomics_helper+0x414/0x4858
[   48.830320]  kasan_atomics+0x198/0x2e0
[   48.830351]  kunit_try_run_case+0x170/0x3f0
[   48.830385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.830423]  kthread+0x328/0x630
[   48.830451]  ret_from_fork+0x10/0x20
[   48.830482] 
[   48.900202] Allocated by task 312:
[   48.903587]  kasan_save_stack+0x3c/0x68
[   48.907407]  kasan_save_track+0x20/0x40
[   48.911226]  kasan_save_alloc_info+0x40/0x58
[   48.915480]  __kasan_kmalloc+0xd4/0xd8
[   48.919212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.923726]  kasan_atomics+0xb8/0x2e0
[   48.927372]  kunit_try_run_case+0x170/0x3f0
[   48.931538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.937007]  kthread+0x328/0x630
[   48.940219]  ret_from_fork+0x10/0x20
[   48.943778] 
[   48.945255] The buggy address belongs to the object at ffff000805f49a00
[   48.945255]  which belongs to the cache kmalloc-64 of size 64
[   48.957580] The buggy address is located 0 bytes to the right of
[   48.957580]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   48.970427] 
[   48.971904] The buggy address belongs to the physical page:
[   48.977460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   48.985447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.991955] page_type: f5(slab)
[   48.995091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.002812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.010530] page dumped because: kasan: bad access detected
[   49.016086] 
[   49.017561] Memory state around the buggy address:
[   49.022340]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.029544]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.036749] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.043950]                                      ^
[   49.048728]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.055933]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.063134] ==================================================================
[   50.389071] ==================================================================
[   50.396105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   50.403392] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   50.410770] 
[   50.412254] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   50.412306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.412322] Hardware name: WinLink E850-96 board (DT)
[   50.412343] Call trace:
[   50.412361]  show_stack+0x20/0x38 (C)
[   50.412394]  dump_stack_lvl+0x8c/0xd0
[   50.412432]  print_report+0x118/0x608
[   50.412467]  kasan_report+0xdc/0x128
[   50.412498]  kasan_check_range+0x100/0x1a8
[   50.412535]  __kasan_check_write+0x20/0x30
[   50.412565]  kasan_atomics_helper+0x684/0x4858
[   50.412598]  kasan_atomics+0x198/0x2e0
[   50.412631]  kunit_try_run_case+0x170/0x3f0
[   50.412667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.412704]  kthread+0x328/0x630
[   50.412733]  ret_from_fork+0x10/0x20
[   50.412764] 
[   50.482470] Allocated by task 312:
[   50.485856]  kasan_save_stack+0x3c/0x68
[   50.489675]  kasan_save_track+0x20/0x40
[   50.493494]  kasan_save_alloc_info+0x40/0x58
[   50.497748]  __kasan_kmalloc+0xd4/0xd8
[   50.501480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.505994]  kasan_atomics+0xb8/0x2e0
[   50.509640]  kunit_try_run_case+0x170/0x3f0
[   50.513806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.519275]  kthread+0x328/0x630
[   50.522487]  ret_from_fork+0x10/0x20
[   50.526046] 
[   50.527521] The buggy address belongs to the object at ffff000805f49a00
[   50.527521]  which belongs to the cache kmalloc-64 of size 64
[   50.539848] The buggy address is located 0 bytes to the right of
[   50.539848]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   50.552695] 
[   50.554171] The buggy address belongs to the physical page:
[   50.559727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   50.567714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.574222] page_type: f5(slab)
[   50.577356] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.585079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.592798] page dumped because: kasan: bad access detected
[   50.598354] 
[   50.599829] Memory state around the buggy address:
[   50.604607]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.611812]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.619017] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.626218]                                      ^
[   50.630996]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.638201]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.645402] ==================================================================
[   51.968124] ==================================================================
[   51.975072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   51.982361] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   51.989739] 
[   51.991223] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   51.991270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.991285] Hardware name: WinLink E850-96 board (DT)
[   51.991306] Call trace:
[   51.991323]  show_stack+0x20/0x38 (C)
[   51.991356]  dump_stack_lvl+0x8c/0xd0
[   51.991392]  print_report+0x118/0x608
[   51.991426]  kasan_report+0xdc/0x128
[   51.991462]  kasan_check_range+0x100/0x1a8
[   51.991498]  __kasan_check_write+0x20/0x30
[   51.991529]  kasan_atomics_helper+0x934/0x4858
[   51.991563]  kasan_atomics+0x198/0x2e0
[   51.991594]  kunit_try_run_case+0x170/0x3f0
[   51.991628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.991666]  kthread+0x328/0x630
[   51.991693]  ret_from_fork+0x10/0x20
[   51.991730] 
[   52.061439] Allocated by task 312:
[   52.064825]  kasan_save_stack+0x3c/0x68
[   52.068644]  kasan_save_track+0x20/0x40
[   52.072463]  kasan_save_alloc_info+0x40/0x58
[   52.076717]  __kasan_kmalloc+0xd4/0xd8
[   52.080449]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.084963]  kasan_atomics+0xb8/0x2e0
[   52.088609]  kunit_try_run_case+0x170/0x3f0
[   52.092776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.098244]  kthread+0x328/0x630
[   52.101456]  ret_from_fork+0x10/0x20
[   52.105015] 
[   52.106490] The buggy address belongs to the object at ffff000805f49a00
[   52.106490]  which belongs to the cache kmalloc-64 of size 64
[   52.118817] The buggy address is located 0 bytes to the right of
[   52.118817]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   52.131664] 
[   52.133142] The buggy address belongs to the physical page:
[   52.138698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   52.146683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.153191] page_type: f5(slab)
[   52.156326] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.164049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.171768] page dumped because: kasan: bad access detected
[   52.177323] 
[   52.178798] Memory state around the buggy address:
[   52.183577]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.190782]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.197986] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.205187]                                      ^
[   52.209965]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.217170]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.224371] ==================================================================
[   58.538208] ==================================================================
[   58.545286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   58.552662] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   58.560040] 
[   58.561523] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   58.561569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.561586] Hardware name: WinLink E850-96 board (DT)
[   58.561606] Call trace:
[   58.561620]  show_stack+0x20/0x38 (C)
[   58.561655]  dump_stack_lvl+0x8c/0xd0
[   58.561689]  print_report+0x118/0x608
[   58.561722]  kasan_report+0xdc/0x128
[   58.561757]  kasan_check_range+0x100/0x1a8
[   58.561793]  __kasan_check_write+0x20/0x30
[   58.561824]  kasan_atomics_helper+0x1190/0x4858
[   58.561857]  kasan_atomics+0x198/0x2e0
[   58.561887]  kunit_try_run_case+0x170/0x3f0
[   58.561918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.561956]  kthread+0x328/0x630
[   58.561984]  ret_from_fork+0x10/0x20
[   58.562017] 
[   58.631827] Allocated by task 312:
[   58.635213]  kasan_save_stack+0x3c/0x68
[   58.639032]  kasan_save_track+0x20/0x40
[   58.642851]  kasan_save_alloc_info+0x40/0x58
[   58.647104]  __kasan_kmalloc+0xd4/0xd8
[   58.650837]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.655351]  kasan_atomics+0xb8/0x2e0
[   58.658997]  kunit_try_run_case+0x170/0x3f0
[   58.663163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.668632]  kthread+0x328/0x630
[   58.671844]  ret_from_fork+0x10/0x20
[   58.675402] 
[   58.676878] The buggy address belongs to the object at ffff000805f49a00
[   58.676878]  which belongs to the cache kmalloc-64 of size 64
[   58.689205] The buggy address is located 0 bytes to the right of
[   58.689205]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   58.702052] 
[   58.703527] The buggy address belongs to the physical page:
[   58.709085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   58.717072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.723579] page_type: f5(slab)
[   58.726712] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.734436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.742155] page dumped because: kasan: bad access detected
[   58.747711] 
[   58.749186] Memory state around the buggy address:
[   58.753964]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.761169]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.768374] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.775575]                                      ^
[   58.780353]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.787558]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.794759] ==================================================================
[   55.119488] ==================================================================
[   55.126413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   55.133703] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   55.141080] 
[   55.142564] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   55.142614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.142629] Hardware name: WinLink E850-96 board (DT)
[   55.142649] Call trace:
[   55.142666]  show_stack+0x20/0x38 (C)
[   55.142698]  dump_stack_lvl+0x8c/0xd0
[   55.142734]  print_report+0x118/0x608
[   55.142767]  kasan_report+0xdc/0x128
[   55.142801]  kasan_check_range+0x100/0x1a8
[   55.142838]  __kasan_check_write+0x20/0x30
[   55.142869]  kasan_atomics_helper+0xd3c/0x4858
[   55.142904]  kasan_atomics+0x198/0x2e0
[   55.142935]  kunit_try_run_case+0x170/0x3f0
[   55.142971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.143009]  kthread+0x328/0x630
[   55.143037]  ret_from_fork+0x10/0x20
[   55.143072] 
[   55.212781] Allocated by task 312:
[   55.216166]  kasan_save_stack+0x3c/0x68
[   55.219986]  kasan_save_track+0x20/0x40
[   55.223805]  kasan_save_alloc_info+0x40/0x58
[   55.228059]  __kasan_kmalloc+0xd4/0xd8
[   55.231791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.236305]  kasan_atomics+0xb8/0x2e0
[   55.239950]  kunit_try_run_case+0x170/0x3f0
[   55.244117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.249586]  kthread+0x328/0x630
[   55.252798]  ret_from_fork+0x10/0x20
[   55.256357] 
[   55.257832] The buggy address belongs to the object at ffff000805f49a00
[   55.257832]  which belongs to the cache kmalloc-64 of size 64
[   55.270159] The buggy address is located 0 bytes to the right of
[   55.270159]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   55.283006] 
[   55.284481] The buggy address belongs to the physical page:
[   55.290039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   55.298026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.304533] page_type: f5(slab)
[   55.307668] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.315391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.323109] page dumped because: kasan: bad access detected
[   55.328664] 
[   55.330140] Memory state around the buggy address:
[   55.334919]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.342123]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.349328] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.356529]                                      ^
[   55.361307]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.368511]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.375713] ==================================================================
[   60.645842] ==================================================================
[   60.652892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   60.660269] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   60.667647] 
[   60.669129] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   60.669176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.669192] Hardware name: WinLink E850-96 board (DT)
[   60.669211] Call trace:
[   60.669227]  show_stack+0x20/0x38 (C)
[   60.669260]  dump_stack_lvl+0x8c/0xd0
[   60.669295]  print_report+0x118/0x608
[   60.669328]  kasan_report+0xdc/0x128
[   60.669361]  kasan_check_range+0x100/0x1a8
[   60.669395]  __kasan_check_write+0x20/0x30
[   60.669427]  kasan_atomics_helper+0x14e4/0x4858
[   60.669461]  kasan_atomics+0x198/0x2e0
[   60.669491]  kunit_try_run_case+0x170/0x3f0
[   60.669524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.669562]  kthread+0x328/0x630
[   60.669590]  ret_from_fork+0x10/0x20
[   60.669623] 
[   60.739434] Allocated by task 312:
[   60.742819]  kasan_save_stack+0x3c/0x68
[   60.746639]  kasan_save_track+0x20/0x40
[   60.750458]  kasan_save_alloc_info+0x40/0x58
[   60.754712]  __kasan_kmalloc+0xd4/0xd8
[   60.758444]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.762958]  kasan_atomics+0xb8/0x2e0
[   60.766604]  kunit_try_run_case+0x170/0x3f0
[   60.770771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.776239]  kthread+0x328/0x630
[   60.779450]  ret_from_fork+0x10/0x20
[   60.783010] 
[   60.784485] The buggy address belongs to the object at ffff000805f49a00
[   60.784485]  which belongs to the cache kmalloc-64 of size 64
[   60.796812] The buggy address is located 0 bytes to the right of
[   60.796812]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   60.809659] 
[   60.811135] The buggy address belongs to the physical page:
[   60.816690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   60.824678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.831186] page_type: f5(slab)
[   60.834321] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.842044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.849762] page dumped because: kasan: bad access detected
[   60.855318] 
[   60.856793] Memory state around the buggy address:
[   60.861572]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.868776]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.875981] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.883182]                                      ^
[   60.887960]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.895165]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.902366] ==================================================================
[   47.494868] ==================================================================
[   47.501879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   47.509164] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   47.516456] 
[   47.517941] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   47.517993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.518009] Hardware name: WinLink E850-96 board (DT)
[   47.518030] Call trace:
[   47.518046]  show_stack+0x20/0x38 (C)
[   47.518082]  dump_stack_lvl+0x8c/0xd0
[   47.518123]  print_report+0x118/0x608
[   47.518158]  kasan_report+0xdc/0x128
[   47.518192]  kasan_check_range+0x100/0x1a8
[   47.518231]  __kasan_check_read+0x20/0x30
[   47.518260]  kasan_atomics_helper+0x2b0/0x4858
[   47.518295]  kasan_atomics+0x198/0x2e0
[   47.518328]  kunit_try_run_case+0x170/0x3f0
[   47.518367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.518407]  kthread+0x328/0x630
[   47.518435]  ret_from_fork+0x10/0x20
[   47.518470] 
[   47.588069] Allocated by task 312:
[   47.591456]  kasan_save_stack+0x3c/0x68
[   47.595274]  kasan_save_track+0x20/0x40
[   47.599093]  kasan_save_alloc_info+0x40/0x58
[   47.603346]  __kasan_kmalloc+0xd4/0xd8
[   47.607079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.611593]  kasan_atomics+0xb8/0x2e0
[   47.615239]  kunit_try_run_case+0x170/0x3f0
[   47.619405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.624874]  kthread+0x328/0x630
[   47.628086]  ret_from_fork+0x10/0x20
[   47.631645] 
[   47.633121] The buggy address belongs to the object at ffff000805f49a00
[   47.633121]  which belongs to the cache kmalloc-64 of size 64
[   47.645447] The buggy address is located 0 bytes to the right of
[   47.645447]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   47.658294] 
[   47.659771] The buggy address belongs to the physical page:
[   47.665330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   47.673311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.679821] page_type: f5(slab)
[   47.682957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.690680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.698397] page dumped because: kasan: bad access detected
[   47.703953] 
[   47.705428] Memory state around the buggy address:
[   47.710208]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.717411]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.724616] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.731817]                                      ^
[   47.736595]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.743800]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.751002] ==================================================================
[   51.180189] ==================================================================
[   51.187237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   51.194526] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   51.201904] 
[   51.203386] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   51.203435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.203452] Hardware name: WinLink E850-96 board (DT)
[   51.203473] Call trace:
[   51.203488]  show_stack+0x20/0x38 (C)
[   51.203521]  dump_stack_lvl+0x8c/0xd0
[   51.203557]  print_report+0x118/0x608
[   51.203590]  kasan_report+0xdc/0x128
[   51.203625]  kasan_check_range+0x100/0x1a8
[   51.203662]  __kasan_check_write+0x20/0x30
[   51.203692]  kasan_atomics_helper+0x7cc/0x4858
[   51.203726]  kasan_atomics+0x198/0x2e0
[   51.203756]  kunit_try_run_case+0x170/0x3f0
[   51.203790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.203828]  kthread+0x328/0x630
[   51.203856]  ret_from_fork+0x10/0x20
[   51.203887] 
[   51.273604] Allocated by task 312:
[   51.276989]  kasan_save_stack+0x3c/0x68
[   51.280809]  kasan_save_track+0x20/0x40
[   51.284628]  kasan_save_alloc_info+0x40/0x58
[   51.288881]  __kasan_kmalloc+0xd4/0xd8
[   51.292614]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.297128]  kasan_atomics+0xb8/0x2e0
[   51.300774]  kunit_try_run_case+0x170/0x3f0
[   51.304940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.310409]  kthread+0x328/0x630
[   51.313621]  ret_from_fork+0x10/0x20
[   51.317180] 
[   51.318655] The buggy address belongs to the object at ffff000805f49a00
[   51.318655]  which belongs to the cache kmalloc-64 of size 64
[   51.330982] The buggy address is located 0 bytes to the right of
[   51.330982]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   51.343829] 
[   51.345304] The buggy address belongs to the physical page:
[   51.350860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   51.358848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.365356] page_type: f5(slab)
[   51.368489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.376213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.383932] page dumped because: kasan: bad access detected
[   51.389488] 
[   51.390963] Memory state around the buggy address:
[   51.395741]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.402946]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.410151] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.417351]                                      ^
[   51.422130]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.429335]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.436536] ==================================================================
[   47.758436] ==================================================================
[   47.765413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   47.772789] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   47.780080] 
[   47.781565] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   47.781618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.781636] Hardware name: WinLink E850-96 board (DT)
[   47.781656] Call trace:
[   47.781670]  show_stack+0x20/0x38 (C)
[   47.781706]  dump_stack_lvl+0x8c/0xd0
[   47.781741]  print_report+0x118/0x608
[   47.781776]  kasan_report+0xdc/0x128
[   47.781812]  __asan_report_load4_noabort+0x20/0x30
[   47.781852]  kasan_atomics_helper+0x40fc/0x4858
[   47.781886]  kasan_atomics+0x198/0x2e0
[   47.781917]  kunit_try_run_case+0x170/0x3f0
[   47.781954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.781993]  kthread+0x328/0x630
[   47.782019]  ret_from_fork+0x10/0x20
[   47.782053] 
[   47.848482] Allocated by task 312:
[   47.851868]  kasan_save_stack+0x3c/0x68
[   47.855686]  kasan_save_track+0x20/0x40
[   47.859506]  kasan_save_alloc_info+0x40/0x58
[   47.863760]  __kasan_kmalloc+0xd4/0xd8
[   47.867491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.872006]  kasan_atomics+0xb8/0x2e0
[   47.875651]  kunit_try_run_case+0x170/0x3f0
[   47.879818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.885287]  kthread+0x328/0x630
[   47.888499]  ret_from_fork+0x10/0x20
[   47.892058] 
[   47.893534] The buggy address belongs to the object at ffff000805f49a00
[   47.893534]  which belongs to the cache kmalloc-64 of size 64
[   47.905862] The buggy address is located 0 bytes to the right of
[   47.905862]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   47.918707] 
[   47.920184] The buggy address belongs to the physical page:
[   47.925741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   47.933726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.940234] page_type: f5(slab)
[   47.943369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.951091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.958810] page dumped because: kasan: bad access detected
[   47.964365] 
[   47.965841] Memory state around the buggy address:
[   47.970621]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.977824]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.985029] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.992230]                                      ^
[   47.997008]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.004212]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.011413] ==================================================================
[   51.707616] ==================================================================
[   51.714659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   51.722035] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   51.729327] 
[   51.730809] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   51.730854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.730872] Hardware name: WinLink E850-96 board (DT)
[   51.730893] Call trace:
[   51.730907]  show_stack+0x20/0x38 (C)
[   51.730940]  dump_stack_lvl+0x8c/0xd0
[   51.730976]  print_report+0x118/0x608
[   51.731010]  kasan_report+0xdc/0x128
[   51.731044]  __asan_report_load4_noabort+0x20/0x30
[   51.731083]  kasan_atomics_helper+0x42d8/0x4858
[   51.731117]  kasan_atomics+0x198/0x2e0
[   51.731149]  kunit_try_run_case+0x170/0x3f0
[   51.731182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.731221]  kthread+0x328/0x630
[   51.731250]  ret_from_fork+0x10/0x20
[   51.731284] 
[   51.797728] Allocated by task 312:
[   51.801114]  kasan_save_stack+0x3c/0x68
[   51.804932]  kasan_save_track+0x20/0x40
[   51.808752]  kasan_save_alloc_info+0x40/0x58
[   51.813006]  __kasan_kmalloc+0xd4/0xd8
[   51.816738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.821252]  kasan_atomics+0xb8/0x2e0
[   51.824898]  kunit_try_run_case+0x170/0x3f0
[   51.829064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.834533]  kthread+0x328/0x630
[   51.837745]  ret_from_fork+0x10/0x20
[   51.841304] 
[   51.842779] The buggy address belongs to the object at ffff000805f49a00
[   51.842779]  which belongs to the cache kmalloc-64 of size 64
[   51.855106] The buggy address is located 0 bytes to the right of
[   51.855106]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   51.867953] 
[   51.869429] The buggy address belongs to the physical page:
[   51.874984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   51.882972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.889480] page_type: f5(slab)
[   51.892614] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.900338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.908056] page dumped because: kasan: bad access detected
[   51.913612] 
[   51.915087] Memory state around the buggy address:
[   51.919866]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.927070]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.934275] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.941476]                                      ^
[   51.946254]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.953459]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.960660] ==================================================================
[   51.443918] ==================================================================
[   51.450948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   51.458237] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   51.465615] 
[   51.467098] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   51.467147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.467165] Hardware name: WinLink E850-96 board (DT)
[   51.467185] Call trace:
[   51.467202]  show_stack+0x20/0x38 (C)
[   51.467234]  dump_stack_lvl+0x8c/0xd0
[   51.467272]  print_report+0x118/0x608
[   51.467305]  kasan_report+0xdc/0x128
[   51.467338]  kasan_check_range+0x100/0x1a8
[   51.467374]  __kasan_check_write+0x20/0x30
[   51.467405]  kasan_atomics_helper+0x894/0x4858
[   51.467437]  kasan_atomics+0x198/0x2e0
[   51.467469]  kunit_try_run_case+0x170/0x3f0
[   51.467504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.467544]  kthread+0x328/0x630
[   51.467571]  ret_from_fork+0x10/0x20
[   51.467604] 
[   51.537315] Allocated by task 312:
[   51.540701]  kasan_save_stack+0x3c/0x68
[   51.544520]  kasan_save_track+0x20/0x40
[   51.548339]  kasan_save_alloc_info+0x40/0x58
[   51.552593]  __kasan_kmalloc+0xd4/0xd8
[   51.556325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.560839]  kasan_atomics+0xb8/0x2e0
[   51.564485]  kunit_try_run_case+0x170/0x3f0
[   51.568652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.574120]  kthread+0x328/0x630
[   51.577332]  ret_from_fork+0x10/0x20
[   51.580891] 
[   51.582367] The buggy address belongs to the object at ffff000805f49a00
[   51.582367]  which belongs to the cache kmalloc-64 of size 64
[   51.594693] The buggy address is located 0 bytes to the right of
[   51.594693]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   51.607540] 
[   51.609016] The buggy address belongs to the physical page:
[   51.614572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   51.622558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.629068] page_type: f5(slab)
[   51.632200] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.639925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.647644] page dumped because: kasan: bad access detected
[   51.653199] 
[   51.654674] Memory state around the buggy address:
[   51.659453]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.666658]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.673862] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.681063]                                      ^
[   51.685841]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.693046]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.700247] ==================================================================
[   49.334217] ==================================================================
[   49.341258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   49.348546] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   49.355924] 
[   49.357408] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   49.357457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.357475] Hardware name: WinLink E850-96 board (DT)
[   49.357497] Call trace:
[   49.357512]  show_stack+0x20/0x38 (C)
[   49.357545]  dump_stack_lvl+0x8c/0xd0
[   49.357583]  print_report+0x118/0x608
[   49.357619]  kasan_report+0xdc/0x128
[   49.357652]  kasan_check_range+0x100/0x1a8
[   49.357686]  __kasan_check_write+0x20/0x30
[   49.357717]  kasan_atomics_helper+0x4e4/0x4858
[   49.357749]  kasan_atomics+0x198/0x2e0
[   49.357781]  kunit_try_run_case+0x170/0x3f0
[   49.357816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.357854]  kthread+0x328/0x630
[   49.357883]  ret_from_fork+0x10/0x20
[   49.357915] 
[   49.427625] Allocated by task 312:
[   49.431010]  kasan_save_stack+0x3c/0x68
[   49.434829]  kasan_save_track+0x20/0x40
[   49.438649]  kasan_save_alloc_info+0x40/0x58
[   49.442903]  __kasan_kmalloc+0xd4/0xd8
[   49.446635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.451149]  kasan_atomics+0xb8/0x2e0
[   49.454794]  kunit_try_run_case+0x170/0x3f0
[   49.458961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.464430]  kthread+0x328/0x630
[   49.467642]  ret_from_fork+0x10/0x20
[   49.471201] 
[   49.472676] The buggy address belongs to the object at ffff000805f49a00
[   49.472676]  which belongs to the cache kmalloc-64 of size 64
[   49.485003] The buggy address is located 0 bytes to the right of
[   49.485003]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   49.497850] 
[   49.499326] The buggy address belongs to the physical page:
[   49.504881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   49.512869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.519377] page_type: f5(slab)
[   49.522510] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.530235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.537953] page dumped because: kasan: bad access detected
[   49.543508] 
[   49.544984] Memory state around the buggy address:
[   49.549762]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.556967]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.564172] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.571373]                                      ^
[   49.576151]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.583356]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.590556] ==================================================================
[   56.431167] ==================================================================
[   56.438200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   56.445575] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   56.452953] 
[   56.454437] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   56.454484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.454501] Hardware name: WinLink E850-96 board (DT)
[   56.454521] Call trace:
[   56.454534]  show_stack+0x20/0x38 (C)
[   56.454567]  dump_stack_lvl+0x8c/0xd0
[   56.454604]  print_report+0x118/0x608
[   56.454637]  kasan_report+0xdc/0x128
[   56.454671]  __asan_report_store8_noabort+0x20/0x30
[   56.454703]  kasan_atomics_helper+0x3e5c/0x4858
[   56.454736]  kasan_atomics+0x198/0x2e0
[   56.454768]  kunit_try_run_case+0x170/0x3f0
[   56.454804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.454842]  kthread+0x328/0x630
[   56.454868]  ret_from_fork+0x10/0x20
[   56.454900] 
[   56.521442] Allocated by task 312:
[   56.524827]  kasan_save_stack+0x3c/0x68
[   56.528647]  kasan_save_track+0x20/0x40
[   56.532466]  kasan_save_alloc_info+0x40/0x58
[   56.536719]  __kasan_kmalloc+0xd4/0xd8
[   56.540452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.544966]  kasan_atomics+0xb8/0x2e0
[   56.548612]  kunit_try_run_case+0x170/0x3f0
[   56.552778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.558247]  kthread+0x328/0x630
[   56.561459]  ret_from_fork+0x10/0x20
[   56.565018] 
[   56.566493] The buggy address belongs to the object at ffff000805f49a00
[   56.566493]  which belongs to the cache kmalloc-64 of size 64
[   56.578820] The buggy address is located 0 bytes to the right of
[   56.578820]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   56.591667] 
[   56.593142] The buggy address belongs to the physical page:
[   56.598698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   56.606683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.613194] page_type: f5(slab)
[   56.616327] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.624051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.631770] page dumped because: kasan: bad access detected
[   56.637326] 
[   56.638801] Memory state around the buggy address:
[   56.643579]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.650784]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.657989] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.665190]                                      ^
[   56.669968]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.677172]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.684374] ==================================================================
[   54.071162] ==================================================================
[   54.078166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   54.085455] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   54.092833] 
[   54.094315] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   54.094361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.094378] Hardware name: WinLink E850-96 board (DT)
[   54.094397] Call trace:
[   54.094411]  show_stack+0x20/0x38 (C)
[   54.094443]  dump_stack_lvl+0x8c/0xd0
[   54.094480]  print_report+0x118/0x608
[   54.094513]  kasan_report+0xdc/0x128
[   54.094546]  kasan_check_range+0x100/0x1a8
[   54.094584]  __kasan_check_write+0x20/0x30
[   54.094615]  kasan_atomics_helper+0xc08/0x4858
[   54.094649]  kasan_atomics+0x198/0x2e0
[   54.094679]  kunit_try_run_case+0x170/0x3f0
[   54.094713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.094751]  kthread+0x328/0x630
[   54.094780]  ret_from_fork+0x10/0x20
[   54.094813] 
[   54.164533] Allocated by task 312:
[   54.167918]  kasan_save_stack+0x3c/0x68
[   54.171737]  kasan_save_track+0x20/0x40
[   54.175557]  kasan_save_alloc_info+0x40/0x58
[   54.179810]  __kasan_kmalloc+0xd4/0xd8
[   54.183543]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.188057]  kasan_atomics+0xb8/0x2e0
[   54.191702]  kunit_try_run_case+0x170/0x3f0
[   54.195869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.201338]  kthread+0x328/0x630
[   54.204550]  ret_from_fork+0x10/0x20
[   54.208108] 
[   54.209584] The buggy address belongs to the object at ffff000805f49a00
[   54.209584]  which belongs to the cache kmalloc-64 of size 64
[   54.221911] The buggy address is located 0 bytes to the right of
[   54.221911]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   54.234758] 
[   54.236233] The buggy address belongs to the physical page:
[   54.241789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   54.249778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.256285] page_type: f5(slab)
[   54.259418] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.267143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.274861] page dumped because: kasan: bad access detected
[   54.280416] 
[   54.281892] Memory state around the buggy address:
[   54.286671]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.293875]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.301080] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.308281]                                      ^
[   54.313059]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.320264]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.327464] ==================================================================
[   56.167435] ==================================================================
[   56.174487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   56.181777] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   56.189155] 
[   56.190636] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   56.190683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.190699] Hardware name: WinLink E850-96 board (DT)
[   56.190717] Call trace:
[   56.190733]  show_stack+0x20/0x38 (C)
[   56.190766]  dump_stack_lvl+0x8c/0xd0
[   56.190801]  print_report+0x118/0x608
[   56.190832]  kasan_report+0xdc/0x128
[   56.190865]  kasan_check_range+0x100/0x1a8
[   56.190901]  __kasan_check_write+0x20/0x30
[   56.190932]  kasan_atomics_helper+0xe44/0x4858
[   56.190966]  kasan_atomics+0x198/0x2e0
[   56.190997]  kunit_try_run_case+0x170/0x3f0
[   56.191032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.191070]  kthread+0x328/0x630
[   56.191098]  ret_from_fork+0x10/0x20
[   56.191128] 
[   56.260855] Allocated by task 312:
[   56.264241]  kasan_save_stack+0x3c/0x68
[   56.268060]  kasan_save_track+0x20/0x40
[   56.271879]  kasan_save_alloc_info+0x40/0x58
[   56.276133]  __kasan_kmalloc+0xd4/0xd8
[   56.279866]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.284380]  kasan_atomics+0xb8/0x2e0
[   56.288025]  kunit_try_run_case+0x170/0x3f0
[   56.292192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.297661]  kthread+0x328/0x630
[   56.300872]  ret_from_fork+0x10/0x20
[   56.304431] 
[   56.305907] The buggy address belongs to the object at ffff000805f49a00
[   56.305907]  which belongs to the cache kmalloc-64 of size 64
[   56.318234] The buggy address is located 0 bytes to the right of
[   56.318234]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   56.331080] 
[   56.332556] The buggy address belongs to the physical page:
[   56.338112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   56.346098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.352608] page_type: f5(slab)
[   56.355741] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.363465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.371184] page dumped because: kasan: bad access detected
[   56.376739] 
[   56.378214] Memory state around the buggy address:
[   56.382993]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.390198]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.397402] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.404603]                                      ^
[   56.409381]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.416586]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.423787] ==================================================================
[   49.861724] ==================================================================
[   49.868679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   49.875969] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   49.883347] 
[   49.884831] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   49.884883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.884899] Hardware name: WinLink E850-96 board (DT)
[   49.884920] Call trace:
[   49.884934]  show_stack+0x20/0x38 (C)
[   49.884967]  dump_stack_lvl+0x8c/0xd0
[   49.885005]  print_report+0x118/0x608
[   49.885038]  kasan_report+0xdc/0x128
[   49.885071]  kasan_check_range+0x100/0x1a8
[   49.885107]  __kasan_check_write+0x20/0x30
[   49.885137]  kasan_atomics_helper+0x5b4/0x4858
[   49.885170]  kasan_atomics+0x198/0x2e0
[   49.885201]  kunit_try_run_case+0x170/0x3f0
[   49.885235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.885274]  kthread+0x328/0x630
[   49.885302]  ret_from_fork+0x10/0x20
[   49.885331] 
[   49.955047] Allocated by task 312:
[   49.958433]  kasan_save_stack+0x3c/0x68
[   49.962252]  kasan_save_track+0x20/0x40
[   49.966072]  kasan_save_alloc_info+0x40/0x58
[   49.970325]  __kasan_kmalloc+0xd4/0xd8
[   49.974058]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.978571]  kasan_atomics+0xb8/0x2e0
[   49.982217]  kunit_try_run_case+0x170/0x3f0
[   49.986384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.991853]  kthread+0x328/0x630
[   49.995064]  ret_from_fork+0x10/0x20
[   49.998623] 
[   50.000099] The buggy address belongs to the object at ffff000805f49a00
[   50.000099]  which belongs to the cache kmalloc-64 of size 64
[   50.012425] The buggy address is located 0 bytes to the right of
[   50.012425]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   50.025272] 
[   50.026749] The buggy address belongs to the physical page:
[   50.032304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   50.040290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.046799] page_type: f5(slab)
[   50.049935] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.057657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.065376] page dumped because: kasan: bad access detected
[   50.070931] 
[   50.072406] Memory state around the buggy address:
[   50.077185]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.084390]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.091594] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.098795]                                      ^
[   50.103574]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.110778]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.117979] ==================================================================
[   46.707046] ==================================================================
[   46.714042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   46.721415] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   46.728795] 
[   46.730282] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   46.730339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.730357] Hardware name: WinLink E850-96 board (DT)
[   46.730378] Call trace:
[   46.730393]  show_stack+0x20/0x38 (C)
[   46.730430]  dump_stack_lvl+0x8c/0xd0
[   46.730468]  print_report+0x118/0x608
[   46.730503]  kasan_report+0xdc/0x128
[   46.730539]  __asan_report_store4_noabort+0x20/0x30
[   46.730575]  kasan_atomics_helper+0x3f7c/0x4858
[   46.730610]  kasan_atomics+0x198/0x2e0
[   46.730645]  kunit_try_run_case+0x170/0x3f0
[   46.730681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.730721]  kthread+0x328/0x630
[   46.730753]  ret_from_fork+0x10/0x20
[   46.730790] 
[   46.797283] Allocated by task 312:
[   46.800670]  kasan_save_stack+0x3c/0x68
[   46.804487]  kasan_save_track+0x20/0x40
[   46.808306]  kasan_save_alloc_info+0x40/0x58
[   46.812560]  __kasan_kmalloc+0xd4/0xd8
[   46.816293]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.820807]  kasan_atomics+0xb8/0x2e0
[   46.824452]  kunit_try_run_case+0x170/0x3f0
[   46.828619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.834087]  kthread+0x328/0x630
[   46.837299]  ret_from_fork+0x10/0x20
[   46.840860] 
[   46.842336] The buggy address belongs to the object at ffff000805f49a00
[   46.842336]  which belongs to the cache kmalloc-64 of size 64
[   46.854662] The buggy address is located 0 bytes to the right of
[   46.854662]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   46.867507] 
[   46.868985] The buggy address belongs to the physical page:
[   46.874542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   46.882527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.889035] page_type: f5(slab)
[   46.892170] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.899892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.907611] page dumped because: kasan: bad access detected
[   46.913166] 
[   46.914641] Memory state around the buggy address:
[   46.919421]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.926624]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.933831] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.941030]                                      ^
[   46.945808]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.953013]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.960214] ==================================================================
[   52.231709] ==================================================================
[   52.238783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.246072] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   52.253451] 
[   52.254933] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   52.254984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.254998] Hardware name: WinLink E850-96 board (DT)
[   52.255018] Call trace:
[   52.255031]  show_stack+0x20/0x38 (C)
[   52.255065]  dump_stack_lvl+0x8c/0xd0
[   52.255100]  print_report+0x118/0x608
[   52.255133]  kasan_report+0xdc/0x128
[   52.255166]  kasan_check_range+0x100/0x1a8
[   52.255201]  __kasan_check_write+0x20/0x30
[   52.255230]  kasan_atomics_helper+0x99c/0x4858
[   52.255265]  kasan_atomics+0x198/0x2e0
[   52.255296]  kunit_try_run_case+0x170/0x3f0
[   52.255329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.255367]  kthread+0x328/0x630
[   52.255396]  ret_from_fork+0x10/0x20
[   52.255428] 
[   52.325151] Allocated by task 312:
[   52.328536]  kasan_save_stack+0x3c/0x68
[   52.332355]  kasan_save_track+0x20/0x40
[   52.336175]  kasan_save_alloc_info+0x40/0x58
[   52.340428]  __kasan_kmalloc+0xd4/0xd8
[   52.344161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.348675]  kasan_atomics+0xb8/0x2e0
[   52.352321]  kunit_try_run_case+0x170/0x3f0
[   52.356487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.361956]  kthread+0x328/0x630
[   52.365168]  ret_from_fork+0x10/0x20
[   52.368727] 
[   52.370202] The buggy address belongs to the object at ffff000805f49a00
[   52.370202]  which belongs to the cache kmalloc-64 of size 64
[   52.382529] The buggy address is located 0 bytes to the right of
[   52.382529]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   52.395375] 
[   52.396851] The buggy address belongs to the physical page:
[   52.402407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   52.410393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.416903] page_type: f5(slab)
[   52.420036] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.427760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.435479] page dumped because: kasan: bad access detected
[   52.441034] 
[   52.442510] Memory state around the buggy address:
[   52.447288]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.454493]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.461698] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.468898]                                      ^
[   52.473677]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.480881]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.488082] ==================================================================
[   48.543148] ==================================================================
[   48.550124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   48.557413] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   48.564791] 
[   48.566276] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   48.566329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.566347] Hardware name: WinLink E850-96 board (DT)
[   48.566371] Call trace:
[   48.566387]  show_stack+0x20/0x38 (C)
[   48.566426]  dump_stack_lvl+0x8c/0xd0
[   48.566464]  print_report+0x118/0x608
[   48.566502]  kasan_report+0xdc/0x128
[   48.566535]  kasan_check_range+0x100/0x1a8
[   48.566574]  __kasan_check_write+0x20/0x30
[   48.566605]  kasan_atomics_helper+0x3ac/0x4858
[   48.566639]  kasan_atomics+0x198/0x2e0
[   48.566669]  kunit_try_run_case+0x170/0x3f0
[   48.566705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.566743]  kthread+0x328/0x630
[   48.566771]  ret_from_fork+0x10/0x20
[   48.566805] 
[   48.636491] Allocated by task 312:
[   48.639878]  kasan_save_stack+0x3c/0x68
[   48.643695]  kasan_save_track+0x20/0x40
[   48.647515]  kasan_save_alloc_info+0x40/0x58
[   48.651768]  __kasan_kmalloc+0xd4/0xd8
[   48.655501]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.660015]  kasan_atomics+0xb8/0x2e0
[   48.663661]  kunit_try_run_case+0x170/0x3f0
[   48.667827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.673296]  kthread+0x328/0x630
[   48.676508]  ret_from_fork+0x10/0x20
[   48.680067] 
[   48.681544] The buggy address belongs to the object at ffff000805f49a00
[   48.681544]  which belongs to the cache kmalloc-64 of size 64
[   48.693869] The buggy address is located 0 bytes to the right of
[   48.693869]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   48.706716] 
[   48.708193] The buggy address belongs to the physical page:
[   48.713752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   48.721735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.728243] page_type: f5(slab)
[   48.731378] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.739100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.746819] page dumped because: kasan: bad access detected
[   48.752374] 
[   48.753850] Memory state around the buggy address:
[   48.758630]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.765833]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.773038] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.780239]                                      ^
[   48.785017]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.792222]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.799422] ==================================================================
[   55.643509] ==================================================================
[   55.650537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   55.657827] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   55.665118] 
[   55.666600] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   55.666652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.666669] Hardware name: WinLink E850-96 board (DT)
[   55.666689] Call trace:
[   55.666705]  show_stack+0x20/0x38 (C)
[   55.666737]  dump_stack_lvl+0x8c/0xd0
[   55.666772]  print_report+0x118/0x608
[   55.666805]  kasan_report+0xdc/0x128
[   55.666840]  kasan_check_range+0x100/0x1a8
[   55.666878]  __kasan_check_read+0x20/0x30
[   55.666909]  kasan_atomics_helper+0xdd4/0x4858
[   55.666943]  kasan_atomics+0x198/0x2e0
[   55.666977]  kunit_try_run_case+0x170/0x3f0
[   55.667010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.667047]  kthread+0x328/0x630
[   55.667074]  ret_from_fork+0x10/0x20
[   55.667107] 
[   55.736731] Allocated by task 312:
[   55.740117]  kasan_save_stack+0x3c/0x68
[   55.743936]  kasan_save_track+0x20/0x40
[   55.747756]  kasan_save_alloc_info+0x40/0x58
[   55.752009]  __kasan_kmalloc+0xd4/0xd8
[   55.755742]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.760255]  kasan_atomics+0xb8/0x2e0
[   55.763901]  kunit_try_run_case+0x170/0x3f0
[   55.768068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.773536]  kthread+0x328/0x630
[   55.776748]  ret_from_fork+0x10/0x20
[   55.780307] 
[   55.781782] The buggy address belongs to the object at ffff000805f49a00
[   55.781782]  which belongs to the cache kmalloc-64 of size 64
[   55.794109] The buggy address is located 0 bytes to the right of
[   55.794109]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   55.806956] 
[   55.808432] The buggy address belongs to the physical page:
[   55.813988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   55.821975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.828484] page_type: f5(slab)
[   55.831619] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.839341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.847060] page dumped because: kasan: bad access detected
[   55.852615] 
[   55.854091] Memory state around the buggy address:
[   55.858869]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.866074]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.873278] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.880479]                                      ^
[   55.885257]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.892462]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.899663] ==================================================================
[   57.482875] ==================================================================
[   57.489921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   57.497209] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   57.504587] 
[   57.506068] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   57.506117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.506134] Hardware name: WinLink E850-96 board (DT)
[   57.506152] Call trace:
[   57.506166]  show_stack+0x20/0x38 (C)
[   57.506199]  dump_stack_lvl+0x8c/0xd0
[   57.506234]  print_report+0x118/0x608
[   57.506268]  kasan_report+0xdc/0x128
[   57.506300]  kasan_check_range+0x100/0x1a8
[   57.506335]  __kasan_check_write+0x20/0x30
[   57.506365]  kasan_atomics_helper+0xff0/0x4858
[   57.506399]  kasan_atomics+0x198/0x2e0
[   57.506429]  kunit_try_run_case+0x170/0x3f0
[   57.506463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.506502]  kthread+0x328/0x630
[   57.506529]  ret_from_fork+0x10/0x20
[   57.506561] 
[   57.576287] Allocated by task 312:
[   57.579673]  kasan_save_stack+0x3c/0x68
[   57.583492]  kasan_save_track+0x20/0x40
[   57.587311]  kasan_save_alloc_info+0x40/0x58
[   57.591565]  __kasan_kmalloc+0xd4/0xd8
[   57.595297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.599811]  kasan_atomics+0xb8/0x2e0
[   57.603457]  kunit_try_run_case+0x170/0x3f0
[   57.607624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.613092]  kthread+0x328/0x630
[   57.616304]  ret_from_fork+0x10/0x20
[   57.619863] 
[   57.621338] The buggy address belongs to the object at ffff000805f49a00
[   57.621338]  which belongs to the cache kmalloc-64 of size 64
[   57.633665] The buggy address is located 0 bytes to the right of
[   57.633665]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   57.646512] 
[   57.647988] The buggy address belongs to the physical page:
[   57.653544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   57.661530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.668039] page_type: f5(slab)
[   57.671172] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.678897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.686615] page dumped because: kasan: bad access detected
[   57.692171] 
[   57.693646] Memory state around the buggy address:
[   57.698425]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.705629]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.712834] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.720035]                                      ^
[   57.724813]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.732018]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.739219] ==================================================================
[   59.857748] ==================================================================
[   59.864713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   59.872087] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   59.879378] 
[   59.880861] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   59.880910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.880928] Hardware name: WinLink E850-96 board (DT)
[   59.880948] Call trace:
[   59.880963]  show_stack+0x20/0x38 (C)
[   59.880999]  dump_stack_lvl+0x8c/0xd0
[   59.881035]  print_report+0x118/0x608
[   59.881071]  kasan_report+0xdc/0x128
[   59.881102]  __asan_report_load8_noabort+0x20/0x30
[   59.881142]  kasan_atomics_helper+0x3f04/0x4858
[   59.881176]  kasan_atomics+0x198/0x2e0
[   59.881207]  kunit_try_run_case+0x170/0x3f0
[   59.881243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.881282]  kthread+0x328/0x630
[   59.881309]  ret_from_fork+0x10/0x20
[   59.881343] 
[   59.947779] Allocated by task 312:
[   59.951165]  kasan_save_stack+0x3c/0x68
[   59.954984]  kasan_save_track+0x20/0x40
[   59.958804]  kasan_save_alloc_info+0x40/0x58
[   59.963057]  __kasan_kmalloc+0xd4/0xd8
[   59.966789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.971303]  kasan_atomics+0xb8/0x2e0
[   59.974949]  kunit_try_run_case+0x170/0x3f0
[   59.979116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.984584]  kthread+0x328/0x630
[   59.987796]  ret_from_fork+0x10/0x20
[   59.991355] 
[   59.992831] The buggy address belongs to the object at ffff000805f49a00
[   59.992831]  which belongs to the cache kmalloc-64 of size 64
[   60.005158] The buggy address is located 0 bytes to the right of
[   60.005158]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   60.018004] 
[   60.019481] The buggy address belongs to the physical page:
[   60.025037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   60.033025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.039531] page_type: f5(slab)
[   60.042665] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.050389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.058108] page dumped because: kasan: bad access detected
[   60.063663] 
[   60.065138] Memory state around the buggy address:
[   60.069918]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.077122]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.084326] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.091527]                                      ^
[   60.096305]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.103510]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.110711] ==================================================================
[   55.907054] ==================================================================
[   55.914075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   55.921451] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   55.928743] 
[   55.930224] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   55.930269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.930284] Hardware name: WinLink E850-96 board (DT)
[   55.930303] Call trace:
[   55.930317]  show_stack+0x20/0x38 (C)
[   55.930349]  dump_stack_lvl+0x8c/0xd0
[   55.930385]  print_report+0x118/0x608
[   55.930417]  kasan_report+0xdc/0x128
[   55.930451]  __asan_report_load8_noabort+0x20/0x30
[   55.930490]  kasan_atomics_helper+0x3f58/0x4858
[   55.930525]  kasan_atomics+0x198/0x2e0
[   55.930556]  kunit_try_run_case+0x170/0x3f0
[   55.930591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.930628]  kthread+0x328/0x630
[   55.930657]  ret_from_fork+0x10/0x20
[   55.930688] 
[   55.997144] Allocated by task 312:
[   56.000530]  kasan_save_stack+0x3c/0x68
[   56.004349]  kasan_save_track+0x20/0x40
[   56.008168]  kasan_save_alloc_info+0x40/0x58
[   56.012422]  __kasan_kmalloc+0xd4/0xd8
[   56.016154]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.020668]  kasan_atomics+0xb8/0x2e0
[   56.024314]  kunit_try_run_case+0x170/0x3f0
[   56.028481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.033949]  kthread+0x328/0x630
[   56.037161]  ret_from_fork+0x10/0x20
[   56.040720] 
[   56.042195] The buggy address belongs to the object at ffff000805f49a00
[   56.042195]  which belongs to the cache kmalloc-64 of size 64
[   56.054522] The buggy address is located 0 bytes to the right of
[   56.054522]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   56.067369] 
[   56.068845] The buggy address belongs to the physical page:
[   56.074401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   56.082388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.088896] page_type: f5(slab)
[   56.092029] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.099754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.107472] page dumped because: kasan: bad access detected
[   56.113028] 
[   56.114504] Memory state around the buggy address:
[   56.119282]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.126486]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.133691] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.140892]                                      ^
[   56.145670]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.152875]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.160075] ==================================================================
[   57.746600] ==================================================================
[   57.753632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   57.761007] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   57.768385] 
[   57.769867] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   57.769915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.769933] Hardware name: WinLink E850-96 board (DT)
[   57.769950] Call trace:
[   57.769967]  show_stack+0x20/0x38 (C)
[   57.769998]  dump_stack_lvl+0x8c/0xd0
[   57.770031]  print_report+0x118/0x608
[   57.770064]  kasan_report+0xdc/0x128
[   57.770100]  kasan_check_range+0x100/0x1a8
[   57.770134]  __kasan_check_write+0x20/0x30
[   57.770165]  kasan_atomics_helper+0x1058/0x4858
[   57.770198]  kasan_atomics+0x198/0x2e0
[   57.770229]  kunit_try_run_case+0x170/0x3f0
[   57.770265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.770303]  kthread+0x328/0x630
[   57.770332]  ret_from_fork+0x10/0x20
[   57.770363] 
[   57.840172] Allocated by task 312:
[   57.843558]  kasan_save_stack+0x3c/0x68
[   57.847377]  kasan_save_track+0x20/0x40
[   57.851196]  kasan_save_alloc_info+0x40/0x58
[   57.855450]  __kasan_kmalloc+0xd4/0xd8
[   57.859182]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.863696]  kasan_atomics+0xb8/0x2e0
[   57.867342]  kunit_try_run_case+0x170/0x3f0
[   57.871508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.876977]  kthread+0x328/0x630
[   57.880189]  ret_from_fork+0x10/0x20
[   57.883747] 
[   57.885223] The buggy address belongs to the object at ffff000805f49a00
[   57.885223]  which belongs to the cache kmalloc-64 of size 64
[   57.897550] The buggy address is located 0 bytes to the right of
[   57.897550]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   57.910396] 
[   57.911873] The buggy address belongs to the physical page:
[   57.917429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   57.925415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.931924] page_type: f5(slab)
[   57.935057] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.942782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.950500] page dumped because: kasan: bad access detected
[   57.956055] 
[   57.957531] Memory state around the buggy address:
[   57.962310]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.969515]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.976719] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.983920]                                      ^
[   57.988698]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.995903]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.003104] ==================================================================
[   50.125343] ==================================================================
[   50.132392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   50.139681] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   50.147058] 
[   50.148542] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   50.148591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.148607] Hardware name: WinLink E850-96 board (DT)
[   50.148628] Call trace:
[   50.148641]  show_stack+0x20/0x38 (C)
[   50.148676]  dump_stack_lvl+0x8c/0xd0
[   50.148714]  print_report+0x118/0x608
[   50.148748]  kasan_report+0xdc/0x128
[   50.148782]  kasan_check_range+0x100/0x1a8
[   50.148817]  __kasan_check_write+0x20/0x30
[   50.148846]  kasan_atomics_helper+0x61c/0x4858
[   50.148880]  kasan_atomics+0x198/0x2e0
[   50.148910]  kunit_try_run_case+0x170/0x3f0
[   50.148945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.148983]  kthread+0x328/0x630
[   50.149010]  ret_from_fork+0x10/0x20
[   50.149043] 
[   50.218758] Allocated by task 312:
[   50.222144]  kasan_save_stack+0x3c/0x68
[   50.225963]  kasan_save_track+0x20/0x40
[   50.229783]  kasan_save_alloc_info+0x40/0x58
[   50.234036]  __kasan_kmalloc+0xd4/0xd8
[   50.237769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.242283]  kasan_atomics+0xb8/0x2e0
[   50.245929]  kunit_try_run_case+0x170/0x3f0
[   50.250095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.255564]  kthread+0x328/0x630
[   50.258775]  ret_from_fork+0x10/0x20
[   50.262334] 
[   50.263810] The buggy address belongs to the object at ffff000805f49a00
[   50.263810]  which belongs to the cache kmalloc-64 of size 64
[   50.276137] The buggy address is located 0 bytes to the right of
[   50.276137]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   50.288983] 
[   50.290459] The buggy address belongs to the physical page:
[   50.296015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   50.304001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.310511] page_type: f5(slab)
[   50.313644] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.321368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.329087] page dumped because: kasan: bad access detected
[   50.334642] 
[   50.336118] Memory state around the buggy address:
[   50.340896]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.348101]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.355306] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.362506]                                      ^
[   50.367285]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.374489]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.381690] ==================================================================
[   54.334849] ==================================================================
[   54.341876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   54.349253] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   54.356544] 
[   54.358026] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   54.358076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.358092] Hardware name: WinLink E850-96 board (DT)
[   54.358113] Call trace:
[   54.358130]  show_stack+0x20/0x38 (C)
[   54.358164]  dump_stack_lvl+0x8c/0xd0
[   54.358200]  print_report+0x118/0x608
[   54.358233]  kasan_report+0xdc/0x128
[   54.358267]  __asan_report_load4_noabort+0x20/0x30
[   54.358307]  kasan_atomics_helper+0x3de4/0x4858
[   54.358340]  kasan_atomics+0x198/0x2e0
[   54.358370]  kunit_try_run_case+0x170/0x3f0
[   54.358407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.358447]  kthread+0x328/0x630
[   54.358475]  ret_from_fork+0x10/0x20
[   54.358507] 
[   54.424945] Allocated by task 312:
[   54.428331]  kasan_save_stack+0x3c/0x68
[   54.432151]  kasan_save_track+0x20/0x40
[   54.435970]  kasan_save_alloc_info+0x40/0x58
[   54.440223]  __kasan_kmalloc+0xd4/0xd8
[   54.443956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.448469]  kasan_atomics+0xb8/0x2e0
[   54.452115]  kunit_try_run_case+0x170/0x3f0
[   54.456282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.461750]  kthread+0x328/0x630
[   54.464962]  ret_from_fork+0x10/0x20
[   54.468521] 
[   54.469997] The buggy address belongs to the object at ffff000805f49a00
[   54.469997]  which belongs to the cache kmalloc-64 of size 64
[   54.482324] The buggy address is located 0 bytes to the right of
[   54.482324]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   54.495170] 
[   54.496647] The buggy address belongs to the physical page:
[   54.502203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   54.510189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.516697] page_type: f5(slab)
[   54.519831] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.527555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.535274] page dumped because: kasan: bad access detected
[   54.540829] 
[   54.542305] Memory state around the buggy address:
[   54.547083]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.554288]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.561492] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.568693]                                      ^
[   54.573471]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.580676]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.587877] ==================================================================
[   62.486093] ==================================================================
[   62.493144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   62.500519] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   62.507810] 
[   62.509294] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   62.509341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.509358] Hardware name: WinLink E850-96 board (DT)
[   62.509376] Call trace:
[   62.509390]  show_stack+0x20/0x38 (C)
[   62.509425]  dump_stack_lvl+0x8c/0xd0
[   62.509460]  print_report+0x118/0x608
[   62.509494]  kasan_report+0xdc/0x128
[   62.509528]  __asan_report_load8_noabort+0x20/0x30
[   62.509566]  kasan_atomics_helper+0x3e10/0x4858
[   62.509602]  kasan_atomics+0x198/0x2e0
[   62.509631]  kunit_try_run_case+0x170/0x3f0
[   62.509665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.509703]  kthread+0x328/0x630
[   62.509728]  ret_from_fork+0x10/0x20
[   62.509760] 
[   62.576212] Allocated by task 312:
[   62.579597]  kasan_save_stack+0x3c/0x68
[   62.583417]  kasan_save_track+0x20/0x40
[   62.587236]  kasan_save_alloc_info+0x40/0x58
[   62.591490]  __kasan_kmalloc+0xd4/0xd8
[   62.595222]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.599736]  kasan_atomics+0xb8/0x2e0
[   62.603382]  kunit_try_run_case+0x170/0x3f0
[   62.607548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.613017]  kthread+0x328/0x630
[   62.616229]  ret_from_fork+0x10/0x20
[   62.619788] 
[   62.621263] The buggy address belongs to the object at ffff000805f49a00
[   62.621263]  which belongs to the cache kmalloc-64 of size 64
[   62.633590] The buggy address is located 0 bytes to the right of
[   62.633590]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   62.646437] 
[   62.647913] The buggy address belongs to the physical page:
[   62.653469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   62.661457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.667964] page_type: f5(slab)
[   62.671097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.678822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.686540] page dumped because: kasan: bad access detected
[   62.692095] 
[   62.693571] Memory state around the buggy address:
[   62.698351]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.705554]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.712759] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.719960]                                      ^
[   62.724738]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.731943]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.739144] ==================================================================
[   53.546987] ==================================================================
[   53.554042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.561330] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   53.568708] 
[   53.570190] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   53.570236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.570252] Hardware name: WinLink E850-96 board (DT)
[   53.570271] Call trace:
[   53.570283]  show_stack+0x20/0x38 (C)
[   53.570316]  dump_stack_lvl+0x8c/0xd0
[   53.570351]  print_report+0x118/0x608
[   53.570383]  kasan_report+0xdc/0x128
[   53.570419]  kasan_check_range+0x100/0x1a8
[   53.570456]  __kasan_check_write+0x20/0x30
[   53.570484]  kasan_atomics_helper+0xb70/0x4858
[   53.570518]  kasan_atomics+0x198/0x2e0
[   53.570549]  kunit_try_run_case+0x170/0x3f0
[   53.570583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.570622]  kthread+0x328/0x630
[   53.570648]  ret_from_fork+0x10/0x20
[   53.570680] 
[   53.640409] Allocated by task 312:
[   53.643794]  kasan_save_stack+0x3c/0x68
[   53.647613]  kasan_save_track+0x20/0x40
[   53.651433]  kasan_save_alloc_info+0x40/0x58
[   53.655686]  __kasan_kmalloc+0xd4/0xd8
[   53.659419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.663933]  kasan_atomics+0xb8/0x2e0
[   53.667579]  kunit_try_run_case+0x170/0x3f0
[   53.671745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.677214]  kthread+0x328/0x630
[   53.680425]  ret_from_fork+0x10/0x20
[   53.683985] 
[   53.685460] The buggy address belongs to the object at ffff000805f49a00
[   53.685460]  which belongs to the cache kmalloc-64 of size 64
[   53.697787] The buggy address is located 0 bytes to the right of
[   53.697787]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   53.710634] 
[   53.712109] The buggy address belongs to the physical page:
[   53.717665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   53.725650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.732161] page_type: f5(slab)
[   53.735294] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.743018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.750737] page dumped because: kasan: bad access detected
[   53.756292] 
[   53.757768] Memory state around the buggy address:
[   53.762546]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.769751]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.776956] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.784157]                                      ^
[   53.788935]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.796139]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.803340] ==================================================================
[   49.070528] ==================================================================
[   49.077546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   49.084835] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   49.092213] 
[   49.093697] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   49.093747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.093765] Hardware name: WinLink E850-96 board (DT)
[   49.093787] Call trace:
[   49.093803]  show_stack+0x20/0x38 (C)
[   49.093836]  dump_stack_lvl+0x8c/0xd0
[   49.093875]  print_report+0x118/0x608
[   49.093908]  kasan_report+0xdc/0x128
[   49.093944]  kasan_check_range+0x100/0x1a8
[   49.093980]  __kasan_check_write+0x20/0x30
[   49.094011]  kasan_atomics_helper+0x47c/0x4858
[   49.094043]  kasan_atomics+0x198/0x2e0
[   49.094073]  kunit_try_run_case+0x170/0x3f0
[   49.094108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.094147]  kthread+0x328/0x630
[   49.094173]  ret_from_fork+0x10/0x20
[   49.094206] 
[   49.163914] Allocated by task 312:
[   49.167299]  kasan_save_stack+0x3c/0x68
[   49.171118]  kasan_save_track+0x20/0x40
[   49.174938]  kasan_save_alloc_info+0x40/0x58
[   49.179191]  __kasan_kmalloc+0xd4/0xd8
[   49.182924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.187437]  kasan_atomics+0xb8/0x2e0
[   49.191083]  kunit_try_run_case+0x170/0x3f0
[   49.195250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.200718]  kthread+0x328/0x630
[   49.203930]  ret_from_fork+0x10/0x20
[   49.207489] 
[   49.208965] The buggy address belongs to the object at ffff000805f49a00
[   49.208965]  which belongs to the cache kmalloc-64 of size 64
[   49.221292] The buggy address is located 0 bytes to the right of
[   49.221292]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   49.234138] 
[   49.235615] The buggy address belongs to the physical page:
[   49.241170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   49.249156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.255665] page_type: f5(slab)
[   49.258799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.266523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.274242] page dumped because: kasan: bad access detected
[   49.279797] 
[   49.281273] Memory state around the buggy address:
[   49.286053]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.293256]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.300461] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.307661]                                      ^
[   49.312439]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.319644]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.326845] ==================================================================
[   63.270803] ==================================================================
[   63.277855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   63.285229] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   63.292607] 
[   63.294091] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   63.294140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.294156] Hardware name: WinLink E850-96 board (DT)
[   63.294174] Call trace:
[   63.294189]  show_stack+0x20/0x38 (C)
[   63.294222]  dump_stack_lvl+0x8c/0xd0
[   63.294255]  print_report+0x118/0x608
[   63.294290]  kasan_report+0xdc/0x128
[   63.294324]  kasan_check_range+0x100/0x1a8
[   63.294360]  __kasan_check_write+0x20/0x30
[   63.294391]  kasan_atomics_helper+0x17ec/0x4858
[   63.294424]  kasan_atomics+0x198/0x2e0
[   63.294454]  kunit_try_run_case+0x170/0x3f0
[   63.294489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.294526]  kthread+0x328/0x630
[   63.294555]  ret_from_fork+0x10/0x20
[   63.294589] 
[   63.364394] Allocated by task 312:
[   63.367780]  kasan_save_stack+0x3c/0x68
[   63.371600]  kasan_save_track+0x20/0x40
[   63.375419]  kasan_save_alloc_info+0x40/0x58
[   63.379672]  __kasan_kmalloc+0xd4/0xd8
[   63.383405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.387919]  kasan_atomics+0xb8/0x2e0
[   63.391564]  kunit_try_run_case+0x170/0x3f0
[   63.395731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.401200]  kthread+0x328/0x630
[   63.404411]  ret_from_fork+0x10/0x20
[   63.407970] 
[   63.409446] The buggy address belongs to the object at ffff000805f49a00
[   63.409446]  which belongs to the cache kmalloc-64 of size 64
[   63.421773] The buggy address is located 0 bytes to the right of
[   63.421773]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   63.434619] 
[   63.436096] The buggy address belongs to the physical page:
[   63.441651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   63.449640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.456147] page_type: f5(slab)
[   63.459280] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.467004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.474723] page dumped because: kasan: bad access detected
[   63.480278] 
[   63.481754] Memory state around the buggy address:
[   63.486536]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.493737]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.500942] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.508142]                                      ^
[   63.512920]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.520126]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.527326] ==================================================================
[   60.381951] ==================================================================
[   60.389009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   60.396384] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   60.403762] 
[   60.405245] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   60.405294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.405309] Hardware name: WinLink E850-96 board (DT)
[   60.405330] Call trace:
[   60.405345]  show_stack+0x20/0x38 (C)
[   60.405379]  dump_stack_lvl+0x8c/0xd0
[   60.405414]  print_report+0x118/0x608
[   60.405448]  kasan_report+0xdc/0x128
[   60.405482]  kasan_check_range+0x100/0x1a8
[   60.405518]  __kasan_check_write+0x20/0x30
[   60.405548]  kasan_atomics_helper+0x147c/0x4858
[   60.405581]  kasan_atomics+0x198/0x2e0
[   60.405611]  kunit_try_run_case+0x170/0x3f0
[   60.405647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.405686]  kthread+0x328/0x630
[   60.405713]  ret_from_fork+0x10/0x20
[   60.405744] 
[   60.475549] Allocated by task 312:
[   60.478935]  kasan_save_stack+0x3c/0x68
[   60.482754]  kasan_save_track+0x20/0x40
[   60.486573]  kasan_save_alloc_info+0x40/0x58
[   60.490827]  __kasan_kmalloc+0xd4/0xd8
[   60.494559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.499073]  kasan_atomics+0xb8/0x2e0
[   60.502719]  kunit_try_run_case+0x170/0x3f0
[   60.506886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.512354]  kthread+0x328/0x630
[   60.515566]  ret_from_fork+0x10/0x20
[   60.519125] 
[   60.520600] The buggy address belongs to the object at ffff000805f49a00
[   60.520600]  which belongs to the cache kmalloc-64 of size 64
[   60.532927] The buggy address is located 0 bytes to the right of
[   60.532927]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   60.545774] 
[   60.547250] The buggy address belongs to the physical page:
[   60.552806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   60.560793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.567301] page_type: f5(slab)
[   60.570435] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.578159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.585877] page dumped because: kasan: bad access detected
[   60.591433] 
[   60.592908] Memory state around the buggy address:
[   60.597687]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.604891]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.612096] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.619297]                                      ^
[   60.624075]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.631280]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.638481] ==================================================================
[   48.282630] ==================================================================
[   48.289537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   48.296913] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   48.304291] 
[   48.305776] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   48.305828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.305848] Hardware name: WinLink E850-96 board (DT)
[   48.305872] Call trace:
[   48.305886]  show_stack+0x20/0x38 (C)
[   48.305925]  dump_stack_lvl+0x8c/0xd0
[   48.305963]  print_report+0x118/0x608
[   48.305997]  kasan_report+0xdc/0x128
[   48.306029]  __asan_report_store4_noabort+0x20/0x30
[   48.306065]  kasan_atomics_helper+0x3f94/0x4858
[   48.306098]  kasan_atomics+0x198/0x2e0
[   48.306129]  kunit_try_run_case+0x170/0x3f0
[   48.306164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.306202]  kthread+0x328/0x630
[   48.306232]  ret_from_fork+0x10/0x20
[   48.306266] 
[   48.372779] Allocated by task 312:
[   48.376165]  kasan_save_stack+0x3c/0x68
[   48.379984]  kasan_save_track+0x20/0x40
[   48.383804]  kasan_save_alloc_info+0x40/0x58
[   48.388057]  __kasan_kmalloc+0xd4/0xd8
[   48.391789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.396304]  kasan_atomics+0xb8/0x2e0
[   48.399949]  kunit_try_run_case+0x170/0x3f0
[   48.404116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.409585]  kthread+0x328/0x630
[   48.412796]  ret_from_fork+0x10/0x20
[   48.416355] 
[   48.417832] The buggy address belongs to the object at ffff000805f49a00
[   48.417832]  which belongs to the cache kmalloc-64 of size 64
[   48.430157] The buggy address is located 0 bytes to the right of
[   48.430157]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   48.443004] 
[   48.444480] The buggy address belongs to the physical page:
[   48.450037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   48.458023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.464532] page_type: f5(slab)
[   48.467665] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.475389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.483108] page dumped because: kasan: bad access detected
[   48.488663] 
[   48.490139] Memory state around the buggy address:
[   48.494918]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.502122]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.509327] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.516528]                                      ^
[   48.521305]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.528510]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.535711] ==================================================================
[   61.437516] ==================================================================
[   61.444549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   61.451924] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   61.459215] 
[   61.460698] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   61.460744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.460760] Hardware name: WinLink E850-96 board (DT)
[   61.460780] Call trace:
[   61.460794]  show_stack+0x20/0x38 (C)
[   61.460828]  dump_stack_lvl+0x8c/0xd0
[   61.460864]  print_report+0x118/0x608
[   61.460898]  kasan_report+0xdc/0x128
[   61.460933]  __asan_report_load8_noabort+0x20/0x30
[   61.460970]  kasan_atomics_helper+0x3db0/0x4858
[   61.461003]  kasan_atomics+0x198/0x2e0
[   61.461033]  kunit_try_run_case+0x170/0x3f0
[   61.461070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.461109]  kthread+0x328/0x630
[   61.461137]  ret_from_fork+0x10/0x20
[   61.461169] 
[   61.527617] Allocated by task 312:
[   61.531002]  kasan_save_stack+0x3c/0x68
[   61.534821]  kasan_save_track+0x20/0x40
[   61.538641]  kasan_save_alloc_info+0x40/0x58
[   61.542894]  __kasan_kmalloc+0xd4/0xd8
[   61.546628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.551141]  kasan_atomics+0xb8/0x2e0
[   61.554786]  kunit_try_run_case+0x170/0x3f0
[   61.558953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.564422]  kthread+0x328/0x630
[   61.567634]  ret_from_fork+0x10/0x20
[   61.571193] 
[   61.572668] The buggy address belongs to the object at ffff000805f49a00
[   61.572668]  which belongs to the cache kmalloc-64 of size 64
[   61.584995] The buggy address is located 0 bytes to the right of
[   61.584995]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   61.597841] 
[   61.599317] The buggy address belongs to the physical page:
[   61.604873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   61.612860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.619369] page_type: f5(slab)
[   61.622502] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.630226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.637945] page dumped because: kasan: bad access detected
[   61.643500] 
[   61.644976] Memory state around the buggy address:
[   61.649756]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.656959]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.664164] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.671365]                                      ^
[   61.676143]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.683347]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.690548] ==================================================================
[   55.383044] ==================================================================
[   55.390125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   55.397500] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   55.404792] 
[   55.406275] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   55.406319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.406335] Hardware name: WinLink E850-96 board (DT)
[   55.406354] Call trace:
[   55.406366]  show_stack+0x20/0x38 (C)
[   55.406399]  dump_stack_lvl+0x8c/0xd0
[   55.406436]  print_report+0x118/0x608
[   55.406468]  kasan_report+0xdc/0x128
[   55.406504]  __asan_report_load4_noabort+0x20/0x30
[   55.406540]  kasan_atomics_helper+0x3e04/0x4858
[   55.406573]  kasan_atomics+0x198/0x2e0
[   55.406604]  kunit_try_run_case+0x170/0x3f0
[   55.406637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.406676]  kthread+0x328/0x630
[   55.406704]  ret_from_fork+0x10/0x20
[   55.406737] 
[   55.473194] Allocated by task 312:
[   55.476579]  kasan_save_stack+0x3c/0x68
[   55.480398]  kasan_save_track+0x20/0x40
[   55.484218]  kasan_save_alloc_info+0x40/0x58
[   55.488471]  __kasan_kmalloc+0xd4/0xd8
[   55.492204]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.496718]  kasan_atomics+0xb8/0x2e0
[   55.500364]  kunit_try_run_case+0x170/0x3f0
[   55.504530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.509999]  kthread+0x328/0x630
[   55.513210]  ret_from_fork+0x10/0x20
[   55.516770] 
[   55.518245] The buggy address belongs to the object at ffff000805f49a00
[   55.518245]  which belongs to the cache kmalloc-64 of size 64
[   55.530572] The buggy address is located 0 bytes to the right of
[   55.530572]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   55.543418] 
[   55.544894] The buggy address belongs to the physical page:
[   55.550450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   55.558438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.564946] page_type: f5(slab)
[   55.568079] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.575803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.583522] page dumped because: kasan: bad access detected
[   55.589078] 
[   55.590553] Memory state around the buggy address:
[   55.595331]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.602536]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.609741] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.616941]                                      ^
[   55.621720]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.628924]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.636125] ==================================================================
[   61.697886] ==================================================================
[   61.704960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   61.712336] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   61.719715] 
[   61.721196] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   61.721244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.721262] Hardware name: WinLink E850-96 board (DT)
[   61.721282] Call trace:
[   61.721296]  show_stack+0x20/0x38 (C)
[   61.721330]  dump_stack_lvl+0x8c/0xd0
[   61.721363]  print_report+0x118/0x608
[   61.721394]  kasan_report+0xdc/0x128
[   61.721432]  kasan_check_range+0x100/0x1a8
[   61.721466]  __kasan_check_write+0x20/0x30
[   61.721495]  kasan_atomics_helper+0x1644/0x4858
[   61.721529]  kasan_atomics+0x198/0x2e0
[   61.721561]  kunit_try_run_case+0x170/0x3f0
[   61.721595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.721633]  kthread+0x328/0x630
[   61.721662]  ret_from_fork+0x10/0x20
[   61.721692] 
[   61.791501] Allocated by task 312:
[   61.794887]  kasan_save_stack+0x3c/0x68
[   61.798706]  kasan_save_track+0x20/0x40
[   61.802526]  kasan_save_alloc_info+0x40/0x58
[   61.806779]  __kasan_kmalloc+0xd4/0xd8
[   61.810512]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.815026]  kasan_atomics+0xb8/0x2e0
[   61.818671]  kunit_try_run_case+0x170/0x3f0
[   61.822838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.828307]  kthread+0x328/0x630
[   61.831518]  ret_from_fork+0x10/0x20
[   61.835077] 
[   61.836553] The buggy address belongs to the object at ffff000805f49a00
[   61.836553]  which belongs to the cache kmalloc-64 of size 64
[   61.848879] The buggy address is located 0 bytes to the right of
[   61.848879]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   61.861726] 
[   61.863202] The buggy address belongs to the physical page:
[   61.868759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   61.876744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.883254] page_type: f5(slab)
[   61.886387] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.894111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.901830] page dumped because: kasan: bad access detected
[   61.907385] 
[   61.908861] Memory state around the buggy address:
[   61.913641]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.920844]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.928049] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.935249]                                      ^
[   61.940027]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.947232]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.954433] ==================================================================
[   54.858940] ==================================================================
[   54.866000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   54.873377] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   54.880668] 
[   54.882149] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   54.882196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.882212] Hardware name: WinLink E850-96 board (DT)
[   54.882231] Call trace:
[   54.882246]  show_stack+0x20/0x38 (C)
[   54.882279]  dump_stack_lvl+0x8c/0xd0
[   54.882316]  print_report+0x118/0x608
[   54.882350]  kasan_report+0xdc/0x128
[   54.882382]  __asan_report_load4_noabort+0x20/0x30
[   54.882420]  kasan_atomics_helper+0x3dd8/0x4858
[   54.882453]  kasan_atomics+0x198/0x2e0
[   54.882483]  kunit_try_run_case+0x170/0x3f0
[   54.882519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.882557]  kthread+0x328/0x630
[   54.882585]  ret_from_fork+0x10/0x20
[   54.882617] 
[   54.949070] Allocated by task 312:
[   54.952455]  kasan_save_stack+0x3c/0x68
[   54.956274]  kasan_save_track+0x20/0x40
[   54.960094]  kasan_save_alloc_info+0x40/0x58
[   54.964347]  __kasan_kmalloc+0xd4/0xd8
[   54.968080]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.972593]  kasan_atomics+0xb8/0x2e0
[   54.976240]  kunit_try_run_case+0x170/0x3f0
[   54.980406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.985875]  kthread+0x328/0x630
[   54.989087]  ret_from_fork+0x10/0x20
[   54.992646] 
[   54.994121] The buggy address belongs to the object at ffff000805f49a00
[   54.994121]  which belongs to the cache kmalloc-64 of size 64
[   55.006448] The buggy address is located 0 bytes to the right of
[   55.006448]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   55.019294] 
[   55.020770] The buggy address belongs to the physical page:
[   55.026326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   55.034312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.040822] page_type: f5(slab)
[   55.043955] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.051679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.059398] page dumped because: kasan: bad access detected
[   55.064953] 
[   55.066429] Memory state around the buggy address:
[   55.071207]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.078412]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.085616] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.092817]                                      ^
[   55.097595]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.104800]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.112001] ==================================================================
[   62.222225] ==================================================================
[   62.229259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   62.236634] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   62.244012] 
[   62.245495] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   62.245543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.245559] Hardware name: WinLink E850-96 board (DT)
[   62.245579] Call trace:
[   62.245595]  show_stack+0x20/0x38 (C)
[   62.245626]  dump_stack_lvl+0x8c/0xd0
[   62.245663]  print_report+0x118/0x608
[   62.245695]  kasan_report+0xdc/0x128
[   62.245727]  kasan_check_range+0x100/0x1a8
[   62.245763]  __kasan_check_write+0x20/0x30
[   62.245792]  kasan_atomics_helper+0x16d0/0x4858
[   62.245826]  kasan_atomics+0x198/0x2e0
[   62.245858]  kunit_try_run_case+0x170/0x3f0
[   62.245893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.245931]  kthread+0x328/0x630
[   62.245958]  ret_from_fork+0x10/0x20
[   62.245989] 
[   62.315799] Allocated by task 312:
[   62.319185]  kasan_save_stack+0x3c/0x68
[   62.323004]  kasan_save_track+0x20/0x40
[   62.326823]  kasan_save_alloc_info+0x40/0x58
[   62.331077]  __kasan_kmalloc+0xd4/0xd8
[   62.334810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.339323]  kasan_atomics+0xb8/0x2e0
[   62.342969]  kunit_try_run_case+0x170/0x3f0
[   62.347136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.352604]  kthread+0x328/0x630
[   62.355816]  ret_from_fork+0x10/0x20
[   62.359375] 
[   62.360851] The buggy address belongs to the object at ffff000805f49a00
[   62.360851]  which belongs to the cache kmalloc-64 of size 64
[   62.373177] The buggy address is located 0 bytes to the right of
[   62.373177]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   62.386024] 
[   62.387500] The buggy address belongs to the physical page:
[   62.393056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   62.401044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.407551] page_type: f5(slab)
[   62.410685] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.418409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.426128] page dumped because: kasan: bad access detected
[   62.431683] 
[   62.433159] Memory state around the buggy address:
[   62.437938]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.445142]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.452346] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.459547]                                      ^
[   62.464325]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.471530]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.478731] ==================================================================
[   48.018806] ==================================================================
[   48.025827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   48.033116] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   48.040493] 
[   48.041978] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   48.042033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.042052] Hardware name: WinLink E850-96 board (DT)
[   48.042074] Call trace:
[   48.042088]  show_stack+0x20/0x38 (C)
[   48.042128]  dump_stack_lvl+0x8c/0xd0
[   48.042165]  print_report+0x118/0x608
[   48.042205]  kasan_report+0xdc/0x128
[   48.042237]  kasan_check_range+0x100/0x1a8
[   48.042278]  __kasan_check_write+0x20/0x30
[   48.042310]  kasan_atomics_helper+0x32c/0x4858
[   48.042342]  kasan_atomics+0x198/0x2e0
[   48.042374]  kunit_try_run_case+0x170/0x3f0
[   48.042411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.042448]  kthread+0x328/0x630
[   48.042479]  ret_from_fork+0x10/0x20
[   48.042514] 
[   48.112193] Allocated by task 312:
[   48.115579]  kasan_save_stack+0x3c/0x68
[   48.119398]  kasan_save_track+0x20/0x40
[   48.123218]  kasan_save_alloc_info+0x40/0x58
[   48.127471]  __kasan_kmalloc+0xd4/0xd8
[   48.131204]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.135717]  kasan_atomics+0xb8/0x2e0
[   48.139363]  kunit_try_run_case+0x170/0x3f0
[   48.143530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.148998]  kthread+0x328/0x630
[   48.152210]  ret_from_fork+0x10/0x20
[   48.155769] 
[   48.157246] The buggy address belongs to the object at ffff000805f49a00
[   48.157246]  which belongs to the cache kmalloc-64 of size 64
[   48.169573] The buggy address is located 0 bytes to the right of
[   48.169573]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   48.182417] 
[   48.183894] The buggy address belongs to the physical page:
[   48.189450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   48.197437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.203945] page_type: f5(slab)
[   48.207081] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.214803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.222521] page dumped because: kasan: bad access detected
[   48.228077] 
[   48.229552] Memory state around the buggy address:
[   48.234332]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.241535]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.248740] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.255941]                                      ^
[   48.260719]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.267924]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.275125] ==================================================================
[   62.746523] ==================================================================
[   62.753558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   62.760932] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   62.768310] 
[   62.769793] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   62.769842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.769858] Hardware name: WinLink E850-96 board (DT)
[   62.769878] Call trace:
[   62.769894]  show_stack+0x20/0x38 (C)
[   62.769925]  dump_stack_lvl+0x8c/0xd0
[   62.769963]  print_report+0x118/0x608
[   62.769998]  kasan_report+0xdc/0x128
[   62.770032]  kasan_check_range+0x100/0x1a8
[   62.770068]  __kasan_check_write+0x20/0x30
[   62.770099]  kasan_atomics_helper+0x175c/0x4858
[   62.770132]  kasan_atomics+0x198/0x2e0
[   62.770164]  kunit_try_run_case+0x170/0x3f0
[   62.770201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.770242]  kthread+0x328/0x630
[   62.770269]  ret_from_fork+0x10/0x20
[   62.770301] 
[   62.840097] Allocated by task 312:
[   62.843483]  kasan_save_stack+0x3c/0x68
[   62.847302]  kasan_save_track+0x20/0x40
[   62.851121]  kasan_save_alloc_info+0x40/0x58
[   62.855374]  __kasan_kmalloc+0xd4/0xd8
[   62.859107]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.863621]  kasan_atomics+0xb8/0x2e0
[   62.867267]  kunit_try_run_case+0x170/0x3f0
[   62.871433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.876902]  kthread+0x328/0x630
[   62.880114]  ret_from_fork+0x10/0x20
[   62.883673] 
[   62.885148] The buggy address belongs to the object at ffff000805f49a00
[   62.885148]  which belongs to the cache kmalloc-64 of size 64
[   62.897475] The buggy address is located 0 bytes to the right of
[   62.897475]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   62.910322] 
[   62.911798] The buggy address belongs to the physical page:
[   62.917354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   62.925342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.931849] page_type: f5(slab)
[   62.934982] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.942707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.950425] page dumped because: kasan: bad access detected
[   62.955981] 
[   62.957456] Memory state around the buggy address:
[   62.962235]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.969439]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.976644] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.983845]                                      ^
[   62.988623]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.995828]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.003029] ==================================================================
[   58.010554] ==================================================================
[   58.017516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   58.024892] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   58.032270] 
[   58.033752] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   58.033803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.033820] Hardware name: WinLink E850-96 board (DT)
[   58.033841] Call trace:
[   58.033856]  show_stack+0x20/0x38 (C)
[   58.033890]  dump_stack_lvl+0x8c/0xd0
[   58.033926]  print_report+0x118/0x608
[   58.033959]  kasan_report+0xdc/0x128
[   58.033994]  kasan_check_range+0x100/0x1a8
[   58.034029]  __kasan_check_write+0x20/0x30
[   58.034059]  kasan_atomics_helper+0x10c0/0x4858
[   58.034094]  kasan_atomics+0x198/0x2e0
[   58.034125]  kunit_try_run_case+0x170/0x3f0
[   58.034160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.034199]  kthread+0x328/0x630
[   58.034226]  ret_from_fork+0x10/0x20
[   58.034258] 
[   58.104057] Allocated by task 312:
[   58.107443]  kasan_save_stack+0x3c/0x68
[   58.111262]  kasan_save_track+0x20/0x40
[   58.115081]  kasan_save_alloc_info+0x40/0x58
[   58.119335]  __kasan_kmalloc+0xd4/0xd8
[   58.123067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.127581]  kasan_atomics+0xb8/0x2e0
[   58.131227]  kunit_try_run_case+0x170/0x3f0
[   58.135393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.140862]  kthread+0x328/0x630
[   58.144074]  ret_from_fork+0x10/0x20
[   58.147633] 
[   58.149108] The buggy address belongs to the object at ffff000805f49a00
[   58.149108]  which belongs to the cache kmalloc-64 of size 64
[   58.161435] The buggy address is located 0 bytes to the right of
[   58.161435]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   58.174282] 
[   58.175759] The buggy address belongs to the physical page:
[   58.181314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   58.189302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.195809] page_type: f5(slab)
[   58.198944] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.206667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.214385] page dumped because: kasan: bad access detected
[   58.219940] 
[   58.221416] Memory state around the buggy address:
[   58.226195]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.233399]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.240604] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.247804]                                      ^
[   58.252583]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.259788]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.266989] ==================================================================
[   59.329915] ==================================================================
[   59.336940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   59.344317] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   59.351695] 
[   59.353177] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   59.353227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.353244] Hardware name: WinLink E850-96 board (DT)
[   59.353263] Call trace:
[   59.353281]  show_stack+0x20/0x38 (C)
[   59.353313]  dump_stack_lvl+0x8c/0xd0
[   59.353350]  print_report+0x118/0x608
[   59.353384]  kasan_report+0xdc/0x128
[   59.353419]  kasan_check_range+0x100/0x1a8
[   59.353453]  __kasan_check_write+0x20/0x30
[   59.353484]  kasan_atomics_helper+0x12d8/0x4858
[   59.353518]  kasan_atomics+0x198/0x2e0
[   59.353549]  kunit_try_run_case+0x170/0x3f0
[   59.353582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.353621]  kthread+0x328/0x630
[   59.353649]  ret_from_fork+0x10/0x20
[   59.353683] 
[   59.423481] Allocated by task 312:
[   59.426867]  kasan_save_stack+0x3c/0x68
[   59.430686]  kasan_save_track+0x20/0x40
[   59.434506]  kasan_save_alloc_info+0x40/0x58
[   59.438759]  __kasan_kmalloc+0xd4/0xd8
[   59.442492]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.447006]  kasan_atomics+0xb8/0x2e0
[   59.450652]  kunit_try_run_case+0x170/0x3f0
[   59.454818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.460286]  kthread+0x328/0x630
[   59.463499]  ret_from_fork+0x10/0x20
[   59.467057] 
[   59.468533] The buggy address belongs to the object at ffff000805f49a00
[   59.468533]  which belongs to the cache kmalloc-64 of size 64
[   59.480859] The buggy address is located 0 bytes to the right of
[   59.480859]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   59.493706] 
[   59.495182] The buggy address belongs to the physical page:
[   59.500738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   59.508727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.515233] page_type: f5(slab)
[   59.518369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.526091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.533810] page dumped because: kasan: bad access detected
[   59.539365] 
[   59.540841] Memory state around the buggy address:
[   59.545619]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.552824]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.560029] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.567229]                                      ^
[   59.572008]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.579212]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.586413] ==================================================================
[   53.810687] ==================================================================
[   53.817752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.825128] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   53.832420] 
[   53.833903] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   53.833949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.833970] Hardware name: WinLink E850-96 board (DT)
[   53.833987] Call trace:
[   53.833999]  show_stack+0x20/0x38 (C)
[   53.834034]  dump_stack_lvl+0x8c/0xd0
[   53.834069]  print_report+0x118/0x608
[   53.834102]  kasan_report+0xdc/0x128
[   53.834137]  __asan_report_load4_noabort+0x20/0x30
[   53.834176]  kasan_atomics_helper+0x3dbc/0x4858
[   53.834210]  kasan_atomics+0x198/0x2e0
[   53.834241]  kunit_try_run_case+0x170/0x3f0
[   53.834277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.834314]  kthread+0x328/0x630
[   53.834343]  ret_from_fork+0x10/0x20
[   53.834375] 
[   53.900821] Allocated by task 312:
[   53.904207]  kasan_save_stack+0x3c/0x68
[   53.908026]  kasan_save_track+0x20/0x40
[   53.911846]  kasan_save_alloc_info+0x40/0x58
[   53.916099]  __kasan_kmalloc+0xd4/0xd8
[   53.919832]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.924346]  kasan_atomics+0xb8/0x2e0
[   53.927991]  kunit_try_run_case+0x170/0x3f0
[   53.932158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.937626]  kthread+0x328/0x630
[   53.940838]  ret_from_fork+0x10/0x20
[   53.944397] 
[   53.945873] The buggy address belongs to the object at ffff000805f49a00
[   53.945873]  which belongs to the cache kmalloc-64 of size 64
[   53.958200] The buggy address is located 0 bytes to the right of
[   53.958200]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   53.971046] 
[   53.972522] The buggy address belongs to the physical page:
[   53.978078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   53.986065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.992573] page_type: f5(slab)
[   53.995707] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.003431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.011150] page dumped because: kasan: bad access detected
[   54.016705] 
[   54.018181] Memory state around the buggy address:
[   54.022959]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.030164]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.037368] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.044569]                                      ^
[   54.049348]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.056552]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.063753] ==================================================================
[   60.909817] ==================================================================
[   60.916779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   60.924154] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   60.931532] 
[   60.933015] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   60.933064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.933082] Hardware name: WinLink E850-96 board (DT)
[   60.933103] Call trace:
[   60.933118]  show_stack+0x20/0x38 (C)
[   60.933151]  dump_stack_lvl+0x8c/0xd0
[   60.933190]  print_report+0x118/0x608
[   60.933225]  kasan_report+0xdc/0x128
[   60.933258]  kasan_check_range+0x100/0x1a8
[   60.933296]  __kasan_check_write+0x20/0x30
[   60.933325]  kasan_atomics_helper+0x154c/0x4858
[   60.933356]  kasan_atomics+0x198/0x2e0
[   60.933386]  kunit_try_run_case+0x170/0x3f0
[   60.933421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.933461]  kthread+0x328/0x630
[   60.933489]  ret_from_fork+0x10/0x20
[   60.933526] 
[   61.003319] Allocated by task 312:
[   61.006704]  kasan_save_stack+0x3c/0x68
[   61.010524]  kasan_save_track+0x20/0x40
[   61.014343]  kasan_save_alloc_info+0x40/0x58
[   61.018596]  __kasan_kmalloc+0xd4/0xd8
[   61.022329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.026843]  kasan_atomics+0xb8/0x2e0
[   61.030489]  kunit_try_run_case+0x170/0x3f0
[   61.034655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.040124]  kthread+0x328/0x630
[   61.043336]  ret_from_fork+0x10/0x20
[   61.046895] 
[   61.048371] The buggy address belongs to the object at ffff000805f49a00
[   61.048371]  which belongs to the cache kmalloc-64 of size 64
[   61.060697] The buggy address is located 0 bytes to the right of
[   61.060697]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   61.073544] 
[   61.075021] The buggy address belongs to the physical page:
[   61.080577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   61.088563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.095071] page_type: f5(slab)
[   61.098206] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.105929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.113647] page dumped because: kasan: bad access detected
[   61.119203] 
[   61.120678] Memory state around the buggy address:
[   61.125458]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.132661]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.139866] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.147067]                                      ^
[   61.151845]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.159049]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.166251] ==================================================================
[   53.022955] ==================================================================
[   53.029919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   53.037207] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   53.044584] 
[   53.046068] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   53.046114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.046129] Hardware name: WinLink E850-96 board (DT)
[   53.046151] Call trace:
[   53.046166]  show_stack+0x20/0x38 (C)
[   53.046199]  dump_stack_lvl+0x8c/0xd0
[   53.046236]  print_report+0x118/0x608
[   53.046272]  kasan_report+0xdc/0x128
[   53.046306]  kasan_check_range+0x100/0x1a8
[   53.046340]  __kasan_check_write+0x20/0x30
[   53.046371]  kasan_atomics_helper+0xad4/0x4858
[   53.046405]  kasan_atomics+0x198/0x2e0
[   53.046437]  kunit_try_run_case+0x170/0x3f0
[   53.046473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.046511]  kthread+0x328/0x630
[   53.046540]  ret_from_fork+0x10/0x20
[   53.046572] 
[   53.116285] Allocated by task 312:
[   53.119670]  kasan_save_stack+0x3c/0x68
[   53.123490]  kasan_save_track+0x20/0x40
[   53.127309]  kasan_save_alloc_info+0x40/0x58
[   53.131562]  __kasan_kmalloc+0xd4/0xd8
[   53.135295]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.139809]  kasan_atomics+0xb8/0x2e0
[   53.143455]  kunit_try_run_case+0x170/0x3f0
[   53.147621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.153090]  kthread+0x328/0x630
[   53.156301]  ret_from_fork+0x10/0x20
[   53.159860] 
[   53.161336] The buggy address belongs to the object at ffff000805f49a00
[   53.161336]  which belongs to the cache kmalloc-64 of size 64
[   53.173664] The buggy address is located 0 bytes to the right of
[   53.173664]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   53.186510] 
[   53.187985] The buggy address belongs to the physical page:
[   53.193541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   53.201530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.208037] page_type: f5(slab)
[   53.211170] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.218894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.226613] page dumped because: kasan: bad access detected
[   53.232168] 
[   53.233644] Memory state around the buggy address:
[   53.238422]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.245627]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.252831] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.260032]                                      ^
[   53.264811]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.272015]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.279216] ==================================================================
[   46.439520] ==================================================================
[   46.453630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   46.461004] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   46.468294] 
[   46.469781] CPU: 2 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   46.469841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.469860] Hardware name: WinLink E850-96 board (DT)
[   46.469883] Call trace:
[   46.469901]  show_stack+0x20/0x38 (C)
[   46.469943]  dump_stack_lvl+0x8c/0xd0
[   46.469981]  print_report+0x118/0x608
[   46.470019]  kasan_report+0xdc/0x128
[   46.470052]  __asan_report_load4_noabort+0x20/0x30
[   46.470093]  kasan_atomics_helper+0x40a8/0x4858
[   46.470130]  kasan_atomics+0x198/0x2e0
[   46.470162]  kunit_try_run_case+0x170/0x3f0
[   46.470201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.470240]  kthread+0x328/0x630
[   46.470272]  ret_from_fork+0x10/0x20
[   46.470311] 
[   46.536698] Allocated by task 312:
[   46.540085]  kasan_save_stack+0x3c/0x68
[   46.543901]  kasan_save_track+0x20/0x40
[   46.547720]  kasan_save_alloc_info+0x40/0x58
[   46.551973]  __kasan_kmalloc+0xd4/0xd8
[   46.555707]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.560220]  kasan_atomics+0xb8/0x2e0
[   46.563866]  kunit_try_run_case+0x170/0x3f0
[   46.568032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.573501]  kthread+0x328/0x630
[   46.576712]  ret_from_fork+0x10/0x20
[   46.580272] 
[   46.581749] The buggy address belongs to the object at ffff000805f49a00
[   46.581749]  which belongs to the cache kmalloc-64 of size 64
[   46.594076] The buggy address is located 0 bytes to the right of
[   46.594076]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   46.606921] 
[   46.608400] The buggy address belongs to the physical page:
[   46.613956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   46.621940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.628451] page_type: f5(slab)
[   46.631584] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.639306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.647025] page dumped because: kasan: bad access detected
[   46.652580] 
[   46.654057] Memory state around the buggy address:
[   46.658834]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.666038]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.673244] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.680444]                                      ^
[   46.685221]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.692426]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.699630] ==================================================================
[   59.066091] ==================================================================
[   59.073057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   59.080432] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   59.087810] 
[   59.089293] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   59.089343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.089359] Hardware name: WinLink E850-96 board (DT)
[   59.089379] Call trace:
[   59.089396]  show_stack+0x20/0x38 (C)
[   59.089430]  dump_stack_lvl+0x8c/0xd0
[   59.089467]  print_report+0x118/0x608
[   59.089500]  kasan_report+0xdc/0x128
[   59.089535]  kasan_check_range+0x100/0x1a8
[   59.089569]  __kasan_check_write+0x20/0x30
[   59.089600]  kasan_atomics_helper+0x126c/0x4858
[   59.089634]  kasan_atomics+0x198/0x2e0
[   59.089663]  kunit_try_run_case+0x170/0x3f0
[   59.089700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.089739]  kthread+0x328/0x630
[   59.089767]  ret_from_fork+0x10/0x20
[   59.089802] 
[   59.159596] Allocated by task 312:
[   59.162982]  kasan_save_stack+0x3c/0x68
[   59.166802]  kasan_save_track+0x20/0x40
[   59.170621]  kasan_save_alloc_info+0x40/0x58
[   59.174874]  __kasan_kmalloc+0xd4/0xd8
[   59.178607]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.183121]  kasan_atomics+0xb8/0x2e0
[   59.186766]  kunit_try_run_case+0x170/0x3f0
[   59.190933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.196402]  kthread+0x328/0x630
[   59.199614]  ret_from_fork+0x10/0x20
[   59.203173] 
[   59.204648] The buggy address belongs to the object at ffff000805f49a00
[   59.204648]  which belongs to the cache kmalloc-64 of size 64
[   59.216976] The buggy address is located 0 bytes to the right of
[   59.216976]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   59.229821] 
[   59.231297] The buggy address belongs to the physical page:
[   59.236853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   59.244842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.251349] page_type: f5(slab)
[   59.254484] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.262206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.269925] page dumped because: kasan: bad access detected
[   59.275480] 
[   59.276956] Memory state around the buggy address:
[   59.281734]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.288939]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.296144] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.303344]                                      ^
[   59.308123]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.315328]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.322528] ==================================================================
[   53.286580] ==================================================================
[   53.293628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.301005] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   53.308296] 
[   53.309777] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   53.309826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.309841] Hardware name: WinLink E850-96 board (DT)
[   53.309860] Call trace:
[   53.309874]  show_stack+0x20/0x38 (C)
[   53.309906]  dump_stack_lvl+0x8c/0xd0
[   53.309941]  print_report+0x118/0x608
[   53.309976]  kasan_report+0xdc/0x128
[   53.310011]  __asan_report_load4_noabort+0x20/0x30
[   53.310049]  kasan_atomics_helper+0x3dcc/0x4858
[   53.310082]  kasan_atomics+0x198/0x2e0
[   53.310114]  kunit_try_run_case+0x170/0x3f0
[   53.310148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.310184]  kthread+0x328/0x630
[   53.310212]  ret_from_fork+0x10/0x20
[   53.310245] 
[   53.376697] Allocated by task 312:
[   53.380083]  kasan_save_stack+0x3c/0x68
[   53.383902]  kasan_save_track+0x20/0x40
[   53.387722]  kasan_save_alloc_info+0x40/0x58
[   53.391975]  __kasan_kmalloc+0xd4/0xd8
[   53.395708]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.400221]  kasan_atomics+0xb8/0x2e0
[   53.403867]  kunit_try_run_case+0x170/0x3f0
[   53.408034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.413502]  kthread+0x328/0x630
[   53.416714]  ret_from_fork+0x10/0x20
[   53.420273] 
[   53.421748] The buggy address belongs to the object at ffff000805f49a00
[   53.421748]  which belongs to the cache kmalloc-64 of size 64
[   53.434076] The buggy address is located 0 bytes to the right of
[   53.434076]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   53.446922] 
[   53.448398] The buggy address belongs to the physical page:
[   53.453954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   53.461940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.468450] page_type: f5(slab)
[   53.471583] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.479307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.487026] page dumped because: kasan: bad access detected
[   53.492581] 
[   53.494057] Memory state around the buggy address:
[   53.498835]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.506040]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.513244] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.520445]                                      ^
[   53.525223]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.532428]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.539629] ==================================================================
[   57.219129] ==================================================================
[   57.226209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   57.233497] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   57.240875] 
[   57.242358] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   57.242410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.242427] Hardware name: WinLink E850-96 board (DT)
[   57.242450] Call trace:
[   57.242466]  show_stack+0x20/0x38 (C)
[   57.242495]  dump_stack_lvl+0x8c/0xd0
[   57.242531]  print_report+0x118/0x608
[   57.242566]  kasan_report+0xdc/0x128
[   57.242600]  kasan_check_range+0x100/0x1a8
[   57.242634]  __kasan_check_write+0x20/0x30
[   57.242664]  kasan_atomics_helper+0xf88/0x4858
[   57.242698]  kasan_atomics+0x198/0x2e0
[   57.242730]  kunit_try_run_case+0x170/0x3f0
[   57.242763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.242803]  kthread+0x328/0x630
[   57.242831]  ret_from_fork+0x10/0x20
[   57.242863] 
[   57.312576] Allocated by task 312:
[   57.315962]  kasan_save_stack+0x3c/0x68
[   57.319781]  kasan_save_track+0x20/0x40
[   57.323600]  kasan_save_alloc_info+0x40/0x58
[   57.327854]  __kasan_kmalloc+0xd4/0xd8
[   57.331586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.336100]  kasan_atomics+0xb8/0x2e0
[   57.339746]  kunit_try_run_case+0x170/0x3f0
[   57.343912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.349381]  kthread+0x328/0x630
[   57.352593]  ret_from_fork+0x10/0x20
[   57.356152] 
[   57.357627] The buggy address belongs to the object at ffff000805f49a00
[   57.357627]  which belongs to the cache kmalloc-64 of size 64
[   57.369954] The buggy address is located 0 bytes to the right of
[   57.369954]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   57.382800] 
[   57.384276] The buggy address belongs to the physical page:
[   57.389832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   57.397821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.404328] page_type: f5(slab)
[   57.407461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.415185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.422904] page dumped because: kasan: bad access detected
[   57.428460] 
[   57.429935] Memory state around the buggy address:
[   57.434713]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.441918]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.449123] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.456324]                                      ^
[   57.461101]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.468307]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.475508] ==================================================================
[   60.118048] ==================================================================
[   60.125123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   60.132499] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   60.139877] 
[   60.141360] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   60.141409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.141424] Hardware name: WinLink E850-96 board (DT)
[   60.141440] Call trace:
[   60.141453]  show_stack+0x20/0x38 (C)
[   60.141487]  dump_stack_lvl+0x8c/0xd0
[   60.141524]  print_report+0x118/0x608
[   60.141557]  kasan_report+0xdc/0x128
[   60.141589]  kasan_check_range+0x100/0x1a8
[   60.141625]  __kasan_check_write+0x20/0x30
[   60.141655]  kasan_atomics_helper+0x1414/0x4858
[   60.141689]  kasan_atomics+0x198/0x2e0
[   60.141719]  kunit_try_run_case+0x170/0x3f0
[   60.141753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.141793]  kthread+0x328/0x630
[   60.141821]  ret_from_fork+0x10/0x20
[   60.141854] 
[   60.211664] Allocated by task 312:
[   60.215049]  kasan_save_stack+0x3c/0x68
[   60.218869]  kasan_save_track+0x20/0x40
[   60.222688]  kasan_save_alloc_info+0x40/0x58
[   60.226942]  __kasan_kmalloc+0xd4/0xd8
[   60.230674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.235188]  kasan_atomics+0xb8/0x2e0
[   60.238834]  kunit_try_run_case+0x170/0x3f0
[   60.243001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.248469]  kthread+0x328/0x630
[   60.251681]  ret_from_fork+0x10/0x20
[   60.255240] 
[   60.256716] The buggy address belongs to the object at ffff000805f49a00
[   60.256716]  which belongs to the cache kmalloc-64 of size 64
[   60.269042] The buggy address is located 0 bytes to the right of
[   60.269042]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   60.281889] 
[   60.283365] The buggy address belongs to the physical page:
[   60.288921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   60.296909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.303416] page_type: f5(slab)
[   60.306550] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.314274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.321992] page dumped because: kasan: bad access detected
[   60.327548] 
[   60.329023] Memory state around the buggy address:
[   60.333802]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.341006]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.348211] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.355412]                                      ^
[   60.360190]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.367395]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.374596] ==================================================================
[   50.652736] ==================================================================
[   50.659814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   50.667103] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   50.674481] 
[   50.675964] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   50.676013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.676029] Hardware name: WinLink E850-96 board (DT)
[   50.676049] Call trace:
[   50.676065]  show_stack+0x20/0x38 (C)
[   50.676098]  dump_stack_lvl+0x8c/0xd0
[   50.676135]  print_report+0x118/0x608
[   50.676170]  kasan_report+0xdc/0x128
[   50.676203]  kasan_check_range+0x100/0x1a8
[   50.676238]  __kasan_check_write+0x20/0x30
[   50.676269]  kasan_atomics_helper+0x6ec/0x4858
[   50.676304]  kasan_atomics+0x198/0x2e0
[   50.676334]  kunit_try_run_case+0x170/0x3f0
[   50.676368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.676408]  kthread+0x328/0x630
[   50.676435]  ret_from_fork+0x10/0x20
[   50.676468] 
[   50.746181] Allocated by task 312:
[   50.749567]  kasan_save_stack+0x3c/0x68
[   50.753386]  kasan_save_track+0x20/0x40
[   50.757205]  kasan_save_alloc_info+0x40/0x58
[   50.761459]  __kasan_kmalloc+0xd4/0xd8
[   50.765192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.769705]  kasan_atomics+0xb8/0x2e0
[   50.773351]  kunit_try_run_case+0x170/0x3f0
[   50.777518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.782986]  kthread+0x328/0x630
[   50.786198]  ret_from_fork+0x10/0x20
[   50.789757] 
[   50.791233] The buggy address belongs to the object at ffff000805f49a00
[   50.791233]  which belongs to the cache kmalloc-64 of size 64
[   50.803559] The buggy address is located 0 bytes to the right of
[   50.803559]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   50.816406] 
[   50.817882] The buggy address belongs to the physical page:
[   50.823438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   50.831425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.837933] page_type: f5(slab)
[   50.841067] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.848791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.856509] page dumped because: kasan: bad access detected
[   50.862065] 
[   50.863540] Memory state around the buggy address:
[   50.868319]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.875524]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.882728] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.889929]                                      ^
[   50.894707]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.901912]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.909113] ==================================================================
[   58.274367] ==================================================================
[   58.281400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   58.288777] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   58.296155] 
[   58.297639] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   58.297690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.297706] Hardware name: WinLink E850-96 board (DT)
[   58.297725] Call trace:
[   58.297742]  show_stack+0x20/0x38 (C)
[   58.297777]  dump_stack_lvl+0x8c/0xd0
[   58.297815]  print_report+0x118/0x608
[   58.297846]  kasan_report+0xdc/0x128
[   58.297880]  kasan_check_range+0x100/0x1a8
[   58.297916]  __kasan_check_write+0x20/0x30
[   58.297946]  kasan_atomics_helper+0x1128/0x4858
[   58.297979]  kasan_atomics+0x198/0x2e0
[   58.298009]  kunit_try_run_case+0x170/0x3f0
[   58.298045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.298083]  kthread+0x328/0x630
[   58.298109]  ret_from_fork+0x10/0x20
[   58.298141] 
[   58.367942] Allocated by task 312:
[   58.371327]  kasan_save_stack+0x3c/0x68
[   58.375147]  kasan_save_track+0x20/0x40
[   58.378966]  kasan_save_alloc_info+0x40/0x58
[   58.383220]  __kasan_kmalloc+0xd4/0xd8
[   58.386952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.391466]  kasan_atomics+0xb8/0x2e0
[   58.395112]  kunit_try_run_case+0x170/0x3f0
[   58.399278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.404747]  kthread+0x328/0x630
[   58.407959]  ret_from_fork+0x10/0x20
[   58.411518] 
[   58.412993] The buggy address belongs to the object at ffff000805f49a00
[   58.412993]  which belongs to the cache kmalloc-64 of size 64
[   58.425320] The buggy address is located 0 bytes to the right of
[   58.425320]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   58.438166] 
[   58.439642] The buggy address belongs to the physical page:
[   58.445200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   58.453187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.459694] page_type: f5(slab)
[   58.462829] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.470551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.478270] page dumped because: kasan: bad access detected
[   58.483825] 
[   58.485301] Memory state around the buggy address:
[   58.490080]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.497284]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.504489] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.511690]                                      ^
[   58.516468]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.523673]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.530874] ==================================================================
[   61.173623] ==================================================================
[   61.180665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   61.188039] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   61.195417] 
[   61.196900] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   61.196951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.196968] Hardware name: WinLink E850-96 board (DT)
[   61.196989] Call trace:
[   61.197005]  show_stack+0x20/0x38 (C)
[   61.197036]  dump_stack_lvl+0x8c/0xd0
[   61.197070]  print_report+0x118/0x608
[   61.197106]  kasan_report+0xdc/0x128
[   61.197138]  kasan_check_range+0x100/0x1a8
[   61.197174]  __kasan_check_write+0x20/0x30
[   61.197205]  kasan_atomics_helper+0x15b4/0x4858
[   61.197239]  kasan_atomics+0x198/0x2e0
[   61.197272]  kunit_try_run_case+0x170/0x3f0
[   61.197305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.197345]  kthread+0x328/0x630
[   61.197371]  ret_from_fork+0x10/0x20
[   61.197406] 
[   61.267204] Allocated by task 312:
[   61.270590]  kasan_save_stack+0x3c/0x68
[   61.274408]  kasan_save_track+0x20/0x40
[   61.278228]  kasan_save_alloc_info+0x40/0x58
[   61.282481]  __kasan_kmalloc+0xd4/0xd8
[   61.286214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.290728]  kasan_atomics+0xb8/0x2e0
[   61.294374]  kunit_try_run_case+0x170/0x3f0
[   61.298540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.304009]  kthread+0x328/0x630
[   61.307221]  ret_from_fork+0x10/0x20
[   61.310780] 
[   61.312255] The buggy address belongs to the object at ffff000805f49a00
[   61.312255]  which belongs to the cache kmalloc-64 of size 64
[   61.324582] The buggy address is located 0 bytes to the right of
[   61.324582]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   61.337429] 
[   61.338904] The buggy address belongs to the physical page:
[   61.344461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   61.352448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.358956] page_type: f5(slab)
[   61.362089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.369813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.377532] page dumped because: kasan: bad access detected
[   61.383088] 
[   61.384563] Memory state around the buggy address:
[   61.389341]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.396546]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.403751] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.410952]                                      ^
[   61.415730]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.422935]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.430136] ==================================================================
[   63.010485] ==================================================================
[   63.017442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   63.024817] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   63.032108] 
[   63.033591] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   63.033640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.033660] Hardware name: WinLink E850-96 board (DT)
[   63.033680] Call trace:
[   63.033694]  show_stack+0x20/0x38 (C)
[   63.033726]  dump_stack_lvl+0x8c/0xd0
[   63.033763]  print_report+0x118/0x608
[   63.033797]  kasan_report+0xdc/0x128
[   63.033833]  __asan_report_load8_noabort+0x20/0x30
[   63.033870]  kasan_atomics_helper+0x3e20/0x4858
[   63.033903]  kasan_atomics+0x198/0x2e0
[   63.033936]  kunit_try_run_case+0x170/0x3f0
[   63.033970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.034007]  kthread+0x328/0x630
[   63.034033]  ret_from_fork+0x10/0x20
[   63.034066] 
[   63.100509] Allocated by task 312:
[   63.103895]  kasan_save_stack+0x3c/0x68
[   63.107715]  kasan_save_track+0x20/0x40
[   63.111534]  kasan_save_alloc_info+0x40/0x58
[   63.115788]  __kasan_kmalloc+0xd4/0xd8
[   63.119520]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.124034]  kasan_atomics+0xb8/0x2e0
[   63.127679]  kunit_try_run_case+0x170/0x3f0
[   63.131846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.137315]  kthread+0x328/0x630
[   63.140527]  ret_from_fork+0x10/0x20
[   63.144086] 
[   63.145561] The buggy address belongs to the object at ffff000805f49a00
[   63.145561]  which belongs to the cache kmalloc-64 of size 64
[   63.157888] The buggy address is located 0 bytes to the right of
[   63.157888]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   63.170734] 
[   63.172210] The buggy address belongs to the physical page:
[   63.177768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   63.185755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.192262] page_type: f5(slab)
[   63.195396] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.203119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.210838] page dumped because: kasan: bad access detected
[   63.216393] 
[   63.217869] Memory state around the buggy address:
[   63.222649]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.229852]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.237057] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.244258]                                      ^
[   63.249036]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.256240]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.263441] ==================================================================
[   52.495405] ==================================================================
[   52.502493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.509783] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   52.517162] 
[   52.518644] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   52.518691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.518705] Hardware name: WinLink E850-96 board (DT)
[   52.518724] Call trace:
[   52.518738]  show_stack+0x20/0x38 (C)
[   52.518772]  dump_stack_lvl+0x8c/0xd0
[   52.518807]  print_report+0x118/0x608
[   52.518841]  kasan_report+0xdc/0x128
[   52.518876]  kasan_check_range+0x100/0x1a8
[   52.518910]  __kasan_check_write+0x20/0x30
[   52.518938]  kasan_atomics_helper+0xa04/0x4858
[   52.518972]  kasan_atomics+0x198/0x2e0
[   52.519002]  kunit_try_run_case+0x170/0x3f0
[   52.519038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.519075]  kthread+0x328/0x630
[   52.519103]  ret_from_fork+0x10/0x20
[   52.519134] 
[   52.588862] Allocated by task 312:
[   52.592247]  kasan_save_stack+0x3c/0x68
[   52.596067]  kasan_save_track+0x20/0x40
[   52.599886]  kasan_save_alloc_info+0x40/0x58
[   52.604139]  __kasan_kmalloc+0xd4/0xd8
[   52.607872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.612386]  kasan_atomics+0xb8/0x2e0
[   52.616032]  kunit_try_run_case+0x170/0x3f0
[   52.620198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.625667]  kthread+0x328/0x630
[   52.628879]  ret_from_fork+0x10/0x20
[   52.632438] 
[   52.633913] The buggy address belongs to the object at ffff000805f49a00
[   52.633913]  which belongs to the cache kmalloc-64 of size 64
[   52.646240] The buggy address is located 0 bytes to the right of
[   52.646240]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   52.659087] 
[   52.660562] The buggy address belongs to the physical page:
[   52.666118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   52.674104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.680614] page_type: f5(slab)
[   52.683747] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.691471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.699190] page dumped because: kasan: bad access detected
[   52.704746] 
[   52.706221] Memory state around the buggy address:
[   52.711000]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.718204]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.725409] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.732610]                                      ^
[   52.737388]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.744593]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.751794] ==================================================================
[   61.961852] ==================================================================
[   61.968845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   61.976221] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   61.983513] 
[   61.984996] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   61.985048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.985063] Hardware name: WinLink E850-96 board (DT)
[   61.985081] Call trace:
[   61.985097]  show_stack+0x20/0x38 (C)
[   61.985129]  dump_stack_lvl+0x8c/0xd0
[   61.985166]  print_report+0x118/0x608
[   61.985199]  kasan_report+0xdc/0x128
[   61.985234]  __asan_report_load8_noabort+0x20/0x30
[   61.985274]  kasan_atomics_helper+0x3df4/0x4858
[   61.985307]  kasan_atomics+0x198/0x2e0
[   61.985338]  kunit_try_run_case+0x170/0x3f0
[   61.985373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.985410]  kthread+0x328/0x630
[   61.985438]  ret_from_fork+0x10/0x20
[   61.985469] 
[   62.051914] Allocated by task 312:
[   62.055300]  kasan_save_stack+0x3c/0x68
[   62.059119]  kasan_save_track+0x20/0x40
[   62.062939]  kasan_save_alloc_info+0x40/0x58
[   62.067192]  __kasan_kmalloc+0xd4/0xd8
[   62.070924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.075438]  kasan_atomics+0xb8/0x2e0
[   62.079084]  kunit_try_run_case+0x170/0x3f0
[   62.083251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.088719]  kthread+0x328/0x630
[   62.091931]  ret_from_fork+0x10/0x20
[   62.095490] 
[   62.096967] The buggy address belongs to the object at ffff000805f49a00
[   62.096967]  which belongs to the cache kmalloc-64 of size 64
[   62.109292] The buggy address is located 0 bytes to the right of
[   62.109292]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   62.122139] 
[   62.123615] The buggy address belongs to the physical page:
[   62.129170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   62.137158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.143666] page_type: f5(slab)
[   62.146799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.154524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.162242] page dumped because: kasan: bad access detected
[   62.167798] 
[   62.169273] Memory state around the buggy address:
[   62.174054]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.181257]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.188461] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.195662]                                      ^
[   62.200440]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.207645]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.214846] ==================================================================
[   46.967607] ==================================================================
[   46.974627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   46.981915] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   46.989207] 
[   46.990691] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   46.990741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.990759] Hardware name: WinLink E850-96 board (DT)
[   46.990779] Call trace:
[   46.990791]  show_stack+0x20/0x38 (C)
[   46.990826]  dump_stack_lvl+0x8c/0xd0
[   46.990866]  print_report+0x118/0x608
[   46.990903]  kasan_report+0xdc/0x128
[   46.990938]  kasan_check_range+0x100/0x1a8
[   46.990978]  __kasan_check_read+0x20/0x30
[   46.991007]  kasan_atomics_helper+0x1ec/0x4858
[   46.991039]  kasan_atomics+0x198/0x2e0
[   46.991072]  kunit_try_run_case+0x170/0x3f0
[   46.991107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.991146]  kthread+0x328/0x630
[   46.991175]  ret_from_fork+0x10/0x20
[   46.991212] 
[   47.060820] Allocated by task 312:
[   47.064207]  kasan_save_stack+0x3c/0x68
[   47.068025]  kasan_save_track+0x20/0x40
[   47.071844]  kasan_save_alloc_info+0x40/0x58
[   47.076098]  __kasan_kmalloc+0xd4/0xd8
[   47.079830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.084344]  kasan_atomics+0xb8/0x2e0
[   47.087990]  kunit_try_run_case+0x170/0x3f0
[   47.092156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.097625]  kthread+0x328/0x630
[   47.100837]  ret_from_fork+0x10/0x20
[   47.104396] 
[   47.105873] The buggy address belongs to the object at ffff000805f49a00
[   47.105873]  which belongs to the cache kmalloc-64 of size 64
[   47.118198] The buggy address is located 0 bytes to the right of
[   47.118198]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   47.131045] 
[   47.132522] The buggy address belongs to the physical page:
[   47.138078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   47.146064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.152573] page_type: f5(slab)
[   47.155707] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.163429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.171148] page dumped because: kasan: bad access detected
[   47.176703] 
[   47.178179] Memory state around the buggy address:
[   47.182959]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.190162]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.197367] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.204568]                                      ^
[   47.209346]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.216550]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.223751] ==================================================================
[   49.597924] ==================================================================
[   49.604968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   49.612258] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   49.619636] 
[   49.621119] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   49.621167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.621185] Hardware name: WinLink E850-96 board (DT)
[   49.621208] Call trace:
[   49.621222]  show_stack+0x20/0x38 (C)
[   49.621255]  dump_stack_lvl+0x8c/0xd0
[   49.621292]  print_report+0x118/0x608
[   49.621325]  kasan_report+0xdc/0x128
[   49.621359]  kasan_check_range+0x100/0x1a8
[   49.621394]  __kasan_check_write+0x20/0x30
[   49.621425]  kasan_atomics_helper+0x54c/0x4858
[   49.621460]  kasan_atomics+0x198/0x2e0
[   49.621491]  kunit_try_run_case+0x170/0x3f0
[   49.621525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.621562]  kthread+0x328/0x630
[   49.621590]  ret_from_fork+0x10/0x20
[   49.621621] 
[   49.691336] Allocated by task 312:
[   49.694722]  kasan_save_stack+0x3c/0x68
[   49.698541]  kasan_save_track+0x20/0x40
[   49.702360]  kasan_save_alloc_info+0x40/0x58
[   49.706614]  __kasan_kmalloc+0xd4/0xd8
[   49.710346]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.714860]  kasan_atomics+0xb8/0x2e0
[   49.718505]  kunit_try_run_case+0x170/0x3f0
[   49.722673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.728141]  kthread+0x328/0x630
[   49.731353]  ret_from_fork+0x10/0x20
[   49.734912] 
[   49.736387] The buggy address belongs to the object at ffff000805f49a00
[   49.736387]  which belongs to the cache kmalloc-64 of size 64
[   49.748714] The buggy address is located 0 bytes to the right of
[   49.748714]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   49.761561] 
[   49.763037] The buggy address belongs to the physical page:
[   49.768593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   49.776579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.783088] page_type: f5(slab)
[   49.786221] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.793945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.801664] page dumped because: kasan: bad access detected
[   49.807220] 
[   49.808695] Memory state around the buggy address:
[   49.813474]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.820678]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.827883] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.835084]                                      ^
[   49.839862]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.847067]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.854268] ==================================================================
[   58.802111] ==================================================================
[   58.809171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   58.816547] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   58.823925] 
[   58.825408] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   58.825457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.825473] Hardware name: WinLink E850-96 board (DT)
[   58.825490] Call trace:
[   58.825507]  show_stack+0x20/0x38 (C)
[   58.825537]  dump_stack_lvl+0x8c/0xd0
[   58.825573]  print_report+0x118/0x608
[   58.825609]  kasan_report+0xdc/0x128
[   58.825641]  kasan_check_range+0x100/0x1a8
[   58.825676]  __kasan_check_write+0x20/0x30
[   58.825705]  kasan_atomics_helper+0x11f8/0x4858
[   58.825740]  kasan_atomics+0x198/0x2e0
[   58.825773]  kunit_try_run_case+0x170/0x3f0
[   58.825807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.825846]  kthread+0x328/0x630
[   58.825874]  ret_from_fork+0x10/0x20
[   58.825905] 
[   58.895711] Allocated by task 312:
[   58.899097]  kasan_save_stack+0x3c/0x68
[   58.902916]  kasan_save_track+0x20/0x40
[   58.906736]  kasan_save_alloc_info+0x40/0x58
[   58.910989]  __kasan_kmalloc+0xd4/0xd8
[   58.914722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.919236]  kasan_atomics+0xb8/0x2e0
[   58.922882]  kunit_try_run_case+0x170/0x3f0
[   58.927048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.932517]  kthread+0x328/0x630
[   58.935729]  ret_from_fork+0x10/0x20
[   58.939288] 
[   58.940763] The buggy address belongs to the object at ffff000805f49a00
[   58.940763]  which belongs to the cache kmalloc-64 of size 64
[   58.953090] The buggy address is located 0 bytes to the right of
[   58.953090]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   58.965937] 
[   58.967412] The buggy address belongs to the physical page:
[   58.972968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   58.980955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.987464] page_type: f5(slab)
[   58.990597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.998321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.006040] page dumped because: kasan: bad access detected
[   59.011595] 
[   59.013071] Memory state around the buggy address:
[   59.017850]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.025054]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.032258] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.039460]                                      ^
[   59.044238]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.051443]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.058643] ==================================================================
[   50.916548] ==================================================================
[   50.923526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   50.930814] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   50.938193] 
[   50.939676] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   50.939724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.939741] Hardware name: WinLink E850-96 board (DT)
[   50.939762] Call trace:
[   50.939777]  show_stack+0x20/0x38 (C)
[   50.939810]  dump_stack_lvl+0x8c/0xd0
[   50.939845]  print_report+0x118/0x608
[   50.939880]  kasan_report+0xdc/0x128
[   50.939915]  kasan_check_range+0x100/0x1a8
[   50.939950]  __kasan_check_write+0x20/0x30
[   50.939980]  kasan_atomics_helper+0x760/0x4858
[   50.940013]  kasan_atomics+0x198/0x2e0
[   50.940044]  kunit_try_run_case+0x170/0x3f0
[   50.940079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.940117]  kthread+0x328/0x630
[   50.940144]  ret_from_fork+0x10/0x20
[   50.940176] 
[   51.009892] Allocated by task 312:
[   51.013278]  kasan_save_stack+0x3c/0x68
[   51.017097]  kasan_save_track+0x20/0x40
[   51.020917]  kasan_save_alloc_info+0x40/0x58
[   51.025170]  __kasan_kmalloc+0xd4/0xd8
[   51.028903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.033416]  kasan_atomics+0xb8/0x2e0
[   51.037063]  kunit_try_run_case+0x170/0x3f0
[   51.041229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.046698]  kthread+0x328/0x630
[   51.049909]  ret_from_fork+0x10/0x20
[   51.053468] 
[   51.054944] The buggy address belongs to the object at ffff000805f49a00
[   51.054944]  which belongs to the cache kmalloc-64 of size 64
[   51.067271] The buggy address is located 0 bytes to the right of
[   51.067271]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   51.080117] 
[   51.081593] The buggy address belongs to the physical page:
[   51.087149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   51.095135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.101645] page_type: f5(slab)
[   51.104779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.112502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.120221] page dumped because: kasan: bad access detected
[   51.125776] 
[   51.127252] Memory state around the buggy address:
[   51.132030]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.139235]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.146440] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.153641]                                      ^
[   51.158418]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.165623]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.172824] ==================================================================
[   59.593777] ==================================================================
[   59.600825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   59.608201] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   59.615580] 
[   59.617063] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   59.617110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.617125] Hardware name: WinLink E850-96 board (DT)
[   59.617145] Call trace:
[   59.617161]  show_stack+0x20/0x38 (C)
[   59.617192]  dump_stack_lvl+0x8c/0xd0
[   59.617229]  print_report+0x118/0x608
[   59.617261]  kasan_report+0xdc/0x128
[   59.617296]  kasan_check_range+0x100/0x1a8
[   59.617329]  __kasan_check_write+0x20/0x30
[   59.617359]  kasan_atomics_helper+0x1384/0x4858
[   59.617392]  kasan_atomics+0x198/0x2e0
[   59.617422]  kunit_try_run_case+0x170/0x3f0
[   59.617455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.617493]  kthread+0x328/0x630
[   59.617520]  ret_from_fork+0x10/0x20
[   59.617553] 
[   59.687367] Allocated by task 312:
[   59.690752]  kasan_save_stack+0x3c/0x68
[   59.694571]  kasan_save_track+0x20/0x40
[   59.698391]  kasan_save_alloc_info+0x40/0x58
[   59.702644]  __kasan_kmalloc+0xd4/0xd8
[   59.706377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.710891]  kasan_atomics+0xb8/0x2e0
[   59.714536]  kunit_try_run_case+0x170/0x3f0
[   59.718703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.724172]  kthread+0x328/0x630
[   59.727383]  ret_from_fork+0x10/0x20
[   59.730942] 
[   59.732418] The buggy address belongs to the object at ffff000805f49a00
[   59.732418]  which belongs to the cache kmalloc-64 of size 64
[   59.744745] The buggy address is located 0 bytes to the right of
[   59.744745]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   59.757591] 
[   59.759067] The buggy address belongs to the physical page:
[   59.764623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   59.772612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.779119] page_type: f5(slab)
[   59.782252] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.789976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.797695] page dumped because: kasan: bad access detected
[   59.803250] 
[   59.804726] Memory state around the buggy address:
[   59.809504]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.816709]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.823914] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.831114]                                      ^
[   59.835892]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.843097]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.850298] ==================================================================

[   29.866375] ==================================================================
[   29.866552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.866762] Read of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.867333] 
[   29.868090] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.868642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.868724] Hardware name: linux,dummy-virt (DT)
[   29.869006] Call trace:
[   29.869155]  show_stack+0x20/0x38 (C)
[   29.869283]  dump_stack_lvl+0x8c/0xd0
[   29.869406]  print_report+0x118/0x608
[   29.870026]  kasan_report+0xdc/0x128
[   29.870509]  __asan_report_load4_noabort+0x20/0x30
[   29.871209]  kasan_atomics_helper+0x3dd8/0x4858
[   29.871568]  kasan_atomics+0x198/0x2e0
[   29.871697]  kunit_try_run_case+0x170/0x3f0
[   29.871839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.872572]  kthread+0x328/0x630
[   29.873468]  ret_from_fork+0x10/0x20
[   29.874014] 
[   29.874375] Allocated by task 265:
[   29.874876]  kasan_save_stack+0x3c/0x68
[   29.875375]  kasan_save_track+0x20/0x40
[   29.876107]  kasan_save_alloc_info+0x40/0x58
[   29.876257]  __kasan_kmalloc+0xd4/0xd8
[   29.876567]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.876820]  kasan_atomics+0xb8/0x2e0
[   29.876929]  kunit_try_run_case+0x170/0x3f0
[   29.877998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.878134]  kthread+0x328/0x630
[   29.878311]  ret_from_fork+0x10/0x20
[   29.878494] 
[   29.878547] The buggy address belongs to the object at fff00000c643c780
[   29.878547]  which belongs to the cache kmalloc-64 of size 64
[   29.878692] The buggy address is located 0 bytes to the right of
[   29.878692]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.878849] 
[   29.878983] The buggy address belongs to the physical page:
[   29.879151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.879287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.879432] page_type: f5(slab)
[   29.879816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.880027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.880179] page dumped because: kasan: bad access detected
[   29.880279] 
[   29.880335] Memory state around the buggy address:
[   29.880421]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.880539]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.880666] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.880768]                                      ^
[   29.880856]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.881237]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.881346] ==================================================================
[   29.728763] ==================================================================
[   29.728923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.729071] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.729257] 
[   29.729423] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.729633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.729705] Hardware name: linux,dummy-virt (DT)
[   29.729781] Call trace:
[   29.729839]  show_stack+0x20/0x38 (C)
[   29.729984]  dump_stack_lvl+0x8c/0xd0
[   29.730115]  print_report+0x118/0x608
[   29.730251]  kasan_report+0xdc/0x128
[   29.730600]  kasan_check_range+0x100/0x1a8
[   29.730767]  __kasan_check_write+0x20/0x30
[   29.731500]  kasan_atomics_helper+0x99c/0x4858
[   29.731666]  kasan_atomics+0x198/0x2e0
[   29.731808]  kunit_try_run_case+0x170/0x3f0
[   29.731894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.732063]  kthread+0x328/0x630
[   29.732190]  ret_from_fork+0x10/0x20
[   29.732335] 
[   29.732461] Allocated by task 265:
[   29.732628]  kasan_save_stack+0x3c/0x68
[   29.732744]  kasan_save_track+0x20/0x40
[   29.732904]  kasan_save_alloc_info+0x40/0x58
[   29.733046]  __kasan_kmalloc+0xd4/0xd8
[   29.733154]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.733448]  kasan_atomics+0xb8/0x2e0
[   29.733573]  kunit_try_run_case+0x170/0x3f0
[   29.733689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.733944]  kthread+0x328/0x630
[   29.734140]  ret_from_fork+0x10/0x20
[   29.734334] 
[   29.734443] The buggy address belongs to the object at fff00000c643c780
[   29.734443]  which belongs to the cache kmalloc-64 of size 64
[   29.734637] The buggy address is located 0 bytes to the right of
[   29.734637]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.734827] 
[   29.734904] The buggy address belongs to the physical page:
[   29.735232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.735420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.735582] page_type: f5(slab)
[   29.735699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.735871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.736010] page dumped because: kasan: bad access detected
[   29.736105] 
[   29.736328] Memory state around the buggy address:
[   29.736491]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.736604]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.736720] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.736907]                                      ^
[   29.737035]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.737149]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.737258] ==================================================================
[   30.255664] ==================================================================
[   30.255776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   30.255895] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.256856] 
[   30.257015] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.257501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.257761] Hardware name: linux,dummy-virt (DT)
[   30.257841] Call trace:
[   30.258345]  show_stack+0x20/0x38 (C)
[   30.258493]  dump_stack_lvl+0x8c/0xd0
[   30.259011]  print_report+0x118/0x608
[   30.259216]  kasan_report+0xdc/0x128
[   30.259454]  kasan_check_range+0x100/0x1a8
[   30.259701]  __kasan_check_write+0x20/0x30
[   30.260102]  kasan_atomics_helper+0x16d0/0x4858
[   30.260400]  kasan_atomics+0x198/0x2e0
[   30.260520]  kunit_try_run_case+0x170/0x3f0
[   30.261599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.262450]  kthread+0x328/0x630
[   30.263351]  ret_from_fork+0x10/0x20
[   30.263756] 
[   30.264411] Allocated by task 265:
[   30.264662]  kasan_save_stack+0x3c/0x68
[   30.265676]  kasan_save_track+0x20/0x40
[   30.266087]  kasan_save_alloc_info+0x40/0x58
[   30.266237]  __kasan_kmalloc+0xd4/0xd8
[   30.266337]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.266444]  kasan_atomics+0xb8/0x2e0
[   30.266539]  kunit_try_run_case+0x170/0x3f0
[   30.268635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.269076]  kthread+0x328/0x630
[   30.269183]  ret_from_fork+0x10/0x20
[   30.269276] 
[   30.270655] The buggy address belongs to the object at fff00000c643c780
[   30.270655]  which belongs to the cache kmalloc-64 of size 64
[   30.270971] The buggy address is located 0 bytes to the right of
[   30.270971]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.272142] 
[   30.272497] The buggy address belongs to the physical page:
[   30.273262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.273420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.273549] page_type: f5(slab)
[   30.273651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.273777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.274603] page dumped because: kasan: bad access detected
[   30.277247] 
[   30.277400] Memory state around the buggy address:
[   30.277646]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.278627]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.278909] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.280022]                                      ^
[   30.280747]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.281182]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.281882] ==================================================================
[   29.857307] ==================================================================
[   29.857443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.857560] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.857682] 
[   29.857746] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.857960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.858031] Hardware name: linux,dummy-virt (DT)
[   29.858110] Call trace:
[   29.858164]  show_stack+0x20/0x38 (C)
[   29.858290]  dump_stack_lvl+0x8c/0xd0
[   29.858405]  print_report+0x118/0x608
[   29.858525]  kasan_report+0xdc/0x128
[   29.858639]  kasan_check_range+0x100/0x1a8
[   29.858764]  __kasan_check_write+0x20/0x30
[   29.858888]  kasan_atomics_helper+0xca0/0x4858
[   29.859500]  kasan_atomics+0x198/0x2e0
[   29.859745]  kunit_try_run_case+0x170/0x3f0
[   29.860203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.860412]  kthread+0x328/0x630
[   29.860545]  ret_from_fork+0x10/0x20
[   29.860862] 
[   29.860915] Allocated by task 265:
[   29.861065]  kasan_save_stack+0x3c/0x68
[   29.861377]  kasan_save_track+0x20/0x40
[   29.861483]  kasan_save_alloc_info+0x40/0x58
[   29.861650]  __kasan_kmalloc+0xd4/0xd8
[   29.861964]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.862088]  kasan_atomics+0xb8/0x2e0
[   29.862366]  kunit_try_run_case+0x170/0x3f0
[   29.862664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.862787]  kthread+0x328/0x630
[   29.862892]  ret_from_fork+0x10/0x20
[   29.863428] 
[   29.863484] The buggy address belongs to the object at fff00000c643c780
[   29.863484]  which belongs to the cache kmalloc-64 of size 64
[   29.863642] The buggy address is located 0 bytes to the right of
[   29.863642]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.863825] 
[   29.863883] The buggy address belongs to the physical page:
[   29.863995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.864307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.864437] page_type: f5(slab)
[   29.864539] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.864672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.864771] page dumped because: kasan: bad access detected
[   29.864854] 
[   29.864900] Memory state around the buggy address:
[   29.865019]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.865201]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.865355] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.865640]                                      ^
[   29.865743]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.865863]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.866008] ==================================================================
[   30.052626] ==================================================================
[   30.052729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   30.052884] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.053176] 
[   30.053431] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.054630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.054807] Hardware name: linux,dummy-virt (DT)
[   30.054897] Call trace:
[   30.054971]  show_stack+0x20/0x38 (C)
[   30.055102]  dump_stack_lvl+0x8c/0xd0
[   30.055229]  print_report+0x118/0x608
[   30.055352]  kasan_report+0xdc/0x128
[   30.055470]  kasan_check_range+0x100/0x1a8
[   30.055589]  __kasan_check_write+0x20/0x30
[   30.055706]  kasan_atomics_helper+0x1190/0x4858
[   30.055829]  kasan_atomics+0x198/0x2e0
[   30.056621]  kunit_try_run_case+0x170/0x3f0
[   30.056784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.057472]  kthread+0x328/0x630
[   30.057890]  ret_from_fork+0x10/0x20
[   30.058048] 
[   30.058270] Allocated by task 265:
[   30.058351]  kasan_save_stack+0x3c/0x68
[   30.058574]  kasan_save_track+0x20/0x40
[   30.058668]  kasan_save_alloc_info+0x40/0x58
[   30.058775]  __kasan_kmalloc+0xd4/0xd8
[   30.058971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.059271]  kasan_atomics+0xb8/0x2e0
[   30.059532]  kunit_try_run_case+0x170/0x3f0
[   30.060103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.060255]  kthread+0x328/0x630
[   30.060559]  ret_from_fork+0x10/0x20
[   30.060677] 
[   30.060982] The buggy address belongs to the object at fff00000c643c780
[   30.060982]  which belongs to the cache kmalloc-64 of size 64
[   30.061439] The buggy address is located 0 bytes to the right of
[   30.061439]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.062827] 
[   30.063043] The buggy address belongs to the physical page:
[   30.063128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.064060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.064195] page_type: f5(slab)
[   30.064293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.065408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.066014] page dumped because: kasan: bad access detected
[   30.066889] 
[   30.066984] Memory state around the buggy address:
[   30.067274]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.067511]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.067794] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.068277]                                      ^
[   30.068385]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.068495]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.068694] ==================================================================
[   30.342413] ==================================================================
[   30.342521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   30.342639] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.342762] 
[   30.343056] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.343625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.344075] Hardware name: linux,dummy-virt (DT)
[   30.344525] Call trace:
[   30.344615]  show_stack+0x20/0x38 (C)
[   30.345405]  dump_stack_lvl+0x8c/0xd0
[   30.345578]  print_report+0x118/0x608
[   30.346006]  kasan_report+0xdc/0x128
[   30.346396]  kasan_check_range+0x100/0x1a8
[   30.346542]  __kasan_check_write+0x20/0x30
[   30.346668]  kasan_atomics_helper+0x17ec/0x4858
[   30.346874]  kasan_atomics+0x198/0x2e0
[   30.347227]  kunit_try_run_case+0x170/0x3f0
[   30.347306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.347417]  kthread+0x328/0x630
[   30.347790]  ret_from_fork+0x10/0x20
[   30.347971] 
[   30.348032] Allocated by task 265:
[   30.348219]  kasan_save_stack+0x3c/0x68
[   30.348411]  kasan_save_track+0x20/0x40
[   30.348510]  kasan_save_alloc_info+0x40/0x58
[   30.348621]  __kasan_kmalloc+0xd4/0xd8
[   30.348914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.349046]  kasan_atomics+0xb8/0x2e0
[   30.349509]  kunit_try_run_case+0x170/0x3f0
[   30.349620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.350084]  kthread+0x328/0x630
[   30.350191]  ret_from_fork+0x10/0x20
[   30.350312] 
[   30.350457] The buggy address belongs to the object at fff00000c643c780
[   30.350457]  which belongs to the cache kmalloc-64 of size 64
[   30.350747] The buggy address is located 0 bytes to the right of
[   30.350747]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.351180] 
[   30.351258] The buggy address belongs to the physical page:
[   30.351342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.351479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.351597] page_type: f5(slab)
[   30.351857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.352017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.352129] page dumped because: kasan: bad access detected
[   30.352213] 
[   30.352275] Memory state around the buggy address:
[   30.352360]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.352516]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.352631] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.352729]                                      ^
[   30.352849]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.353408]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.353652] ==================================================================
[   30.083738] ==================================================================
[   30.083855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   30.084003] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.084135] 
[   30.084205] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.084516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.084661] Hardware name: linux,dummy-virt (DT)
[   30.084820] Call trace:
[   30.084928]  show_stack+0x20/0x38 (C)
[   30.085262]  dump_stack_lvl+0x8c/0xd0
[   30.085462]  print_report+0x118/0x608
[   30.085749]  kasan_report+0xdc/0x128
[   30.086059]  kasan_check_range+0x100/0x1a8
[   30.086213]  __kasan_check_write+0x20/0x30
[   30.086567]  kasan_atomics_helper+0x126c/0x4858
[   30.086708]  kasan_atomics+0x198/0x2e0
[   30.086832]  kunit_try_run_case+0x170/0x3f0
[   30.086986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.087127]  kthread+0x328/0x630
[   30.087292]  ret_from_fork+0x10/0x20
[   30.087531] 
[   30.087591] Allocated by task 265:
[   30.087764]  kasan_save_stack+0x3c/0x68
[   30.087889]  kasan_save_track+0x20/0x40
[   30.088103]  kasan_save_alloc_info+0x40/0x58
[   30.088298]  __kasan_kmalloc+0xd4/0xd8
[   30.088500]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.088622]  kasan_atomics+0xb8/0x2e0
[   30.088719]  kunit_try_run_case+0x170/0x3f0
[   30.088871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.089018]  kthread+0x328/0x630
[   30.089116]  ret_from_fork+0x10/0x20
[   30.089226] 
[   30.089296] The buggy address belongs to the object at fff00000c643c780
[   30.089296]  which belongs to the cache kmalloc-64 of size 64
[   30.089446] The buggy address is located 0 bytes to the right of
[   30.089446]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.089708] 
[   30.089775] The buggy address belongs to the physical page:
[   30.089899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.090057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.090255] page_type: f5(slab)
[   30.090417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.090555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.090684] page dumped because: kasan: bad access detected
[   30.090784] 
[   30.090950] Memory state around the buggy address:
[   30.091047]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.091263]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.091386] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.091501]                                      ^
[   30.091682]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.091796]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.091917] ==================================================================
[   30.004705] ==================================================================
[   30.004851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   30.004989] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.005113] 
[   30.005185] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.005384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.005456] Hardware name: linux,dummy-virt (DT)
[   30.005531] Call trace:
[   30.005643]  show_stack+0x20/0x38 (C)
[   30.005777]  dump_stack_lvl+0x8c/0xd0
[   30.005893]  print_report+0x118/0x608
[   30.006038]  kasan_report+0xdc/0x128
[   30.006154]  kasan_check_range+0x100/0x1a8
[   30.006277]  __kasan_check_write+0x20/0x30
[   30.006393]  kasan_atomics_helper+0xff0/0x4858
[   30.006510]  kasan_atomics+0x198/0x2e0
[   30.006627]  kunit_try_run_case+0x170/0x3f0
[   30.006753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.006897]  kthread+0x328/0x630
[   30.007201]  ret_from_fork+0x10/0x20
[   30.007951] 
[   30.008380] Allocated by task 265:
[   30.008492]  kasan_save_stack+0x3c/0x68
[   30.008997]  kasan_save_track+0x20/0x40
[   30.009131]  kasan_save_alloc_info+0x40/0x58
[   30.009320]  __kasan_kmalloc+0xd4/0xd8
[   30.009476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.009582]  kasan_atomics+0xb8/0x2e0
[   30.009681]  kunit_try_run_case+0x170/0x3f0
[   30.010450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.011078]  kthread+0x328/0x630
[   30.011672]  ret_from_fork+0x10/0x20
[   30.011786] 
[   30.011847] The buggy address belongs to the object at fff00000c643c780
[   30.011847]  which belongs to the cache kmalloc-64 of size 64
[   30.012017] The buggy address is located 0 bytes to the right of
[   30.012017]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.012545] 
[   30.012654] The buggy address belongs to the physical page:
[   30.012823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.013483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.013867] page_type: f5(slab)
[   30.014001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.014578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.014748] page dumped because: kasan: bad access detected
[   30.015034] 
[   30.015098] Memory state around the buggy address:
[   30.015187]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.015763]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.016125] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.016245]                                      ^
[   30.016657]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.017170]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.017308] ==================================================================
[   30.231798] ==================================================================
[   30.231979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   30.232093] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.232214] 
[   30.232284] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.232490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.232680] Hardware name: linux,dummy-virt (DT)
[   30.232906] Call trace:
[   30.233088]  show_stack+0x20/0x38 (C)
[   30.233233]  dump_stack_lvl+0x8c/0xd0
[   30.233409]  print_report+0x118/0x608
[   30.233575]  kasan_report+0xdc/0x128
[   30.233783]  kasan_check_range+0x100/0x1a8
[   30.234038]  __kasan_check_write+0x20/0x30
[   30.234173]  kasan_atomics_helper+0x1644/0x4858
[   30.234326]  kasan_atomics+0x198/0x2e0
[   30.234782]  kunit_try_run_case+0x170/0x3f0
[   30.235096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.235391]  kthread+0x328/0x630
[   30.235559]  ret_from_fork+0x10/0x20
[   30.235832] 
[   30.235978] Allocated by task 265:
[   30.236112]  kasan_save_stack+0x3c/0x68
[   30.236306]  kasan_save_track+0x20/0x40
[   30.236406]  kasan_save_alloc_info+0x40/0x58
[   30.236508]  __kasan_kmalloc+0xd4/0xd8
[   30.236654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.236784]  kasan_atomics+0xb8/0x2e0
[   30.236891]  kunit_try_run_case+0x170/0x3f0
[   30.237018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.237252]  kthread+0x328/0x630
[   30.237427]  ret_from_fork+0x10/0x20
[   30.237574] 
[   30.237635] The buggy address belongs to the object at fff00000c643c780
[   30.237635]  which belongs to the cache kmalloc-64 of size 64
[   30.238005] The buggy address is located 0 bytes to the right of
[   30.238005]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.238222] 
[   30.238353] The buggy address belongs to the physical page:
[   30.238436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.238566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.238687] page_type: f5(slab)
[   30.238780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.238921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.239053] page dumped because: kasan: bad access detected
[   30.239166] 
[   30.239227] Memory state around the buggy address:
[   30.239416]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.239554]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.239685] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.239799]                                      ^
[   30.240007]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.240144]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.240250] ==================================================================
[   29.962083] ==================================================================
[   29.962192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.962304] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.962429] 
[   29.962497] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.962690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.962759] Hardware name: linux,dummy-virt (DT)
[   29.962849] Call trace:
[   29.962953]  show_stack+0x20/0x38 (C)
[   29.963241]  dump_stack_lvl+0x8c/0xd0
[   29.963500]  print_report+0x118/0x608
[   29.963837]  kasan_report+0xdc/0x128
[   29.963978]  kasan_check_range+0x100/0x1a8
[   29.964329]  __kasan_check_write+0x20/0x30
[   29.964482]  kasan_atomics_helper+0xeb8/0x4858
[   29.964657]  kasan_atomics+0x198/0x2e0
[   29.964803]  kunit_try_run_case+0x170/0x3f0
[   29.965068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.965253]  kthread+0x328/0x630
[   29.965642]  ret_from_fork+0x10/0x20
[   29.965816] 
[   29.966305] Allocated by task 265:
[   29.966608]  kasan_save_stack+0x3c/0x68
[   29.966997]  kasan_save_track+0x20/0x40
[   29.967168]  kasan_save_alloc_info+0x40/0x58
[   29.967487]  __kasan_kmalloc+0xd4/0xd8
[   29.967679]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.967835]  kasan_atomics+0xb8/0x2e0
[   29.968113]  kunit_try_run_case+0x170/0x3f0
[   29.968223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.968334]  kthread+0x328/0x630
[   29.968482]  ret_from_fork+0x10/0x20
[   29.968585] 
[   29.968638] The buggy address belongs to the object at fff00000c643c780
[   29.968638]  which belongs to the cache kmalloc-64 of size 64
[   29.968785] The buggy address is located 0 bytes to the right of
[   29.968785]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.969081] 
[   29.969504] The buggy address belongs to the physical page:
[   29.969906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.970154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.970334] page_type: f5(slab)
[   29.970544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.971179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.971366] page dumped because: kasan: bad access detected
[   29.971502] 
[   29.971812] Memory state around the buggy address:
[   29.971906]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.972042]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.972169] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.972269]                                      ^
[   29.972739]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.973013]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.973126] ==================================================================
[   30.109640] ==================================================================
[   30.109769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   30.110304] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.110482] 
[   30.110557] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.110758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.110823] Hardware name: linux,dummy-virt (DT)
[   30.110911] Call trace:
[   30.110987]  show_stack+0x20/0x38 (C)
[   30.111114]  dump_stack_lvl+0x8c/0xd0
[   30.112539]  print_report+0x118/0x608
[   30.112688]  kasan_report+0xdc/0x128
[   30.112818]  kasan_check_range+0x100/0x1a8
[   30.113337]  __kasan_check_write+0x20/0x30
[   30.113959]  kasan_atomics_helper+0x1384/0x4858
[   30.114205]  kasan_atomics+0x198/0x2e0
[   30.114627]  kunit_try_run_case+0x170/0x3f0
[   30.115587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.115872]  kthread+0x328/0x630
[   30.116192]  ret_from_fork+0x10/0x20
[   30.116380] 
[   30.116461] Allocated by task 265:
[   30.116657]  kasan_save_stack+0x3c/0x68
[   30.116772]  kasan_save_track+0x20/0x40
[   30.116919]  kasan_save_alloc_info+0x40/0x58
[   30.117190]  __kasan_kmalloc+0xd4/0xd8
[   30.117342]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.117631]  kasan_atomics+0xb8/0x2e0
[   30.117792]  kunit_try_run_case+0x170/0x3f0
[   30.117904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.118067]  kthread+0x328/0x630
[   30.118216]  ret_from_fork+0x10/0x20
[   30.118366] 
[   30.118425] The buggy address belongs to the object at fff00000c643c780
[   30.118425]  which belongs to the cache kmalloc-64 of size 64
[   30.118582] The buggy address is located 0 bytes to the right of
[   30.118582]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.118781] 
[   30.118846] The buggy address belongs to the physical page:
[   30.119173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.119329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.119623] page_type: f5(slab)
[   30.119769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.119994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.120110] page dumped because: kasan: bad access detected
[   30.120244] 
[   30.120306] Memory state around the buggy address:
[   30.120401]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.120526]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.120645] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.120743]                                      ^
[   30.120824]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.121005]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.121097] ==================================================================
[   29.749551] ==================================================================
[   29.749619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.749685] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.749750] 
[   29.749786] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.749890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.749927] Hardware name: linux,dummy-virt (DT)
[   29.750028] Call trace:
[   29.750181]  show_stack+0x20/0x38 (C)
[   29.750323]  dump_stack_lvl+0x8c/0xd0
[   29.750458]  print_report+0x118/0x608
[   29.750810]  kasan_report+0xdc/0x128
[   29.751034]  kasan_check_range+0x100/0x1a8
[   29.751261]  __kasan_check_write+0x20/0x30
[   29.751490]  kasan_atomics_helper+0xa6c/0x4858
[   29.751717]  kasan_atomics+0x198/0x2e0
[   29.752038]  kunit_try_run_case+0x170/0x3f0
[   29.752860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.753131]  kthread+0x328/0x630
[   29.754475]  ret_from_fork+0x10/0x20
[   29.754684] 
[   29.754739] Allocated by task 265:
[   29.754817]  kasan_save_stack+0x3c/0x68
[   29.754985]  kasan_save_track+0x20/0x40
[   29.755249]  kasan_save_alloc_info+0x40/0x58
[   29.755427]  __kasan_kmalloc+0xd4/0xd8
[   29.755591]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.755851]  kasan_atomics+0xb8/0x2e0
[   29.756034]  kunit_try_run_case+0x170/0x3f0
[   29.756163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.756372]  kthread+0x328/0x630
[   29.756677]  ret_from_fork+0x10/0x20
[   29.757267] 
[   29.757338] The buggy address belongs to the object at fff00000c643c780
[   29.757338]  which belongs to the cache kmalloc-64 of size 64
[   29.757646] The buggy address is located 0 bytes to the right of
[   29.757646]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.757828] 
[   29.757882] The buggy address belongs to the physical page:
[   29.758804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.759237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.759871] page_type: f5(slab)
[   29.760638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.761151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.761300] page dumped because: kasan: bad access detected
[   29.761774] 
[   29.762150] Memory state around the buggy address:
[   29.762486]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.762605]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.763868] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.764372]                                      ^
[   29.765229]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.765353]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.765451] ==================================================================
[   29.845268] ==================================================================
[   29.845368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   29.845481] Read of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.845603] 
[   29.845668] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.845860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.845927] Hardware name: linux,dummy-virt (DT)
[   29.846027] Call trace:
[   29.846081]  show_stack+0x20/0x38 (C)
[   29.846209]  dump_stack_lvl+0x8c/0xd0
[   29.846328]  print_report+0x118/0x608
[   29.846453]  kasan_report+0xdc/0x128
[   29.846573]  __asan_report_load4_noabort+0x20/0x30
[   29.846700]  kasan_atomics_helper+0x3de4/0x4858
[   29.846827]  kasan_atomics+0x198/0x2e0
[   29.847929]  kunit_try_run_case+0x170/0x3f0
[   29.848150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.848338]  kthread+0x328/0x630
[   29.848470]  ret_from_fork+0x10/0x20
[   29.848616] 
[   29.848679] Allocated by task 265:
[   29.848842]  kasan_save_stack+0x3c/0x68
[   29.849193]  kasan_save_track+0x20/0x40
[   29.849377]  kasan_save_alloc_info+0x40/0x58
[   29.849494]  __kasan_kmalloc+0xd4/0xd8
[   29.849629]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.849759]  kasan_atomics+0xb8/0x2e0
[   29.849860]  kunit_try_run_case+0x170/0x3f0
[   29.849980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.850100]  kthread+0x328/0x630
[   29.850259]  ret_from_fork+0x10/0x20
[   29.850379] 
[   29.850461] The buggy address belongs to the object at fff00000c643c780
[   29.850461]  which belongs to the cache kmalloc-64 of size 64
[   29.850698] The buggy address is located 0 bytes to the right of
[   29.850698]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.851100] 
[   29.851527] The buggy address belongs to the physical page:
[   29.851678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.852478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.852757] page_type: f5(slab)
[   29.852874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.853152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.853268] page dumped because: kasan: bad access detected
[   29.853373] 
[   29.853663] Memory state around the buggy address:
[   29.853985]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.854630]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.855143] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.855726]                                      ^
[   29.855871]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.856012]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.856114] ==================================================================
[   30.219415] ==================================================================
[   30.219531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   30.219664] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.219806] 
[   30.219955] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.220159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.220235] Hardware name: linux,dummy-virt (DT)
[   30.220318] Call trace:
[   30.220385]  show_stack+0x20/0x38 (C)
[   30.220518]  dump_stack_lvl+0x8c/0xd0
[   30.220645]  print_report+0x118/0x608
[   30.220765]  kasan_report+0xdc/0x128
[   30.220886]  __asan_report_load8_noabort+0x20/0x30
[   30.221036]  kasan_atomics_helper+0x3db0/0x4858
[   30.221163]  kasan_atomics+0x198/0x2e0
[   30.221296]  kunit_try_run_case+0x170/0x3f0
[   30.221486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.221681]  kthread+0x328/0x630
[   30.221832]  ret_from_fork+0x10/0x20
[   30.221992] 
[   30.222066] Allocated by task 265:
[   30.222288]  kasan_save_stack+0x3c/0x68
[   30.222509]  kasan_save_track+0x20/0x40
[   30.222619]  kasan_save_alloc_info+0x40/0x58
[   30.222732]  __kasan_kmalloc+0xd4/0xd8
[   30.222831]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.222965]  kasan_atomics+0xb8/0x2e0
[   30.223060]  kunit_try_run_case+0x170/0x3f0
[   30.223183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.223354]  kthread+0x328/0x630
[   30.223469]  ret_from_fork+0x10/0x20
[   30.223654] 
[   30.223739] The buggy address belongs to the object at fff00000c643c780
[   30.223739]  which belongs to the cache kmalloc-64 of size 64
[   30.223985] The buggy address is located 0 bytes to the right of
[   30.223985]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.225793] 
[   30.226381] The buggy address belongs to the physical page:
[   30.226503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.227020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.227267] page_type: f5(slab)
[   30.227397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.227614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.228027] page dumped because: kasan: bad access detected
[   30.228153] 
[   30.228463] Memory state around the buggy address:
[   30.228620]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.228896]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.229038] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.229893]                                      ^
[   30.230041]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.230676]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.230976] ==================================================================
[   29.952849] ==================================================================
[   29.953372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.953612] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.953748] 
[   29.953952] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.954236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.954442] Hardware name: linux,dummy-virt (DT)
[   29.954624] Call trace:
[   29.954680]  show_stack+0x20/0x38 (C)
[   29.954808]  dump_stack_lvl+0x8c/0xd0
[   29.954955]  print_report+0x118/0x608
[   29.955099]  kasan_report+0xdc/0x128
[   29.955719]  __asan_report_store8_noabort+0x20/0x30
[   29.956168]  kasan_atomics_helper+0x3e5c/0x4858
[   29.956322]  kasan_atomics+0x198/0x2e0
[   29.956528]  kunit_try_run_case+0x170/0x3f0
[   29.956746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.956920]  kthread+0x328/0x630
[   29.957127]  ret_from_fork+0x10/0x20
[   29.957285] 
[   29.957445] Allocated by task 265:
[   29.957534]  kasan_save_stack+0x3c/0x68
[   29.957640]  kasan_save_track+0x20/0x40
[   29.957793]  kasan_save_alloc_info+0x40/0x58
[   29.958027]  __kasan_kmalloc+0xd4/0xd8
[   29.958173]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.958339]  kasan_atomics+0xb8/0x2e0
[   29.958442]  kunit_try_run_case+0x170/0x3f0
[   29.958543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.958653]  kthread+0x328/0x630
[   29.958744]  ret_from_fork+0x10/0x20
[   29.958910] 
[   29.958983] The buggy address belongs to the object at fff00000c643c780
[   29.958983]  which belongs to the cache kmalloc-64 of size 64
[   29.959141] The buggy address is located 0 bytes to the right of
[   29.959141]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.959325] 
[   29.959392] The buggy address belongs to the physical page:
[   29.959558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.959788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.959922] page_type: f5(slab)
[   29.960058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.960208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.960319] page dumped because: kasan: bad access detected
[   29.960408] 
[   29.960457] Memory state around the buggy address:
[   29.960535]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.960755]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.960952] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.961056]                                      ^
[   29.961151]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.961285]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.961548] ==================================================================
[   30.328813] ==================================================================
[   30.328927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   30.329070] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.329192] 
[   30.329279] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.329474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.329542] Hardware name: linux,dummy-virt (DT)
[   30.329624] Call trace:
[   30.329696]  show_stack+0x20/0x38 (C)
[   30.330066]  dump_stack_lvl+0x8c/0xd0
[   30.330439]  print_report+0x118/0x608
[   30.330572]  kasan_report+0xdc/0x128
[   30.330701]  __asan_report_load8_noabort+0x20/0x30
[   30.331010]  kasan_atomics_helper+0x3e20/0x4858
[   30.331202]  kasan_atomics+0x198/0x2e0
[   30.331823]  kunit_try_run_case+0x170/0x3f0
[   30.332174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.332323]  kthread+0x328/0x630
[   30.332543]  ret_from_fork+0x10/0x20
[   30.333180] 
[   30.333252] Allocated by task 265:
[   30.333338]  kasan_save_stack+0x3c/0x68
[   30.333562]  kasan_save_track+0x20/0x40
[   30.333723]  kasan_save_alloc_info+0x40/0x58
[   30.334295]  __kasan_kmalloc+0xd4/0xd8
[   30.334406]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.334663]  kasan_atomics+0xb8/0x2e0
[   30.334852]  kunit_try_run_case+0x170/0x3f0
[   30.334980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.335548]  kthread+0x328/0x630
[   30.335807]  ret_from_fork+0x10/0x20
[   30.336059] 
[   30.336117] The buggy address belongs to the object at fff00000c643c780
[   30.336117]  which belongs to the cache kmalloc-64 of size 64
[   30.336820] The buggy address is located 0 bytes to the right of
[   30.336820]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.337261] 
[   30.337327] The buggy address belongs to the physical page:
[   30.337672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.337857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.338272] page_type: f5(slab)
[   30.338563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.338819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.339232] page dumped because: kasan: bad access detected
[   30.339382] 
[   30.339598] Memory state around the buggy address:
[   30.339891]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.340334]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.340697] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.341249]                                      ^
[   30.341420]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.341564]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.341669] ==================================================================
[   29.394003] ==================================================================
[   29.397562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   29.399745]  kasan_atomics_helper+0x1ec/0x4858
[   29.405108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.406355]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.412466]  kunit_try_run_case+0x170/0x3f0
[   29.418684] 
[   29.421378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.426881]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.427837] ==================================================================
[   30.186293] ==================================================================
[   30.186923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   30.187073] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.187783] 
[   30.187878] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.188284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.188607] Hardware name: linux,dummy-virt (DT)
[   30.188686] Call trace:
[   30.188750]  show_stack+0x20/0x38 (C)
[   30.188892]  dump_stack_lvl+0x8c/0xd0
[   30.189030]  print_report+0x118/0x608
[   30.189146]  kasan_report+0xdc/0x128
[   30.191915]  kasan_check_range+0x100/0x1a8
[   30.192076]  __kasan_check_write+0x20/0x30
[   30.193053]  kasan_atomics_helper+0x154c/0x4858
[   30.193835]  kasan_atomics+0x198/0x2e0
[   30.194384]  kunit_try_run_case+0x170/0x3f0
[   30.194528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.194666]  kthread+0x328/0x630
[   30.195905]  ret_from_fork+0x10/0x20
[   30.196452] 
[   30.196666] Allocated by task 265:
[   30.196864]  kasan_save_stack+0x3c/0x68
[   30.197555]  kasan_save_track+0x20/0x40
[   30.198389]  kasan_save_alloc_info+0x40/0x58
[   30.198819]  __kasan_kmalloc+0xd4/0xd8
[   30.198965]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.199313]  kasan_atomics+0xb8/0x2e0
[   30.199421]  kunit_try_run_case+0x170/0x3f0
[   30.199842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.200118]  kthread+0x328/0x630
[   30.200227]  ret_from_fork+0x10/0x20
[   30.200755] 
[   30.200887] The buggy address belongs to the object at fff00000c643c780
[   30.200887]  which belongs to the cache kmalloc-64 of size 64
[   30.201387] The buggy address is located 0 bytes to the right of
[   30.201387]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.201613] 
[   30.201737] The buggy address belongs to the physical page:
[   30.201823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.201981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.202115] page_type: f5(slab)
[   30.202400] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.202538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.202650] page dumped because: kasan: bad access detected
[   30.202891] 
[   30.203493] Memory state around the buggy address:
[   30.203653]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.203775]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.203894] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.204013]                                      ^
[   30.204282]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.204621]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.204818] ==================================================================
[   30.241253] ==================================================================
[   30.241568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   30.241885] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.242032] 
[   30.242109] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.242306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.242374] Hardware name: linux,dummy-virt (DT)
[   30.242450] Call trace:
[   30.242502]  show_stack+0x20/0x38 (C)
[   30.242630]  dump_stack_lvl+0x8c/0xd0
[   30.242750]  print_report+0x118/0x608
[   30.242886]  kasan_report+0xdc/0x128
[   30.243432]  __asan_report_load8_noabort+0x20/0x30
[   30.244265]  kasan_atomics_helper+0x3df4/0x4858
[   30.244867]  kasan_atomics+0x198/0x2e0
[   30.245126]  kunit_try_run_case+0x170/0x3f0
[   30.245381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.245636]  kthread+0x328/0x630
[   30.246227]  ret_from_fork+0x10/0x20
[   30.246472] 
[   30.247023] Allocated by task 265:
[   30.247149]  kasan_save_stack+0x3c/0x68
[   30.247364]  kasan_save_track+0x20/0x40
[   30.247617]  kasan_save_alloc_info+0x40/0x58
[   30.247747]  __kasan_kmalloc+0xd4/0xd8
[   30.247921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.248062]  kasan_atomics+0xb8/0x2e0
[   30.248159]  kunit_try_run_case+0x170/0x3f0
[   30.248253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.248370]  kthread+0x328/0x630
[   30.248493]  ret_from_fork+0x10/0x20
[   30.248632] 
[   30.248686] The buggy address belongs to the object at fff00000c643c780
[   30.248686]  which belongs to the cache kmalloc-64 of size 64
[   30.248831] The buggy address is located 0 bytes to the right of
[   30.248831]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.249385] 
[   30.249459] The buggy address belongs to the physical page:
[   30.249572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.250570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.251093] page_type: f5(slab)
[   30.251372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.252007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.252130] page dumped because: kasan: bad access detected
[   30.252343] 
[   30.252417] Memory state around the buggy address:
[   30.252626]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.252922]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.253409] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.253542]                                      ^
[   30.253764]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.254315]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.254513] ==================================================================
[   29.973782] ==================================================================
[   29.973897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.974050] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.974245] 
[   29.974360] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.974911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.975007] Hardware name: linux,dummy-virt (DT)
[   29.975091] Call trace:
[   29.975437]  show_stack+0x20/0x38 (C)
[   29.975631]  dump_stack_lvl+0x8c/0xd0
[   29.975771]  print_report+0x118/0x608
[   29.975893]  kasan_report+0xdc/0x128
[   29.976171]  kasan_check_range+0x100/0x1a8
[   29.976433]  __kasan_check_write+0x20/0x30
[   29.976566]  kasan_atomics_helper+0xf20/0x4858
[   29.976694]  kasan_atomics+0x198/0x2e0
[   29.976810]  kunit_try_run_case+0x170/0x3f0
[   29.976955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.977151]  kthread+0x328/0x630
[   29.977285]  ret_from_fork+0x10/0x20
[   29.977570] 
[   29.977621] Allocated by task 265:
[   29.977725]  kasan_save_stack+0x3c/0x68
[   29.977866]  kasan_save_track+0x20/0x40
[   29.978354]  kasan_save_alloc_info+0x40/0x58
[   29.978474]  __kasan_kmalloc+0xd4/0xd8
[   29.978586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.978711]  kasan_atomics+0xb8/0x2e0
[   29.978817]  kunit_try_run_case+0x170/0x3f0
[   29.979117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.979256]  kthread+0x328/0x630
[   29.979524]  ret_from_fork+0x10/0x20
[   29.979664] 
[   29.979746] The buggy address belongs to the object at fff00000c643c780
[   29.979746]  which belongs to the cache kmalloc-64 of size 64
[   29.980157] The buggy address is located 0 bytes to the right of
[   29.980157]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.980433] 
[   29.980488] The buggy address belongs to the physical page:
[   29.980571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.980713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.980835] page_type: f5(slab)
[   29.982168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.982350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.982470] page dumped because: kasan: bad access detected
[   29.982562] 
[   29.983630] Memory state around the buggy address:
[   29.984018]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.984173]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.984310] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.984584]                                      ^
[   29.984802]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.985074]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.985175] ==================================================================
[   29.769313] ==================================================================
[   29.769518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.769692] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.769816] 
[   29.769888] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.770115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.770199] Hardware name: linux,dummy-virt (DT)
[   29.771411]  print_report+0x118/0x608
[   29.781091]                                      ^
[   29.786663]  print_report+0x118/0x608
[   29.786786]  kasan_report+0xdc/0x128
[   29.788801]  ret_from_fork+0x10/0x20
[   29.788925] 
[   29.789371]  kasan_save_track+0x20/0x40
[   29.789702]  __kasan_kmalloc+0xd4/0xd8
[   29.790710]  kthread+0x328/0x630
[   29.791490] The buggy address is located 0 bytes to the right of
[   29.791490]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.792435] page_type: f5(slab)
[   29.792554] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.793650]                                      ^
[   29.793844]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.795681] 
[   29.797659]  kasan_atomics_helper+0xb70/0x4858
[   29.802534]  kasan_save_alloc_info+0x40/0x58
[   29.804855] The buggy address is located 0 bytes to the right of
[   29.804855]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.808889] 
[   29.811255] page_type: f5(slab)
[   29.812661] 
[   29.815530]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.817258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   29.819969]  kunit_try_run_case+0x170/0x3f0
[   29.821838]  kthread+0x328/0x630
[   29.824018] 
[   29.825133] page_type: f5(slab)
[   29.825819] 
[   29.827872]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.830101] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.840244] 
[   29.840298] The buggy address belongs to the physical page:
[   29.841124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.841863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.842388] page_type: f5(slab)
[   29.842598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.842834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.842995] page dumped because: kasan: bad access detected
[   29.843459] 
[   29.843524] Memory state around the buggy address:
[   29.843621]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.844124]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.844368] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.844562]                                      ^
[   29.844656]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.844770]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.844949] ==================================================================
[   30.306556] ==================================================================
[   30.306663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   30.306779] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.306914] 
[   30.307024] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.307293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.307375] Hardware name: linux,dummy-virt (DT)
[   30.307473] Call trace:
[   30.307595]  show_stack+0x20/0x38 (C)
[   30.307748]  dump_stack_lvl+0x8c/0xd0
[   30.307886]  print_report+0x118/0x608
[   30.308124]  kasan_report+0xdc/0x128
[   30.308322]  kasan_check_range+0x100/0x1a8
[   30.308518]  __kasan_check_write+0x20/0x30
[   30.308718]  kasan_atomics_helper+0x175c/0x4858
[   30.309090]  kasan_atomics+0x198/0x2e0
[   30.309253]  kunit_try_run_case+0x170/0x3f0
[   30.309401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.309646]  kthread+0x328/0x630
[   30.310458]  ret_from_fork+0x10/0x20
[   30.310589] 
[   30.310639] Allocated by task 265:
[   30.311494]  kasan_save_stack+0x3c/0x68
[   30.312381]  kasan_save_track+0x20/0x40
[   30.312499]  kasan_save_alloc_info+0x40/0x58
[   30.312615]  __kasan_kmalloc+0xd4/0xd8
[   30.313668]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.313902]  kasan_atomics+0xb8/0x2e0
[   30.314394]  kunit_try_run_case+0x170/0x3f0
[   30.316664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.317014]  kthread+0x328/0x630
[   30.318216]  ret_from_fork+0x10/0x20
[   30.318350] 
[   30.318730] The buggy address belongs to the object at fff00000c643c780
[   30.318730]  which belongs to the cache kmalloc-64 of size 64
[   30.319325] The buggy address is located 0 bytes to the right of
[   30.319325]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.320583] 
[   30.320651] The buggy address belongs to the physical page:
[   30.321527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.322016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.322880] page_type: f5(slab)
[   30.323705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.323847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.323979] page dumped because: kasan: bad access detected
[   30.324070] 
[   30.324119] Memory state around the buggy address:
[   30.324206]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.324476]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.324591] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.324691]                                      ^
[   30.324851]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.325048]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.325219] ==================================================================
[   30.135156] ==================================================================
[   30.135261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   30.135328] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.135411] 
[   30.135835] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.136652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.136735] Hardware name: linux,dummy-virt (DT)
[   30.136857] Call trace:
[   30.136989]  show_stack+0x20/0x38 (C)
[   30.137169]  dump_stack_lvl+0x8c/0xd0
[   30.137300]  print_report+0x118/0x608
[   30.137634]  kasan_report+0xdc/0x128
[   30.137759]  kasan_check_range+0x100/0x1a8
[   30.137949]  __kasan_check_write+0x20/0x30
[   30.138093]  kasan_atomics_helper+0x1414/0x4858
[   30.138723]  kasan_atomics+0x198/0x2e0
[   30.139268]  kunit_try_run_case+0x170/0x3f0
[   30.139502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.139673]  kthread+0x328/0x630
[   30.139800]  ret_from_fork+0x10/0x20
[   30.139975] 
[   30.140031] Allocated by task 265:
[   30.140108]  kasan_save_stack+0x3c/0x68
[   30.140220]  kasan_save_track+0x20/0x40
[   30.140330]  kasan_save_alloc_info+0x40/0x58
[   30.140472]  __kasan_kmalloc+0xd4/0xd8
[   30.140744]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.140911]  kasan_atomics+0xb8/0x2e0
[   30.141047]  kunit_try_run_case+0x170/0x3f0
[   30.141188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.141353]  kthread+0x328/0x630
[   30.141710]  ret_from_fork+0x10/0x20
[   30.141834] 
[   30.141967] The buggy address belongs to the object at fff00000c643c780
[   30.141967]  which belongs to the cache kmalloc-64 of size 64
[   30.142209] The buggy address is located 0 bytes to the right of
[   30.142209]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.142429] 
[   30.142487] The buggy address belongs to the physical page:
[   30.142921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.143078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.143203] page_type: f5(slab)
[   30.143303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.143434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.143538] page dumped because: kasan: bad access detected
[   30.143650] 
[   30.143724] Memory state around the buggy address:
[   30.143836]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.144103]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.144223] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.144329]                                      ^
[   30.144416]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.145812]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.145998] ==================================================================
[   30.029022] ==================================================================
[   30.029328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   30.030127] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.030306] 
[   30.030528] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.031450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.031641] Hardware name: linux,dummy-virt (DT)
[   30.031749] Call trace:
[   30.031810]  show_stack+0x20/0x38 (C)
[   30.031969]  dump_stack_lvl+0x8c/0xd0
[   30.032095]  print_report+0x118/0x608
[   30.032217]  kasan_report+0xdc/0x128
[   30.032332]  kasan_check_range+0x100/0x1a8
[   30.032455]  __kasan_check_write+0x20/0x30
[   30.032571]  kasan_atomics_helper+0x10c0/0x4858
[   30.033259]  kasan_atomics+0x198/0x2e0
[   30.033508]  kunit_try_run_case+0x170/0x3f0
[   30.034228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.034554]  kthread+0x328/0x630
[   30.034951]  ret_from_fork+0x10/0x20
[   30.035753] 
[   30.036047] Allocated by task 265:
[   30.036143]  kasan_save_stack+0x3c/0x68
[   30.036480]  kasan_save_track+0x20/0x40
[   30.036618]  kasan_save_alloc_info+0x40/0x58
[   30.036762]  __kasan_kmalloc+0xd4/0xd8
[   30.036988]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.037144]  kasan_atomics+0xb8/0x2e0
[   30.037316]  kunit_try_run_case+0x170/0x3f0
[   30.037420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.037555]  kthread+0x328/0x630
[   30.037649]  ret_from_fork+0x10/0x20
[   30.037744] 
[   30.037803] The buggy address belongs to the object at fff00000c643c780
[   30.037803]  which belongs to the cache kmalloc-64 of size 64
[   30.037967] The buggy address is located 0 bytes to the right of
[   30.037967]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.038126] 
[   30.038178] The buggy address belongs to the physical page:
[   30.038255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.038400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.038613] page_type: f5(slab)
[   30.038716] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.038855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.039214] page dumped because: kasan: bad access detected
[   30.039319] 
[   30.039859] Memory state around the buggy address:
[   30.039971]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.041015]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.041207] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.041519]                                      ^
[   30.041992]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.043222]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.043339] ==================================================================
[   29.612242] ==================================================================
[   29.612372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   29.612628] 
[   29.612770] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.613049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.614066]  kasan_check_range+0x100/0x1a8
[   29.614252]  __kasan_check_write+0x20/0x30
[   29.614646]  kasan_atomics+0x198/0x2e0
[   29.615465]  kasan_save_stack+0x3c/0x68
[   29.615568]  kasan_save_track+0x20/0x40
[   29.615744]  kasan_save_alloc_info+0x40/0x58
[   29.615902]  __kasan_kmalloc+0xd4/0xd8
[   29.616370]  kasan_atomics+0xb8/0x2e0
[   29.617301]  ret_from_fork+0x10/0x20
[   29.617634] The buggy address is located 0 bytes to the right of
[   29.617634]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.617847] 
[   29.617958] The buggy address belongs to the physical page:
[   29.618753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.619327]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.619613]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.619743] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.619865]                                      ^
[   29.620063]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.620232]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.620339] ==================================================================
[   29.986701] ==================================================================
[   29.987255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.987461] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.987675] 
[   29.987758] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.988012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.988090] Hardware name: linux,dummy-virt (DT)
[   29.988182] Call trace:
[   29.988358]  show_stack+0x20/0x38 (C)
[   29.988669]  dump_stack_lvl+0x8c/0xd0
[   29.988798]  print_report+0x118/0x608
[   29.988918]  kasan_report+0xdc/0x128
[   29.989061]  kasan_check_range+0x100/0x1a8
[   29.989212]  __kasan_check_write+0x20/0x30
[   29.989943]  kasan_atomics_helper+0xf88/0x4858
[   29.990132]  kasan_atomics+0x198/0x2e0
[   29.990346]  kunit_try_run_case+0x170/0x3f0
[   29.990662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.991451]  kthread+0x328/0x630
[   29.992841]  ret_from_fork+0x10/0x20
[   29.993636] 
[   29.993989] Allocated by task 265:
[   29.994319]  kasan_save_stack+0x3c/0x68
[   29.994485]  kasan_save_track+0x20/0x40
[   29.995065]  kasan_save_alloc_info+0x40/0x58
[   29.995348]  __kasan_kmalloc+0xd4/0xd8
[   29.995448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.995550]  kasan_atomics+0xb8/0x2e0
[   29.995646]  kunit_try_run_case+0x170/0x3f0
[   29.995749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.995872]  kthread+0x328/0x630
[   29.995989]  ret_from_fork+0x10/0x20
[   29.996091] 
[   29.997642] The buggy address belongs to the object at fff00000c643c780
[   29.997642]  which belongs to the cache kmalloc-64 of size 64
[   29.998621] The buggy address is located 0 bytes to the right of
[   29.998621]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.999298] 
[   29.999372] The buggy address belongs to the physical page:
[   29.999599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.000272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.000550] page_type: f5(slab)
[   30.000673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.000982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.001095] page dumped because: kasan: bad access detected
[   30.001434] 
[   30.001491] Memory state around the buggy address:
[   30.001708]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.002000]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.002154] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.002408]                                      ^
[   30.002497]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.002608]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.002710] ==================================================================
[   29.738191] ==================================================================
[   29.738318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   29.738586] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.738955] 
[   29.739040] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.739471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.739578] Hardware name: linux,dummy-virt (DT)
[   29.739673] Call trace:
[   29.739756]  show_stack+0x20/0x38 (C)
[   29.739959]  dump_stack_lvl+0x8c/0xd0
[   29.740109]  print_report+0x118/0x608
[   29.740304]  kasan_report+0xdc/0x128
[   29.740400]  kasan_check_range+0x100/0x1a8
[   29.740532]  __kasan_check_write+0x20/0x30
[   29.740913]  kasan_atomics_helper+0xa04/0x4858
[   29.741201]  kasan_atomics+0x198/0x2e0
[   29.741390]  kunit_try_run_case+0x170/0x3f0
[   29.741525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.741668]  kthread+0x328/0x630
[   29.741790]  ret_from_fork+0x10/0x20
[   29.741971] 
[   29.742098] Allocated by task 265:
[   29.742173]  kasan_save_stack+0x3c/0x68
[   29.742288]  kasan_save_track+0x20/0x40
[   29.742390]  kasan_save_alloc_info+0x40/0x58
[   29.742654]  __kasan_kmalloc+0xd4/0xd8
[   29.742793]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.743015]  kasan_atomics+0xb8/0x2e0
[   29.743184]  kunit_try_run_case+0x170/0x3f0
[   29.743306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.743698]  kthread+0x328/0x630
[   29.743893]  ret_from_fork+0x10/0x20
[   29.744024] 
[   29.744081] The buggy address belongs to the object at fff00000c643c780
[   29.744081]  which belongs to the cache kmalloc-64 of size 64
[   29.745094] The buggy address is located 0 bytes to the right of
[   29.745094]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.745263] 
[   29.745315] The buggy address belongs to the physical page:
[   29.745393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.745524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.745646] page_type: f5(slab)
[   29.745743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.745869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.745988] page dumped because: kasan: bad access detected
[   29.746072] 
[   29.746122] Memory state around the buggy address:
[   29.746202]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.746312]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.746418] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.746517]                                      ^
[   29.746596]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746707]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746807] ==================================================================
[   30.018700] ==================================================================
[   30.018805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   30.018927] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.020518] 
[   30.020609] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.020733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.020845] Hardware name: linux,dummy-virt (DT)
[   30.020960] Call trace:
[   30.021035]  show_stack+0x20/0x38 (C)
[   30.021289]  dump_stack_lvl+0x8c/0xd0
[   30.021465]  print_report+0x118/0x608
[   30.021594]  kasan_report+0xdc/0x128
[   30.021779]  kasan_check_range+0x100/0x1a8
[   30.022369]  __kasan_check_write+0x20/0x30
[   30.022532]  kasan_atomics_helper+0x1058/0x4858
[   30.022667]  kasan_atomics+0x198/0x2e0
[   30.023171]  kunit_try_run_case+0x170/0x3f0
[   30.023463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.023765]  kthread+0x328/0x630
[   30.024010]  ret_from_fork+0x10/0x20
[   30.024133] 
[   30.024189] Allocated by task 265:
[   30.024271]  kasan_save_stack+0x3c/0x68
[   30.024382]  kasan_save_track+0x20/0x40
[   30.024480]  kasan_save_alloc_info+0x40/0x58
[   30.024581]  __kasan_kmalloc+0xd4/0xd8
[   30.024710]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.024844]  kasan_atomics+0xb8/0x2e0
[   30.025048]  kunit_try_run_case+0x170/0x3f0
[   30.025168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.025305]  kthread+0x328/0x630
[   30.025415]  ret_from_fork+0x10/0x20
[   30.025615] 
[   30.025681] The buggy address belongs to the object at fff00000c643c780
[   30.025681]  which belongs to the cache kmalloc-64 of size 64
[   30.025976] The buggy address is located 0 bytes to the right of
[   30.025976]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.026174] 
[   30.026342] The buggy address belongs to the physical page:
[   30.026426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.026559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.026679] page_type: f5(slab)
[   30.026771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.026912] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.027038] page dumped because: kasan: bad access detected
[   30.027183] 
[   30.027243] Memory state around the buggy address:
[   30.027338]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.027506]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.027695] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.027806]                                      ^
[   30.027905]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.028096]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.028212] ==================================================================
[   30.148535] ==================================================================
[   30.148675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   30.148796] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.148919] 
[   30.149019] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.150604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.150758] Hardware name: linux,dummy-virt (DT)
[   30.151095] Call trace:
[   30.151208]  show_stack+0x20/0x38 (C)
[   30.151379]  dump_stack_lvl+0x8c/0xd0
[   30.151839]  print_report+0x118/0x608
[   30.152082]  kasan_report+0xdc/0x128
[   30.152248]  kasan_check_range+0x100/0x1a8
[   30.152371]  __kasan_check_write+0x20/0x30
[   30.152572]  kasan_atomics_helper+0x147c/0x4858
[   30.153030]  kasan_atomics+0x198/0x2e0
[   30.153514]  kunit_try_run_case+0x170/0x3f0
[   30.154262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.154411]  kthread+0x328/0x630
[   30.154950]  ret_from_fork+0x10/0x20
[   30.155136] 
[   30.155686] Allocated by task 265:
[   30.155793]  kasan_save_stack+0x3c/0x68
[   30.156463]  kasan_save_track+0x20/0x40
[   30.156571]  kasan_save_alloc_info+0x40/0x58
[   30.156685]  __kasan_kmalloc+0xd4/0xd8
[   30.156789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.157293]  kasan_atomics+0xb8/0x2e0
[   30.157799]  kunit_try_run_case+0x170/0x3f0
[   30.158147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.158457]  kthread+0x328/0x630
[   30.158581]  ret_from_fork+0x10/0x20
[   30.159036] 
[   30.159094] The buggy address belongs to the object at fff00000c643c780
[   30.159094]  which belongs to the cache kmalloc-64 of size 64
[   30.159620] The buggy address is located 0 bytes to the right of
[   30.159620]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.160424] 
[   30.160520] The buggy address belongs to the physical page:
[   30.160677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.161473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.161753] page_type: f5(slab)
[   30.161966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.162102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.162238] page dumped because: kasan: bad access detected
[   30.162477] 
[   30.162602] Memory state around the buggy address:
[   30.162696]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.163034]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.163884] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.164031]                                      ^
[   30.164127]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.165338]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.165457] ==================================================================
[   30.166111] ==================================================================
[   30.166341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   30.166456] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.166582] 
[   30.166654] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.166850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.166950] Hardware name: linux,dummy-virt (DT)
[   30.167028] Call trace:
[   30.167087]  show_stack+0x20/0x38 (C)
[   30.167224]  dump_stack_lvl+0x8c/0xd0
[   30.167589]  print_report+0x118/0x608
[   30.167737]  kasan_report+0xdc/0x128
[   30.167929]  kasan_check_range+0x100/0x1a8
[   30.168089]  __kasan_check_write+0x20/0x30
[   30.168233]  kasan_atomics_helper+0x14e4/0x4858
[   30.168571]  kasan_atomics+0x198/0x2e0
[   30.168701]  kunit_try_run_case+0x170/0x3f0
[   30.168836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.169000]  kthread+0x328/0x630
[   30.169123]  ret_from_fork+0x10/0x20
[   30.169294] 
[   30.169356] Allocated by task 265:
[   30.169483]  kasan_save_stack+0x3c/0x68
[   30.169606]  kasan_save_track+0x20/0x40
[   30.169699]  kasan_save_alloc_info+0x40/0x58
[   30.169806]  __kasan_kmalloc+0xd4/0xd8
[   30.169900]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.170032]  kasan_atomics+0xb8/0x2e0
[   30.170132]  kunit_try_run_case+0x170/0x3f0
[   30.171164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.172052]  kthread+0x328/0x630
[   30.173377]  ret_from_fork+0x10/0x20
[   30.173502] 
[   30.173557] The buggy address belongs to the object at fff00000c643c780
[   30.173557]  which belongs to the cache kmalloc-64 of size 64
[   30.174441] The buggy address is located 0 bytes to the right of
[   30.174441]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.174611] 
[   30.174671] The buggy address belongs to the physical page:
[   30.174749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.174896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.175068] page_type: f5(slab)
[   30.177041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.177194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.177314] page dumped because: kasan: bad access detected
[   30.177412] 
[   30.177462] Memory state around the buggy address:
[   30.178549]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.180496]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.180626] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.180740]                                      ^
[   30.180831]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.182711]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.183057] ==================================================================
[   30.044217] ==================================================================
[   30.044502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   30.044614] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.044738] 
[   30.044813] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.045108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.045183] Hardware name: linux,dummy-virt (DT)
[   30.045309] Call trace:
[   30.045485]  show_stack+0x20/0x38 (C)
[   30.045848]  dump_stack_lvl+0x8c/0xd0
[   30.046041]  print_report+0x118/0x608
[   30.046225]  kasan_report+0xdc/0x128
[   30.046368]  kasan_check_range+0x100/0x1a8
[   30.046509]  __kasan_check_write+0x20/0x30
[   30.046816]  kasan_atomics_helper+0x1128/0x4858
[   30.046992]  kasan_atomics+0x198/0x2e0
[   30.047172]  kunit_try_run_case+0x170/0x3f0
[   30.047313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.047491]  kthread+0x328/0x630
[   30.047606]  ret_from_fork+0x10/0x20
[   30.047818] 
[   30.047872] Allocated by task 265:
[   30.047968]  kasan_save_stack+0x3c/0x68
[   30.048092]  kasan_save_track+0x20/0x40
[   30.048343]  kasan_save_alloc_info+0x40/0x58
[   30.048469]  __kasan_kmalloc+0xd4/0xd8
[   30.048802]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.049028]  kasan_atomics+0xb8/0x2e0
[   30.049202]  kunit_try_run_case+0x170/0x3f0
[   30.049311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.049420]  kthread+0x328/0x630
[   30.049546]  ret_from_fork+0x10/0x20
[   30.049758] 
[   30.049810] The buggy address belongs to the object at fff00000c643c780
[   30.049810]  which belongs to the cache kmalloc-64 of size 64
[   30.050068] The buggy address is located 0 bytes to the right of
[   30.050068]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.050520] 
[   30.050633] The buggy address belongs to the physical page:
[   30.050717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.050844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.050994] page_type: f5(slab)
[   30.051210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.051528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.051653] page dumped because: kasan: bad access detected
[   30.051750] 
[   30.051803] Memory state around the buggy address:
[   30.051886]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.052069]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.052148] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.052203]                                      ^
[   30.052248]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.052304]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.052353] ==================================================================
[   30.092814] ==================================================================
[   30.092925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   30.093058] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.093179] 
[   30.093253] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.093453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.093532] Hardware name: linux,dummy-virt (DT)
[   30.093759] Call trace:
[   30.093954]  show_stack+0x20/0x38 (C)
[   30.094167]  dump_stack_lvl+0x8c/0xd0
[   30.094347]  print_report+0x118/0x608
[   30.094498]  kasan_report+0xdc/0x128
[   30.094623]  kasan_check_range+0x100/0x1a8
[   30.094747]  __kasan_check_write+0x20/0x30
[   30.094876]  kasan_atomics_helper+0x12d8/0x4858
[   30.095021]  kasan_atomics+0x198/0x2e0
[   30.095478]  kunit_try_run_case+0x170/0x3f0
[   30.095843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.096119]  kthread+0x328/0x630
[   30.096876]  ret_from_fork+0x10/0x20
[   30.097885] 
[   30.097957] Allocated by task 265:
[   30.098283]  kasan_save_stack+0x3c/0x68
[   30.098728]  kasan_save_track+0x20/0x40
[   30.099151]  kasan_save_alloc_info+0x40/0x58
[   30.099365]  __kasan_kmalloc+0xd4/0xd8
[   30.099476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.099594]  kasan_atomics+0xb8/0x2e0
[   30.100571]  kunit_try_run_case+0x170/0x3f0
[   30.100973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.101497]  kthread+0x328/0x630
[   30.101826]  ret_from_fork+0x10/0x20
[   30.102407] 
[   30.102697] The buggy address belongs to the object at fff00000c643c780
[   30.102697]  which belongs to the cache kmalloc-64 of size 64
[   30.102988] The buggy address is located 0 bytes to the right of
[   30.102988]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.103382] 
[   30.103449] The buggy address belongs to the physical page:
[   30.103539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.104267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.104887] page_type: f5(slab)
[   30.105259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.105626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.105840] page dumped because: kasan: bad access detected
[   30.106323] 
[   30.106414] Memory state around the buggy address:
[   30.106805]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.106951]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.107066] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.107736]                                      ^
[   30.107947]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.108073]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.108181] ==================================================================
[   29.924463] ==================================================================
[   29.924618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.924752] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.924991] 
[   29.925178] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.925406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.925484] Hardware name: linux,dummy-virt (DT)
[   29.925571] Call trace:
[   29.925635]  show_stack+0x20/0x38 (C)
[   29.925761]  dump_stack_lvl+0x8c/0xd0
[   29.925890]  print_report+0x118/0x608
[   29.926034]  kasan_report+0xdc/0x128
[   29.926156]  __asan_report_load8_noabort+0x20/0x30
[   29.926286]  kasan_atomics_helper+0x3f58/0x4858
[   29.926407]  kasan_atomics+0x198/0x2e0
[   29.926521]  kunit_try_run_case+0x170/0x3f0
[   29.926648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.926785]  kthread+0x328/0x630
[   29.926912]  ret_from_fork+0x10/0x20
[   29.927091] 
[   29.927221] Allocated by task 265:
[   29.927473]  kasan_save_stack+0x3c/0x68
[   29.927626]  kasan_save_track+0x20/0x40
[   29.927744]  kasan_save_alloc_info+0x40/0x58
[   29.927860]  __kasan_kmalloc+0xd4/0xd8
[   29.927992]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.928100]  kasan_atomics+0xb8/0x2e0
[   29.928337]  kunit_try_run_case+0x170/0x3f0
[   29.928494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.928816]  kthread+0x328/0x630
[   29.928918]  ret_from_fork+0x10/0x20
[   29.929154] 
[   29.929208] The buggy address belongs to the object at fff00000c643c780
[   29.929208]  which belongs to the cache kmalloc-64 of size 64
[   29.929477] The buggy address is located 0 bytes to the right of
[   29.929477]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.929781] 
[   29.929865] The buggy address belongs to the physical page:
[   29.930007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.930198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.930345] page_type: f5(slab)
[   29.930461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.930609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.930979] page dumped because: kasan: bad access detected
[   29.931128] 
[   29.931251] Memory state around the buggy address:
[   29.931671]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.931822]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.931971] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.932333]                                      ^
[   29.932499]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.932709]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.933438] ==================================================================
[   30.070170] ==================================================================
[   30.070465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   30.070779] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.071559] 
[   30.071661] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.071889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.071991] Hardware name: linux,dummy-virt (DT)
[   30.072197] Call trace:
[   30.072368]  show_stack+0x20/0x38 (C)
[   30.072565]  dump_stack_lvl+0x8c/0xd0
[   30.072750]  print_report+0x118/0x608
[   30.073007]  kasan_report+0xdc/0x128
[   30.073369]  kasan_check_range+0x100/0x1a8
[   30.073881]  __kasan_check_write+0x20/0x30
[   30.074495]  kasan_atomics_helper+0x11f8/0x4858
[   30.074838]  kasan_atomics+0x198/0x2e0
[   30.075239]  kunit_try_run_case+0x170/0x3f0
[   30.075390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.075528]  kthread+0x328/0x630
[   30.075658]  ret_from_fork+0x10/0x20
[   30.075790] 
[   30.075843] Allocated by task 265:
[   30.077247]  kasan_save_stack+0x3c/0x68
[   30.077372]  kasan_save_track+0x20/0x40
[   30.077493]  kasan_save_alloc_info+0x40/0x58
[   30.078162]  __kasan_kmalloc+0xd4/0xd8
[   30.079218]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.079548]  kasan_atomics+0xb8/0x2e0
[   30.079656]  kunit_try_run_case+0x170/0x3f0
[   30.079759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.079870]  kthread+0x328/0x630
[   30.080009]  ret_from_fork+0x10/0x20
[   30.080257] 
[   30.080310] The buggy address belongs to the object at fff00000c643c780
[   30.080310]  which belongs to the cache kmalloc-64 of size 64
[   30.080482] The buggy address is located 0 bytes to the right of
[   30.080482]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.080696] 
[   30.080757] The buggy address belongs to the physical page:
[   30.080834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.081153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.081288] page_type: f5(slab)
[   30.081548] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.081910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.082077] page dumped because: kasan: bad access detected
[   30.082177] 
[   30.082236] Memory state around the buggy address:
[   30.082342]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.082522]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.082653] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.082783]                                      ^
[   30.082924]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.083084]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.083191] ==================================================================
[   30.206100] ==================================================================
[   30.206246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   30.206453] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.206616] 
[   30.206898] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.207348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.207584] Hardware name: linux,dummy-virt (DT)
[   30.207773] Call trace:
[   30.207870]  show_stack+0x20/0x38 (C)
[   30.208178]  dump_stack_lvl+0x8c/0xd0
[   30.208526]  print_report+0x118/0x608
[   30.208813]  kasan_report+0xdc/0x128
[   30.209140]  kasan_check_range+0x100/0x1a8
[   30.209355]  __kasan_check_write+0x20/0x30
[   30.209800]  kasan_atomics_helper+0x15b4/0x4858
[   30.210047]  kasan_atomics+0x198/0x2e0
[   30.210243]  kunit_try_run_case+0x170/0x3f0
[   30.210455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.210660]  kthread+0x328/0x630
[   30.210915]  ret_from_fork+0x10/0x20
[   30.211076] 
[   30.211414] Allocated by task 265:
[   30.211700]  kasan_save_stack+0x3c/0x68
[   30.212074]  kasan_save_track+0x20/0x40
[   30.212289]  kasan_save_alloc_info+0x40/0x58
[   30.212596]  __kasan_kmalloc+0xd4/0xd8
[   30.212767]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.212993]  kasan_atomics+0xb8/0x2e0
[   30.213302]  kunit_try_run_case+0x170/0x3f0
[   30.213654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.213833]  kthread+0x328/0x630
[   30.214581]  ret_from_fork+0x10/0x20
[   30.214746] 
[   30.214839] The buggy address belongs to the object at fff00000c643c780
[   30.214839]  which belongs to the cache kmalloc-64 of size 64
[   30.215531] The buggy address is located 0 bytes to the right of
[   30.215531]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.215704] 
[   30.215984] The buggy address belongs to the physical page:
[   30.216082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.216446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.216859] page_type: f5(slab)
[   30.217094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.217338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.217594] page dumped because: kasan: bad access detected
[   30.217689] 
[   30.217834] Memory state around the buggy address:
[   30.217920]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.218066]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.218181] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.218401]                                      ^
[   30.218542]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.218700]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.218967] ==================================================================
[   29.694232] ==================================================================
[   29.694340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.694453] Read of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.694575] 
[   29.694642] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.694833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.694920] Hardware name: linux,dummy-virt (DT)
[   29.699179] Call trace:
[   29.699746]  show_stack+0x20/0x38 (C)
[   29.700056]  dump_stack_lvl+0x8c/0xd0
[   29.700198]  print_report+0x118/0x608
[   29.700328]  kasan_report+0xdc/0x128
[   29.701363]  __asan_report_load4_noabort+0x20/0x30
[   29.701756]  kasan_atomics_helper+0x42d8/0x4858
[   29.701958]  kasan_atomics+0x198/0x2e0
[   29.702103]  kunit_try_run_case+0x170/0x3f0
[   29.702427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.702578]  kthread+0x328/0x630
[   29.702962]  ret_from_fork+0x10/0x20
[   29.703091] 
[   29.703152] Allocated by task 265:
[   29.703243]  kasan_save_stack+0x3c/0x68
[   29.703613]  kasan_save_track+0x20/0x40
[   29.703735]  kasan_save_alloc_info+0x40/0x58
[   29.703865]  __kasan_kmalloc+0xd4/0xd8
[   29.704124]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.704274]  kasan_atomics+0xb8/0x2e0
[   29.704365]  kunit_try_run_case+0x170/0x3f0
[   29.704464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.704582]  kthread+0x328/0x630
[   29.704827]  ret_from_fork+0x10/0x20
[   29.704924] 
[   29.705005] The buggy address belongs to the object at fff00000c643c780
[   29.705005]  which belongs to the cache kmalloc-64 of size 64
[   29.705381] The buggy address is located 0 bytes to the right of
[   29.705381]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.705831] 
[   29.706164] The buggy address belongs to the physical page:
[   29.706267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.706636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.706774] page_type: f5(slab)
[   29.707045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.711187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.712271] Call trace:
[   29.712341]  show_stack+0x20/0x38 (C)
[   29.713288]  dump_stack_lvl+0x8c/0xd0
[   29.713636]  print_report+0x118/0x608
[   29.714159]  kasan_report+0xdc/0x128
[   29.714667]  kasan_check_range+0x100/0x1a8
[   29.715720]  __kasan_check_write+0x20/0x30
[   29.715911]  kasan_atomics_helper+0x934/0x4858
[   29.716112]  kasan_atomics+0x198/0x2e0
[   29.716347]  kunit_try_run_case+0x170/0x3f0
[   29.716635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717159]  kthread+0x328/0x630
[   29.717303]  ret_from_fork+0x10/0x20
[   29.717424] 
[   29.718115] Allocated by task 265:
[   29.718200]  kasan_save_stack+0x3c/0x68
[   29.718710]  kasan_save_track+0x20/0x40
[   29.719162]  kasan_save_alloc_info+0x40/0x58
[   29.719504]  __kasan_kmalloc+0xd4/0xd8
[   29.719928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.720245]  kasan_atomics+0xb8/0x2e0
[   29.720365]  kunit_try_run_case+0x170/0x3f0
[   29.721024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.721232]  kthread+0x328/0x630
[   29.721353]  ret_from_fork+0x10/0x20
[   29.721600] 
[   29.721658] The buggy address belongs to the object at fff00000c643c780
[   29.721658]  which belongs to the cache kmalloc-64 of size 64
[   29.722235] The buggy address is located 0 bytes to the right of
[   29.722235]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.722605] 
[   29.723176] The buggy address belongs to the physical page:
[   29.723612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.723752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.723874] page_type: f5(slab)
[   29.724893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.725202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.725396] page dumped because: kasan: bad access detected
[   29.725600] 
[   29.725764] Memory state around the buggy address:
[   29.725890]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.726269]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.726437] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.726541]                                      ^
[   29.726628]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.726738]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.726842] ==================================================================
[   30.121624] ==================================================================
[   30.121904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   30.122123] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.122260] 
[   30.122453] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.123006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.123222] Hardware name: linux,dummy-virt (DT)
[   30.123350] Call trace:
[   30.123452]  show_stack+0x20/0x38 (C)
[   30.123611]  dump_stack_lvl+0x8c/0xd0
[   30.123750]  print_report+0x118/0x608
[   30.124000]  kasan_report+0xdc/0x128
[   30.124263]  __asan_report_load8_noabort+0x20/0x30
[   30.124448]  kasan_atomics_helper+0x3f04/0x4858
[   30.126145]  kasan_atomics+0x198/0x2e0
[   30.126283]  kunit_try_run_case+0x170/0x3f0
[   30.126451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.126857]  kthread+0x328/0x630
[   30.127075]  ret_from_fork+0x10/0x20
[   30.127427] 
[   30.127479] Allocated by task 265:
[   30.127569]  kasan_save_stack+0x3c/0x68
[   30.127847]  kasan_save_track+0x20/0x40
[   30.127994]  kasan_save_alloc_info+0x40/0x58
[   30.128117]  __kasan_kmalloc+0xd4/0xd8
[   30.128234]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.129293]  kasan_atomics+0xb8/0x2e0
[   30.129528]  kunit_try_run_case+0x170/0x3f0
[   30.129685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.129924]  kthread+0x328/0x630
[   30.130038]  ret_from_fork+0x10/0x20
[   30.130395] 
[   30.130458] The buggy address belongs to the object at fff00000c643c780
[   30.130458]  which belongs to the cache kmalloc-64 of size 64
[   30.130629] The buggy address is located 0 bytes to the right of
[   30.130629]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.131178] 
[   30.131245] The buggy address belongs to the physical page:
[   30.131864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.132061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.132201] page_type: f5(slab)
[   30.132440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.133083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.133282] page dumped because: kasan: bad access detected
[   30.133499] 
[   30.133656] Memory state around the buggy address:
[   30.133819]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.134016]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.134157] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.134294]                                      ^
[   30.134385]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.134493]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.134590] ==================================================================
[   30.284705] ==================================================================
[   30.284818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   30.284962] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   30.285088] 
[   30.285167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.285367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.285441] Hardware name: linux,dummy-virt (DT)
[   30.285517] Call trace:
[   30.285573]  show_stack+0x20/0x38 (C)
[   30.285704]  dump_stack_lvl+0x8c/0xd0
[   30.285828]  print_report+0x118/0x608
[   30.289761]  kasan_report+0xdc/0x128
[   30.290994]  __asan_report_load8_noabort+0x20/0x30
[   30.291133]  kasan_atomics_helper+0x3e10/0x4858
[   30.293487]  kasan_atomics+0x198/0x2e0
[   30.294253]  kunit_try_run_case+0x170/0x3f0
[   30.294723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.295684]  kthread+0x328/0x630
[   30.296518]  ret_from_fork+0x10/0x20
[   30.297329] 
[   30.297493] Allocated by task 265:
[   30.297876]  kasan_save_stack+0x3c/0x68
[   30.298002]  kasan_save_track+0x20/0x40
[   30.298106]  kasan_save_alloc_info+0x40/0x58
[   30.299440]  __kasan_kmalloc+0xd4/0xd8
[   30.299560]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.299679]  kasan_atomics+0xb8/0x2e0
[   30.301001]  kunit_try_run_case+0x170/0x3f0
[   30.301122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.302361]  kthread+0x328/0x630
[   30.302644]  ret_from_fork+0x10/0x20
[   30.303485] 
[   30.303557] The buggy address belongs to the object at fff00000c643c780
[   30.303557]  which belongs to the cache kmalloc-64 of size 64
[   30.303981] The buggy address is located 0 bytes to the right of
[   30.303981]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   30.304078] 
[   30.304112] The buggy address belongs to the physical page:
[   30.304201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   30.304359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.304510] page_type: f5(slab)
[   30.304639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.304781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.304912] page dumped because: kasan: bad access detected
[   30.305033] 
[   30.305086] Memory state around the buggy address:
[   30.305236]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.305370]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.305499] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.305612]                                      ^
[   30.305712]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.305852]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.305984] ==================================================================
[   29.911701] ==================================================================
[   29.911809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.911926] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.912076] 
[   29.912151] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.912356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.912430] Hardware name: linux,dummy-virt (DT)
[   29.912513] Call trace:
[   29.912580]  show_stack+0x20/0x38 (C)
[   29.912723]  dump_stack_lvl+0x8c/0xd0
[   29.915227]  print_report+0x118/0x608
[   29.915536]  kasan_report+0xdc/0x128
[   29.916247]  kasan_check_range+0x100/0x1a8
[   29.916577]  __kasan_check_read+0x20/0x30
[   29.917087]  kasan_atomics_helper+0xdd4/0x4858
[   29.917212]  kasan_atomics+0x198/0x2e0
[   29.918179]  kunit_try_run_case+0x170/0x3f0
[   29.918338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.918473]  kthread+0x328/0x630
[   29.918582]  ret_from_fork+0x10/0x20
[   29.918701] 
[   29.918752] Allocated by task 265:
[   29.918830]  kasan_save_stack+0x3c/0x68
[   29.918959]  kasan_save_track+0x20/0x40
[   29.919079]  kasan_save_alloc_info+0x40/0x58
[   29.919197]  __kasan_kmalloc+0xd4/0xd8
[   29.919291]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.919409]  kasan_atomics+0xb8/0x2e0
[   29.919509]  kunit_try_run_case+0x170/0x3f0
[   29.920157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.920348]  kthread+0x328/0x630
[   29.920450]  ret_from_fork+0x10/0x20
[   29.920554] 
[   29.920709] The buggy address belongs to the object at fff00000c643c780
[   29.920709]  which belongs to the cache kmalloc-64 of size 64
[   29.920870] The buggy address is located 0 bytes to the right of
[   29.920870]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.921051] 
[   29.921103] The buggy address belongs to the physical page:
[   29.921193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.921599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.921955] page_type: f5(slab)
[   29.922073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.922225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.922379] page dumped because: kasan: bad access detected
[   29.922606] 
[   29.922668] Memory state around the buggy address:
[   29.922747]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.922859]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.923013] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.923334]                                      ^
[   29.923501]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.923621]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.923892] ==================================================================
[   29.934761] ==================================================================
[   29.934880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.935015] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.935540] 
[   29.936767] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.937951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.938111] Hardware name: linux,dummy-virt (DT)
[   29.939118] Call trace:
[   29.939187]  show_stack+0x20/0x38 (C)
[   29.940276]  dump_stack_lvl+0x8c/0xd0
[   29.940414]  print_report+0x118/0x608
[   29.941259]  kasan_report+0xdc/0x128
[   29.942082]  kasan_check_range+0x100/0x1a8
[   29.942460]  __kasan_check_write+0x20/0x30
[   29.943114]  kasan_atomics_helper+0xe44/0x4858
[   29.943263]  kasan_atomics+0x198/0x2e0
[   29.943659]  kunit_try_run_case+0x170/0x3f0
[   29.943781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.943963]  kthread+0x328/0x630
[   29.944318]  ret_from_fork+0x10/0x20
[   29.944466] 
[   29.944516] Allocated by task 265:
[   29.944588]  kasan_save_stack+0x3c/0x68
[   29.944695]  kasan_save_track+0x20/0x40
[   29.944858]  kasan_save_alloc_info+0x40/0x58
[   29.945045]  __kasan_kmalloc+0xd4/0xd8
[   29.945291]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.945446]  kasan_atomics+0xb8/0x2e0
[   29.945725]  kunit_try_run_case+0x170/0x3f0
[   29.945849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.945984]  kthread+0x328/0x630
[   29.946101]  ret_from_fork+0x10/0x20
[   29.946685] 
[   29.947019] The buggy address belongs to the object at fff00000c643c780
[   29.947019]  which belongs to the cache kmalloc-64 of size 64
[   29.947402] The buggy address is located 0 bytes to the right of
[   29.947402]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.948098] 
[   29.948296] The buggy address belongs to the physical page:
[   29.948665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.948830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.949061] page_type: f5(slab)
[   29.949336] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.949463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.949567] page dumped because: kasan: bad access detected
[   29.949773] 
[   29.949828] Memory state around the buggy address:
[   29.950002]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.950124]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.950236] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.950352]                                      ^
[   29.950452]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.950714]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.951325] ==================================================================
[   29.526092] ==================================================================
[   29.526311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   29.527619] Hardware name: linux,dummy-virt (DT)
[   29.531852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.534362] The buggy address belongs to the object at fff00000c643c780
[   29.534362]  which belongs to the cache kmalloc-64 of size 64
[   29.536244]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.538016] ==================================================================
[   29.882582] ==================================================================
[   29.882690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.882802] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.882952] 
[   29.883023] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.883249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.883383] Hardware name: linux,dummy-virt (DT)
[   29.883507] Call trace:
[   29.883577]  show_stack+0x20/0x38 (C)
[   29.883726]  dump_stack_lvl+0x8c/0xd0
[   29.883910]  print_report+0x118/0x608
[   29.884089]  kasan_report+0xdc/0x128
[   29.884240]  kasan_check_range+0x100/0x1a8
[   29.884454]  __kasan_check_write+0x20/0x30
[   29.884810]  kasan_atomics_helper+0xd3c/0x4858
[   29.884983]  kasan_atomics+0x198/0x2e0
[   29.885109]  kunit_try_run_case+0x170/0x3f0
[   29.885240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.885393]  kthread+0x328/0x630
[   29.885508]  ret_from_fork+0x10/0x20
[   29.885637] 
[   29.885685] Allocated by task 265:
[   29.885777]  kasan_save_stack+0x3c/0x68
[   29.885907]  kasan_save_track+0x20/0x40
[   29.886228]  kasan_save_alloc_info+0x40/0x58
[   29.886344]  __kasan_kmalloc+0xd4/0xd8
[   29.886462]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.886767]  kasan_atomics+0xb8/0x2e0
[   29.886965]  kunit_try_run_case+0x170/0x3f0
[   29.887074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.887193]  kthread+0x328/0x630
[   29.887292]  ret_from_fork+0x10/0x20
[   29.887466] 
[   29.887559] The buggy address belongs to the object at fff00000c643c780
[   29.887559]  which belongs to the cache kmalloc-64 of size 64
[   29.887719] The buggy address is located 0 bytes to the right of
[   29.887719]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.887995] 
[   29.888116] The buggy address belongs to the physical page:
[   29.888199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.888341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.888657] page_type: f5(slab)
[   29.888853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.889277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.889386] page dumped because: kasan: bad access detected
[   29.889501] 
[   29.889554] Memory state around the buggy address:
[   29.889641]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.889772]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.889966] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.890098]                                      ^
[   29.890196]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.890312]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.890413] ==================================================================
[   29.624192] ==================================================================
[   29.624303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   29.624432] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.624558] 
[   29.624630] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.624848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.631366] 
[   29.631782] page_type: f5(slab)
[   29.632961]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.634315] ==================================================================
[   29.891018] ==================================================================
[   29.891257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.891502] Read of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265
[   29.891627] 
[   29.892437] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.894992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.895038] Hardware name: linux,dummy-virt (DT)
[   29.895080] Call trace:
[   29.895108]  show_stack+0x20/0x38 (C)
[   29.895231]  dump_stack_lvl+0x8c/0xd0
[   29.895369]  print_report+0x118/0x608
[   29.895852]  kasan_report+0xdc/0x128
[   29.896284]  __asan_report_load4_noabort+0x20/0x30
[   29.896602]  kasan_atomics_helper+0x3e04/0x4858
[   29.897016]  kasan_atomics+0x198/0x2e0
[   29.897369]  kunit_try_run_case+0x170/0x3f0
[   29.897754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.898030]  kthread+0x328/0x630
[   29.898230]  ret_from_fork+0x10/0x20
[   29.898725] 
[   29.898814] Allocated by task 265:
[   29.899320]  kasan_save_stack+0x3c/0x68
[   29.899465]  kasan_save_track+0x20/0x40
[   29.899582]  kasan_save_alloc_info+0x40/0x58
[   29.899702]  __kasan_kmalloc+0xd4/0xd8
[   29.899834]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.899967]  kasan_atomics+0xb8/0x2e0
[   29.900102]  kunit_try_run_case+0x170/0x3f0
[   29.900211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.900707]  kthread+0x328/0x630
[   29.901241]  ret_from_fork+0x10/0x20
[   29.901406] 
[   29.902101] The buggy address belongs to the object at fff00000c643c780
[   29.902101]  which belongs to the cache kmalloc-64 of size 64
[   29.902247] The buggy address is located 0 bytes to the right of
[   29.902247]  allocated 48-byte region [fff00000c643c780, fff00000c643c7b0)
[   29.902409] 
[   29.902461] The buggy address belongs to the physical page:
[   29.902540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c
[   29.902677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.902809] page_type: f5(slab)
[   29.902926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.903080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.907169] page dumped because: kasan: bad access detected
[   29.907282] 
[   29.907593] Memory state around the buggy address:
[   29.907686]  fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.907826]  fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.907973] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.908077]                                      ^
[   29.911080]  fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.911206]  fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.911312] ==================================================================

[   30.101111] ==================================================================
[   30.101226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   30.101359] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.101487] 
[   30.101578] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.101789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.102983] Hardware name: linux,dummy-virt (DT)
[   30.103240] Call trace:
[   30.103306]  show_stack+0x20/0x38 (C)
[   30.103440]  dump_stack_lvl+0x8c/0xd0
[   30.103558]  print_report+0x118/0x608
[   30.104355]  kasan_report+0xdc/0x128
[   30.107436]  kasan_check_range+0x100/0x1a8
[   30.107568]  __kasan_check_write+0x20/0x30
[   30.107714]  kasan_atomics_helper+0xf20/0x4858
[   30.107957]  kasan_atomics+0x198/0x2e0
[   30.108291]  kunit_try_run_case+0x170/0x3f0
[   30.108484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.108881]  kthread+0x328/0x630
[   30.109177]  ret_from_fork+0x10/0x20
[   30.109313] 
[   30.109373] Allocated by task 265:
[   30.109461]  kasan_save_stack+0x3c/0x68
[   30.109570]  kasan_save_track+0x20/0x40
[   30.109670]  kasan_save_alloc_info+0x40/0x58
[   30.109794]  __kasan_kmalloc+0xd4/0xd8
[   30.109918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.110035]  kasan_atomics+0xb8/0x2e0
[   30.110135]  kunit_try_run_case+0x170/0x3f0
[   30.110587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.110890]  kthread+0x328/0x630
[   30.111335]  ret_from_fork+0x10/0x20
[   30.111504] 
[   30.111571] The buggy address belongs to the object at fff00000c7751400
[   30.111571]  which belongs to the cache kmalloc-64 of size 64
[   30.111724] The buggy address is located 0 bytes to the right of
[   30.111724]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.112166] 
[   30.112471] The buggy address belongs to the physical page:
[   30.112985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.113191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.113956] page_type: f5(slab)
[   30.114190] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.115005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.115307] page dumped because: kasan: bad access detected
[   30.115819] 
[   30.115894] Memory state around the buggy address:
[   30.115992]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.116997]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.117208] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.117309]                                      ^
[   30.117394]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.117506]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.118627] ==================================================================
[   29.851330] ==================================================================
[   29.851571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.851703] Write of size 4 at addr fff00000c7751430 by task kunit_try_catch/265
[   29.851857] 
[   29.851938] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.852159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.852248] Hardware name: linux,dummy-virt (DT)
[   29.852385] Call trace:
[   29.852461]  show_stack+0x20/0x38 (C)
[   29.852734]  dump_stack_lvl+0x8c/0xd0
[   29.853254]  print_report+0x118/0x608
[   29.853466]  kasan_report+0xdc/0x128
[   29.853599]  kasan_check_range+0x100/0x1a8
[   29.854727]  __kasan_check_write+0x20/0x30
[   29.855082]  kasan_atomics_helper+0x99c/0x4858
[   29.855466]  kasan_atomics+0x198/0x2e0
[   29.855868]  kunit_try_run_case+0x170/0x3f0
[   29.856072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.856329]  kthread+0x328/0x630
[   29.856706]  ret_from_fork+0x10/0x20
[   29.857114] 
[   29.857172] Allocated by task 265:
[   29.857252]  kasan_save_stack+0x3c/0x68
[   29.857371]  kasan_save_track+0x20/0x40
[   29.857588]  kasan_save_alloc_info+0x40/0x58
[   29.857699]  __kasan_kmalloc+0xd4/0xd8
[   29.857864]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.858169]  kasan_atomics+0xb8/0x2e0
[   29.858429]  kunit_try_run_case+0x170/0x3f0
[   29.858567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.858692]  kthread+0x328/0x630
[   29.858849]  ret_from_fork+0x10/0x20
[   29.858966] 
[   29.859064] The buggy address belongs to the object at fff00000c7751400
[   29.859064]  which belongs to the cache kmalloc-64 of size 64
[   29.859253] The buggy address is located 0 bytes to the right of
[   29.859253]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.859429] 
[   29.859490] The buggy address belongs to the physical page:
[   29.859605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   29.859770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.859969] page_type: f5(slab)
[   29.860089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.860227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.860341] page dumped because: kasan: bad access detected
[   29.860445] 
[   29.860573] Memory state around the buggy address:
[   29.860761]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.860905]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.861105] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.861223]                                      ^
[   29.861318]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.861467]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.861569] ==================================================================
[   29.999143] ==================================================================
[   29.999253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.999801] Write of size 4 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.000797] 
[   30.000924] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.001078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.001154] Hardware name: linux,dummy-virt (DT)
[   30.001274] Call trace:
[   30.001422]  show_stack+0x20/0x38 (C)
[   30.003160]  dump_stack_lvl+0x8c/0xd0
[   30.003340]  print_report+0x118/0x608
[   30.003474]  kasan_report+0xdc/0x128
[   30.003602]  kasan_check_range+0x100/0x1a8
[   30.004001]  __kasan_check_write+0x20/0x30
[   30.004343]  kasan_atomics_helper+0xd3c/0x4858
[   30.004715]  kasan_atomics+0x198/0x2e0
[   30.004938]  kunit_try_run_case+0x170/0x3f0
[   30.005088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.005246]  kthread+0x328/0x630
[   30.007901]  ret_from_fork+0x10/0x20
[   30.008057] 
[   30.008186] Allocated by task 265:
[   30.008272]  kasan_save_stack+0x3c/0x68
[   30.008399]  kasan_save_track+0x20/0x40
[   30.008503]  kasan_save_alloc_info+0x40/0x58
[   30.008606]  __kasan_kmalloc+0xd4/0xd8
[   30.009217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.009347]  kasan_atomics+0xb8/0x2e0
[   30.009465]  kunit_try_run_case+0x170/0x3f0
[   30.009587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.009725]  kthread+0x328/0x630
[   30.009864]  ret_from_fork+0x10/0x20
[   30.009995] 
[   30.010090] The buggy address belongs to the object at fff00000c7751400
[   30.010090]  which belongs to the cache kmalloc-64 of size 64
[   30.010253] The buggy address is located 0 bytes to the right of
[   30.010253]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.010475] 
[   30.010549] The buggy address belongs to the physical page:
[   30.010639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.010778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.011272] page_type: f5(slab)
[   30.012174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.012310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.012415] page dumped because: kasan: bad access detected
[   30.012502] 
[   30.012650] Memory state around the buggy address:
[   30.012775]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.012977]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.013140] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.013257]                                      ^
[   30.013958]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.014737]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.014913] ==================================================================
[   30.288211] ==================================================================
[   30.288323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   30.288452] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.288576] 
[   30.288952] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.290081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.290250] Hardware name: linux,dummy-virt (DT)
[   30.290363] Call trace:
[   30.290450]  show_stack+0x20/0x38 (C)
[   30.290684]  dump_stack_lvl+0x8c/0xd0
[   30.290947]  print_report+0x118/0x608
[   30.291143]  kasan_report+0xdc/0x128
[   30.291306]  __asan_report_load8_noabort+0x20/0x30
[   30.291509]  kasan_atomics_helper+0x3f04/0x4858
[   30.291683]  kasan_atomics+0x198/0x2e0
[   30.292098]  kunit_try_run_case+0x170/0x3f0
[   30.292272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.292648]  kthread+0x328/0x630
[   30.292851]  ret_from_fork+0x10/0x20
[   30.293007] 
[   30.293108] Allocated by task 265:
[   30.293528]  kasan_save_stack+0x3c/0x68
[   30.293874]  kasan_save_track+0x20/0x40
[   30.294042]  kasan_save_alloc_info+0x40/0x58
[   30.294245]  __kasan_kmalloc+0xd4/0xd8
[   30.294367]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.294575]  kasan_atomics+0xb8/0x2e0
[   30.294697]  kunit_try_run_case+0x170/0x3f0
[   30.295258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.295466]  kthread+0x328/0x630
[   30.295717]  ret_from_fork+0x10/0x20
[   30.295940] 
[   30.296004] The buggy address belongs to the object at fff00000c7751400
[   30.296004]  which belongs to the cache kmalloc-64 of size 64
[   30.296155] The buggy address is located 0 bytes to the right of
[   30.296155]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.296581] 
[   30.296694] The buggy address belongs to the physical page:
[   30.296817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.297089] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.297546] page_type: f5(slab)
[   30.297823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.298130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.298243] page dumped because: kasan: bad access detected
[   30.298949] 
[   30.299424] Memory state around the buggy address:
[   30.299902]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.300174]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.300294] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.300392]                                      ^
[   30.300546]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.300661]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.300758] ==================================================================
[   30.213970] ==================================================================
[   30.214381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   30.214723] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.214906] 
[   30.215070] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.215356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.215492] Hardware name: linux,dummy-virt (DT)
[   30.215583] Call trace:
[   30.215807]  show_stack+0x20/0x38 (C)
[   30.215997]  dump_stack_lvl+0x8c/0xd0
[   30.216198]  print_report+0x118/0x608
[   30.216334]  kasan_report+0xdc/0x128
[   30.216901]  kasan_check_range+0x100/0x1a8
[   30.217289]  __kasan_check_write+0x20/0x30
[   30.217898]  kasan_atomics_helper+0x1190/0x4858
[   30.218070]  kasan_atomics+0x198/0x2e0
[   30.218598]  kunit_try_run_case+0x170/0x3f0
[   30.218734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.218895]  kthread+0x328/0x630
[   30.219010]  ret_from_fork+0x10/0x20
[   30.219127] 
[   30.222798] Allocated by task 265:
[   30.222944]  kasan_save_stack+0x3c/0x68
[   30.223085]  kasan_save_track+0x20/0x40
[   30.223185]  kasan_save_alloc_info+0x40/0x58
[   30.223279]  __kasan_kmalloc+0xd4/0xd8
[   30.223362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.223455]  kasan_atomics+0xb8/0x2e0
[   30.223536]  kunit_try_run_case+0x170/0x3f0
[   30.223625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.223727]  kthread+0x328/0x630
[   30.223819]  ret_from_fork+0x10/0x20
[   30.223924] 
[   30.223970] The buggy address belongs to the object at fff00000c7751400
[   30.223970]  which belongs to the cache kmalloc-64 of size 64
[   30.224104] The buggy address is located 0 bytes to the right of
[   30.224104]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.224251] 
[   30.224300] The buggy address belongs to the physical page:
[   30.224376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.224517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.225793] page_type: f5(slab)
[   30.226008] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.226486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.226594] page dumped because: kasan: bad access detected
[   30.226743] 
[   30.226824] Memory state around the buggy address:
[   30.227196]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.228294]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.229560] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.229866]                                      ^
[   30.229977]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.230432]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.230539] ==================================================================
[   29.426581] ==================================================================
[   29.454748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   29.456216]  print_report+0x118/0x608
[   29.457851]  ret_from_fork+0x10/0x20
[   29.460580]  kasan_atomics+0xb8/0x2e0
[   29.463680] 
[   29.463747] The buggy address belongs to the physical page:
[   29.464022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   29.464374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.464540] page_type: f5(slab)
[   29.465518] page dumped because: kasan: bad access detected
[   29.466461] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.467416] ==================================================================
[   30.342817] ==================================================================
[   30.343077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   30.343199] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.343338] 
[   30.343934] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.344162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.344234] Hardware name: linux,dummy-virt (DT)
[   30.344317] Call trace:
[   30.344377]  show_stack+0x20/0x38 (C)
[   30.344511]  dump_stack_lvl+0x8c/0xd0
[   30.344637]  print_report+0x118/0x608
[   30.344755]  kasan_report+0xdc/0x128
[   30.344892]  kasan_check_range+0x100/0x1a8
[   30.345014]  __kasan_check_write+0x20/0x30
[   30.346524]  kasan_atomics_helper+0x154c/0x4858
[   30.347169]  kasan_atomics+0x198/0x2e0
[   30.347464]  kunit_try_run_case+0x170/0x3f0
[   30.347955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.348340]  kthread+0x328/0x630
[   30.348719]  ret_from_fork+0x10/0x20
[   30.349101] 
[   30.349303] Allocated by task 265:
[   30.349479]  kasan_save_stack+0x3c/0x68
[   30.349796]  kasan_save_track+0x20/0x40
[   30.350191]  kasan_save_alloc_info+0x40/0x58
[   30.350386]  __kasan_kmalloc+0xd4/0xd8
[   30.350669]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.350796]  kasan_atomics+0xb8/0x2e0
[   30.351033]  kunit_try_run_case+0x170/0x3f0
[   30.351143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.351268]  kthread+0x328/0x630
[   30.351372]  ret_from_fork+0x10/0x20
[   30.351498] 
[   30.351586] The buggy address belongs to the object at fff00000c7751400
[   30.351586]  which belongs to the cache kmalloc-64 of size 64
[   30.351731] The buggy address is located 0 bytes to the right of
[   30.351731]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.352329] 
[   30.352390] The buggy address belongs to the physical page:
[   30.353218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.353379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.353929] page_type: f5(slab)
[   30.354284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.354579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.354742] page dumped because: kasan: bad access detected
[   30.355160] 
[   30.355393] Memory state around the buggy address:
[   30.355482]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.355957]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.356558] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.356861]                                      ^
[   30.357242]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.357366]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.359049] ==================================================================
[   30.458499] ==================================================================
[   30.458748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   30.458916] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.459039] 
[   30.459114] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.459309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.459385] Hardware name: linux,dummy-virt (DT)
[   30.459937] Call trace:
[   30.460015]  show_stack+0x20/0x38 (C)
[   30.460162]  dump_stack_lvl+0x8c/0xd0
[   30.460380]  print_report+0x118/0x608
[   30.460815]  kasan_report+0xdc/0x128
[   30.461122]  __asan_report_load8_noabort+0x20/0x30
[   30.461474]  kasan_atomics_helper+0x3e20/0x4858
[   30.461790]  kasan_atomics+0x198/0x2e0
[   30.461950]  kunit_try_run_case+0x170/0x3f0
[   30.462091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.462283]  kthread+0x328/0x630
[   30.462591]  ret_from_fork+0x10/0x20
[   30.462737] 
[   30.462790] Allocated by task 265:
[   30.463183]  kasan_save_stack+0x3c/0x68
[   30.463305]  kasan_save_track+0x20/0x40
[   30.463417]  kasan_save_alloc_info+0x40/0x58
[   30.464055]  __kasan_kmalloc+0xd4/0xd8
[   30.464653]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.464794]  kasan_atomics+0xb8/0x2e0
[   30.466011]  kunit_try_run_case+0x170/0x3f0
[   30.466569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.466889]  kthread+0x328/0x630
[   30.466999]  ret_from_fork+0x10/0x20
[   30.467576] 
[   30.467640] The buggy address belongs to the object at fff00000c7751400
[   30.467640]  which belongs to the cache kmalloc-64 of size 64
[   30.468124] The buggy address is located 0 bytes to the right of
[   30.468124]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.468507] 
[   30.468565] The buggy address belongs to the physical page:
[   30.468676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.469074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.469227] page_type: f5(slab)
[   30.469342] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.469495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.469611] page dumped because: kasan: bad access detected
[   30.470131] 
[   30.470303] Memory state around the buggy address:
[   30.470393]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.470521]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.470637] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.470830]                                      ^
[   30.471050]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.471173]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.471468] ==================================================================
[   30.230955] ==================================================================
[   30.231525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   30.232219] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.232373] 
[   30.233095] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.233337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.233423] Hardware name: linux,dummy-virt (DT)
[   30.233661] Call trace:
[   30.233747]  show_stack+0x20/0x38 (C)
[   30.234149]  dump_stack_lvl+0x8c/0xd0
[   30.234703]  print_report+0x118/0x608
[   30.234874]  kasan_report+0xdc/0x128
[   30.234999]  kasan_check_range+0x100/0x1a8
[   30.235487]  __kasan_check_write+0x20/0x30
[   30.235921]  kasan_atomics_helper+0x11f8/0x4858
[   30.236092]  kasan_atomics+0x198/0x2e0
[   30.236634]  kunit_try_run_case+0x170/0x3f0
[   30.237069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.237213]  kthread+0x328/0x630
[   30.237643]  ret_from_fork+0x10/0x20
[   30.237947] 
[   30.238001] Allocated by task 265:
[   30.238171]  kasan_save_stack+0x3c/0x68
[   30.238481]  kasan_save_track+0x20/0x40
[   30.239039]  kasan_save_alloc_info+0x40/0x58
[   30.239556]  __kasan_kmalloc+0xd4/0xd8
[   30.239667]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.240409]  kasan_atomics+0xb8/0x2e0
[   30.240715]  kunit_try_run_case+0x170/0x3f0
[   30.240816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.241035]  kthread+0x328/0x630
[   30.241234]  ret_from_fork+0x10/0x20
[   30.241438] 
[   30.241760] The buggy address belongs to the object at fff00000c7751400
[   30.241760]  which belongs to the cache kmalloc-64 of size 64
[   30.241932] The buggy address is located 0 bytes to the right of
[   30.241932]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.242103] 
[   30.242861] The buggy address belongs to the physical page:
[   30.243040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.243292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.243421] page_type: f5(slab)
[   30.243522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.243698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.244903] page dumped because: kasan: bad access detected
[   30.245125] 
[   30.245403] Memory state around the buggy address:
[   30.245812]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.245952]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.246064] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.246159]                                      ^
[   30.246249]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.247174]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.247789] ==================================================================
[   30.375642] ==================================================================
[   30.375755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   30.375912] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.376033] 
[   30.376130] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.376352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.376431] Hardware name: linux,dummy-virt (DT)
[   30.376618] Call trace:
[   30.376743]  show_stack+0x20/0x38 (C)
[   30.376968]  dump_stack_lvl+0x8c/0xd0
[   30.377129]  print_report+0x118/0x608
[   30.377257]  kasan_report+0xdc/0x128
[   30.377402]  __asan_report_load8_noabort+0x20/0x30
[   30.377787]  kasan_atomics_helper+0x3db0/0x4858
[   30.377952]  kasan_atomics+0x198/0x2e0
[   30.378114]  kunit_try_run_case+0x170/0x3f0
[   30.378301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.378538]  kthread+0x328/0x630
[   30.378826]  ret_from_fork+0x10/0x20
[   30.378999] 
[   30.379142] Allocated by task 265:
[   30.379317]  kasan_save_stack+0x3c/0x68
[   30.379420]  kasan_save_track+0x20/0x40
[   30.379680]  kasan_save_alloc_info+0x40/0x58
[   30.379801]  __kasan_kmalloc+0xd4/0xd8
[   30.379918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.380022]  kasan_atomics+0xb8/0x2e0
[   30.380181]  kunit_try_run_case+0x170/0x3f0
[   30.380305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.381128]  kthread+0x328/0x630
[   30.381260]  ret_from_fork+0x10/0x20
[   30.381390] 
[   30.381570] The buggy address belongs to the object at fff00000c7751400
[   30.381570]  which belongs to the cache kmalloc-64 of size 64
[   30.381718] The buggy address is located 0 bytes to the right of
[   30.381718]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.381893] 
[   30.381951] The buggy address belongs to the physical page:
[   30.382032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.382158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.382273] page_type: f5(slab)
[   30.382368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.382499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.382641] page dumped because: kasan: bad access detected
[   30.382720] 
[   30.382778] Memory state around the buggy address:
[   30.382891]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.383064]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.383179] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.383500]                                      ^
[   30.383608]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.383752]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.383873] ==================================================================
[   30.416245] ==================================================================
[   30.416435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   30.416581] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.416708] 
[   30.416791] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.417012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.417145] Hardware name: linux,dummy-virt (DT)
[   30.417246] Call trace:
[   30.417318]  show_stack+0x20/0x38 (C)
[   30.417714]  dump_stack_lvl+0x8c/0xd0
[   30.417919]  print_report+0x118/0x608
[   30.418063]  kasan_report+0xdc/0x128
[   30.418403]  kasan_check_range+0x100/0x1a8
[   30.418568]  __kasan_check_write+0x20/0x30
[   30.418696]  kasan_atomics_helper+0x16d0/0x4858
[   30.418884]  kasan_atomics+0x198/0x2e0
[   30.419132]  kunit_try_run_case+0x170/0x3f0
[   30.419315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.419469]  kthread+0x328/0x630
[   30.419805]  ret_from_fork+0x10/0x20
[   30.419983] 
[   30.420043] Allocated by task 265:
[   30.420126]  kasan_save_stack+0x3c/0x68
[   30.420248]  kasan_save_track+0x20/0x40
[   30.420406]  kasan_save_alloc_info+0x40/0x58
[   30.420535]  __kasan_kmalloc+0xd4/0xd8
[   30.420648]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.420802]  kasan_atomics+0xb8/0x2e0
[   30.420984]  kunit_try_run_case+0x170/0x3f0
[   30.421167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.421274]  kthread+0x328/0x630
[   30.421324]  ret_from_fork+0x10/0x20
[   30.421371] 
[   30.421415] The buggy address belongs to the object at fff00000c7751400
[   30.421415]  which belongs to the cache kmalloc-64 of size 64
[   30.421683] The buggy address is located 0 bytes to the right of
[   30.421683]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.421888] 
[   30.421950] The buggy address belongs to the physical page:
[   30.422029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.422200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.422324] page_type: f5(slab)
[   30.422516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.422857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.423025] page dumped because: kasan: bad access detected
[   30.423245] 
[   30.423300] Memory state around the buggy address:
[   30.423381]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.423541]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.423684] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.423906]                                      ^
[   30.424019]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.424151]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.424262] ==================================================================
[   29.987897] ==================================================================
[   29.989851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.989964] Read of size 4 at addr fff00000c7751430 by task kunit_try_catch/265
[   29.990034] 
[   29.990114] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.990331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.990414] Hardware name: linux,dummy-virt (DT)
[   29.990503] Call trace:
[   29.990612]  show_stack+0x20/0x38 (C)
[   29.990930]  dump_stack_lvl+0x8c/0xd0
[   29.991152]  print_report+0x118/0x608
[   29.991339]  kasan_report+0xdc/0x128
[   29.991680]  __asan_report_load4_noabort+0x20/0x30
[   29.991941]  kasan_atomics_helper+0x3dd8/0x4858
[   29.992074]  kasan_atomics+0x198/0x2e0
[   29.992135]  kunit_try_run_case+0x170/0x3f0
[   29.992203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.992274]  kthread+0x328/0x630
[   29.992332]  ret_from_fork+0x10/0x20
[   29.992395] 
[   29.992422] Allocated by task 265:
[   29.992461]  kasan_save_stack+0x3c/0x68
[   29.992516]  kasan_save_track+0x20/0x40
[   29.992566]  kasan_save_alloc_info+0x40/0x58
[   29.992618]  __kasan_kmalloc+0xd4/0xd8
[   29.992666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.992719]  kasan_atomics+0xb8/0x2e0
[   29.992766]  kunit_try_run_case+0x170/0x3f0
[   29.992816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.992940]  kthread+0x328/0x630
[   29.993028]  ret_from_fork+0x10/0x20
[   29.993163] 
[   29.993323] The buggy address belongs to the object at fff00000c7751400
[   29.993323]  which belongs to the cache kmalloc-64 of size 64
[   29.993474] The buggy address is located 0 bytes to the right of
[   29.993474]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.993633] 
[   29.993726] The buggy address belongs to the physical page:
[   29.993959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   29.994095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.994227] page_type: f5(slab)
[   29.994447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.994794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.994954] page dumped because: kasan: bad access detected
[   29.995556] 
[   29.995715] Memory state around the buggy address:
[   29.996243]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.996433]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.996601] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.996828]                                      ^
[   29.997335]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.997530]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.997732] ==================================================================
[   30.425606] ==================================================================
[   30.425718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   30.425831] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.425976] 
[   30.426059] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.426562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.426649] Hardware name: linux,dummy-virt (DT)
[   30.426748] Call trace:
[   30.426804]  show_stack+0x20/0x38 (C)
[   30.427188]  dump_stack_lvl+0x8c/0xd0
[   30.427384]  print_report+0x118/0x608
[   30.428039]  kasan_report+0xdc/0x128
[   30.428177]  __asan_report_load8_noabort+0x20/0x30
[   30.428431]  kasan_atomics_helper+0x3e10/0x4858
[   30.428884]  kasan_atomics+0x198/0x2e0
[   30.429152]  kunit_try_run_case+0x170/0x3f0
[   30.429357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.429644]  kthread+0x328/0x630
[   30.429996]  ret_from_fork+0x10/0x20
[   30.430128] 
[   30.430176] Allocated by task 265:
[   30.430249]  kasan_save_stack+0x3c/0x68
[   30.430346]  kasan_save_track+0x20/0x40
[   30.430453]  kasan_save_alloc_info+0x40/0x58
[   30.430557]  __kasan_kmalloc+0xd4/0xd8
[   30.430773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.430961]  kasan_atomics+0xb8/0x2e0
[   30.431081]  kunit_try_run_case+0x170/0x3f0
[   30.431198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.431803]  kthread+0x328/0x630
[   30.431950]  ret_from_fork+0x10/0x20
[   30.432062] 
[   30.432124] The buggy address belongs to the object at fff00000c7751400
[   30.432124]  which belongs to the cache kmalloc-64 of size 64
[   30.432768] The buggy address is located 0 bytes to the right of
[   30.432768]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.433209] 
[   30.433338] The buggy address belongs to the physical page:
[   30.433418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.433553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.433678] page_type: f5(slab)
[   30.434235] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.434520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.434631] page dumped because: kasan: bad access detected
[   30.434721] 
[   30.434849] Memory state around the buggy address:
[   30.435034]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.435153]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.435268] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.435369]                                      ^
[   30.435466]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.437145]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.437261] ==================================================================
[   29.822339] ==================================================================
[   29.822447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.822571] Read of size 4 at addr fff00000c7751430 by task kunit_try_catch/265
[   29.822706] 
[   29.822778] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.823601]  print_report+0x118/0x608
[   29.828168]  kasan_save_alloc_info+0x40/0x58
[   29.828285]  __kasan_kmalloc+0xd4/0xd8
[   29.829831] The buggy address is located 0 bytes to the right of
[   29.829831]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.830919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.832918]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.838131] Call trace:
[   29.838189]  show_stack+0x20/0x38 (C)
[   29.838309]  dump_stack_lvl+0x8c/0xd0
[   29.838441]  print_report+0x118/0x608
[   29.838561]  kasan_report+0xdc/0x128
[   29.838681]  kasan_check_range+0x100/0x1a8
[   29.838820]  __kasan_check_write+0x20/0x30
[   29.841071]  kasan_atomics_helper+0x934/0x4858
[   29.841203]  kasan_atomics+0x198/0x2e0
[   29.841385]  kunit_try_run_case+0x170/0x3f0
[   29.841523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.841661]  kthread+0x328/0x630
[   29.841769]  ret_from_fork+0x10/0x20
[   29.842340] 
[   29.842415] Allocated by task 265:
[   29.842883]  kasan_save_stack+0x3c/0x68
[   29.843011]  kasan_save_track+0x20/0x40
[   29.843423]  kasan_save_alloc_info+0x40/0x58
[   29.843827]  __kasan_kmalloc+0xd4/0xd8
[   29.843963]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.844072]  kasan_atomics+0xb8/0x2e0
[   29.844166]  kunit_try_run_case+0x170/0x3f0
[   29.844264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.844380]  kthread+0x328/0x630
[   29.845304]  ret_from_fork+0x10/0x20
[   29.845418] 
[   29.845536] The buggy address belongs to the object at fff00000c7751400
[   29.845536]  which belongs to the cache kmalloc-64 of size 64
[   29.845674] The buggy address is located 0 bytes to the right of
[   29.845674]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.845850] 
[   29.846024] The buggy address belongs to the physical page:
[   29.846511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   29.846696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.846825] page_type: f5(slab)
[   29.846955] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.847102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.847210] page dumped because: kasan: bad access detected
[   29.847292] 
[   29.847346] Memory state around the buggy address:
[   29.848707]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.849154]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.849301] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.849410]                                      ^
[   29.849508]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.849730]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.849989] ==================================================================
[   30.473031] ==================================================================
[   30.473789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   30.474270] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.474451] 
[   30.474529] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.475104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.475191] Hardware name: linux,dummy-virt (DT)
[   30.475270] Call trace:
[   30.475329]  show_stack+0x20/0x38 (C)
[   30.475457]  dump_stack_lvl+0x8c/0xd0
[   30.475577]  print_report+0x118/0x608
[   30.475699]  kasan_report+0xdc/0x128
[   30.475868]  kasan_check_range+0x100/0x1a8
[   30.476428]  __kasan_check_write+0x20/0x30
[   30.476722]  kasan_atomics_helper+0x17ec/0x4858
[   30.476873]  kasan_atomics+0x198/0x2e0
[   30.477025]  kunit_try_run_case+0x170/0x3f0
[   30.477186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.477547]  kthread+0x328/0x630
[   30.477665]  ret_from_fork+0x10/0x20
[   30.477964] 
[   30.478032] Allocated by task 265:
[   30.478103]  kasan_save_stack+0x3c/0x68
[   30.478281]  kasan_save_track+0x20/0x40
[   30.478394]  kasan_save_alloc_info+0x40/0x58
[   30.478706]  __kasan_kmalloc+0xd4/0xd8
[   30.479677]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.480007]  kasan_atomics+0xb8/0x2e0
[   30.480275]  kunit_try_run_case+0x170/0x3f0
[   30.480463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.480770]  kthread+0x328/0x630
[   30.480881]  ret_from_fork+0x10/0x20
[   30.480980] 
[   30.481035] The buggy address belongs to the object at fff00000c7751400
[   30.481035]  which belongs to the cache kmalloc-64 of size 64
[   30.481186] The buggy address is located 0 bytes to the right of
[   30.481186]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.481719] 
[   30.481917] The buggy address belongs to the physical page:
[   30.482038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.482194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.482370] page_type: f5(slab)
[   30.482734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.483075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.483184] page dumped because: kasan: bad access detected
[   30.483266] 
[   30.483317] Memory state around the buggy address:
[   30.483471]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.483587]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.483700] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.483852]                                      ^
[   30.483952]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.484080]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.484466] ==================================================================
[   30.120555] ==================================================================
[   30.120668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   30.120798] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.121365] 
[   30.121472] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.121890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.122002] Hardware name: linux,dummy-virt (DT)
[   30.123742] Call trace:
[   30.123850]  show_stack+0x20/0x38 (C)
[   30.124201]  dump_stack_lvl+0x8c/0xd0
[   30.124793]  print_report+0x118/0x608
[   30.125301]  kasan_report+0xdc/0x128
[   30.125637]  kasan_check_range+0x100/0x1a8
[   30.126014]  __kasan_check_write+0x20/0x30
[   30.126650]  kasan_atomics_helper+0xf88/0x4858
[   30.128168]  kasan_atomics+0x198/0x2e0
[   30.128347]  kunit_try_run_case+0x170/0x3f0
[   30.129122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.129666]  kthread+0x328/0x630
[   30.129863]  ret_from_fork+0x10/0x20
[   30.130195] 
[   30.131070] Allocated by task 265:
[   30.131213]  kasan_save_stack+0x3c/0x68
[   30.131368]  kasan_save_track+0x20/0x40
[   30.132086]  kasan_save_alloc_info+0x40/0x58
[   30.132277]  __kasan_kmalloc+0xd4/0xd8
[   30.132933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.133439]  kasan_atomics+0xb8/0x2e0
[   30.134052]  kunit_try_run_case+0x170/0x3f0
[   30.134237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.134361]  kthread+0x328/0x630
[   30.134459]  ret_from_fork+0x10/0x20
[   30.135069] 
[   30.135128] The buggy address belongs to the object at fff00000c7751400
[   30.135128]  which belongs to the cache kmalloc-64 of size 64
[   30.135535] The buggy address is located 0 bytes to the right of
[   30.135535]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.135722] 
[   30.135833] The buggy address belongs to the physical page:
[   30.136590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.136760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.136915] page_type: f5(slab)
[   30.137027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.137172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.137278] page dumped because: kasan: bad access detected
[   30.137360] 
[   30.137412] Memory state around the buggy address:
[   30.137492]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.137605]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.137716] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.137807]                                      ^
[   30.139327]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.139528]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.139870] ==================================================================
[   30.275175] ==================================================================
[   30.275280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   30.275498] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.275633] 
[   30.275704] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.275932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.276005] Hardware name: linux,dummy-virt (DT)
[   30.276079] Call trace:
[   30.276136]  show_stack+0x20/0x38 (C)
[   30.276273]  dump_stack_lvl+0x8c/0xd0
[   30.276477]  print_report+0x118/0x608
[   30.276679]  kasan_report+0xdc/0x128
[   30.277035]  kasan_check_range+0x100/0x1a8
[   30.277285]  __kasan_check_write+0x20/0x30
[   30.277414]  kasan_atomics_helper+0x1384/0x4858
[   30.277738]  kasan_atomics+0x198/0x2e0
[   30.277958]  kunit_try_run_case+0x170/0x3f0
[   30.278459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.279034]  kthread+0x328/0x630
[   30.279480]  ret_from_fork+0x10/0x20
[   30.279806] 
[   30.280166] Allocated by task 265:
[   30.280248]  kasan_save_stack+0x3c/0x68
[   30.280350]  kasan_save_track+0x20/0x40
[   30.280449]  kasan_save_alloc_info+0x40/0x58
[   30.281003]  __kasan_kmalloc+0xd4/0xd8
[   30.281949]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.282070]  kasan_atomics+0xb8/0x2e0
[   30.282183]  kunit_try_run_case+0x170/0x3f0
[   30.282858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.283068]  kthread+0x328/0x630
[   30.283174]  ret_from_fork+0x10/0x20
[   30.284893] 
[   30.284970] The buggy address belongs to the object at fff00000c7751400
[   30.284970]  which belongs to the cache kmalloc-64 of size 64
[   30.285130] The buggy address is located 0 bytes to the right of
[   30.285130]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.285305] 
[   30.285375] The buggy address belongs to the physical page:
[   30.285466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.285626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.285777] page_type: f5(slab)
[   30.285965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.286318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.286463] page dumped because: kasan: bad access detected
[   30.286544] 
[   30.286595] Memory state around the buggy address:
[   30.286720]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.286992]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.287104] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.287206]                                      ^
[   30.287293]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.287448]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.287731] ==================================================================
[   30.076964] ==================================================================
[   30.077086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   30.077204] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.077326] 
[   30.077406] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.077602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.077676] Hardware name: linux,dummy-virt (DT)
[   30.078200] Call trace:
[   30.078475]  show_stack+0x20/0x38 (C)
[   30.078762]  dump_stack_lvl+0x8c/0xd0
[   30.078958]  print_report+0x118/0x608
[   30.079237]  kasan_report+0xdc/0x128
[   30.079413]  __asan_report_store8_noabort+0x20/0x30
[   30.079705]  kasan_atomics_helper+0x3e5c/0x4858
[   30.080065]  kasan_atomics+0x198/0x2e0
[   30.080191]  kunit_try_run_case+0x170/0x3f0
[   30.080313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.080447]  kthread+0x328/0x630
[   30.080553]  ret_from_fork+0x10/0x20
[   30.080674] 
[   30.080720] Allocated by task 265:
[   30.080793]  kasan_save_stack+0x3c/0x68
[   30.080919]  kasan_save_track+0x20/0x40
[   30.081484]  kasan_save_alloc_info+0x40/0x58
[   30.082170]  __kasan_kmalloc+0xd4/0xd8
[   30.082529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.082787]  kasan_atomics+0xb8/0x2e0
[   30.082957]  kunit_try_run_case+0x170/0x3f0
[   30.083061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.083176]  kthread+0x328/0x630
[   30.083258]  ret_from_fork+0x10/0x20
[   30.083347] 
[   30.083401] The buggy address belongs to the object at fff00000c7751400
[   30.083401]  which belongs to the cache kmalloc-64 of size 64
[   30.083537] The buggy address is located 0 bytes to the right of
[   30.083537]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.083688] 
[   30.083742] The buggy address belongs to the physical page:
[   30.083858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.083997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.084132] page_type: f5(slab)
[   30.084779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.085517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.085665] page dumped because: kasan: bad access detected
[   30.086039] 
[   30.086121] Memory state around the buggy address:
[   30.086399]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.086514]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.086623] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.086717]                                      ^
[   30.086805]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.086946]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.087043] ==================================================================
[   30.249004] ==================================================================
[   30.249237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   30.250058] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.250219] 
[   30.250351] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.250574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.250647] Hardware name: linux,dummy-virt (DT)
[   30.250722] Call trace:
[   30.250783]  show_stack+0x20/0x38 (C)
[   30.250929]  dump_stack_lvl+0x8c/0xd0
[   30.251058]  print_report+0x118/0x608
[   30.251182]  kasan_report+0xdc/0x128
[   30.251298]  kasan_check_range+0x100/0x1a8
[   30.252801]  __kasan_check_write+0x20/0x30
[   30.253083]  kasan_atomics_helper+0x126c/0x4858
[   30.254067]  kasan_atomics+0x198/0x2e0
[   30.254443]  kunit_try_run_case+0x170/0x3f0
[   30.254723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.255218]  kthread+0x328/0x630
[   30.255870]  ret_from_fork+0x10/0x20
[   30.256089] 
[   30.256754] Allocated by task 265:
[   30.257069]  kasan_save_stack+0x3c/0x68
[   30.257247]  kasan_save_track+0x20/0x40
[   30.257362]  kasan_save_alloc_info+0x40/0x58
[   30.257469]  __kasan_kmalloc+0xd4/0xd8
[   30.257799]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.258754]  kasan_atomics+0xb8/0x2e0
[   30.258975]  kunit_try_run_case+0x170/0x3f0
[   30.259094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.259222]  kthread+0x328/0x630
[   30.259311]  ret_from_fork+0x10/0x20
[   30.259405] 
[   30.259462] The buggy address belongs to the object at fff00000c7751400
[   30.259462]  which belongs to the cache kmalloc-64 of size 64
[   30.260776] The buggy address is located 0 bytes to the right of
[   30.260776]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.261949] 
[   30.262136] The buggy address belongs to the physical page:
[   30.262221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.262357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.262470] page_type: f5(slab)
[   30.262568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.263102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.263331] page dumped because: kasan: bad access detected
[   30.263425] 
[   30.263487] Memory state around the buggy address:
[   30.264036]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.264438]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.264620] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.264772]                                      ^
[   30.264885]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.264997]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.265098] ==================================================================
[   30.401498] ==================================================================
[   30.401614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   30.401856] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.402207] 
[   30.402647] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.403104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.403182] Hardware name: linux,dummy-virt (DT)
[   30.403259] Call trace:
[   30.403317]  show_stack+0x20/0x38 (C)
[   30.405367]  dump_stack_lvl+0x8c/0xd0
[   30.406459]  print_report+0x118/0x608
[   30.406601]  kasan_report+0xdc/0x128
[   30.406741]  __asan_report_load8_noabort+0x20/0x30
[   30.406900]  kasan_atomics_helper+0x3df4/0x4858
[   30.407041]  kasan_atomics+0x198/0x2e0
[   30.407168]  kunit_try_run_case+0x170/0x3f0
[   30.407297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.407437]  kthread+0x328/0x630
[   30.407554]  ret_from_fork+0x10/0x20
[   30.407696] 
[   30.407750] Allocated by task 265:
[   30.407851]  kasan_save_stack+0x3c/0x68
[   30.408147]  kasan_save_track+0x20/0x40
[   30.408254]  kasan_save_alloc_info+0x40/0x58
[   30.408364]  __kasan_kmalloc+0xd4/0xd8
[   30.408459]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.408570]  kasan_atomics+0xb8/0x2e0
[   30.409408]  kunit_try_run_case+0x170/0x3f0
[   30.409703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.410095]  kthread+0x328/0x630
[   30.410194]  ret_from_fork+0x10/0x20
[   30.410778] 
[   30.411190] The buggy address belongs to the object at fff00000c7751400
[   30.411190]  which belongs to the cache kmalloc-64 of size 64
[   30.411549] The buggy address is located 0 bytes to the right of
[   30.411549]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.411900] 
[   30.412501] The buggy address belongs to the physical page:
[   30.412605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.412767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.413201] page_type: f5(slab)
[   30.413522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.413731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.413873] page dumped because: kasan: bad access detected
[   30.413994] 
[   30.414057] Memory state around the buggy address:
[   30.414153]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.414316]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.414429] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.414854]                                      ^
[   30.414958]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.415080]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.415187] ==================================================================
[   30.329015] ==================================================================
[   30.329162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   30.329297] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.329617] 
[   30.329714] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.329950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.330051] Hardware name: linux,dummy-virt (DT)
[   30.330174] Call trace:
[   30.330658]  show_stack+0x20/0x38 (C)
[   30.331285]  dump_stack_lvl+0x8c/0xd0
[   30.331809]  print_report+0x118/0x608
[   30.332006]  kasan_report+0xdc/0x128
[   30.332150]  kasan_check_range+0x100/0x1a8
[   30.332276]  __kasan_check_write+0x20/0x30
[   30.333418]  kasan_atomics_helper+0x14e4/0x4858
[   30.333780]  kasan_atomics+0x198/0x2e0
[   30.333939]  kunit_try_run_case+0x170/0x3f0
[   30.334072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.334221]  kthread+0x328/0x630
[   30.334337]  ret_from_fork+0x10/0x20
[   30.334456] 
[   30.335134] Allocated by task 265:
[   30.335231]  kasan_save_stack+0x3c/0x68
[   30.335341]  kasan_save_track+0x20/0x40
[   30.335438]  kasan_save_alloc_info+0x40/0x58
[   30.335545]  __kasan_kmalloc+0xd4/0xd8
[   30.335968]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.336108]  kasan_atomics+0xb8/0x2e0
[   30.336235]  kunit_try_run_case+0x170/0x3f0
[   30.336451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.336588]  kthread+0x328/0x630
[   30.336770]  ret_from_fork+0x10/0x20
[   30.336887] 
[   30.336944] The buggy address belongs to the object at fff00000c7751400
[   30.336944]  which belongs to the cache kmalloc-64 of size 64
[   30.337150] The buggy address is located 0 bytes to the right of
[   30.337150]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.337336] 
[   30.337401] The buggy address belongs to the physical page:
[   30.337510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.337669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.338217] page_type: f5(slab)
[   30.338819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.339119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.339231] page dumped because: kasan: bad access detected
[   30.339347] 
[   30.339398] Memory state around the buggy address:
[   30.339476]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.339756]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.339944] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.340093]                                      ^
[   30.340225]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340515]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340651] ==================================================================
[   30.029807] ==================================================================
[   30.030586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   30.030732] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.030884] 
[   30.031138] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.031344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.031416] Hardware name: linux,dummy-virt (DT)
[   30.031491] Call trace:
[   30.031552]  show_stack+0x20/0x38 (C)
[   30.031675]  dump_stack_lvl+0x8c/0xd0
[   30.031807]  print_report+0x118/0x608
[   30.031947]  kasan_report+0xdc/0x128
[   30.032066]  kasan_check_range+0x100/0x1a8
[   30.032186]  __kasan_check_read+0x20/0x30
[   30.032301]  kasan_atomics_helper+0xdd4/0x4858
[   30.032420]  kasan_atomics+0x198/0x2e0
[   30.032539]  kunit_try_run_case+0x170/0x3f0
[   30.032672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.032949]  kthread+0x328/0x630
[   30.033151]  ret_from_fork+0x10/0x20
[   30.033329] 
[   30.033394] Allocated by task 265:
[   30.033483]  kasan_save_stack+0x3c/0x68
[   30.033598]  kasan_save_track+0x20/0x40
[   30.033719]  kasan_save_alloc_info+0x40/0x58
[   30.033853]  __kasan_kmalloc+0xd4/0xd8
[   30.034067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.034258]  kasan_atomics+0xb8/0x2e0
[   30.034635]  kunit_try_run_case+0x170/0x3f0
[   30.034770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.034904]  kthread+0x328/0x630
[   30.034995]  ret_from_fork+0x10/0x20
[   30.035087] 
[   30.035139] The buggy address belongs to the object at fff00000c7751400
[   30.035139]  which belongs to the cache kmalloc-64 of size 64
[   30.035282] The buggy address is located 0 bytes to the right of
[   30.035282]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.035443] 
[   30.035759] The buggy address belongs to the physical page:
[   30.036949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.039852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.040346] page_type: f5(slab)
[   30.040473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.040608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.040730] page dumped because: kasan: bad access detected
[   30.041903] 
[   30.041965] Memory state around the buggy address:
[   30.042055]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.043884]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.044868] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.045155]                                      ^
[   30.045260]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.045376]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.045490] ==================================================================
[   30.174401] ==================================================================
[   30.174514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   30.174636] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.174759] 
[   30.175111] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.176103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.176205] Hardware name: linux,dummy-virt (DT)
[   30.176303] Call trace:
[   30.176692]  show_stack+0x20/0x38 (C)
[   30.177309]  dump_stack_lvl+0x8c/0xd0
[   30.177446]  print_report+0x118/0x608
[   30.177810]  kasan_report+0xdc/0x128
[   30.178402]  kasan_check_range+0x100/0x1a8
[   30.178537]  __kasan_check_write+0x20/0x30
[   30.179016]  kasan_atomics_helper+0x10c0/0x4858
[   30.179536]  kasan_atomics+0x198/0x2e0
[   30.180088]  kunit_try_run_case+0x170/0x3f0
[   30.180260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.180802]  kthread+0x328/0x630
[   30.180959]  ret_from_fork+0x10/0x20
[   30.181725] 
[   30.181849] Allocated by task 265:
[   30.181934]  kasan_save_stack+0x3c/0x68
[   30.182420]  kasan_save_track+0x20/0x40
[   30.182544]  kasan_save_alloc_info+0x40/0x58
[   30.183142]  __kasan_kmalloc+0xd4/0xd8
[   30.183573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.183816]  kasan_atomics+0xb8/0x2e0
[   30.184590]  kunit_try_run_case+0x170/0x3f0
[   30.184733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.185157]  kthread+0x328/0x630
[   30.185349]  ret_from_fork+0x10/0x20
[   30.185448] 
[   30.186169] The buggy address belongs to the object at fff00000c7751400
[   30.186169]  which belongs to the cache kmalloc-64 of size 64
[   30.186372] The buggy address is located 0 bytes to the right of
[   30.186372]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.187000] 
[   30.187067] The buggy address belongs to the physical page:
[   30.187461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.187720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.188092] page_type: f5(slab)
[   30.188225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.188356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.188459] page dumped because: kasan: bad access detected
[   30.188541] 
[   30.188586] Memory state around the buggy address:
[   30.189163]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.189365]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.189563] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.190096]                                      ^
[   30.190562]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.190765]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.191181] ==================================================================
[   30.088149] ==================================================================
[   30.088265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   30.088858] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.089238] 
[   30.089331] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.089530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.089600] Hardware name: linux,dummy-virt (DT)
[   30.089679] Call trace:
[   30.089744]  show_stack+0x20/0x38 (C)
[   30.089887]  dump_stack_lvl+0x8c/0xd0
[   30.090087]  print_report+0x118/0x608
[   30.090228]  kasan_report+0xdc/0x128
[   30.090351]  kasan_check_range+0x100/0x1a8
[   30.090473]  __kasan_check_write+0x20/0x30
[   30.090595]  kasan_atomics_helper+0xeb8/0x4858
[   30.090721]  kasan_atomics+0x198/0x2e0
[   30.090860]  kunit_try_run_case+0x170/0x3f0
[   30.092171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.092349]  kthread+0x328/0x630
[   30.093256]  ret_from_fork+0x10/0x20
[   30.093421] 
[   30.093479] Allocated by task 265:
[   30.093566]  kasan_save_stack+0x3c/0x68
[   30.093679]  kasan_save_track+0x20/0x40
[   30.093793]  kasan_save_alloc_info+0x40/0x58
[   30.093946]  __kasan_kmalloc+0xd4/0xd8
[   30.094282]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.094402]  kasan_atomics+0xb8/0x2e0
[   30.094495]  kunit_try_run_case+0x170/0x3f0
[   30.094601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.094715]  kthread+0x328/0x630
[   30.094805]  ret_from_fork+0x10/0x20
[   30.094925] 
[   30.094978] The buggy address belongs to the object at fff00000c7751400
[   30.094978]  which belongs to the cache kmalloc-64 of size 64
[   30.095113] The buggy address is located 0 bytes to the right of
[   30.095113]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.095279] 
[   30.095338] The buggy address belongs to the physical page:
[   30.095424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.095553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.095687] page_type: f5(slab)
[   30.095809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.096416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.096530] page dumped because: kasan: bad access detected
[   30.096613] 
[   30.096658] Memory state around the buggy address:
[   30.096746]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.097758]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.098501] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.098604]                                      ^
[   30.099792]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.099939]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.100042] ==================================================================
[   29.863111] ==================================================================
[   29.863308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   29.863536] Write of size 4 at addr fff00000c7751430 by task kunit_try_catch/265
[   29.863724] 
[   29.863817] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.864667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.864770] Hardware name: linux,dummy-virt (DT)
[   29.864871] Call trace:
[   29.864952]  show_stack+0x20/0x38 (C)
[   29.865132]  dump_stack_lvl+0x8c/0xd0
[   29.865314]  print_report+0x118/0x608
[   29.866221]  kasan_report+0xdc/0x128
[   29.866375]  kasan_check_range+0x100/0x1a8
[   29.867045]  __kasan_check_write+0x20/0x30
[   29.869241]  ret_from_fork+0x10/0x20
[   29.869375] 
[   29.869431] Allocated by task 265:
[   29.869513]  kasan_save_stack+0x3c/0x68
[   29.870160]  kasan_save_track+0x20/0x40
[   29.870278]  kasan_save_alloc_info+0x40/0x58
[   29.870383]  __kasan_kmalloc+0xd4/0xd8
[   29.870664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.871159]  kasan_atomics+0xb8/0x2e0
[   29.871290]  kunit_try_run_case+0x170/0x3f0
[   29.871408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.871608]  kthread+0x328/0x630
[   29.872087]  ret_from_fork+0x10/0x20
[   29.872593] 
[   29.872647] The buggy address belongs to the object at fff00000c7751400
[   29.872647]  which belongs to the cache kmalloc-64 of size 64
[   29.872935] The buggy address is located 0 bytes to the right of
[   29.872935]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.873144] 
[   29.873198] The buggy address belongs to the physical page:
[   29.873279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   29.873407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.873529] page_type: f5(slab)
[   29.873653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.874412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.874576] page dumped because: kasan: bad access detected
[   29.874701] 
[   29.874759] Memory state around the buggy address:
[   29.874861]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.875151]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.875295] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.875404]                                      ^
[   29.875926]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.876047]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.876154] ==================================================================
[   30.062125] ==================================================================
[   30.062230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   30.063280] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.063430] 
[   30.063521] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.063737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.063809] Hardware name: linux,dummy-virt (DT)
[   30.063893] Call trace:
[   30.064564]  show_stack+0x20/0x38 (C)
[   30.064740]  dump_stack_lvl+0x8c/0xd0
[   30.064888]  print_report+0x118/0x608
[   30.065020]  kasan_report+0xdc/0x128
[   30.065325]  kasan_check_range+0x100/0x1a8
[   30.065521]  __kasan_check_write+0x20/0x30
[   30.065653]  kasan_atomics_helper+0xe44/0x4858
[   30.065787]  kasan_atomics+0x198/0x2e0
[   30.066187]  kunit_try_run_case+0x170/0x3f0
[   30.066676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.066892]  kthread+0x328/0x630
[   30.067034]  ret_from_fork+0x10/0x20
[   30.068582] 
[   30.068641] Allocated by task 265:
[   30.068709]  kasan_save_stack+0x3c/0x68
[   30.068832]  kasan_save_track+0x20/0x40
[   30.069048]  kasan_save_alloc_info+0x40/0x58
[   30.069175]  __kasan_kmalloc+0xd4/0xd8
[   30.069278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.070595]  kasan_atomics+0xb8/0x2e0
[   30.070932]  kunit_try_run_case+0x170/0x3f0
[   30.071188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.071982]  kthread+0x328/0x630
[   30.072100]  ret_from_fork+0x10/0x20
[   30.072211] 
[   30.072261] The buggy address belongs to the object at fff00000c7751400
[   30.072261]  which belongs to the cache kmalloc-64 of size 64
[   30.072404] The buggy address is located 0 bytes to the right of
[   30.072404]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.072609] 
[   30.072691] The buggy address belongs to the physical page:
[   30.072780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.072961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.073157] page_type: f5(slab)
[   30.073273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.073627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.073738] page dumped because: kasan: bad access detected
[   30.073896] 
[   30.073955] Memory state around the buggy address:
[   30.074049]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.074179]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.075242] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.075353]                                      ^
[   30.075450]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.075884]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.076074] ==================================================================
[   30.316991] ==================================================================
[   30.317207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   30.317382] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.317777] 
[   30.318063] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.318317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.318623] Hardware name: linux,dummy-virt (DT)
[   30.318858] Call trace:
[   30.319122]  show_stack+0x20/0x38 (C)
[   30.319267]  dump_stack_lvl+0x8c/0xd0
[   30.319418]  print_report+0x118/0x608
[   30.319599]  kasan_report+0xdc/0x128
[   30.320044]  kasan_check_range+0x100/0x1a8
[   30.320310]  __kasan_check_write+0x20/0x30
[   30.320528]  kasan_atomics_helper+0x147c/0x4858
[   30.320815]  kasan_atomics+0x198/0x2e0
[   30.320966]  kunit_try_run_case+0x170/0x3f0
[   30.321404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.321763]  kthread+0x328/0x630
[   30.322141]  ret_from_fork+0x10/0x20
[   30.322292] 
[   30.322347] Allocated by task 265:
[   30.322524]  kasan_save_stack+0x3c/0x68
[   30.322635]  kasan_save_track+0x20/0x40
[   30.322732]  kasan_save_alloc_info+0x40/0x58
[   30.322857]  __kasan_kmalloc+0xd4/0xd8
[   30.323509]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.324014]  kasan_atomics+0xb8/0x2e0
[   30.324295]  kunit_try_run_case+0x170/0x3f0
[   30.324418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.325012]  kthread+0x328/0x630
[   30.325246]  ret_from_fork+0x10/0x20
[   30.325385] 
[   30.325454] The buggy address belongs to the object at fff00000c7751400
[   30.325454]  which belongs to the cache kmalloc-64 of size 64
[   30.325602] The buggy address is located 0 bytes to the right of
[   30.325602]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.325823] 
[   30.325908] The buggy address belongs to the physical page:
[   30.326155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.326298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.326474] page_type: f5(slab)
[   30.326642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.326783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.327073] page dumped because: kasan: bad access detected
[   30.327304] 
[   30.327435] Memory state around the buggy address:
[   30.327576]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.327734]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.327870] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.328067]                                      ^
[   30.328157]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.328262]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.328366] ==================================================================
[   29.879118] ==================================================================
[   29.879273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.879419] Write of size 4 at addr fff00000c7751430 by task kunit_try_catch/265
[   29.879556] 
[   29.880105] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.880762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.881004] Hardware name: linux,dummy-virt (DT)
[   29.881157] Call trace:
[   29.881301]  show_stack+0x20/0x38 (C)
[   29.881451]  dump_stack_lvl+0x8c/0xd0
[   29.881586]  print_report+0x118/0x608
[   29.881725]  kasan_report+0xdc/0x128
[   29.882048]  kasan_check_range+0x100/0x1a8
[   29.882178]  __kasan_check_write+0x20/0x30
[   29.882302]  kasan_atomics_helper+0xa6c/0x4858
[   29.882440]  kasan_atomics+0x198/0x2e0
[   29.882740]  kunit_try_run_case+0x170/0x3f0
[   29.883573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.883807]  kthread+0x328/0x630
[   29.884444]  ret_from_fork+0x10/0x20
[   29.884721] 
[   29.884870] Allocated by task 265:
[   29.885174]  kasan_save_track+0x20/0x40
[   29.885293]  kasan_save_alloc_info+0x40/0x58
[   29.885712]  __kasan_kmalloc+0xd4/0xd8
[   29.885928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.886163]  kasan_atomics+0xb8/0x2e0
[   29.886386]  kunit_try_run_case+0x170/0x3f0
[   29.887591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.888797] The buggy address is located 0 bytes to the right of
[   29.888797]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.893380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.896022]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.898861] Call trace:
[   29.901591]  kasan_save_alloc_info+0x40/0x58
[   29.901871]  __kasan_kmalloc+0xd4/0xd8
[   29.902132]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.902276]  kasan_atomics+0xb8/0x2e0
[   29.902513]  kunit_try_run_case+0x170/0x3f0
[   29.902622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.902782]  kthread+0x328/0x630
[   29.902912]  ret_from_fork+0x10/0x20
[   29.903076] 
[   29.903144] The buggy address belongs to the object at fff00000c7751400
[   29.903144]  which belongs to the cache kmalloc-64 of size 64
[   29.903284] The buggy address is located 0 bytes to the right of
[   29.903284]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.903443] 
[   29.903741] The buggy address belongs to the physical page:
[   29.903866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   29.904001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.904134] page_type: f5(slab)
[   29.904234] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.904503] page dumped because: kasan: bad access detected
[   29.905466]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.908812]  kasan_atomics+0x198/0x2e0
[   29.910210]  __kasan_kmalloc+0xd4/0xd8
[   29.910362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.910490]  kasan_atomics+0xb8/0x2e0
[   29.910599]  kunit_try_run_case+0x170/0x3f0
[   29.912985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   29.914906]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.926067]  kasan_save_alloc_info+0x40/0x58
[   29.927418]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.929466] 
[   29.930858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.931789] page dumped because: kasan: bad access detected
[   29.934361] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.935200] Read of size 4 at addr fff00000c7751430 by task kunit_try_catch/265
[   29.936102]  print_report+0x118/0x608
[   29.938443]  ret_from_fork+0x10/0x20
[   29.941263]  kunit_try_run_case+0x170/0x3f0
[   29.941368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.941491]  kthread+0x328/0x630
[   29.942956] The buggy address is located 0 bytes to the right of
[   29.942956]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.943415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.943908] page dumped because: kasan: bad access detected
[   29.944117]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.945482]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.947872] Call trace:
[   29.948290]  kasan_atomics_helper+0xc08/0x4858
[   29.949110]  __kasan_kmalloc+0xd4/0xd8
[   29.952662] 
[   29.952988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.960113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.963905]  kasan_save_stack+0x3c/0x68
[   29.964896]  ret_from_fork+0x10/0x20
[   29.965027] 
[   29.965296] The buggy address is located 0 bytes to the right of
[   29.965296]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.966512] page dumped because: kasan: bad access detected
[   29.967464]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.978639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.982973] 
[   29.983024] The buggy address belongs to the object at fff00000c7751400
[   29.983024]  which belongs to the cache kmalloc-64 of size 64
[   29.983173] The buggy address is located 0 bytes to the right of
[   29.983173]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   29.983353] 
[   29.983420] The buggy address belongs to the physical page:
[   29.983511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   29.983650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.983810] page_type: f5(slab)
[   29.984010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.984159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.984258] page dumped because: kasan: bad access detected
[   29.985091] 
[   29.985162] Memory state around the buggy address:
[   29.985262]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.985394]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.985570] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.985679]                                      ^
[   29.985856]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.986046]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.986156] ==================================================================
[   30.386115] ==================================================================
[   30.386252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   30.386368] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.386494] 
[   30.386611] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.387658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.387717] Hardware name: linux,dummy-virt (DT)
[   30.387757] Call trace:
[   30.387798]  show_stack+0x20/0x38 (C)
[   30.387931]  dump_stack_lvl+0x8c/0xd0
[   30.388172]  print_report+0x118/0x608
[   30.388522]  kasan_report+0xdc/0x128
[   30.388857]  kasan_check_range+0x100/0x1a8
[   30.389352]  __kasan_check_write+0x20/0x30
[   30.389543]  kasan_atomics_helper+0x1644/0x4858
[   30.389682]  kasan_atomics+0x198/0x2e0
[   30.389797]  kunit_try_run_case+0x170/0x3f0
[   30.389945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.390127]  kthread+0x328/0x630
[   30.390275]  ret_from_fork+0x10/0x20
[   30.390396] 
[   30.390446] Allocated by task 265:
[   30.390530]  kasan_save_stack+0x3c/0x68
[   30.390660]  kasan_save_track+0x20/0x40
[   30.390766]  kasan_save_alloc_info+0x40/0x58
[   30.390938]  __kasan_kmalloc+0xd4/0xd8
[   30.391048]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.391172]  kasan_atomics+0xb8/0x2e0
[   30.391290]  kunit_try_run_case+0x170/0x3f0
[   30.391719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.392002]  kthread+0x328/0x630
[   30.392093]  ret_from_fork+0x10/0x20
[   30.392278] 
[   30.392331] The buggy address belongs to the object at fff00000c7751400
[   30.392331]  which belongs to the cache kmalloc-64 of size 64
[   30.392478] The buggy address is located 0 bytes to the right of
[   30.392478]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.393152] 
[   30.393292] The buggy address belongs to the physical page:
[   30.393869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.394200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.395170] page_type: f5(slab)
[   30.395392] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.395524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.395635] page dumped because: kasan: bad access detected
[   30.395721] 
[   30.395774] Memory state around the buggy address:
[   30.396853]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.398108]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.398322] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.398436]                                      ^
[   30.398540]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.398667]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.398895] ==================================================================
[   30.046904] ==================================================================
[   30.047016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   30.047143] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.047267] 
[   30.047352] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.047566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.047642] Hardware name: linux,dummy-virt (DT)
[   30.047719] Call trace:
[   30.047790]  show_stack+0x20/0x38 (C)
[   30.047936]  dump_stack_lvl+0x8c/0xd0
[   30.048060]  print_report+0x118/0x608
[   30.048177]  kasan_report+0xdc/0x128
[   30.048296]  __asan_report_load8_noabort+0x20/0x30
[   30.048428]  kasan_atomics_helper+0x3f58/0x4858
[   30.048592]  kasan_atomics+0x198/0x2e0
[   30.048774]  kunit_try_run_case+0x170/0x3f0
[   30.049275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.051906]  kthread+0x328/0x630
[   30.052621]  ret_from_fork+0x10/0x20
[   30.052767] 
[   30.052815] Allocated by task 265:
[   30.052930]  kasan_save_stack+0x3c/0x68
[   30.053264]  kasan_save_track+0x20/0x40
[   30.053424]  kasan_save_alloc_info+0x40/0x58
[   30.053871]  __kasan_kmalloc+0xd4/0xd8
[   30.054008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.054128]  kasan_atomics+0xb8/0x2e0
[   30.054232]  kunit_try_run_case+0x170/0x3f0
[   30.055150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.055439]  kthread+0x328/0x630
[   30.055580]  ret_from_fork+0x10/0x20
[   30.055877] 
[   30.055939] The buggy address belongs to the object at fff00000c7751400
[   30.055939]  which belongs to the cache kmalloc-64 of size 64
[   30.056082] The buggy address is located 0 bytes to the right of
[   30.056082]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.056246] 
[   30.056342] The buggy address belongs to the physical page:
[   30.057015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.057228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.057417] page_type: f5(slab)
[   30.057532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.057676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.057832] page dumped because: kasan: bad access detected
[   30.057947] 
[   30.058128] Memory state around the buggy address:
[   30.058215]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.058334]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.058449] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.059500]                                      ^
[   30.060501]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.060692]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061154] ==================================================================
[   30.192173] ==================================================================
[   30.192294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   30.192623] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.192917] 
[   30.193133] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.193454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.193633] Hardware name: linux,dummy-virt (DT)
[   30.194363] Call trace:
[   30.194632]  show_stack+0x20/0x38 (C)
[   30.194801]  dump_stack_lvl+0x8c/0xd0
[   30.195640]  print_report+0x118/0x608
[   30.195791]  kasan_report+0xdc/0x128
[   30.195936]  kasan_check_range+0x100/0x1a8
[   30.196076]  __kasan_check_write+0x20/0x30
[   30.196206]  kasan_atomics_helper+0x1128/0x4858
[   30.196548]  kasan_atomics+0x198/0x2e0
[   30.196744]  kunit_try_run_case+0x170/0x3f0
[   30.196904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.197887]  kthread+0x328/0x630
[   30.198410]  ret_from_fork+0x10/0x20
[   30.198876] 
[   30.199271] Allocated by task 265:
[   30.199353]  kasan_save_stack+0x3c/0x68
[   30.199705]  kasan_save_track+0x20/0x40
[   30.199952]  kasan_save_alloc_info+0x40/0x58
[   30.200122]  __kasan_kmalloc+0xd4/0xd8
[   30.200280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.200404]  kasan_atomics+0xb8/0x2e0
[   30.200744]  kunit_try_run_case+0x170/0x3f0
[   30.200873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.202505]  kthread+0x328/0x630
[   30.202648]  ret_from_fork+0x10/0x20
[   30.202766] 
[   30.202822] The buggy address belongs to the object at fff00000c7751400
[   30.202822]  which belongs to the cache kmalloc-64 of size 64
[   30.202988] The buggy address is located 0 bytes to the right of
[   30.202988]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.203150] 
[   30.203208] The buggy address belongs to the physical page:
[   30.203290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.204102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.204324] page_type: f5(slab)
[   30.204445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.204805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.205813] page dumped because: kasan: bad access detected
[   30.205980] 
[   30.206053] Memory state around the buggy address:
[   30.206210]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.206667]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.207079] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.207296]                                      ^
[   30.207393]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.207515]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.207618] ==================================================================
[   30.266116] ==================================================================
[   30.266224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   30.266338] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.266462] 
[   30.266539] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.266738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.266808] Hardware name: linux,dummy-virt (DT)
[   30.266903] Call trace:
[   30.266964]  show_stack+0x20/0x38 (C)
[   30.267084]  dump_stack_lvl+0x8c/0xd0
[   30.267210]  print_report+0x118/0x608
[   30.267358]  kasan_report+0xdc/0x128
[   30.268200]  kasan_check_range+0x100/0x1a8
[   30.268414]  __kasan_check_write+0x20/0x30
[   30.268628]  kasan_atomics_helper+0x12d8/0x4858
[   30.268781]  kasan_atomics+0x198/0x2e0
[   30.268938]  kunit_try_run_case+0x170/0x3f0
[   30.269108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.269353]  kthread+0x328/0x630
[   30.269610]  ret_from_fork+0x10/0x20
[   30.269821] 
[   30.269907] Allocated by task 265:
[   30.270069]  kasan_save_stack+0x3c/0x68
[   30.270218]  kasan_save_track+0x20/0x40
[   30.270399]  kasan_save_alloc_info+0x40/0x58
[   30.270521]  __kasan_kmalloc+0xd4/0xd8
[   30.270644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.270864]  kasan_atomics+0xb8/0x2e0
[   30.271040]  kunit_try_run_case+0x170/0x3f0
[   30.271149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.271269]  kthread+0x328/0x630
[   30.271376]  ret_from_fork+0x10/0x20
[   30.271570] 
[   30.271717] The buggy address belongs to the object at fff00000c7751400
[   30.271717]  which belongs to the cache kmalloc-64 of size 64
[   30.271964] The buggy address is located 0 bytes to the right of
[   30.271964]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.272231] 
[   30.272335] The buggy address belongs to the physical page:
[   30.272416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.272617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.272774] page_type: f5(slab)
[   30.272890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.273068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.273190] page dumped because: kasan: bad access detected
[   30.273326] 
[   30.273410] Memory state around the buggy address:
[   30.273577]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.273735]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.274056] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.274189]                                      ^
[   30.274305]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.274513]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.274681] ==================================================================
[   30.359603] ==================================================================
[   30.359710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   30.359862] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.359998] 
[   30.360092] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.360296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.360361] Hardware name: linux,dummy-virt (DT)
[   30.360445] Call trace:
[   30.360503]  show_stack+0x20/0x38 (C)
[   30.360633]  dump_stack_lvl+0x8c/0xd0
[   30.360751]  print_report+0x118/0x608
[   30.363831]  kasan_report+0xdc/0x128
[   30.363994]  kasan_check_range+0x100/0x1a8
[   30.364134]  __kasan_check_write+0x20/0x30
[   30.364265]  kasan_atomics_helper+0x15b4/0x4858
[   30.364401]  kasan_atomics+0x198/0x2e0
[   30.364529]  kunit_try_run_case+0x170/0x3f0
[   30.364674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.364824]  kthread+0x328/0x630
[   30.364976]  ret_from_fork+0x10/0x20
[   30.365110] 
[   30.365170] Allocated by task 265:
[   30.365250]  kasan_save_stack+0x3c/0x68
[   30.365358]  kasan_save_track+0x20/0x40
[   30.365458]  kasan_save_alloc_info+0x40/0x58
[   30.365564]  __kasan_kmalloc+0xd4/0xd8
[   30.365657]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.365769]  kasan_atomics+0xb8/0x2e0
[   30.368503]  kunit_try_run_case+0x170/0x3f0
[   30.368621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.368745]  kthread+0x328/0x630
[   30.368829]  ret_from_fork+0x10/0x20
[   30.368944] 
[   30.368997] The buggy address belongs to the object at fff00000c7751400
[   30.368997]  which belongs to the cache kmalloc-64 of size 64
[   30.371274] The buggy address is located 0 bytes to the right of
[   30.371274]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.371620] 
[   30.371723] The buggy address belongs to the physical page:
[   30.371819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.372241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.372421] page_type: f5(slab)
[   30.372596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.372950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.373221] page dumped because: kasan: bad access detected
[   30.373355] 
[   30.373476] Memory state around the buggy address:
[   30.373561]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.374420]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.374632] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.374732]                                      ^
[   30.374824]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.374971]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.375085] ==================================================================
[   30.140713] ==================================================================
[   30.140948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   30.141094] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.141287] 
[   30.141700] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.142188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.142272] Hardware name: linux,dummy-virt (DT)
[   30.142800] Call trace:
[   30.142892]  show_stack+0x20/0x38 (C)
[   30.143021]  dump_stack_lvl+0x8c/0xd0
[   30.143138]  print_report+0x118/0x608
[   30.143345]  kasan_report+0xdc/0x128
[   30.144121]  kasan_check_range+0x100/0x1a8
[   30.144474]  __kasan_check_write+0x20/0x30
[   30.144981]  kasan_atomics_helper+0xff0/0x4858
[   30.145349]  kasan_atomics+0x198/0x2e0
[   30.145600]  kunit_try_run_case+0x170/0x3f0
[   30.146162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.146419]  kthread+0x328/0x630
[   30.146729]  ret_from_fork+0x10/0x20
[   30.146916] 
[   30.147283] Allocated by task 265:
[   30.147396]  kasan_save_stack+0x3c/0x68
[   30.147541]  kasan_save_track+0x20/0x40
[   30.147646]  kasan_save_alloc_info+0x40/0x58
[   30.148179]  __kasan_kmalloc+0xd4/0xd8
[   30.148664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.148804]  kasan_atomics+0xb8/0x2e0
[   30.149299]  kunit_try_run_case+0x170/0x3f0
[   30.149514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.149870]  kthread+0x328/0x630
[   30.150045]  ret_from_fork+0x10/0x20
[   30.150187] 
[   30.150241] The buggy address belongs to the object at fff00000c7751400
[   30.150241]  which belongs to the cache kmalloc-64 of size 64
[   30.150391] The buggy address is located 0 bytes to the right of
[   30.150391]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.150548] 
[   30.150603] The buggy address belongs to the physical page:
[   30.150681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.151261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.151733] page_type: f5(slab)
[   30.151996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.152261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.152373] page dumped because: kasan: bad access detected
[   30.152476] 
[   30.152526] Memory state around the buggy address:
[   30.152613]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.152727]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.153967] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.154091]                                      ^
[   30.154192]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.154321]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.154433] ==================================================================
[   30.155218] ==================================================================
[   30.155673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   30.156132] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.156433] 
[   30.156523] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.156747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.156850] Hardware name: linux,dummy-virt (DT)
[   30.156941] Call trace:
[   30.158522]  show_stack+0x20/0x38 (C)
[   30.158706]  dump_stack_lvl+0x8c/0xd0
[   30.158869]  print_report+0x118/0x608
[   30.160072]  kasan_report+0xdc/0x128
[   30.160268]  kasan_check_range+0x100/0x1a8
[   30.160402]  __kasan_check_write+0x20/0x30
[   30.160524]  kasan_atomics_helper+0x1058/0x4858
[   30.161858]  kasan_atomics+0x198/0x2e0
[   30.162079]  kunit_try_run_case+0x170/0x3f0
[   30.162669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.162812]  kthread+0x328/0x630
[   30.162954]  ret_from_fork+0x10/0x20
[   30.163077] 
[   30.163128] Allocated by task 265:
[   30.163204]  kasan_save_stack+0x3c/0x68
[   30.163324]  kasan_save_track+0x20/0x40
[   30.163449]  kasan_save_alloc_info+0x40/0x58
[   30.163983]  __kasan_kmalloc+0xd4/0xd8
[   30.164388]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.164866]  kasan_atomics+0xb8/0x2e0
[   30.165199]  kunit_try_run_case+0x170/0x3f0
[   30.165682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.166220]  kthread+0x328/0x630
[   30.166375]  ret_from_fork+0x10/0x20
[   30.166485] 
[   30.166540] The buggy address belongs to the object at fff00000c7751400
[   30.166540]  which belongs to the cache kmalloc-64 of size 64
[   30.166953] The buggy address is located 0 bytes to the right of
[   30.166953]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.167240] 
[   30.167370] The buggy address belongs to the physical page:
[   30.167815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.167992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.168233] page_type: f5(slab)
[   30.168782] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.169196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.169684] page dumped because: kasan: bad access detected
[   30.169784] 
[   30.169868] Memory state around the buggy address:
[   30.169962]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.170276]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.170661] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.171277]                                      ^
[   30.171410]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.171853]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.172197] ==================================================================
[   30.437713] ==================================================================
[   30.437821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   30.437979] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.438117] 
[   30.438203] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.438444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.438523] Hardware name: linux,dummy-virt (DT)
[   30.438748] Call trace:
[   30.438828]  show_stack+0x20/0x38 (C)
[   30.439129]  dump_stack_lvl+0x8c/0xd0
[   30.439254]  print_report+0x118/0x608
[   30.439380]  kasan_report+0xdc/0x128
[   30.440489]  kasan_check_range+0x100/0x1a8
[   30.440629]  __kasan_check_write+0x20/0x30
[   30.440797]  kasan_atomics_helper+0x175c/0x4858
[   30.440950]  kasan_atomics+0x198/0x2e0
[   30.441112]  kunit_try_run_case+0x170/0x3f0
[   30.441505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.441670]  kthread+0x328/0x630
[   30.443259]  ret_from_fork+0x10/0x20
[   30.443451] 
[   30.443503] Allocated by task 265:
[   30.443578]  kasan_save_stack+0x3c/0x68
[   30.443679]  kasan_save_track+0x20/0x40
[   30.443791]  kasan_save_alloc_info+0x40/0x58
[   30.443914]  __kasan_kmalloc+0xd4/0xd8
[   30.444123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.444231]  kasan_atomics+0xb8/0x2e0
[   30.444588]  kunit_try_run_case+0x170/0x3f0
[   30.445176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.445673]  kthread+0x328/0x630
[   30.446168]  ret_from_fork+0x10/0x20
[   30.446734] 
[   30.446794] The buggy address belongs to the object at fff00000c7751400
[   30.446794]  which belongs to the cache kmalloc-64 of size 64
[   30.447523] The buggy address is located 0 bytes to the right of
[   30.447523]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.448454] 
[   30.449053] The buggy address belongs to the physical page:
[   30.449454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.449606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.449739] page_type: f5(slab)
[   30.451345] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.451993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.452102] page dumped because: kasan: bad access detected
[   30.452188] 
[   30.452242] Memory state around the buggy address:
[   30.454122]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.454278]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.454395] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.454497]                                      ^
[   30.456258]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.456561]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.456664] ==================================================================
[   30.015822] ==================================================================
[   30.015952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   30.016075] Read of size 4 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.017945] 
[   30.018047] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.018271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.018354] Hardware name: linux,dummy-virt (DT)
[   30.018442] Call trace:
[   30.018507]  show_stack+0x20/0x38 (C)
[   30.018637]  dump_stack_lvl+0x8c/0xd0
[   30.018765]  print_report+0x118/0x608
[   30.018906]  kasan_report+0xdc/0x128
[   30.019969]  __asan_report_load4_noabort+0x20/0x30
[   30.020113]  kasan_atomics_helper+0x3e04/0x4858
[   30.020356]  kasan_atomics+0x198/0x2e0
[   30.021112]  kunit_try_run_case+0x170/0x3f0
[   30.021267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.021439]  kthread+0x328/0x630
[   30.021644]  ret_from_fork+0x10/0x20
[   30.021866] 
[   30.022032] Allocated by task 265:
[   30.022196]  kasan_save_stack+0x3c/0x68
[   30.022307]  kasan_save_track+0x20/0x40
[   30.022412]  kasan_save_alloc_info+0x40/0x58
[   30.022570]  __kasan_kmalloc+0xd4/0xd8
[   30.022833]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.022965]  kasan_atomics+0xb8/0x2e0
[   30.023063]  kunit_try_run_case+0x170/0x3f0
[   30.023384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.023702]  kthread+0x328/0x630
[   30.023940]  ret_from_fork+0x10/0x20
[   30.024299] 
[   30.024357] The buggy address belongs to the object at fff00000c7751400
[   30.024357]  which belongs to the cache kmalloc-64 of size 64
[   30.024935] The buggy address is located 0 bytes to the right of
[   30.024935]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.025124] 
[   30.025187] The buggy address belongs to the physical page:
[   30.025274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.025423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.025696] page_type: f5(slab)
[   30.025816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.026146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.026418] page dumped because: kasan: bad access detected
[   30.026963] 
[   30.027170] Memory state around the buggy address:
[   30.027285]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.027404]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.027551] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.027830]                                      ^
[   30.028009]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.028468]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.028658] ==================================================================
[   30.302910] ==================================================================
[   30.303282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   30.303530] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265
[   30.303665] 
[   30.304154] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.304463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.304543] Hardware name: linux,dummy-virt (DT)
[   30.304637] Call trace:
[   30.304701]  show_stack+0x20/0x38 (C)
[   30.304830]  dump_stack_lvl+0x8c/0xd0
[   30.304984]  print_report+0x118/0x608
[   30.305553]  kasan_report+0xdc/0x128
[   30.306018]  kasan_check_range+0x100/0x1a8
[   30.306222]  __kasan_check_write+0x20/0x30
[   30.306382]  kasan_atomics_helper+0x1414/0x4858
[   30.306557]  kasan_atomics+0x198/0x2e0
[   30.306707]  kunit_try_run_case+0x170/0x3f0
[   30.307300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.307692]  kthread+0x328/0x630
[   30.308314]  ret_from_fork+0x10/0x20
[   30.308507] 
[   30.308650] Allocated by task 265:
[   30.308757]  kasan_save_stack+0x3c/0x68
[   30.309005]  kasan_save_track+0x20/0x40
[   30.309197]  kasan_save_alloc_info+0x40/0x58
[   30.309358]  __kasan_kmalloc+0xd4/0xd8
[   30.309542]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.309730]  kasan_atomics+0xb8/0x2e0
[   30.310200]  kunit_try_run_case+0x170/0x3f0
[   30.310312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.310454]  kthread+0x328/0x630
[   30.310644]  ret_from_fork+0x10/0x20
[   30.310795] 
[   30.310873] The buggy address belongs to the object at fff00000c7751400
[   30.310873]  which belongs to the cache kmalloc-64 of size 64
[   30.311067] The buggy address is located 0 bytes to the right of
[   30.311067]  allocated 48-byte region [fff00000c7751400, fff00000c7751430)
[   30.311240] 
[   30.311303] The buggy address belongs to the physical page:
[   30.311385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751
[   30.311718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.311965] page_type: f5(slab)
[   30.312131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.312416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.312549] page dumped because: kasan: bad access detected
[   30.312896] 
[   30.313355] Memory state around the buggy address:
[   30.313478]  fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.313743]  fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.313877] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.314805]                                      ^
[   30.315033]  fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.315205]  fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.315375] ==================================================================

[   23.577970] ==================================================================
[   23.578412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   23.579026] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.579785] 
[   23.580069] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.580208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.580302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.580390] Call Trace:
[   23.580465]  <TASK>
[   23.580598]  dump_stack_lvl+0x73/0xb0
[   23.580699]  print_report+0xd1/0x650
[   23.580779]  ? __virt_addr_valid+0x1db/0x2d0
[   23.580857]  ? kasan_atomics_helper+0x4a0/0x5450
[   23.580934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.581012]  ? kasan_atomics_helper+0x4a0/0x5450
[   23.581087]  kasan_report+0x141/0x180
[   23.581164]  ? kasan_atomics_helper+0x4a0/0x5450
[   23.581287]  kasan_check_range+0x10c/0x1c0
[   23.581374]  __kasan_check_write+0x18/0x20
[   23.581477]  kasan_atomics_helper+0x4a0/0x5450
[   23.581608]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.581708]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.581832]  ? kasan_atomics+0x152/0x310
[   23.581957]  kasan_atomics+0x1dc/0x310
[   23.582046]  ? __pfx_kasan_atomics+0x10/0x10
[   23.582124]  ? __pfx_read_tsc+0x10/0x10
[   23.582190]  ? ktime_get_ts64+0x86/0x230
[   23.582301]  kunit_try_run_case+0x1a5/0x480
[   23.582378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.582448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.582571]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.582704]  ? __kthread_parkme+0x82/0x180
[   23.582787]  ? preempt_count_sub+0x50/0x80
[   23.582866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.582947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.583032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.583111]  kthread+0x337/0x6f0
[   23.583145]  ? trace_preempt_on+0x20/0xc0
[   23.583182]  ? __pfx_kthread+0x10/0x10
[   23.583214]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.583298]  ? calculate_sigpending+0x7b/0xa0
[   23.583339]  ? __pfx_kthread+0x10/0x10
[   23.583371]  ret_from_fork+0x116/0x1d0
[   23.583398]  ? __pfx_kthread+0x10/0x10
[   23.583433]  ret_from_fork_asm+0x1a/0x30
[   23.583476]  </TASK>
[   23.583493] 
[   23.603261] Allocated by task 283:
[   23.603634]  kasan_save_stack+0x45/0x70
[   23.604009]  kasan_save_track+0x18/0x40
[   23.604380]  kasan_save_alloc_info+0x3b/0x50
[   23.604881]  __kasan_kmalloc+0xb7/0xc0
[   23.605460]  __kmalloc_cache_noprof+0x189/0x420
[   23.606128]  kasan_atomics+0x95/0x310
[   23.606656]  kunit_try_run_case+0x1a5/0x480
[   23.608256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.609398]  kthread+0x337/0x6f0
[   23.610040]  ret_from_fork+0x116/0x1d0
[   23.610482]  ret_from_fork_asm+0x1a/0x30
[   23.610836] 
[   23.611032] The buggy address belongs to the object at ffff8881039d9c80
[   23.611032]  which belongs to the cache kmalloc-64 of size 64
[   23.613640] The buggy address is located 0 bytes to the right of
[   23.613640]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.615263] 
[   23.615542] The buggy address belongs to the physical page:
[   23.616762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.617847] flags: 0x200000000000000(node=0|zone=2)
[   23.618388] page_type: f5(slab)
[   23.618867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.619643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.620491] page dumped because: kasan: bad access detected
[   23.620995] 
[   23.621333] Memory state around the buggy address:
[   23.621804]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.622747]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.624056] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.625108]                                      ^
[   23.625764]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.627017]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.627795] ==================================================================
[   26.063087] ==================================================================
[   26.065854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   26.067244] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.067898] 
[   26.068149] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.068312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.068361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.068563] Call Trace:
[   26.068625]  <TASK>
[   26.068679]  dump_stack_lvl+0x73/0xb0
[   26.068740]  print_report+0xd1/0x650
[   26.068779]  ? __virt_addr_valid+0x1db/0x2d0
[   26.068816]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.068851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.068886]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.068920]  kasan_report+0x141/0x180
[   26.068952]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.068991]  __asan_report_load8_noabort+0x18/0x20
[   26.069030]  kasan_atomics_helper+0x4f71/0x5450
[   26.069065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.069099]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.069143]  ? kasan_atomics+0x152/0x310
[   26.069183]  kasan_atomics+0x1dc/0x310
[   26.069240]  ? __pfx_kasan_atomics+0x10/0x10
[   26.069304]  ? __pfx_read_tsc+0x10/0x10
[   26.069341]  ? ktime_get_ts64+0x86/0x230
[   26.069381]  kunit_try_run_case+0x1a5/0x480
[   26.069425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.069468]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.069532]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.069575]  ? __kthread_parkme+0x82/0x180
[   26.069608]  ? preempt_count_sub+0x50/0x80
[   26.069659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.069698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.069736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.069775]  kthread+0x337/0x6f0
[   26.069806]  ? trace_preempt_on+0x20/0xc0
[   26.069842]  ? __pfx_kthread+0x10/0x10
[   26.069873]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.069906]  ? calculate_sigpending+0x7b/0xa0
[   26.069942]  ? __pfx_kthread+0x10/0x10
[   26.069974]  ret_from_fork+0x116/0x1d0
[   26.070001]  ? __pfx_kthread+0x10/0x10
[   26.070031]  ret_from_fork_asm+0x1a/0x30
[   26.070074]  </TASK>
[   26.070092] 
[   26.088541] Allocated by task 283:
[   26.088960]  kasan_save_stack+0x45/0x70
[   26.089517]  kasan_save_track+0x18/0x40
[   26.089967]  kasan_save_alloc_info+0x3b/0x50
[   26.090557]  __kasan_kmalloc+0xb7/0xc0
[   26.091054]  __kmalloc_cache_noprof+0x189/0x420
[   26.091675]  kasan_atomics+0x95/0x310
[   26.092068]  kunit_try_run_case+0x1a5/0x480
[   26.092723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.093377]  kthread+0x337/0x6f0
[   26.093931]  ret_from_fork+0x116/0x1d0
[   26.094313]  ret_from_fork_asm+0x1a/0x30
[   26.094693] 
[   26.094938] The buggy address belongs to the object at ffff8881039d9c80
[   26.094938]  which belongs to the cache kmalloc-64 of size 64
[   26.096032] The buggy address is located 0 bytes to the right of
[   26.096032]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.097170] 
[   26.097461] The buggy address belongs to the physical page:
[   26.097956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.098744] flags: 0x200000000000000(node=0|zone=2)
[   26.099112] page_type: f5(slab)
[   26.099613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.100438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.101156] page dumped because: kasan: bad access detected
[   26.101772] 
[   26.102016] Memory state around the buggy address:
[   26.102540]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.103132]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.103841] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.104422]                                      ^
[   26.104992]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.105764]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.106445] ==================================================================
[   24.420628] ==================================================================
[   24.421130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   24.422725] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.423255] 
[   24.423787] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.423924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.423992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.424062] Call Trace:
[   24.424456]  <TASK>
[   24.424528]  dump_stack_lvl+0x73/0xb0
[   24.424649]  print_report+0xd1/0x650
[   24.424736]  ? __virt_addr_valid+0x1db/0x2d0
[   24.424803]  ? kasan_atomics_helper+0xd47/0x5450
[   24.424840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.424876]  ? kasan_atomics_helper+0xd47/0x5450
[   24.424909]  kasan_report+0x141/0x180
[   24.424942]  ? kasan_atomics_helper+0xd47/0x5450
[   24.424982]  kasan_check_range+0x10c/0x1c0
[   24.425019]  __kasan_check_write+0x18/0x20
[   24.425049]  kasan_atomics_helper+0xd47/0x5450
[   24.425083]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.425117]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.425162]  ? kasan_atomics+0x152/0x310
[   24.425202]  kasan_atomics+0x1dc/0x310
[   24.425305]  ? __pfx_kasan_atomics+0x10/0x10
[   24.425390]  ? __pfx_read_tsc+0x10/0x10
[   24.425428]  ? ktime_get_ts64+0x86/0x230
[   24.425466]  kunit_try_run_case+0x1a5/0x480
[   24.425544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.425649]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.425721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.425788]  ? __kthread_parkme+0x82/0x180
[   24.425863]  ? preempt_count_sub+0x50/0x80
[   24.425932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.425999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.426071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.426148]  kthread+0x337/0x6f0
[   24.426207]  ? trace_preempt_on+0x20/0xc0
[   24.426281]  ? __pfx_kthread+0x10/0x10
[   24.426315]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.426349]  ? calculate_sigpending+0x7b/0xa0
[   24.426385]  ? __pfx_kthread+0x10/0x10
[   24.426417]  ret_from_fork+0x116/0x1d0
[   24.426446]  ? __pfx_kthread+0x10/0x10
[   24.426478]  ret_from_fork_asm+0x1a/0x30
[   24.426561]  </TASK>
[   24.426603] 
[   24.450239] Allocated by task 283:
[   24.450653]  kasan_save_stack+0x45/0x70
[   24.452102]  kasan_save_track+0x18/0x40
[   24.452732]  kasan_save_alloc_info+0x3b/0x50
[   24.453105]  __kasan_kmalloc+0xb7/0xc0
[   24.453926]  __kmalloc_cache_noprof+0x189/0x420
[   24.454992]  kasan_atomics+0x95/0x310
[   24.456079]  kunit_try_run_case+0x1a5/0x480
[   24.456784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.458006]  kthread+0x337/0x6f0
[   24.458185]  ret_from_fork+0x116/0x1d0
[   24.458918]  ret_from_fork_asm+0x1a/0x30
[   24.459582] 
[   24.459831] The buggy address belongs to the object at ffff8881039d9c80
[   24.459831]  which belongs to the cache kmalloc-64 of size 64
[   24.461247] The buggy address is located 0 bytes to the right of
[   24.461247]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.463586] 
[   24.463975] The buggy address belongs to the physical page:
[   24.464849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.465810] flags: 0x200000000000000(node=0|zone=2)
[   24.466983] page_type: f5(slab)
[   24.467594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.468407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.469170] page dumped because: kasan: bad access detected
[   24.469954] 
[   24.470178] Memory state around the buggy address:
[   24.470595]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.471055]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.472282] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.473657]                                      ^
[   24.474710]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.475667]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.476235] ==================================================================
[   25.483383] ==================================================================
[   25.485020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   25.485746] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.486449] 
[   25.486783] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.486922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.486966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.487058] Call Trace:
[   25.487140]  <TASK>
[   25.487198]  dump_stack_lvl+0x73/0xb0
[   25.487283]  print_report+0xd1/0x650
[   25.487324]  ? __virt_addr_valid+0x1db/0x2d0
[   25.487397]  ? kasan_atomics_helper+0x1818/0x5450
[   25.487476]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.487579]  ? kasan_atomics_helper+0x1818/0x5450
[   25.487660]  kasan_report+0x141/0x180
[   25.487763]  ? kasan_atomics_helper+0x1818/0x5450
[   25.487885]  kasan_check_range+0x10c/0x1c0
[   25.487967]  __kasan_check_write+0x18/0x20
[   25.488026]  kasan_atomics_helper+0x1818/0x5450
[   25.488066]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.488100]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.488146]  ? kasan_atomics+0x152/0x310
[   25.488187]  kasan_atomics+0x1dc/0x310
[   25.488232]  ? __pfx_kasan_atomics+0x10/0x10
[   25.488312]  ? __pfx_read_tsc+0x10/0x10
[   25.488351]  ? ktime_get_ts64+0x86/0x230
[   25.488389]  kunit_try_run_case+0x1a5/0x480
[   25.488432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.488469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.488532]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.488573]  ? __kthread_parkme+0x82/0x180
[   25.488606]  ? preempt_count_sub+0x50/0x80
[   25.488640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.488678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.488715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.488753]  kthread+0x337/0x6f0
[   25.488782]  ? trace_preempt_on+0x20/0xc0
[   25.488817]  ? __pfx_kthread+0x10/0x10
[   25.488847]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.488880]  ? calculate_sigpending+0x7b/0xa0
[   25.488917]  ? __pfx_kthread+0x10/0x10
[   25.488950]  ret_from_fork+0x116/0x1d0
[   25.488980]  ? __pfx_kthread+0x10/0x10
[   25.489010]  ret_from_fork_asm+0x1a/0x30
[   25.489053]  </TASK>
[   25.489069] 
[   25.506405] Allocated by task 283:
[   25.506885]  kasan_save_stack+0x45/0x70
[   25.507580]  kasan_save_track+0x18/0x40
[   25.508008]  kasan_save_alloc_info+0x3b/0x50
[   25.508603]  __kasan_kmalloc+0xb7/0xc0
[   25.509073]  __kmalloc_cache_noprof+0x189/0x420
[   25.509732]  kasan_atomics+0x95/0x310
[   25.510283]  kunit_try_run_case+0x1a5/0x480
[   25.510763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.511752]  kthread+0x337/0x6f0
[   25.512621]  ret_from_fork+0x116/0x1d0
[   25.513032]  ret_from_fork_asm+0x1a/0x30
[   25.513558] 
[   25.513825] The buggy address belongs to the object at ffff8881039d9c80
[   25.513825]  which belongs to the cache kmalloc-64 of size 64
[   25.514914] The buggy address is located 0 bytes to the right of
[   25.514914]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.515745] 
[   25.515997] The buggy address belongs to the physical page:
[   25.516699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.517586] flags: 0x200000000000000(node=0|zone=2)
[   25.518353] page_type: f5(slab)
[   25.518752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.519636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.520100] page dumped because: kasan: bad access detected
[   25.520616] 
[   25.520939] Memory state around the buggy address:
[   25.521450]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.522082]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.523602] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.524244]                                      ^
[   25.524923]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.525828]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.526721] ==================================================================
[   26.417456] ==================================================================
[   26.418516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   26.419177] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.419823] 
[   26.420107] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.420249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.420291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.420359] Call Trace:
[   26.420418]  <TASK>
[   26.420482]  dump_stack_lvl+0x73/0xb0
[   26.420613]  print_report+0xd1/0x650
[   26.420701]  ? __virt_addr_valid+0x1db/0x2d0
[   26.420792]  ? kasan_atomics_helper+0x5115/0x5450
[   26.420868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.420926]  ? kasan_atomics_helper+0x5115/0x5450
[   26.420999]  kasan_report+0x141/0x180
[   26.421081]  ? kasan_atomics_helper+0x5115/0x5450
[   26.421171]  __asan_report_load8_noabort+0x18/0x20
[   26.421259]  kasan_atomics_helper+0x5115/0x5450
[   26.421346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.421424]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.421974]  ? kasan_atomics+0x152/0x310
[   26.422067]  kasan_atomics+0x1dc/0x310
[   26.422148]  ? __pfx_kasan_atomics+0x10/0x10
[   26.422231]  ? __pfx_read_tsc+0x10/0x10
[   26.422307]  ? ktime_get_ts64+0x86/0x230
[   26.422424]  kunit_try_run_case+0x1a5/0x480
[   26.422534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.422618]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.422698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.422777]  ? __kthread_parkme+0x82/0x180
[   26.422853]  ? preempt_count_sub+0x50/0x80
[   26.422932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.423016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.423078]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.423118]  kthread+0x337/0x6f0
[   26.423148]  ? trace_preempt_on+0x20/0xc0
[   26.423185]  ? __pfx_kthread+0x10/0x10
[   26.423218]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.423286]  ? calculate_sigpending+0x7b/0xa0
[   26.423326]  ? __pfx_kthread+0x10/0x10
[   26.423361]  ret_from_fork+0x116/0x1d0
[   26.423389]  ? __pfx_kthread+0x10/0x10
[   26.423419]  ret_from_fork_asm+0x1a/0x30
[   26.423463]  </TASK>
[   26.423481] 
[   26.444948] Allocated by task 283:
[   26.445300]  kasan_save_stack+0x45/0x70
[   26.445844]  kasan_save_track+0x18/0x40
[   26.446155]  kasan_save_alloc_info+0x3b/0x50
[   26.446454]  __kasan_kmalloc+0xb7/0xc0
[   26.446873]  __kmalloc_cache_noprof+0x189/0x420
[   26.447351]  kasan_atomics+0x95/0x310
[   26.447768]  kunit_try_run_case+0x1a5/0x480
[   26.448200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.448604]  kthread+0x337/0x6f0
[   26.449770]  ret_from_fork+0x116/0x1d0
[   26.450218]  ret_from_fork_asm+0x1a/0x30
[   26.451145] 
[   26.451342] The buggy address belongs to the object at ffff8881039d9c80
[   26.451342]  which belongs to the cache kmalloc-64 of size 64
[   26.452857] The buggy address is located 0 bytes to the right of
[   26.452857]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.453469] 
[   26.454543] The buggy address belongs to the physical page:
[   26.455059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.455829] flags: 0x200000000000000(node=0|zone=2)
[   26.456308] page_type: f5(slab)
[   26.456675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.457214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.457823] page dumped because: kasan: bad access detected
[   26.458398] 
[   26.458690] Memory state around the buggy address:
[   26.459192]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.459794]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.460416] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.460939]                                      ^
[   26.461292]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.462013]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.462731] ==================================================================
[   26.325078] ==================================================================
[   26.325566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   26.326121] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.327171] 
[   26.327447] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.327597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.327642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.327707] Call Trace:
[   26.327763]  <TASK>
[   26.327826]  dump_stack_lvl+0x73/0xb0
[   26.327927]  print_report+0xd1/0x650
[   26.328014]  ? __virt_addr_valid+0x1db/0x2d0
[   26.328096]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.328174]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.328264]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.328346]  kasan_report+0x141/0x180
[   26.328433]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.328880]  __asan_report_load8_noabort+0x18/0x20
[   26.328974]  kasan_atomics_helper+0x4fa5/0x5450
[   26.329055]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.329134]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.329232]  ? kasan_atomics+0x152/0x310
[   26.329322]  kasan_atomics+0x1dc/0x310
[   26.329400]  ? __pfx_kasan_atomics+0x10/0x10
[   26.329473]  ? __pfx_read_tsc+0x10/0x10
[   26.329571]  ? ktime_get_ts64+0x86/0x230
[   26.329669]  kunit_try_run_case+0x1a5/0x480
[   26.329759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.329841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.329922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.330007]  ? __kthread_parkme+0x82/0x180
[   26.330079]  ? preempt_count_sub+0x50/0x80
[   26.330162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.330251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.330333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.330415]  kthread+0x337/0x6f0
[   26.330487]  ? trace_preempt_on+0x20/0xc0
[   26.330627]  ? __pfx_kthread+0x10/0x10
[   26.330688]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.330753]  ? calculate_sigpending+0x7b/0xa0
[   26.330830]  ? __pfx_kthread+0x10/0x10
[   26.330901]  ret_from_fork+0x116/0x1d0
[   26.330971]  ? __pfx_kthread+0x10/0x10
[   26.331048]  ret_from_fork_asm+0x1a/0x30
[   26.331147]  </TASK>
[   26.331188] 
[   26.355141] Allocated by task 283:
[   26.355782]  kasan_save_stack+0x45/0x70
[   26.356544]  kasan_save_track+0x18/0x40
[   26.357137]  kasan_save_alloc_info+0x3b/0x50
[   26.357561]  __kasan_kmalloc+0xb7/0xc0
[   26.357992]  __kmalloc_cache_noprof+0x189/0x420
[   26.358455]  kasan_atomics+0x95/0x310
[   26.358908]  kunit_try_run_case+0x1a5/0x480
[   26.359383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.359923]  kthread+0x337/0x6f0
[   26.360363]  ret_from_fork+0x116/0x1d0
[   26.360789]  ret_from_fork_asm+0x1a/0x30
[   26.361273] 
[   26.361520] The buggy address belongs to the object at ffff8881039d9c80
[   26.361520]  which belongs to the cache kmalloc-64 of size 64
[   26.362435] The buggy address is located 0 bytes to the right of
[   26.362435]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.363444] 
[   26.363709] The buggy address belongs to the physical page:
[   26.364189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.364868] flags: 0x200000000000000(node=0|zone=2)
[   26.365376] page_type: f5(slab)
[   26.365715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.366457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.367032] page dumped because: kasan: bad access detected
[   26.368135] 
[   26.368680] Memory state around the buggy address:
[   26.369396]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.369908]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.370426] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.371186]                                      ^
[   26.371592]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.372184]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.372917] ==================================================================
[   24.243397] ==================================================================
[   24.244047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   24.244836] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.245657] 
[   24.245916] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.246704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.246748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.246814] Call Trace:
[   24.246866]  <TASK>
[   24.246922]  dump_stack_lvl+0x73/0xb0
[   24.247026]  print_report+0xd1/0x650
[   24.247107]  ? __virt_addr_valid+0x1db/0x2d0
[   24.247191]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.247675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.248133]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.248259]  kasan_report+0x141/0x180
[   24.248348]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.248441]  kasan_check_range+0x10c/0x1c0
[   24.248581]  __kasan_check_write+0x18/0x20
[   24.248662]  kasan_atomics_helper+0xb6a/0x5450
[   24.248743]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.248794]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.248844]  ? kasan_atomics+0x152/0x310
[   24.248884]  kasan_atomics+0x1dc/0x310
[   24.248919]  ? __pfx_kasan_atomics+0x10/0x10
[   24.248956]  ? __pfx_read_tsc+0x10/0x10
[   24.248988]  ? ktime_get_ts64+0x86/0x230
[   24.249024]  kunit_try_run_case+0x1a5/0x480
[   24.249065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.249101]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.249136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.249169]  ? __kthread_parkme+0x82/0x180
[   24.249200]  ? preempt_count_sub+0x50/0x80
[   24.249290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.249335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.249372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.249409]  kthread+0x337/0x6f0
[   24.249439]  ? trace_preempt_on+0x20/0xc0
[   24.249475]  ? __pfx_kthread+0x10/0x10
[   24.249534]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.249609]  ? calculate_sigpending+0x7b/0xa0
[   24.249702]  ? __pfx_kthread+0x10/0x10
[   24.249762]  ret_from_fork+0x116/0x1d0
[   24.249818]  ? __pfx_kthread+0x10/0x10
[   24.249877]  ret_from_fork_asm+0x1a/0x30
[   24.249956]  </TASK>
[   24.249988] 
[   24.271981] Allocated by task 283:
[   24.272587]  kasan_save_stack+0x45/0x70
[   24.273736]  kasan_save_track+0x18/0x40
[   24.274588]  kasan_save_alloc_info+0x3b/0x50
[   24.275859]  __kasan_kmalloc+0xb7/0xc0
[   24.276201]  __kmalloc_cache_noprof+0x189/0x420
[   24.276992]  kasan_atomics+0x95/0x310
[   24.277592]  kunit_try_run_case+0x1a5/0x480
[   24.278283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.278783]  kthread+0x337/0x6f0
[   24.279879]  ret_from_fork+0x116/0x1d0
[   24.280489]  ret_from_fork_asm+0x1a/0x30
[   24.281354] 
[   24.281572] The buggy address belongs to the object at ffff8881039d9c80
[   24.281572]  which belongs to the cache kmalloc-64 of size 64
[   24.283138] The buggy address is located 0 bytes to the right of
[   24.283138]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.284029] 
[   24.284194] The buggy address belongs to the physical page:
[   24.284570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.285023] flags: 0x200000000000000(node=0|zone=2)
[   24.285365] page_type: f5(slab)
[   24.285771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.286460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.288055] page dumped because: kasan: bad access detected
[   24.289454] 
[   24.289702] Memory state around the buggy address:
[   24.290712]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.291328]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.292174] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.293447]                                      ^
[   24.295853]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.298062]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.299669] ==================================================================
[   23.251296] ==================================================================
[   23.252403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   23.253046] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.253653] 
[   23.253924] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.254059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.254096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.254163] Call Trace:
[   23.254202]  <TASK>
[   23.254255]  dump_stack_lvl+0x73/0xb0
[   23.254358]  print_report+0xd1/0x650
[   23.254437]  ? __virt_addr_valid+0x1db/0x2d0
[   23.254541]  ? kasan_atomics_helper+0x4bbc/0x5450
[   23.255040]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.255118]  ? kasan_atomics_helper+0x4bbc/0x5450
[   23.255192]  kasan_report+0x141/0x180
[   23.255467]  ? kasan_atomics_helper+0x4bbc/0x5450
[   23.255638]  __asan_report_load4_noabort+0x18/0x20
[   23.255724]  kasan_atomics_helper+0x4bbc/0x5450
[   23.255800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.255896]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.255978]  ? kasan_atomics+0x152/0x310
[   23.256019]  kasan_atomics+0x1dc/0x310
[   23.256053]  ? __pfx_kasan_atomics+0x10/0x10
[   23.256089]  ? __pfx_read_tsc+0x10/0x10
[   23.256123]  ? ktime_get_ts64+0x86/0x230
[   23.256157]  kunit_try_run_case+0x1a5/0x480
[   23.256195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.256276]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.256321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.256357]  ? __kthread_parkme+0x82/0x180
[   23.256389]  ? preempt_count_sub+0x50/0x80
[   23.256420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.256456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.256490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.256603]  kthread+0x337/0x6f0
[   23.256688]  ? trace_preempt_on+0x20/0xc0
[   23.256731]  ? __pfx_kthread+0x10/0x10
[   23.256760]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.256794]  ? calculate_sigpending+0x7b/0xa0
[   23.256830]  ? __pfx_kthread+0x10/0x10
[   23.256859]  ret_from_fork+0x116/0x1d0
[   23.256886]  ? __pfx_kthread+0x10/0x10
[   23.256915]  ret_from_fork_asm+0x1a/0x30
[   23.256956]  </TASK>
[   23.256973] 
[   23.273867] Allocated by task 283:
[   23.274347]  kasan_save_stack+0x45/0x70
[   23.274859]  kasan_save_track+0x18/0x40
[   23.275308]  kasan_save_alloc_info+0x3b/0x50
[   23.275731]  __kasan_kmalloc+0xb7/0xc0
[   23.276049]  __kmalloc_cache_noprof+0x189/0x420
[   23.276470]  kasan_atomics+0x95/0x310
[   23.276906]  kunit_try_run_case+0x1a5/0x480
[   23.277476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.278055]  kthread+0x337/0x6f0
[   23.278759]  ret_from_fork+0x116/0x1d0
[   23.279145]  ret_from_fork_asm+0x1a/0x30
[   23.279691] 
[   23.279936] The buggy address belongs to the object at ffff8881039d9c80
[   23.279936]  which belongs to the cache kmalloc-64 of size 64
[   23.280876] The buggy address is located 0 bytes to the right of
[   23.280876]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.281832] 
[   23.282025] The buggy address belongs to the physical page:
[   23.282453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.283159] flags: 0x200000000000000(node=0|zone=2)
[   23.283928] page_type: f5(slab)
[   23.284204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.284788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.285464] page dumped because: kasan: bad access detected
[   23.286096] 
[   23.286399] Memory state around the buggy address:
[   23.286982]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.287436]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.288733] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.289392]                                      ^
[   23.290033]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.290858]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.291402] ==================================================================
[   25.222432] ==================================================================
[   25.222988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   25.223704] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.224339] 
[   25.224640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.224772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.224820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.224889] Call Trace:
[   25.224944]  <TASK>
[   25.224999]  dump_stack_lvl+0x73/0xb0
[   25.225095]  print_report+0xd1/0x650
[   25.225184]  ? __virt_addr_valid+0x1db/0x2d0
[   25.225309]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.225389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.225472]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.225575]  kasan_report+0x141/0x180
[   25.225674]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.225766]  __asan_report_store8_noabort+0x1b/0x30
[   25.225846]  kasan_atomics_helper+0x50d4/0x5450
[   25.225929]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.226017]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.226121]  ? kasan_atomics+0x152/0x310
[   25.226215]  kasan_atomics+0x1dc/0x310
[   25.226345]  ? __pfx_kasan_atomics+0x10/0x10
[   25.226429]  ? __pfx_read_tsc+0x10/0x10
[   25.226525]  ? ktime_get_ts64+0x86/0x230
[   25.226573]  kunit_try_run_case+0x1a5/0x480
[   25.226618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.226694]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.226781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.226866]  ? __kthread_parkme+0x82/0x180
[   25.226951]  ? preempt_count_sub+0x50/0x80
[   25.227038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.227121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.227209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.227338]  kthread+0x337/0x6f0
[   25.227411]  ? trace_preempt_on+0x20/0xc0
[   25.227466]  ? __pfx_kthread+0x10/0x10
[   25.227525]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.227562]  ? calculate_sigpending+0x7b/0xa0
[   25.227598]  ? __pfx_kthread+0x10/0x10
[   25.227632]  ret_from_fork+0x116/0x1d0
[   25.227660]  ? __pfx_kthread+0x10/0x10
[   25.227690]  ret_from_fork_asm+0x1a/0x30
[   25.227735]  </TASK>
[   25.227752] 
[   25.242110] Allocated by task 283:
[   25.242628]  kasan_save_stack+0x45/0x70
[   25.243097]  kasan_save_track+0x18/0x40
[   25.243561]  kasan_save_alloc_info+0x3b/0x50
[   25.243967]  __kasan_kmalloc+0xb7/0xc0
[   25.244441]  __kmalloc_cache_noprof+0x189/0x420
[   25.244921]  kasan_atomics+0x95/0x310
[   25.245302]  kunit_try_run_case+0x1a5/0x480
[   25.245779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.246269]  kthread+0x337/0x6f0
[   25.246686]  ret_from_fork+0x116/0x1d0
[   25.247080]  ret_from_fork_asm+0x1a/0x30
[   25.247538] 
[   25.247782] The buggy address belongs to the object at ffff8881039d9c80
[   25.247782]  which belongs to the cache kmalloc-64 of size 64
[   25.248664] The buggy address is located 0 bytes to the right of
[   25.248664]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.249429] 
[   25.249712] The buggy address belongs to the physical page:
[   25.250309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.251120] flags: 0x200000000000000(node=0|zone=2)
[   25.251966] page_type: f5(slab)
[   25.252380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.253028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.254076] page dumped because: kasan: bad access detected
[   25.255090] 
[   25.255480] Memory state around the buggy address:
[   25.256134]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.257403]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.258081] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.259060]                                      ^
[   25.259553]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.260486]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.261111] ==================================================================
[   24.300611] ==================================================================
[   24.301040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   24.305437] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.308162] 
[   24.309144] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.309326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.309351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.309390] Call Trace:
[   24.309416]  <TASK>
[   24.309441]  dump_stack_lvl+0x73/0xb0
[   24.309545]  print_report+0xd1/0x650
[   24.309692]  ? __virt_addr_valid+0x1db/0x2d0
[   24.309761]  ? kasan_atomics_helper+0xc70/0x5450
[   24.309803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.309837]  ? kasan_atomics_helper+0xc70/0x5450
[   24.309870]  kasan_report+0x141/0x180
[   24.309905]  ? kasan_atomics_helper+0xc70/0x5450
[   24.309943]  kasan_check_range+0x10c/0x1c0
[   24.309978]  __kasan_check_write+0x18/0x20
[   24.310006]  kasan_atomics_helper+0xc70/0x5450
[   24.310040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.310073]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.310118]  ? kasan_atomics+0x152/0x310
[   24.310157]  kasan_atomics+0x1dc/0x310
[   24.310192]  ? __pfx_kasan_atomics+0x10/0x10
[   24.310273]  ? __pfx_read_tsc+0x10/0x10
[   24.310314]  ? ktime_get_ts64+0x86/0x230
[   24.310351]  kunit_try_run_case+0x1a5/0x480
[   24.310392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.310428]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.310464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.310524]  ? __kthread_parkme+0x82/0x180
[   24.310599]  ? preempt_count_sub+0x50/0x80
[   24.310681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.310752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.310826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.310903]  kthread+0x337/0x6f0
[   24.310960]  ? trace_preempt_on+0x20/0xc0
[   24.311025]  ? __pfx_kthread+0x10/0x10
[   24.311087]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.311158]  ? calculate_sigpending+0x7b/0xa0
[   24.311230]  ? __pfx_kthread+0x10/0x10
[   24.311300]  ret_from_fork+0x116/0x1d0
[   24.311332]  ? __pfx_kthread+0x10/0x10
[   24.311362]  ret_from_fork_asm+0x1a/0x30
[   24.311406]  </TASK>
[   24.311422] 
[   24.336397] Allocated by task 283:
[   24.337571]  kasan_save_stack+0x45/0x70
[   24.338335]  kasan_save_track+0x18/0x40
[   24.339076]  kasan_save_alloc_info+0x3b/0x50
[   24.339903]  __kasan_kmalloc+0xb7/0xc0
[   24.340272]  __kmalloc_cache_noprof+0x189/0x420
[   24.340698]  kasan_atomics+0x95/0x310
[   24.341051]  kunit_try_run_case+0x1a5/0x480
[   24.341441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.343553]  kthread+0x337/0x6f0
[   24.344015]  ret_from_fork+0x116/0x1d0
[   24.344999]  ret_from_fork_asm+0x1a/0x30
[   24.345659] 
[   24.346037] The buggy address belongs to the object at ffff8881039d9c80
[   24.346037]  which belongs to the cache kmalloc-64 of size 64
[   24.346926] The buggy address is located 0 bytes to the right of
[   24.346926]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.348179] 
[   24.348487] The buggy address belongs to the physical page:
[   24.349734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.350432] flags: 0x200000000000000(node=0|zone=2)
[   24.350977] page_type: f5(slab)
[   24.351738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.352985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.354126] page dumped because: kasan: bad access detected
[   24.354448] 
[   24.354638] Memory state around the buggy address:
[   24.356059]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.356758]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.357457] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.358455]                                      ^
[   24.358965]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.360053]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.360855] ==================================================================
[   25.884447] ==================================================================
[   25.885321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   25.885843] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.886437] 
[   25.886736] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.886878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.886921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.886987] Call Trace:
[   25.887038]  <TASK>
[   25.887087]  dump_stack_lvl+0x73/0xb0
[   25.887179]  print_report+0xd1/0x650
[   25.887315]  ? __virt_addr_valid+0x1db/0x2d0
[   25.887396]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.887472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.887572]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.887649]  kasan_report+0x141/0x180
[   25.887726]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.887811]  kasan_check_range+0x10c/0x1c0
[   25.887896]  __kasan_check_write+0x18/0x20
[   25.887973]  kasan_atomics_helper+0x1d7a/0x5450
[   25.888057]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.888141]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.888288]  ? kasan_atomics+0x152/0x310
[   25.888384]  kasan_atomics+0x1dc/0x310
[   25.888465]  ? __pfx_kasan_atomics+0x10/0x10
[   25.888564]  ? __pfx_read_tsc+0x10/0x10
[   25.888643]  ? ktime_get_ts64+0x86/0x230
[   25.888732]  kunit_try_run_case+0x1a5/0x480
[   25.888821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.888896]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.888942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.888979]  ? __kthread_parkme+0x82/0x180
[   25.889012]  ? preempt_count_sub+0x50/0x80
[   25.889046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.889084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.889121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.889157]  kthread+0x337/0x6f0
[   25.889186]  ? trace_preempt_on+0x20/0xc0
[   25.889249]  ? __pfx_kthread+0x10/0x10
[   25.889304]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.889339]  ? calculate_sigpending+0x7b/0xa0
[   25.889374]  ? __pfx_kthread+0x10/0x10
[   25.889406]  ret_from_fork+0x116/0x1d0
[   25.889434]  ? __pfx_kthread+0x10/0x10
[   25.889466]  ret_from_fork_asm+0x1a/0x30
[   25.889536]  </TASK>
[   25.889555] 
[   25.906022] Allocated by task 283:
[   25.906489]  kasan_save_stack+0x45/0x70
[   25.907841]  kasan_save_track+0x18/0x40
[   25.909205]  kasan_save_alloc_info+0x3b/0x50
[   25.911565]  __kasan_kmalloc+0xb7/0xc0
[   25.912544]  __kmalloc_cache_noprof+0x189/0x420
[   25.914109]  kasan_atomics+0x95/0x310
[   25.915176]  kunit_try_run_case+0x1a5/0x480
[   25.916684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.917020]  kthread+0x337/0x6f0
[   25.918275]  ret_from_fork+0x116/0x1d0
[   25.919319]  ret_from_fork_asm+0x1a/0x30
[   25.920111] 
[   25.921089] The buggy address belongs to the object at ffff8881039d9c80
[   25.921089]  which belongs to the cache kmalloc-64 of size 64
[   25.922151] The buggy address is located 0 bytes to the right of
[   25.922151]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.923179] 
[   25.923397] The buggy address belongs to the physical page:
[   25.924240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.925422] flags: 0x200000000000000(node=0|zone=2)
[   25.925876] page_type: f5(slab)
[   25.926300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.927417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.928075] page dumped because: kasan: bad access detected
[   25.928709] 
[   25.928921] Memory state around the buggy address:
[   25.929298]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.929836]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.930357] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.931561]                                      ^
[   25.932297]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.933004]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.933748] ==================================================================
[   26.153380] ==================================================================
[   26.154385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   26.155296] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.155990] 
[   26.156239] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.156370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.156414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.156481] Call Trace:
[   26.156552]  <TASK>
[   26.156607]  dump_stack_lvl+0x73/0xb0
[   26.156703]  print_report+0xd1/0x650
[   26.156790]  ? __virt_addr_valid+0x1db/0x2d0
[   26.156832]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.156866]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.156901]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.156961]  kasan_report+0x141/0x180
[   26.157021]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.157097]  __asan_report_load8_noabort+0x18/0x20
[   26.157181]  kasan_atomics_helper+0x4f98/0x5450
[   26.157323]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.157472]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.157699]  ? kasan_atomics+0x152/0x310
[   26.157793]  kasan_atomics+0x1dc/0x310
[   26.157874]  ? __pfx_kasan_atomics+0x10/0x10
[   26.157953]  ? __pfx_read_tsc+0x10/0x10
[   26.158027]  ? ktime_get_ts64+0x86/0x230
[   26.158108]  kunit_try_run_case+0x1a5/0x480
[   26.158197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.158292]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.158429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.158618]  ? __kthread_parkme+0x82/0x180
[   26.158780]  ? preempt_count_sub+0x50/0x80
[   26.158897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.158984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.159066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.159147]  kthread+0x337/0x6f0
[   26.159193]  ? trace_preempt_on+0x20/0xc0
[   26.159247]  ? __pfx_kthread+0x10/0x10
[   26.159299]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.159334]  ? calculate_sigpending+0x7b/0xa0
[   26.159370]  ? __pfx_kthread+0x10/0x10
[   26.159400]  ret_from_fork+0x116/0x1d0
[   26.159428]  ? __pfx_kthread+0x10/0x10
[   26.159458]  ret_from_fork_asm+0x1a/0x30
[   26.159526]  </TASK>
[   26.159546] 
[   26.185477] Allocated by task 283:
[   26.186173]  kasan_save_stack+0x45/0x70
[   26.186994]  kasan_save_track+0x18/0x40
[   26.187797]  kasan_save_alloc_info+0x3b/0x50
[   26.188198]  __kasan_kmalloc+0xb7/0xc0
[   26.188727]  __kmalloc_cache_noprof+0x189/0x420
[   26.189307]  kasan_atomics+0x95/0x310
[   26.189861]  kunit_try_run_case+0x1a5/0x480
[   26.190396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.190924]  kthread+0x337/0x6f0
[   26.191444]  ret_from_fork+0x116/0x1d0
[   26.191880]  ret_from_fork_asm+0x1a/0x30
[   26.192360] 
[   26.192730] The buggy address belongs to the object at ffff8881039d9c80
[   26.192730]  which belongs to the cache kmalloc-64 of size 64
[   26.193732] The buggy address is located 0 bytes to the right of
[   26.193732]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.194893] 
[   26.195157] The buggy address belongs to the physical page:
[   26.195806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.196693] flags: 0x200000000000000(node=0|zone=2)
[   26.197293] page_type: f5(slab)
[   26.197757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.198530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.199204] page dumped because: kasan: bad access detected
[   26.199640] 
[   26.199851] Memory state around the buggy address:
[   26.200204]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.200884]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.201589] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.202287]                                      ^
[   26.202684]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.203457]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.204083] ==================================================================
[   25.757029] ==================================================================
[   25.757694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   25.758578] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.759368] 
[   25.759741] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.759904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.759950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.760068] Call Trace:
[   25.760155]  <TASK>
[   25.760213]  dump_stack_lvl+0x73/0xb0
[   25.760410]  print_report+0xd1/0x650
[   25.760545]  ? __virt_addr_valid+0x1db/0x2d0
[   25.760631]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.760794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.760879]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.760948]  kasan_report+0x141/0x180
[   25.760988]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.761028]  kasan_check_range+0x10c/0x1c0
[   25.761065]  __kasan_check_write+0x18/0x20
[   25.761095]  kasan_atomics_helper+0x1c18/0x5450
[   25.761129]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.761162]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.761209]  ? kasan_atomics+0x152/0x310
[   25.761312]  kasan_atomics+0x1dc/0x310
[   25.761350]  ? __pfx_kasan_atomics+0x10/0x10
[   25.761387]  ? __pfx_read_tsc+0x10/0x10
[   25.761419]  ? ktime_get_ts64+0x86/0x230
[   25.761455]  kunit_try_run_case+0x1a5/0x480
[   25.761516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.761562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.761599]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.761650]  ? __kthread_parkme+0x82/0x180
[   25.761683]  ? preempt_count_sub+0x50/0x80
[   25.761716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.761755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.761791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.761828]  kthread+0x337/0x6f0
[   25.761856]  ? trace_preempt_on+0x20/0xc0
[   25.761891]  ? __pfx_kthread+0x10/0x10
[   25.761922]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.761954]  ? calculate_sigpending+0x7b/0xa0
[   25.761991]  ? __pfx_kthread+0x10/0x10
[   25.762023]  ret_from_fork+0x116/0x1d0
[   25.762049]  ? __pfx_kthread+0x10/0x10
[   25.762079]  ret_from_fork_asm+0x1a/0x30
[   25.762123]  </TASK>
[   25.762140] 
[   25.778934] Allocated by task 283:
[   25.779382]  kasan_save_stack+0x45/0x70
[   25.779871]  kasan_save_track+0x18/0x40
[   25.780375]  kasan_save_alloc_info+0x3b/0x50
[   25.780962]  __kasan_kmalloc+0xb7/0xc0
[   25.781459]  __kmalloc_cache_noprof+0x189/0x420
[   25.782093]  kasan_atomics+0x95/0x310
[   25.782616]  kunit_try_run_case+0x1a5/0x480
[   25.783069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.783546]  kthread+0x337/0x6f0
[   25.784016]  ret_from_fork+0x116/0x1d0
[   25.784655]  ret_from_fork_asm+0x1a/0x30
[   25.785100] 
[   25.785383] The buggy address belongs to the object at ffff8881039d9c80
[   25.785383]  which belongs to the cache kmalloc-64 of size 64
[   25.786579] The buggy address is located 0 bytes to the right of
[   25.786579]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.787781] 
[   25.788035] The buggy address belongs to the physical page:
[   25.788639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.789141] flags: 0x200000000000000(node=0|zone=2)
[   25.789571] page_type: f5(slab)
[   25.790082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.790919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.791643] page dumped because: kasan: bad access detected
[   25.792668] 
[   25.792861] Memory state around the buggy address:
[   25.793214]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.794408]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.795339] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.795903]                                      ^
[   25.796842]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.797523]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.798314] ==================================================================
[   24.651925] ==================================================================
[   24.652672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   24.653863] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.654932] 
[   24.655140] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.655255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.655296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.655361] Call Trace:
[   24.655407]  <TASK>
[   24.655460]  dump_stack_lvl+0x73/0xb0
[   24.655591]  print_report+0xd1/0x650
[   24.655679]  ? __virt_addr_valid+0x1db/0x2d0
[   24.655762]  ? kasan_atomics_helper+0xfa9/0x5450
[   24.655842]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.655925]  ? kasan_atomics_helper+0xfa9/0x5450
[   24.656003]  kasan_report+0x141/0x180
[   24.656083]  ? kasan_atomics_helper+0xfa9/0x5450
[   24.656173]  kasan_check_range+0x10c/0x1c0
[   24.656259]  __kasan_check_write+0x18/0x20
[   24.656331]  kasan_atomics_helper+0xfa9/0x5450
[   24.656406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.656483]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.656605]  ? kasan_atomics+0x152/0x310
[   24.656713]  kasan_atomics+0x1dc/0x310
[   24.656755]  ? __pfx_kasan_atomics+0x10/0x10
[   24.656794]  ? __pfx_read_tsc+0x10/0x10
[   24.656828]  ? ktime_get_ts64+0x86/0x230
[   24.656866]  kunit_try_run_case+0x1a5/0x480
[   24.656906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.656941]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.656977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.657012]  ? __kthread_parkme+0x82/0x180
[   24.657042]  ? preempt_count_sub+0x50/0x80
[   24.657076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.657112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.657147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.657184]  kthread+0x337/0x6f0
[   24.657212]  ? trace_preempt_on+0x20/0xc0
[   24.657279]  ? __pfx_kthread+0x10/0x10
[   24.657314]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.657348]  ? calculate_sigpending+0x7b/0xa0
[   24.657383]  ? __pfx_kthread+0x10/0x10
[   24.657416]  ret_from_fork+0x116/0x1d0
[   24.657444]  ? __pfx_kthread+0x10/0x10
[   24.657475]  ret_from_fork_asm+0x1a/0x30
[   24.657550]  </TASK>
[   24.657568] 
[   24.675016] Allocated by task 283:
[   24.675614]  kasan_save_stack+0x45/0x70
[   24.676199]  kasan_save_track+0x18/0x40
[   24.676681]  kasan_save_alloc_info+0x3b/0x50
[   24.677397]  __kasan_kmalloc+0xb7/0xc0
[   24.677828]  __kmalloc_cache_noprof+0x189/0x420
[   24.678596]  kasan_atomics+0x95/0x310
[   24.679017]  kunit_try_run_case+0x1a5/0x480
[   24.679413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.679990]  kthread+0x337/0x6f0
[   24.680391]  ret_from_fork+0x116/0x1d0
[   24.680850]  ret_from_fork_asm+0x1a/0x30
[   24.681197] 
[   24.681444] The buggy address belongs to the object at ffff8881039d9c80
[   24.681444]  which belongs to the cache kmalloc-64 of size 64
[   24.683876] The buggy address is located 0 bytes to the right of
[   24.683876]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.685027] 
[   24.685701] The buggy address belongs to the physical page:
[   24.686135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.687015] flags: 0x200000000000000(node=0|zone=2)
[   24.687992] page_type: f5(slab)
[   24.688172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.688969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.689291] page dumped because: kasan: bad access detected
[   24.690247] 
[   24.690488] Memory state around the buggy address:
[   24.691049]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.692075]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.692895] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.694051]                                      ^
[   24.694632]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.695152]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.696408] ==================================================================
[   24.960045] ==================================================================
[   24.960694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   24.961283] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.961922] 
[   24.962160] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.962305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.962348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.962414] Call Trace:
[   24.962471]  <TASK>
[   24.962548]  dump_stack_lvl+0x73/0xb0
[   24.962645]  print_report+0xd1/0x650
[   24.962732]  ? __virt_addr_valid+0x1db/0x2d0
[   24.962818]  ? kasan_atomics_helper+0x49e8/0x5450
[   24.962903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.962985]  ? kasan_atomics_helper+0x49e8/0x5450
[   24.963065]  kasan_report+0x141/0x180
[   24.963150]  ? kasan_atomics_helper+0x49e8/0x5450
[   24.963240]  __asan_report_load4_noabort+0x18/0x20
[   24.963330]  kasan_atomics_helper+0x49e8/0x5450
[   24.963411]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.963488]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.963574]  ? kasan_atomics+0x152/0x310
[   24.963616]  kasan_atomics+0x1dc/0x310
[   24.963650]  ? __pfx_kasan_atomics+0x10/0x10
[   24.963687]  ? __pfx_read_tsc+0x10/0x10
[   24.963721]  ? ktime_get_ts64+0x86/0x230
[   24.963756]  kunit_try_run_case+0x1a5/0x480
[   24.963796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.963831]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.963866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.963900]  ? __kthread_parkme+0x82/0x180
[   24.963931]  ? preempt_count_sub+0x50/0x80
[   24.963963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.964000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.964035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.964071]  kthread+0x337/0x6f0
[   24.964099]  ? trace_preempt_on+0x20/0xc0
[   24.964133]  ? __pfx_kthread+0x10/0x10
[   24.964163]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.964196]  ? calculate_sigpending+0x7b/0xa0
[   24.964250]  ? __pfx_kthread+0x10/0x10
[   24.964301]  ret_from_fork+0x116/0x1d0
[   24.964330]  ? __pfx_kthread+0x10/0x10
[   24.964360]  ret_from_fork_asm+0x1a/0x30
[   24.964402]  </TASK>
[   24.964419] 
[   24.978918] Allocated by task 283:
[   24.979260]  kasan_save_stack+0x45/0x70
[   24.979758]  kasan_save_track+0x18/0x40
[   24.980173]  kasan_save_alloc_info+0x3b/0x50
[   24.980611]  __kasan_kmalloc+0xb7/0xc0
[   24.980930]  __kmalloc_cache_noprof+0x189/0x420
[   24.981441]  kasan_atomics+0x95/0x310
[   24.982203]  kunit_try_run_case+0x1a5/0x480
[   24.982692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.984766]  kthread+0x337/0x6f0
[   24.985185]  ret_from_fork+0x116/0x1d0
[   24.985687]  ret_from_fork_asm+0x1a/0x30
[   24.986117] 
[   24.986788] The buggy address belongs to the object at ffff8881039d9c80
[   24.986788]  which belongs to the cache kmalloc-64 of size 64
[   24.987736] The buggy address is located 0 bytes to the right of
[   24.987736]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.989549] 
[   24.989951] The buggy address belongs to the physical page:
[   24.990762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.991689] flags: 0x200000000000000(node=0|zone=2)
[   24.992143] page_type: f5(slab)
[   24.992547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.993149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.993850] page dumped because: kasan: bad access detected
[   24.994380] 
[   24.994608] Memory state around the buggy address:
[   24.995065]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.995811]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.996469] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.997069]                                      ^
[   24.997597]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.998314]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.998921] ==================================================================
[   25.575894] ==================================================================
[   25.576648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   25.577454] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.577965] 
[   25.578275] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.578398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.578437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.578524] Call Trace:
[   25.578610]  <TASK>
[   25.578667]  dump_stack_lvl+0x73/0xb0
[   25.578902]  print_report+0xd1/0x650
[   25.579026]  ? __virt_addr_valid+0x1db/0x2d0
[   25.579111]  ? kasan_atomics_helper+0x194a/0x5450
[   25.579191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.579283]  ? kasan_atomics_helper+0x194a/0x5450
[   25.579343]  kasan_report+0x141/0x180
[   25.579411]  ? kasan_atomics_helper+0x194a/0x5450
[   25.579568]  kasan_check_range+0x10c/0x1c0
[   25.579689]  __kasan_check_write+0x18/0x20
[   25.579768]  kasan_atomics_helper+0x194a/0x5450
[   25.579904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.580015]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.580104]  ? kasan_atomics+0x152/0x310
[   25.580149]  kasan_atomics+0x1dc/0x310
[   25.580185]  ? __pfx_kasan_atomics+0x10/0x10
[   25.580225]  ? __pfx_read_tsc+0x10/0x10
[   25.580306]  ? ktime_get_ts64+0x86/0x230
[   25.580346]  kunit_try_run_case+0x1a5/0x480
[   25.580389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.580426]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.580462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.580523]  ? __kthread_parkme+0x82/0x180
[   25.580560]  ? preempt_count_sub+0x50/0x80
[   25.580595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.580633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.580669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.580705]  kthread+0x337/0x6f0
[   25.580734]  ? trace_preempt_on+0x20/0xc0
[   25.580770]  ? __pfx_kthread+0x10/0x10
[   25.580801]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.580834]  ? calculate_sigpending+0x7b/0xa0
[   25.580870]  ? __pfx_kthread+0x10/0x10
[   25.580902]  ret_from_fork+0x116/0x1d0
[   25.580930]  ? __pfx_kthread+0x10/0x10
[   25.580959]  ret_from_fork_asm+0x1a/0x30
[   25.581002]  </TASK>
[   25.581018] 
[   25.598819] Allocated by task 283:
[   25.599267]  kasan_save_stack+0x45/0x70
[   25.599831]  kasan_save_track+0x18/0x40
[   25.600337]  kasan_save_alloc_info+0x3b/0x50
[   25.600758]  __kasan_kmalloc+0xb7/0xc0
[   25.601145]  __kmalloc_cache_noprof+0x189/0x420
[   25.601762]  kasan_atomics+0x95/0x310
[   25.602259]  kunit_try_run_case+0x1a5/0x480
[   25.602757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.603317]  kthread+0x337/0x6f0
[   25.603754]  ret_from_fork+0x116/0x1d0
[   25.604137]  ret_from_fork_asm+0x1a/0x30
[   25.604529] 
[   25.604773] The buggy address belongs to the object at ffff8881039d9c80
[   25.604773]  which belongs to the cache kmalloc-64 of size 64
[   25.605863] The buggy address is located 0 bytes to the right of
[   25.605863]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.606831] 
[   25.607031] The buggy address belongs to the physical page:
[   25.607455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.608212] flags: 0x200000000000000(node=0|zone=2)
[   25.608800] page_type: f5(slab)
[   25.609294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.610046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.610768] page dumped because: kasan: bad access detected
[   25.611421] 
[   25.611631] Memory state around the buggy address:
[   25.611979]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.612688]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.613466] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.614128]                                      ^
[   25.614673]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.615394]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.615957] ==================================================================
[   25.351015] ==================================================================
[   25.351786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   25.352563] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.353347] 
[   25.353670] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.353799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.353843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.353909] Call Trace:
[   25.353966]  <TASK>
[   25.354019]  dump_stack_lvl+0x73/0xb0
[   25.354182]  print_report+0xd1/0x650
[   25.354425]  ? __virt_addr_valid+0x1db/0x2d0
[   25.354601]  ? kasan_atomics_helper+0x164f/0x5450
[   25.354713]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.354796]  ? kasan_atomics_helper+0x164f/0x5450
[   25.354875]  kasan_report+0x141/0x180
[   25.354951]  ? kasan_atomics_helper+0x164f/0x5450
[   25.355037]  kasan_check_range+0x10c/0x1c0
[   25.355121]  __kasan_check_write+0x18/0x20
[   25.355197]  kasan_atomics_helper+0x164f/0x5450
[   25.355442]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.355564]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.355663]  ? kasan_atomics+0x152/0x310
[   25.355747]  kasan_atomics+0x1dc/0x310
[   25.355793]  ? __pfx_kasan_atomics+0x10/0x10
[   25.355833]  ? __pfx_read_tsc+0x10/0x10
[   25.355868]  ? ktime_get_ts64+0x86/0x230
[   25.355903]  kunit_try_run_case+0x1a5/0x480
[   25.355943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.355977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.356013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.356050]  ? __kthread_parkme+0x82/0x180
[   25.356080]  ? preempt_count_sub+0x50/0x80
[   25.356113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.356150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.356185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.356245]  kthread+0x337/0x6f0
[   25.356296]  ? trace_preempt_on+0x20/0xc0
[   25.356333]  ? __pfx_kthread+0x10/0x10
[   25.356363]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.356395]  ? calculate_sigpending+0x7b/0xa0
[   25.356431]  ? __pfx_kthread+0x10/0x10
[   25.356460]  ret_from_fork+0x116/0x1d0
[   25.356487]  ? __pfx_kthread+0x10/0x10
[   25.356548]  ret_from_fork_asm+0x1a/0x30
[   25.356594]  </TASK>
[   25.356610] 
[   25.370616] Allocated by task 283:
[   25.371289]  kasan_save_stack+0x45/0x70
[   25.371749]  kasan_save_track+0x18/0x40
[   25.372157]  kasan_save_alloc_info+0x3b/0x50
[   25.372603]  __kasan_kmalloc+0xb7/0xc0
[   25.372890]  __kmalloc_cache_noprof+0x189/0x420
[   25.373192]  kasan_atomics+0x95/0x310
[   25.373708]  kunit_try_run_case+0x1a5/0x480
[   25.374156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.374629]  kthread+0x337/0x6f0
[   25.374874]  ret_from_fork+0x116/0x1d0
[   25.375217]  ret_from_fork_asm+0x1a/0x30
[   25.375678] 
[   25.375832] The buggy address belongs to the object at ffff8881039d9c80
[   25.375832]  which belongs to the cache kmalloc-64 of size 64
[   25.376598] The buggy address is located 0 bytes to the right of
[   25.376598]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.377436] 
[   25.380548] The buggy address belongs to the physical page:
[   25.380947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.381454] flags: 0x200000000000000(node=0|zone=2)
[   25.381820] page_type: f5(slab)
[   25.382061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.382452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.382993] page dumped because: kasan: bad access detected
[   25.383851] 
[   25.384074] Memory state around the buggy address:
[   25.384527]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.385552]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.386240] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.388277]                                      ^
[   25.388622]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.390079]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.390833] ==================================================================
[   24.477127] ==================================================================
[   24.478461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   24.479421] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.479877] 
[   24.480070] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.480181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.480219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.480283] Call Trace:
[   24.480795]  <TASK>
[   24.480887]  dump_stack_lvl+0x73/0xb0
[   24.480995]  print_report+0xd1/0x650
[   24.481079]  ? __virt_addr_valid+0x1db/0x2d0
[   24.481321]  ? kasan_atomics_helper+0xde0/0x5450
[   24.481401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.481481]  ? kasan_atomics_helper+0xde0/0x5450
[   24.481642]  kasan_report+0x141/0x180
[   24.481729]  ? kasan_atomics_helper+0xde0/0x5450
[   24.481819]  kasan_check_range+0x10c/0x1c0
[   24.481902]  __kasan_check_write+0x18/0x20
[   24.481975]  kasan_atomics_helper+0xde0/0x5450
[   24.482085]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.482173]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.482268]  ? kasan_atomics+0x152/0x310
[   24.482323]  kasan_atomics+0x1dc/0x310
[   24.482360]  ? __pfx_kasan_atomics+0x10/0x10
[   24.482398]  ? __pfx_read_tsc+0x10/0x10
[   24.482433]  ? ktime_get_ts64+0x86/0x230
[   24.482471]  kunit_try_run_case+0x1a5/0x480
[   24.482559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.482641]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.482715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.482787]  ? __kthread_parkme+0x82/0x180
[   24.482856]  ? preempt_count_sub+0x50/0x80
[   24.482927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.483002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.483082]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.483127]  kthread+0x337/0x6f0
[   24.483156]  ? trace_preempt_on+0x20/0xc0
[   24.483191]  ? __pfx_kthread+0x10/0x10
[   24.483230]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.483303]  ? calculate_sigpending+0x7b/0xa0
[   24.483342]  ? __pfx_kthread+0x10/0x10
[   24.483374]  ret_from_fork+0x116/0x1d0
[   24.483401]  ? __pfx_kthread+0x10/0x10
[   24.483432]  ret_from_fork_asm+0x1a/0x30
[   24.483476]  </TASK>
[   24.483492] 
[   24.507300] Allocated by task 283:
[   24.507979]  kasan_save_stack+0x45/0x70
[   24.508578]  kasan_save_track+0x18/0x40
[   24.508998]  kasan_save_alloc_info+0x3b/0x50
[   24.509959]  __kasan_kmalloc+0xb7/0xc0
[   24.510439]  __kmalloc_cache_noprof+0x189/0x420
[   24.511490]  kasan_atomics+0x95/0x310
[   24.512139]  kunit_try_run_case+0x1a5/0x480
[   24.512620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.513058]  kthread+0x337/0x6f0
[   24.513386]  ret_from_fork+0x116/0x1d0
[   24.514099]  ret_from_fork_asm+0x1a/0x30
[   24.515321] 
[   24.515725] The buggy address belongs to the object at ffff8881039d9c80
[   24.515725]  which belongs to the cache kmalloc-64 of size 64
[   24.516769] The buggy address is located 0 bytes to the right of
[   24.516769]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.519049] 
[   24.519248] The buggy address belongs to the physical page:
[   24.519776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.520836] flags: 0x200000000000000(node=0|zone=2)
[   24.522347] page_type: f5(slab)
[   24.522969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.524198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.525239] page dumped because: kasan: bad access detected
[   24.526154] 
[   24.526423] Memory state around the buggy address:
[   24.527517]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.528387]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.529291] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.530064]                                      ^
[   24.530804]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.531197]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.532715] ==================================================================
[   25.000301] ==================================================================
[   25.000841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   25.001492] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.002165] 
[   25.002561] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.002692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.002737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.002805] Call Trace:
[   25.002861]  <TASK>
[   25.002937]  dump_stack_lvl+0x73/0xb0
[   25.003067]  print_report+0xd1/0x650
[   25.003156]  ? __virt_addr_valid+0x1db/0x2d0
[   25.003307]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.003421]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.003516]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.003597]  kasan_report+0x141/0x180
[   25.003678]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.003769]  kasan_check_range+0x10c/0x1c0
[   25.003875]  __kasan_check_write+0x18/0x20
[   25.003981]  kasan_atomics_helper+0x12e6/0x5450
[   25.004069]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.004149]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.004326]  ? kasan_atomics+0x152/0x310
[   25.004416]  kasan_atomics+0x1dc/0x310
[   25.004476]  ? __pfx_kasan_atomics+0x10/0x10
[   25.004543]  ? __pfx_read_tsc+0x10/0x10
[   25.004582]  ? ktime_get_ts64+0x86/0x230
[   25.004620]  kunit_try_run_case+0x1a5/0x480
[   25.004660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.004697]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.004733]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.004768]  ? __kthread_parkme+0x82/0x180
[   25.004800]  ? preempt_count_sub+0x50/0x80
[   25.004833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.004870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.004906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.004942]  kthread+0x337/0x6f0
[   25.004971]  ? trace_preempt_on+0x20/0xc0
[   25.005005]  ? __pfx_kthread+0x10/0x10
[   25.005036]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.005069]  ? calculate_sigpending+0x7b/0xa0
[   25.005104]  ? __pfx_kthread+0x10/0x10
[   25.005134]  ret_from_fork+0x116/0x1d0
[   25.005162]  ? __pfx_kthread+0x10/0x10
[   25.005191]  ret_from_fork_asm+0x1a/0x30
[   25.005269]  </TASK>
[   25.005291] 
[   25.023064] Allocated by task 283:
[   25.023631]  kasan_save_stack+0x45/0x70
[   25.024302]  kasan_save_track+0x18/0x40
[   25.024837]  kasan_save_alloc_info+0x3b/0x50
[   25.025460]  __kasan_kmalloc+0xb7/0xc0
[   25.025962]  __kmalloc_cache_noprof+0x189/0x420
[   25.026635]  kasan_atomics+0x95/0x310
[   25.027110]  kunit_try_run_case+0x1a5/0x480
[   25.027693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.028348]  kthread+0x337/0x6f0
[   25.028854]  ret_from_fork+0x116/0x1d0
[   25.029404]  ret_from_fork_asm+0x1a/0x30
[   25.029928] 
[   25.030265] The buggy address belongs to the object at ffff8881039d9c80
[   25.030265]  which belongs to the cache kmalloc-64 of size 64
[   25.031179] The buggy address is located 0 bytes to the right of
[   25.031179]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.032545] 
[   25.032816] The buggy address belongs to the physical page:
[   25.033454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.034106] flags: 0x200000000000000(node=0|zone=2)
[   25.034798] page_type: f5(slab)
[   25.035160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.035947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.036796] page dumped because: kasan: bad access detected
[   25.037392] 
[   25.037663] Memory state around the buggy address:
[   25.038277]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.039023]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.039830] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.040541]                                      ^
[   25.040914]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.041585]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.042163] ==================================================================
[   23.628934] ==================================================================
[   23.629476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   23.631985] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.632986] 
[   23.633238] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.633441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.633488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.633595] Call Trace:
[   23.633673]  <TASK>
[   23.633731]  dump_stack_lvl+0x73/0xb0
[   23.633841]  print_report+0xd1/0x650
[   23.633927]  ? __virt_addr_valid+0x1db/0x2d0
[   23.634008]  ? kasan_atomics_helper+0x4b3a/0x5450
[   23.634087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.634170]  ? kasan_atomics_helper+0x4b3a/0x5450
[   23.634248]  kasan_report+0x141/0x180
[   23.634566]  ? kasan_atomics_helper+0x4b3a/0x5450
[   23.634660]  __asan_report_store4_noabort+0x1b/0x30
[   23.634739]  kasan_atomics_helper+0x4b3a/0x5450
[   23.634820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.634938]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.634992]  ? kasan_atomics+0x152/0x310
[   23.635033]  kasan_atomics+0x1dc/0x310
[   23.635070]  ? __pfx_kasan_atomics+0x10/0x10
[   23.635112]  ? __pfx_read_tsc+0x10/0x10
[   23.635147]  ? ktime_get_ts64+0x86/0x230
[   23.635185]  kunit_try_run_case+0x1a5/0x480
[   23.635254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.635304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.635343]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.635380]  ? __kthread_parkme+0x82/0x180
[   23.635413]  ? preempt_count_sub+0x50/0x80
[   23.635447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.635484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.635564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.635654]  kthread+0x337/0x6f0
[   23.635728]  ? trace_preempt_on+0x20/0xc0
[   23.635809]  ? __pfx_kthread+0x10/0x10
[   23.635878]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.635952]  ? calculate_sigpending+0x7b/0xa0
[   23.636025]  ? __pfx_kthread+0x10/0x10
[   23.636061]  ret_from_fork+0x116/0x1d0
[   23.636092]  ? __pfx_kthread+0x10/0x10
[   23.636123]  ret_from_fork_asm+0x1a/0x30
[   23.636166]  </TASK>
[   23.636181] 
[   23.660368] Allocated by task 283:
[   23.662117]  kasan_save_stack+0x45/0x70
[   23.662871]  kasan_save_track+0x18/0x40
[   23.663327]  kasan_save_alloc_info+0x3b/0x50
[   23.664362]  __kasan_kmalloc+0xb7/0xc0
[   23.664739]  __kmalloc_cache_noprof+0x189/0x420
[   23.665077]  kasan_atomics+0x95/0x310
[   23.665592]  kunit_try_run_case+0x1a5/0x480
[   23.666864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.667975]  kthread+0x337/0x6f0
[   23.668441]  ret_from_fork+0x116/0x1d0
[   23.668914]  ret_from_fork_asm+0x1a/0x30
[   23.670069] 
[   23.670620] The buggy address belongs to the object at ffff8881039d9c80
[   23.670620]  which belongs to the cache kmalloc-64 of size 64
[   23.671990] The buggy address is located 0 bytes to the right of
[   23.671990]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.673761] 
[   23.674446] The buggy address belongs to the physical page:
[   23.674849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.675725] flags: 0x200000000000000(node=0|zone=2)
[   23.676178] page_type: f5(slab)
[   23.676572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.677169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.678069] page dumped because: kasan: bad access detected
[   23.678442] 
[   23.678716] Memory state around the buggy address:
[   23.680132]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.681189]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.681996] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.683096]                                      ^
[   23.683563]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.684094]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.684855] ==================================================================
[   24.598485] ==================================================================
[   24.599321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   24.601395] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.602148] 
[   24.602699] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.602836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.602877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.602963] Call Trace:
[   24.603016]  <TASK>
[   24.603071]  dump_stack_lvl+0x73/0xb0
[   24.603184]  print_report+0xd1/0x650
[   24.603561]  ? __virt_addr_valid+0x1db/0x2d0
[   24.603652]  ? kasan_atomics_helper+0xf10/0x5450
[   24.603735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.603814]  ? kasan_atomics_helper+0xf10/0x5450
[   24.603892]  kasan_report+0x141/0x180
[   24.603930]  ? kasan_atomics_helper+0xf10/0x5450
[   24.603971]  kasan_check_range+0x10c/0x1c0
[   24.604006]  __kasan_check_write+0x18/0x20
[   24.604037]  kasan_atomics_helper+0xf10/0x5450
[   24.604073]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.604107]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.604152]  ? kasan_atomics+0x152/0x310
[   24.604193]  kasan_atomics+0x1dc/0x310
[   24.604237]  ? __pfx_kasan_atomics+0x10/0x10
[   24.604309]  ? __pfx_read_tsc+0x10/0x10
[   24.604345]  ? ktime_get_ts64+0x86/0x230
[   24.604382]  kunit_try_run_case+0x1a5/0x480
[   24.604424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.604461]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.604523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.604952]  ? __kthread_parkme+0x82/0x180
[   24.604998]  ? preempt_count_sub+0x50/0x80
[   24.605036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.605076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.605115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.605153]  kthread+0x337/0x6f0
[   24.605186]  ? trace_preempt_on+0x20/0xc0
[   24.605225]  ? __pfx_kthread+0x10/0x10
[   24.605304]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.605343]  ? calculate_sigpending+0x7b/0xa0
[   24.605382]  ? __pfx_kthread+0x10/0x10
[   24.605415]  ret_from_fork+0x116/0x1d0
[   24.605445]  ? __pfx_kthread+0x10/0x10
[   24.605475]  ret_from_fork_asm+0x1a/0x30
[   24.605552]  </TASK>
[   24.605606] 
[   24.626230] Allocated by task 283:
[   24.627320]  kasan_save_stack+0x45/0x70
[   24.628210]  kasan_save_track+0x18/0x40
[   24.629116]  kasan_save_alloc_info+0x3b/0x50
[   24.630376]  __kasan_kmalloc+0xb7/0xc0
[   24.630712]  __kmalloc_cache_noprof+0x189/0x420
[   24.631182]  kasan_atomics+0x95/0x310
[   24.632412]  kunit_try_run_case+0x1a5/0x480
[   24.632862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.633349]  kthread+0x337/0x6f0
[   24.633713]  ret_from_fork+0x116/0x1d0
[   24.634131]  ret_from_fork_asm+0x1a/0x30
[   24.635132] 
[   24.635377] The buggy address belongs to the object at ffff8881039d9c80
[   24.635377]  which belongs to the cache kmalloc-64 of size 64
[   24.636812] The buggy address is located 0 bytes to the right of
[   24.636812]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.638268] 
[   24.638947] The buggy address belongs to the physical page:
[   24.639636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.640887] flags: 0x200000000000000(node=0|zone=2)
[   24.641314] page_type: f5(slab)
[   24.642193] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.642890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.644129] page dumped because: kasan: bad access detected
[   24.644599] 
[   24.644938] Memory state around the buggy address:
[   24.645877]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.647027]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.648169] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.648589]                                      ^
[   24.648905]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.649165]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.650155] ==================================================================
[   26.022326] ==================================================================
[   26.022961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   26.023636] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.024331] 
[   26.024638] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.024770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.024813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.024877] Call Trace:
[   26.024933]  <TASK>
[   26.024989]  dump_stack_lvl+0x73/0xb0
[   26.025083]  print_report+0xd1/0x650
[   26.025166]  ? __virt_addr_valid+0x1db/0x2d0
[   26.025301]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.025385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.025470]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.025570]  kasan_report+0x141/0x180
[   26.025662]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.025752]  kasan_check_range+0x10c/0x1c0
[   26.025841]  __kasan_check_write+0x18/0x20
[   26.025921]  kasan_atomics_helper+0x1f43/0x5450
[   26.026008]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.026091]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.026194]  ? kasan_atomics+0x152/0x310
[   26.026333]  kasan_atomics+0x1dc/0x310
[   26.026414]  ? __pfx_kasan_atomics+0x10/0x10
[   26.026519]  ? __pfx_read_tsc+0x10/0x10
[   26.026596]  ? ktime_get_ts64+0x86/0x230
[   26.026688]  kunit_try_run_case+0x1a5/0x480
[   26.026781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.026865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.026949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.027034]  ? __kthread_parkme+0x82/0x180
[   26.027112]  ? preempt_count_sub+0x50/0x80
[   26.027194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.027288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.027331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.027370]  kthread+0x337/0x6f0
[   26.027402]  ? trace_preempt_on+0x20/0xc0
[   26.027441]  ? __pfx_kthread+0x10/0x10
[   26.027472]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.027528]  ? calculate_sigpending+0x7b/0xa0
[   26.027571]  ? __pfx_kthread+0x10/0x10
[   26.027603]  ret_from_fork+0x116/0x1d0
[   26.027630]  ? __pfx_kthread+0x10/0x10
[   26.027661]  ret_from_fork_asm+0x1a/0x30
[   26.027704]  </TASK>
[   26.027720] 
[   26.044663] Allocated by task 283:
[   26.045176]  kasan_save_stack+0x45/0x70
[   26.045716]  kasan_save_track+0x18/0x40
[   26.046204]  kasan_save_alloc_info+0x3b/0x50
[   26.046712]  __kasan_kmalloc+0xb7/0xc0
[   26.047130]  __kmalloc_cache_noprof+0x189/0x420
[   26.047646]  kasan_atomics+0x95/0x310
[   26.048077]  kunit_try_run_case+0x1a5/0x480
[   26.048429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.049085]  kthread+0x337/0x6f0
[   26.049703]  ret_from_fork+0x116/0x1d0
[   26.050064]  ret_from_fork_asm+0x1a/0x30
[   26.050401] 
[   26.050625] The buggy address belongs to the object at ffff8881039d9c80
[   26.050625]  which belongs to the cache kmalloc-64 of size 64
[   26.051670] The buggy address is located 0 bytes to the right of
[   26.051670]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.052887] 
[   26.053085] The buggy address belongs to the physical page:
[   26.053462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.054207] flags: 0x200000000000000(node=0|zone=2)
[   26.054852] page_type: f5(slab)
[   26.055295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.056023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.056653] page dumped because: kasan: bad access detected
[   26.057140] 
[   26.057493] Memory state around the buggy address:
[   26.057978]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.058701]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.059157] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.059862]                                      ^
[   26.060372]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.061038]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.061954] ==================================================================
[   23.525037] ==================================================================
[   23.525521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   23.526130] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.527521] 
[   23.527851] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.527984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.528029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.528096] Call Trace:
[   23.528151]  <TASK>
[   23.528203]  dump_stack_lvl+0x73/0xb0
[   23.528780]  print_report+0xd1/0x650
[   23.528903]  ? __virt_addr_valid+0x1db/0x2d0
[   23.528985]  ? kasan_atomics_helper+0x4b54/0x5450
[   23.529053]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.529092]  ? kasan_atomics_helper+0x4b54/0x5450
[   23.529128]  kasan_report+0x141/0x180
[   23.529162]  ? kasan_atomics_helper+0x4b54/0x5450
[   23.529203]  __asan_report_load4_noabort+0x18/0x20
[   23.529295]  kasan_atomics_helper+0x4b54/0x5450
[   23.529336]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.529371]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.529417]  ? kasan_atomics+0x152/0x310
[   23.529459]  kasan_atomics+0x1dc/0x310
[   23.529515]  ? __pfx_kasan_atomics+0x10/0x10
[   23.529633]  ? __pfx_read_tsc+0x10/0x10
[   23.529713]  ? ktime_get_ts64+0x86/0x230
[   23.529755]  kunit_try_run_case+0x1a5/0x480
[   23.529798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.529835]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.529871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.529905]  ? __kthread_parkme+0x82/0x180
[   23.529936]  ? preempt_count_sub+0x50/0x80
[   23.529970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.530007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.530042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.530078]  kthread+0x337/0x6f0
[   23.530107]  ? trace_preempt_on+0x20/0xc0
[   23.530140]  ? __pfx_kthread+0x10/0x10
[   23.530170]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.530203]  ? calculate_sigpending+0x7b/0xa0
[   23.530277]  ? __pfx_kthread+0x10/0x10
[   23.530313]  ret_from_fork+0x116/0x1d0
[   23.530340]  ? __pfx_kthread+0x10/0x10
[   23.530370]  ret_from_fork_asm+0x1a/0x30
[   23.530412]  </TASK>
[   23.530428] 
[   23.551370] Allocated by task 283:
[   23.552201]  kasan_save_stack+0x45/0x70
[   23.552911]  kasan_save_track+0x18/0x40
[   23.553532]  kasan_save_alloc_info+0x3b/0x50
[   23.554359]  __kasan_kmalloc+0xb7/0xc0
[   23.554667]  __kmalloc_cache_noprof+0x189/0x420
[   23.555365]  kasan_atomics+0x95/0x310
[   23.555992]  kunit_try_run_case+0x1a5/0x480
[   23.556842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.557473]  kthread+0x337/0x6f0
[   23.558004]  ret_from_fork+0x116/0x1d0
[   23.558464]  ret_from_fork_asm+0x1a/0x30
[   23.559198] 
[   23.559756] The buggy address belongs to the object at ffff8881039d9c80
[   23.559756]  which belongs to the cache kmalloc-64 of size 64
[   23.562042] The buggy address is located 0 bytes to the right of
[   23.562042]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.563584] 
[   23.564071] The buggy address belongs to the physical page:
[   23.564851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.566350] flags: 0x200000000000000(node=0|zone=2)
[   23.566921] page_type: f5(slab)
[   23.567226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.568338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.568804] page dumped because: kasan: bad access detected
[   23.570096] 
[   23.570682] Memory state around the buggy address:
[   23.571212]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.572136]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.572654] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.573194]                                      ^
[   23.574374]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.575423]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.576533] ==================================================================
[   23.857955] ==================================================================
[   23.858695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   23.859770] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.860296] 
[   23.861319] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.861454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.861515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.861782] Call Trace:
[   23.861844]  <TASK>
[   23.861899]  dump_stack_lvl+0x73/0xb0
[   23.862007]  print_report+0xd1/0x650
[   23.862094]  ? __virt_addr_valid+0x1db/0x2d0
[   23.862174]  ? kasan_atomics_helper+0x72f/0x5450
[   23.862272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.862353]  ? kasan_atomics_helper+0x72f/0x5450
[   23.862429]  kasan_report+0x141/0x180
[   23.862532]  ? kasan_atomics_helper+0x72f/0x5450
[   23.862627]  kasan_check_range+0x10c/0x1c0
[   23.862841]  __kasan_check_write+0x18/0x20
[   23.862923]  kasan_atomics_helper+0x72f/0x5450
[   23.863001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.863042]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.863092]  ? kasan_atomics+0x152/0x310
[   23.863134]  kasan_atomics+0x1dc/0x310
[   23.863169]  ? __pfx_kasan_atomics+0x10/0x10
[   23.863207]  ? __pfx_read_tsc+0x10/0x10
[   23.863278]  ? ktime_get_ts64+0x86/0x230
[   23.863321]  kunit_try_run_case+0x1a5/0x480
[   23.863363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.863402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.863439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.863474]  ? __kthread_parkme+0x82/0x180
[   23.863542]  ? preempt_count_sub+0x50/0x80
[   23.863732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.863776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.863817]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.863855]  kthread+0x337/0x6f0
[   23.863887]  ? trace_preempt_on+0x20/0xc0
[   23.863923]  ? __pfx_kthread+0x10/0x10
[   23.863955]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.863989]  ? calculate_sigpending+0x7b/0xa0
[   23.864026]  ? __pfx_kthread+0x10/0x10
[   23.864059]  ret_from_fork+0x116/0x1d0
[   23.864086]  ? __pfx_kthread+0x10/0x10
[   23.864117]  ret_from_fork_asm+0x1a/0x30
[   23.864162]  </TASK>
[   23.864179] 
[   23.880185] Allocated by task 283:
[   23.880620]  kasan_save_stack+0x45/0x70
[   23.881272]  kasan_save_track+0x18/0x40
[   23.881707]  kasan_save_alloc_info+0x3b/0x50
[   23.882139]  __kasan_kmalloc+0xb7/0xc0
[   23.882527]  __kmalloc_cache_noprof+0x189/0x420
[   23.883072]  kasan_atomics+0x95/0x310
[   23.883652]  kunit_try_run_case+0x1a5/0x480
[   23.884120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.884528]  kthread+0x337/0x6f0
[   23.884944]  ret_from_fork+0x116/0x1d0
[   23.885393]  ret_from_fork_asm+0x1a/0x30
[   23.885775] 
[   23.886023] The buggy address belongs to the object at ffff8881039d9c80
[   23.886023]  which belongs to the cache kmalloc-64 of size 64
[   23.886943] The buggy address is located 0 bytes to the right of
[   23.886943]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.887868] 
[   23.888127] The buggy address belongs to the physical page:
[   23.888711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.889683] flags: 0x200000000000000(node=0|zone=2)
[   23.890052] page_type: f5(slab)
[   23.890403] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.891460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.892141] page dumped because: kasan: bad access detected
[   23.892647] 
[   23.892855] Memory state around the buggy address:
[   23.893254]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.893796]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.894478] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.894947]                                      ^
[   23.895629]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.896254]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.896941] ==================================================================
[   26.247940] ==================================================================
[   26.249374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   26.249854] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.250938] 
[   26.251372] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.251522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.251564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.251628] Call Trace:
[   26.251683]  <TASK>
[   26.251741]  dump_stack_lvl+0x73/0xb0
[   26.251846]  print_report+0xd1/0x650
[   26.251927]  ? __virt_addr_valid+0x1db/0x2d0
[   26.252019]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.252095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.252173]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.252277]  kasan_report+0x141/0x180
[   26.252364]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.252455]  __asan_report_load8_noabort+0x18/0x20
[   26.252561]  kasan_atomics_helper+0x4fb2/0x5450
[   26.252638]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.252717]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.252835]  ? kasan_atomics+0x152/0x310
[   26.252889]  kasan_atomics+0x1dc/0x310
[   26.252929]  ? __pfx_kasan_atomics+0x10/0x10
[   26.252968]  ? __pfx_read_tsc+0x10/0x10
[   26.253005]  ? ktime_get_ts64+0x86/0x230
[   26.253047]  kunit_try_run_case+0x1a5/0x480
[   26.253091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.253129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.253168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.253204]  ? __kthread_parkme+0x82/0x180
[   26.253279]  ? preempt_count_sub+0x50/0x80
[   26.253324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.253364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.253401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.253438]  kthread+0x337/0x6f0
[   26.253469]  ? trace_preempt_on+0x20/0xc0
[   26.253557]  ? __pfx_kthread+0x10/0x10
[   26.253625]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.253686]  ? calculate_sigpending+0x7b/0xa0
[   26.253749]  ? __pfx_kthread+0x10/0x10
[   26.253812]  ret_from_fork+0x116/0x1d0
[   26.253847]  ? __pfx_kthread+0x10/0x10
[   26.253881]  ret_from_fork_asm+0x1a/0x30
[   26.253926]  </TASK>
[   26.253943] 
[   26.268087] Allocated by task 283:
[   26.268775]  kasan_save_stack+0x45/0x70
[   26.269227]  kasan_save_track+0x18/0x40
[   26.269717]  kasan_save_alloc_info+0x3b/0x50
[   26.270178]  __kasan_kmalloc+0xb7/0xc0
[   26.270642]  __kmalloc_cache_noprof+0x189/0x420
[   26.271148]  kasan_atomics+0x95/0x310
[   26.271575]  kunit_try_run_case+0x1a5/0x480
[   26.271967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.272483]  kthread+0x337/0x6f0
[   26.272896]  ret_from_fork+0x116/0x1d0
[   26.273315]  ret_from_fork_asm+0x1a/0x30
[   26.273702] 
[   26.273898] The buggy address belongs to the object at ffff8881039d9c80
[   26.273898]  which belongs to the cache kmalloc-64 of size 64
[   26.274763] The buggy address is located 0 bytes to the right of
[   26.274763]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.276202] 
[   26.276474] The buggy address belongs to the physical page:
[   26.276879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.277435] flags: 0x200000000000000(node=0|zone=2)
[   26.277978] page_type: f5(slab)
[   26.278540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.279150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.279640] page dumped because: kasan: bad access detected
[   26.280007] 
[   26.280190] Memory state around the buggy address:
[   26.280695]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.281314]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.281979] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.282955]                                      ^
[   26.283409]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.283923]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.284466] ==================================================================
[   23.465120] ==================================================================
[   23.465883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   23.466670] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.467277] 
[   23.467531] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.467695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.467742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.467808] Call Trace:
[   23.467908]  <TASK>
[   23.467970]  dump_stack_lvl+0x73/0xb0
[   23.468058]  print_report+0xd1/0x650
[   23.468137]  ? __virt_addr_valid+0x1db/0x2d0
[   23.468208]  ? kasan_atomics_helper+0x3df/0x5450
[   23.468324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.468413]  ? kasan_atomics_helper+0x3df/0x5450
[   23.468489]  kasan_report+0x141/0x180
[   23.468631]  ? kasan_atomics_helper+0x3df/0x5450
[   23.468718]  kasan_check_range+0x10c/0x1c0
[   23.468800]  __kasan_check_read+0x15/0x20
[   23.468872]  kasan_atomics_helper+0x3df/0x5450
[   23.468950]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.469031]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.469128]  ? kasan_atomics+0x152/0x310
[   23.469258]  kasan_atomics+0x1dc/0x310
[   23.469346]  ? __pfx_kasan_atomics+0x10/0x10
[   23.469473]  ? __pfx_read_tsc+0x10/0x10
[   23.469613]  ? ktime_get_ts64+0x86/0x230
[   23.469721]  kunit_try_run_case+0x1a5/0x480
[   23.469815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.469892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.469971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.470052]  ? __kthread_parkme+0x82/0x180
[   23.470129]  ? preempt_count_sub+0x50/0x80
[   23.470210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.470320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.470407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.470494]  kthread+0x337/0x6f0
[   23.470583]  ? trace_preempt_on+0x20/0xc0
[   23.470665]  ? __pfx_kthread+0x10/0x10
[   23.470740]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.470817]  ? calculate_sigpending+0x7b/0xa0
[   23.470963]  ? __pfx_kthread+0x10/0x10
[   23.471022]  ret_from_fork+0x116/0x1d0
[   23.471058]  ? __pfx_kthread+0x10/0x10
[   23.471089]  ret_from_fork_asm+0x1a/0x30
[   23.471133]  </TASK>
[   23.471150] 
[   23.491294] Allocated by task 283:
[   23.492162]  kasan_save_stack+0x45/0x70
[   23.493483]  kasan_save_track+0x18/0x40
[   23.495325]  kasan_save_alloc_info+0x3b/0x50
[   23.496749]  __kasan_kmalloc+0xb7/0xc0
[   23.497948]  __kmalloc_cache_noprof+0x189/0x420
[   23.499290]  kasan_atomics+0x95/0x310
[   23.499909]  kunit_try_run_case+0x1a5/0x480
[   23.500205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.502936]  kthread+0x337/0x6f0
[   23.504131]  ret_from_fork+0x116/0x1d0
[   23.504819]  ret_from_fork_asm+0x1a/0x30
[   23.505092] 
[   23.505246] The buggy address belongs to the object at ffff8881039d9c80
[   23.505246]  which belongs to the cache kmalloc-64 of size 64
[   23.509071] The buggy address is located 0 bytes to the right of
[   23.509071]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.510913] 
[   23.511168] The buggy address belongs to the physical page:
[   23.511645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.512477] flags: 0x200000000000000(node=0|zone=2)
[   23.513553] page_type: f5(slab)
[   23.513878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.514868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.516764] page dumped because: kasan: bad access detected
[   23.517749] 
[   23.517984] Memory state around the buggy address:
[   23.518384]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.519200]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.520588] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.521207]                                      ^
[   23.522014]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.523032]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.523455] ==================================================================
[   25.086829] ==================================================================
[   25.087465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   25.088174] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.088802] 
[   25.089129] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.089267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.089314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.089404] Call Trace:
[   25.089487]  <TASK>
[   25.089561]  dump_stack_lvl+0x73/0xb0
[   25.089647]  print_report+0xd1/0x650
[   25.089690]  ? __virt_addr_valid+0x1db/0x2d0
[   25.089729]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.089808]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.089893]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.090024]  kasan_report+0x141/0x180
[   25.090114]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.090210]  kasan_check_range+0x10c/0x1c0
[   25.090312]  __kasan_check_read+0x15/0x20
[   25.090420]  kasan_atomics_helper+0x13b5/0x5450
[   25.090518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.090566]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.090618]  ? kasan_atomics+0x152/0x310
[   25.090659]  kasan_atomics+0x1dc/0x310
[   25.090704]  ? __pfx_kasan_atomics+0x10/0x10
[   25.090775]  ? __pfx_read_tsc+0x10/0x10
[   25.090828]  ? ktime_get_ts64+0x86/0x230
[   25.090869]  kunit_try_run_case+0x1a5/0x480
[   25.090912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.090950]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.090986]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.091021]  ? __kthread_parkme+0x82/0x180
[   25.091053]  ? preempt_count_sub+0x50/0x80
[   25.091086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.091125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.091161]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.091197]  kthread+0x337/0x6f0
[   25.091240]  ? trace_preempt_on+0x20/0xc0
[   25.091299]  ? __pfx_kthread+0x10/0x10
[   25.091333]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.091366]  ? calculate_sigpending+0x7b/0xa0
[   25.091404]  ? __pfx_kthread+0x10/0x10
[   25.091434]  ret_from_fork+0x116/0x1d0
[   25.091464]  ? __pfx_kthread+0x10/0x10
[   25.091493]  ret_from_fork_asm+0x1a/0x30
[   25.091564]  </TASK>
[   25.091581] 
[   25.112372] Allocated by task 283:
[   25.113906]  kasan_save_stack+0x45/0x70
[   25.115025]  kasan_save_track+0x18/0x40
[   25.115769]  kasan_save_alloc_info+0x3b/0x50
[   25.116707]  __kasan_kmalloc+0xb7/0xc0
[   25.117048]  __kmalloc_cache_noprof+0x189/0x420
[   25.117965]  kasan_atomics+0x95/0x310
[   25.118569]  kunit_try_run_case+0x1a5/0x480
[   25.119042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.119774]  kthread+0x337/0x6f0
[   25.120371]  ret_from_fork+0x116/0x1d0
[   25.120769]  ret_from_fork_asm+0x1a/0x30
[   25.121560] 
[   25.121835] The buggy address belongs to the object at ffff8881039d9c80
[   25.121835]  which belongs to the cache kmalloc-64 of size 64
[   25.122921] The buggy address is located 0 bytes to the right of
[   25.122921]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.123949] 
[   25.124247] The buggy address belongs to the physical page:
[   25.124843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.125643] flags: 0x200000000000000(node=0|zone=2)
[   25.126232] page_type: f5(slab)
[   25.126811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.127421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.128173] page dumped because: kasan: bad access detected
[   25.128871] 
[   25.129088] Memory state around the buggy address:
[   25.129791]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.130393]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.130978] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.131674]                                      ^
[   25.132027]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.132995]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.133731] ==================================================================
[   25.711484] ==================================================================
[   25.712210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   25.713032] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.713696] 
[   25.713895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.714005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.714043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.714102] Call Trace:
[   25.714146]  <TASK>
[   25.714192]  dump_stack_lvl+0x73/0xb0
[   25.714334]  print_report+0xd1/0x650
[   25.714481]  ? __virt_addr_valid+0x1db/0x2d0
[   25.714628]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.714718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.714799]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.714879]  kasan_report+0x141/0x180
[   25.714959]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.715046]  kasan_check_range+0x10c/0x1c0
[   25.715131]  __kasan_check_write+0x18/0x20
[   25.715201]  kasan_atomics_helper+0x1b22/0x5450
[   25.715389]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.715469]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.715587]  ? kasan_atomics+0x152/0x310
[   25.715669]  kasan_atomics+0x1dc/0x310
[   25.715749]  ? __pfx_kasan_atomics+0x10/0x10
[   25.715834]  ? __pfx_read_tsc+0x10/0x10
[   25.715913]  ? ktime_get_ts64+0x86/0x230
[   25.716070]  kunit_try_run_case+0x1a5/0x480
[   25.716251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.716338]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.716418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.716514]  ? __kthread_parkme+0x82/0x180
[   25.716560]  ? preempt_count_sub+0x50/0x80
[   25.716597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.716636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.716672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.716708]  kthread+0x337/0x6f0
[   25.716738]  ? trace_preempt_on+0x20/0xc0
[   25.716773]  ? __pfx_kthread+0x10/0x10
[   25.716805]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.716837]  ? calculate_sigpending+0x7b/0xa0
[   25.716872]  ? __pfx_kthread+0x10/0x10
[   25.716903]  ret_from_fork+0x116/0x1d0
[   25.716931]  ? __pfx_kthread+0x10/0x10
[   25.716961]  ret_from_fork_asm+0x1a/0x30
[   25.717005]  </TASK>
[   25.717022] 
[   25.735465] Allocated by task 283:
[   25.736078]  kasan_save_stack+0x45/0x70
[   25.736730]  kasan_save_track+0x18/0x40
[   25.738181]  kasan_save_alloc_info+0x3b/0x50
[   25.739147]  __kasan_kmalloc+0xb7/0xc0
[   25.739589]  __kmalloc_cache_noprof+0x189/0x420
[   25.740321]  kasan_atomics+0x95/0x310
[   25.740780]  kunit_try_run_case+0x1a5/0x480
[   25.741212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.742066]  kthread+0x337/0x6f0
[   25.742529]  ret_from_fork+0x116/0x1d0
[   25.742975]  ret_from_fork_asm+0x1a/0x30
[   25.743519] 
[   25.743723] The buggy address belongs to the object at ffff8881039d9c80
[   25.743723]  which belongs to the cache kmalloc-64 of size 64
[   25.744673] The buggy address is located 0 bytes to the right of
[   25.744673]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.745645] 
[   25.745964] The buggy address belongs to the physical page:
[   25.746397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.747072] flags: 0x200000000000000(node=0|zone=2)
[   25.747741] page_type: f5(slab)
[   25.748207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.748874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.749657] page dumped because: kasan: bad access detected
[   25.750307] 
[   25.750565] Memory state around the buggy address:
[   25.751026]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.751802]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.752570] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.753307]                                      ^
[   25.753903]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.754629]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.755375] ==================================================================
[   24.824104] ==================================================================
[   24.826781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   24.827480] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.829124] 
[   24.829378] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.829489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.829545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.829601] Call Trace:
[   24.829662]  <TASK>
[   24.829706]  dump_stack_lvl+0x73/0xb0
[   24.829788]  print_report+0xd1/0x650
[   24.829848]  ? __virt_addr_valid+0x1db/0x2d0
[   24.829907]  ? kasan_atomics_helper+0x1148/0x5450
[   24.829964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.830021]  ? kasan_atomics_helper+0x1148/0x5450
[   24.830079]  kasan_report+0x141/0x180
[   24.830133]  ? kasan_atomics_helper+0x1148/0x5450
[   24.830283]  kasan_check_range+0x10c/0x1c0
[   24.830366]  __kasan_check_write+0x18/0x20
[   24.830435]  kasan_atomics_helper+0x1148/0x5450
[   24.830561]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.830679]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.830830]  ? kasan_atomics+0x152/0x310
[   24.830948]  kasan_atomics+0x1dc/0x310
[   24.831025]  ? __pfx_kasan_atomics+0x10/0x10
[   24.831105]  ? __pfx_read_tsc+0x10/0x10
[   24.831179]  ? ktime_get_ts64+0x86/0x230
[   24.831315]  kunit_try_run_case+0x1a5/0x480
[   24.831404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.831485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.831591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.832704]  ? __kthread_parkme+0x82/0x180
[   24.832778]  ? preempt_count_sub+0x50/0x80
[   24.832856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.832932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.833009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.833094]  kthread+0x337/0x6f0
[   24.833171]  ? trace_preempt_on+0x20/0xc0
[   24.833267]  ? __pfx_kthread+0x10/0x10
[   24.833340]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.833404]  ? calculate_sigpending+0x7b/0xa0
[   24.833471]  ? __pfx_kthread+0x10/0x10
[   24.833557]  ret_from_fork+0x116/0x1d0
[   24.833639]  ? __pfx_kthread+0x10/0x10
[   24.833702]  ret_from_fork_asm+0x1a/0x30
[   24.833780]  </TASK>
[   24.833815] 
[   24.852129] Allocated by task 283:
[   24.852732]  kasan_save_stack+0x45/0x70
[   24.853214]  kasan_save_track+0x18/0x40
[   24.853824]  kasan_save_alloc_info+0x3b/0x50
[   24.854276]  __kasan_kmalloc+0xb7/0xc0
[   24.854692]  __kmalloc_cache_noprof+0x189/0x420
[   24.855298]  kasan_atomics+0x95/0x310
[   24.855744]  kunit_try_run_case+0x1a5/0x480
[   24.856128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.856773]  kthread+0x337/0x6f0
[   24.857162]  ret_from_fork+0x116/0x1d0
[   24.857679]  ret_from_fork_asm+0x1a/0x30
[   24.858140] 
[   24.858468] The buggy address belongs to the object at ffff8881039d9c80
[   24.858468]  which belongs to the cache kmalloc-64 of size 64
[   24.859665] The buggy address is located 0 bytes to the right of
[   24.859665]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.860772] 
[   24.860976] The buggy address belongs to the physical page:
[   24.861405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.862192] flags: 0x200000000000000(node=0|zone=2)
[   24.862819] page_type: f5(slab)
[   24.863274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.864022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.864705] page dumped because: kasan: bad access detected
[   24.865302] 
[   24.865527] Memory state around the buggy address:
[   24.866017]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.866714]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.867268] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.868110]                                      ^
[   24.868661]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.869116]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.869826] ==================================================================
[   23.797044] ==================================================================
[   23.798024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   23.799217] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.801212] 
[   23.801434] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.801575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.801631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.802135] Call Trace:
[   23.802167]  <TASK>
[   23.802195]  dump_stack_lvl+0x73/0xb0
[   23.802286]  print_report+0xd1/0x650
[   23.802326]  ? __virt_addr_valid+0x1db/0x2d0
[   23.802362]  ? kasan_atomics_helper+0x697/0x5450
[   23.802421]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.802458]  ? kasan_atomics_helper+0x697/0x5450
[   23.802536]  kasan_report+0x141/0x180
[   23.802673]  ? kasan_atomics_helper+0x697/0x5450
[   23.802765]  kasan_check_range+0x10c/0x1c0
[   23.802807]  __kasan_check_write+0x18/0x20
[   23.802863]  kasan_atomics_helper+0x697/0x5450
[   23.802899]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.802952]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.803033]  ? kasan_atomics+0x152/0x310
[   23.803104]  kasan_atomics+0x1dc/0x310
[   23.803149]  ? __pfx_kasan_atomics+0x10/0x10
[   23.803188]  ? __pfx_read_tsc+0x10/0x10
[   23.803226]  ? ktime_get_ts64+0x86/0x230
[   23.803300]  kunit_try_run_case+0x1a5/0x480
[   23.803344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.803382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.803418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.803453]  ? __kthread_parkme+0x82/0x180
[   23.803483]  ? preempt_count_sub+0x50/0x80
[   23.803552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.803643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.803703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.803743]  kthread+0x337/0x6f0
[   23.803773]  ? trace_preempt_on+0x20/0xc0
[   23.803810]  ? __pfx_kthread+0x10/0x10
[   23.803841]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.803874]  ? calculate_sigpending+0x7b/0xa0
[   23.803910]  ? __pfx_kthread+0x10/0x10
[   23.803942]  ret_from_fork+0x116/0x1d0
[   23.803970]  ? __pfx_kthread+0x10/0x10
[   23.804000]  ret_from_fork_asm+0x1a/0x30
[   23.804047]  </TASK>
[   23.804063] 
[   23.831384] Allocated by task 283:
[   23.832099]  kasan_save_stack+0x45/0x70
[   23.832714]  kasan_save_track+0x18/0x40
[   23.833040]  kasan_save_alloc_info+0x3b/0x50
[   23.833798]  __kasan_kmalloc+0xb7/0xc0
[   23.834641]  __kmalloc_cache_noprof+0x189/0x420
[   23.835411]  kasan_atomics+0x95/0x310
[   23.836124]  kunit_try_run_case+0x1a5/0x480
[   23.836972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.838062]  kthread+0x337/0x6f0
[   23.839597]  ret_from_fork+0x116/0x1d0
[   23.840053]  ret_from_fork_asm+0x1a/0x30
[   23.840519] 
[   23.840972] The buggy address belongs to the object at ffff8881039d9c80
[   23.840972]  which belongs to the cache kmalloc-64 of size 64
[   23.842018] The buggy address is located 0 bytes to the right of
[   23.842018]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.844231] 
[   23.844523] The buggy address belongs to the physical page:
[   23.845562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.846604] flags: 0x200000000000000(node=0|zone=2)
[   23.847733] page_type: f5(slab)
[   23.848152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.848907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.849949] page dumped because: kasan: bad access detected
[   23.851547] 
[   23.851759] Memory state around the buggy address:
[   23.852107]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.852938]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.853720] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.854291]                                      ^
[   23.855408]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.856174]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.856926] ==================================================================
[   25.935754] ==================================================================
[   25.936321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   25.937392] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.938199] 
[   25.938587] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.938724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.938765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.938830] Call Trace:
[   25.938951]  <TASK>
[   25.939080]  dump_stack_lvl+0x73/0xb0
[   25.939205]  print_report+0xd1/0x650
[   25.939364]  ? __virt_addr_valid+0x1db/0x2d0
[   25.939443]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.939481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.939549]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.939584]  kasan_report+0x141/0x180
[   25.939619]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.939658]  kasan_check_range+0x10c/0x1c0
[   25.939693]  __kasan_check_write+0x18/0x20
[   25.939722]  kasan_atomics_helper+0x1e12/0x5450
[   25.939754]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.939787]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.939832]  ? kasan_atomics+0x152/0x310
[   25.939871]  kasan_atomics+0x1dc/0x310
[   25.939904]  ? __pfx_kasan_atomics+0x10/0x10
[   25.939940]  ? __pfx_read_tsc+0x10/0x10
[   25.939972]  ? ktime_get_ts64+0x86/0x230
[   25.940008]  kunit_try_run_case+0x1a5/0x480
[   25.940048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.940084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.940119]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.940154]  ? __kthread_parkme+0x82/0x180
[   25.940186]  ? preempt_count_sub+0x50/0x80
[   25.940240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.940310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.940348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.940386]  kthread+0x337/0x6f0
[   25.940414]  ? trace_preempt_on+0x20/0xc0
[   25.940450]  ? __pfx_kthread+0x10/0x10
[   25.940480]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.940546]  ? calculate_sigpending+0x7b/0xa0
[   25.940586]  ? __pfx_kthread+0x10/0x10
[   25.940618]  ret_from_fork+0x116/0x1d0
[   25.940646]  ? __pfx_kthread+0x10/0x10
[   25.940678]  ret_from_fork_asm+0x1a/0x30
[   25.940723]  </TASK>
[   25.940740] 
[   25.958033] Allocated by task 283:
[   25.958591]  kasan_save_stack+0x45/0x70
[   25.959138]  kasan_save_track+0x18/0x40
[   25.959626]  kasan_save_alloc_info+0x3b/0x50
[   25.960114]  __kasan_kmalloc+0xb7/0xc0
[   25.960569]  __kmalloc_cache_noprof+0x189/0x420
[   25.961089]  kasan_atomics+0x95/0x310
[   25.961595]  kunit_try_run_case+0x1a5/0x480
[   25.962024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.962697]  kthread+0x337/0x6f0
[   25.963094]  ret_from_fork+0x116/0x1d0
[   25.963566]  ret_from_fork_asm+0x1a/0x30
[   25.964019] 
[   25.964331] The buggy address belongs to the object at ffff8881039d9c80
[   25.964331]  which belongs to the cache kmalloc-64 of size 64
[   25.965431] The buggy address is located 0 bytes to the right of
[   25.965431]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.966362] 
[   25.966665] The buggy address belongs to the physical page:
[   25.967270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.967991] flags: 0x200000000000000(node=0|zone=2)
[   25.968581] page_type: f5(slab)
[   25.968988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.969641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.970351] page dumped because: kasan: bad access detected
[   25.970847] 
[   25.971090] Memory state around the buggy address:
[   25.971650]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.972320]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.972952] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.973649]                                      ^
[   25.974138]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.974795]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.975432] ==================================================================
[   25.977021] ==================================================================
[   25.977851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   25.978606] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.979459] 
[   25.979752] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.979868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.979903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.979954] Call Trace:
[   25.979997]  <TASK>
[   25.980042]  dump_stack_lvl+0x73/0xb0
[   25.980124]  print_report+0xd1/0x650
[   25.980197]  ? __virt_addr_valid+0x1db/0x2d0
[   25.980312]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.980374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.980443]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.980571]  kasan_report+0x141/0x180
[   25.980658]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.980748]  kasan_check_range+0x10c/0x1c0
[   25.980831]  __kasan_check_write+0x18/0x20
[   25.980910]  kasan_atomics_helper+0x1eaa/0x5450
[   25.980993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.981074]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.981176]  ? kasan_atomics+0x152/0x310
[   25.981346]  kasan_atomics+0x1dc/0x310
[   25.981424]  ? __pfx_kasan_atomics+0x10/0x10
[   25.981488]  ? __pfx_read_tsc+0x10/0x10
[   25.981582]  ? ktime_get_ts64+0x86/0x230
[   25.981717]  kunit_try_run_case+0x1a5/0x480
[   25.981823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.981908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.982034]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.982184]  ? __kthread_parkme+0x82/0x180
[   25.982293]  ? preempt_count_sub+0x50/0x80
[   25.982380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.982466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.982570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.982653]  kthread+0x337/0x6f0
[   25.982726]  ? trace_preempt_on+0x20/0xc0
[   25.982810]  ? __pfx_kthread+0x10/0x10
[   25.982884]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.982959]  ? calculate_sigpending+0x7b/0xa0
[   25.983039]  ? __pfx_kthread+0x10/0x10
[   25.983114]  ret_from_fork+0x116/0x1d0
[   25.983182]  ? __pfx_kthread+0x10/0x10
[   25.983257]  ret_from_fork_asm+0x1a/0x30
[   25.983348]  </TASK>
[   25.983392] 
[   26.002691] Allocated by task 283:
[   26.003360]  kasan_save_stack+0x45/0x70
[   26.003842]  kasan_save_track+0x18/0x40
[   26.004243]  kasan_save_alloc_info+0x3b/0x50
[   26.004716]  __kasan_kmalloc+0xb7/0xc0
[   26.005470]  __kmalloc_cache_noprof+0x189/0x420
[   26.006156]  kasan_atomics+0x95/0x310
[   26.006622]  kunit_try_run_case+0x1a5/0x480
[   26.007030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.007789]  kthread+0x337/0x6f0
[   26.008457]  ret_from_fork+0x116/0x1d0
[   26.008821]  ret_from_fork_asm+0x1a/0x30
[   26.009449] 
[   26.009746] The buggy address belongs to the object at ffff8881039d9c80
[   26.009746]  which belongs to the cache kmalloc-64 of size 64
[   26.011139] The buggy address is located 0 bytes to the right of
[   26.011139]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.012309] 
[   26.012697] The buggy address belongs to the physical page:
[   26.013230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.014043] flags: 0x200000000000000(node=0|zone=2)
[   26.014636] page_type: f5(slab)
[   26.014925] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.015658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.016270] page dumped because: kasan: bad access detected
[   26.016784] 
[   26.017000] Memory state around the buggy address:
[   26.017451]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.018001]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.018675] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.019271]                                      ^
[   26.019723]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.020349]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.020973] ==================================================================
[   23.410454] ==================================================================
[   23.411898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   23.413059] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.413842] 
[   23.414307] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.414434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.414471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.414693] Call Trace:
[   23.414755]  <TASK>
[   23.414811]  dump_stack_lvl+0x73/0xb0
[   23.414964]  print_report+0xd1/0x650
[   23.415049]  ? __virt_addr_valid+0x1db/0x2d0
[   23.415130]  ? kasan_atomics_helper+0x4b6e/0x5450
[   23.415200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.415275]  ? kasan_atomics_helper+0x4b6e/0x5450
[   23.415312]  kasan_report+0x141/0x180
[   23.415346]  ? kasan_atomics_helper+0x4b6e/0x5450
[   23.415383]  __asan_report_store4_noabort+0x1b/0x30
[   23.415413]  kasan_atomics_helper+0x4b6e/0x5450
[   23.415444]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.415475]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.415564]  ? kasan_atomics+0x152/0x310
[   23.415653]  kasan_atomics+0x1dc/0x310
[   23.415709]  ? __pfx_kasan_atomics+0x10/0x10
[   23.415745]  ? __pfx_read_tsc+0x10/0x10
[   23.415778]  ? ktime_get_ts64+0x86/0x230
[   23.415813]  kunit_try_run_case+0x1a5/0x480
[   23.415851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.415885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.415919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.415952]  ? __kthread_parkme+0x82/0x180
[   23.415983]  ? preempt_count_sub+0x50/0x80
[   23.416170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.416212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.416308]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.416351]  kthread+0x337/0x6f0
[   23.416382]  ? trace_preempt_on+0x20/0xc0
[   23.416417]  ? __pfx_kthread+0x10/0x10
[   23.416449]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.416483]  ? calculate_sigpending+0x7b/0xa0
[   23.416561]  ? __pfx_kthread+0x10/0x10
[   23.416644]  ret_from_fork+0x116/0x1d0
[   23.416710]  ? __pfx_kthread+0x10/0x10
[   23.416777]  ret_from_fork_asm+0x1a/0x30
[   23.416860]  </TASK>
[   23.416895] 
[   23.440634] Allocated by task 283:
[   23.440994]  kasan_save_stack+0x45/0x70
[   23.441871]  kasan_save_track+0x18/0x40
[   23.442280]  kasan_save_alloc_info+0x3b/0x50
[   23.443123]  __kasan_kmalloc+0xb7/0xc0
[   23.443793]  __kmalloc_cache_noprof+0x189/0x420
[   23.444651]  kasan_atomics+0x95/0x310
[   23.445247]  kunit_try_run_case+0x1a5/0x480
[   23.446183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.447322]  kthread+0x337/0x6f0
[   23.447880]  ret_from_fork+0x116/0x1d0
[   23.448236]  ret_from_fork_asm+0x1a/0x30
[   23.449130] 
[   23.449344] The buggy address belongs to the object at ffff8881039d9c80
[   23.449344]  which belongs to the cache kmalloc-64 of size 64
[   23.451158] The buggy address is located 0 bytes to the right of
[   23.451158]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.452264] 
[   23.452541] The buggy address belongs to the physical page:
[   23.453034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.453962] flags: 0x200000000000000(node=0|zone=2)
[   23.454452] page_type: f5(slab)
[   23.454784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.456065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.456873] page dumped because: kasan: bad access detected
[   23.457356] 
[   23.457985] Memory state around the buggy address:
[   23.458408]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.459169]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.460140] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.461303]                                      ^
[   23.461926]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.463006]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.464280] ==================================================================
[   24.361889] ==================================================================
[   24.362336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   24.363933] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.365006] 
[   24.365390] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.365752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.365855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.365954] Call Trace:
[   24.366016]  <TASK>
[   24.366075]  dump_stack_lvl+0x73/0xb0
[   24.366267]  print_report+0xd1/0x650
[   24.366359]  ? __virt_addr_valid+0x1db/0x2d0
[   24.366439]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.366489]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.366634]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.366710]  kasan_report+0x141/0x180
[   24.366776]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.366848]  __asan_report_load4_noabort+0x18/0x20
[   24.366924]  kasan_atomics_helper+0x4a84/0x5450
[   24.366991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.367054]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.367138]  ? kasan_atomics+0x152/0x310
[   24.367218]  kasan_atomics+0x1dc/0x310
[   24.367292]  ? __pfx_kasan_atomics+0x10/0x10
[   24.367332]  ? __pfx_read_tsc+0x10/0x10
[   24.367366]  ? ktime_get_ts64+0x86/0x230
[   24.367402]  kunit_try_run_case+0x1a5/0x480
[   24.367442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.367477]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.367554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.367640]  ? __kthread_parkme+0x82/0x180
[   24.367701]  ? preempt_count_sub+0x50/0x80
[   24.367737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.367777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.367816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.367854]  kthread+0x337/0x6f0
[   24.367882]  ? trace_preempt_on+0x20/0xc0
[   24.367919]  ? __pfx_kthread+0x10/0x10
[   24.367950]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.367983]  ? calculate_sigpending+0x7b/0xa0
[   24.368019]  ? __pfx_kthread+0x10/0x10
[   24.368050]  ret_from_fork+0x116/0x1d0
[   24.368078]  ? __pfx_kthread+0x10/0x10
[   24.368108]  ret_from_fork_asm+0x1a/0x30
[   24.368151]  </TASK>
[   24.368168] 
[   24.392272] Allocated by task 283:
[   24.392854]  kasan_save_stack+0x45/0x70
[   24.393688]  kasan_save_track+0x18/0x40
[   24.394617]  kasan_save_alloc_info+0x3b/0x50
[   24.395059]  __kasan_kmalloc+0xb7/0xc0
[   24.395529]  __kmalloc_cache_noprof+0x189/0x420
[   24.396424]  kasan_atomics+0x95/0x310
[   24.397390]  kunit_try_run_case+0x1a5/0x480
[   24.398011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.399058]  kthread+0x337/0x6f0
[   24.399474]  ret_from_fork+0x116/0x1d0
[   24.399852]  ret_from_fork_asm+0x1a/0x30
[   24.400281] 
[   24.400543] The buggy address belongs to the object at ffff8881039d9c80
[   24.400543]  which belongs to the cache kmalloc-64 of size 64
[   24.402693] The buggy address is located 0 bytes to the right of
[   24.402693]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.404863] 
[   24.405058] The buggy address belongs to the physical page:
[   24.405399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.407024] flags: 0x200000000000000(node=0|zone=2)
[   24.408483] page_type: f5(slab)
[   24.409855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.410492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.411083] page dumped because: kasan: bad access detected
[   24.412300] 
[   24.412478] Memory state around the buggy address:
[   24.412915]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.413918]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.414946] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.415569]                                      ^
[   24.416551]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.417137]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.418591] ==================================================================
[   23.963046] ==================================================================
[   23.963878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   23.965160] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.966193] 
[   23.966865] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.967658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.967712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.967808] Call Trace:
[   23.967860]  <TASK>
[   23.967891]  dump_stack_lvl+0x73/0xb0
[   23.967956]  print_report+0xd1/0x650
[   23.967999]  ? __virt_addr_valid+0x1db/0x2d0
[   23.968043]  ? kasan_atomics_helper+0x860/0x5450
[   23.968082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.968122]  ? kasan_atomics_helper+0x860/0x5450
[   23.968161]  kasan_report+0x141/0x180
[   23.968198]  ? kasan_atomics_helper+0x860/0x5450
[   23.968268]  kasan_check_range+0x10c/0x1c0
[   23.968447]  __kasan_check_write+0x18/0x20
[   23.968550]  kasan_atomics_helper+0x860/0x5450
[   23.968637]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.968727]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.968790]  ? kasan_atomics+0x152/0x310
[   23.968836]  kasan_atomics+0x1dc/0x310
[   23.968875]  ? __pfx_kasan_atomics+0x10/0x10
[   23.968919]  ? __pfx_read_tsc+0x10/0x10
[   23.968956]  ? ktime_get_ts64+0x86/0x230
[   23.968997]  kunit_try_run_case+0x1a5/0x480
[   23.969045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.969087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.969130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.969170]  ? __kthread_parkme+0x82/0x180
[   23.969206]  ? preempt_count_sub+0x50/0x80
[   23.969276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.969326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.969372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.969418]  kthread+0x337/0x6f0
[   23.969453]  ? trace_preempt_on+0x20/0xc0
[   23.969493]  ? __pfx_kthread+0x10/0x10
[   23.969586]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.969693]  ? calculate_sigpending+0x7b/0xa0
[   23.969744]  ? __pfx_kthread+0x10/0x10
[   23.969785]  ret_from_fork+0x116/0x1d0
[   23.969818]  ? __pfx_kthread+0x10/0x10
[   23.969854]  ret_from_fork_asm+0x1a/0x30
[   23.969902]  </TASK>
[   23.969919] 
[   23.993939] Allocated by task 283:
[   23.995303]  kasan_save_stack+0x45/0x70
[   23.995852]  kasan_save_track+0x18/0x40
[   23.996408]  kasan_save_alloc_info+0x3b/0x50
[   23.996906]  __kasan_kmalloc+0xb7/0xc0
[   23.997303]  __kmalloc_cache_noprof+0x189/0x420
[   23.997742]  kasan_atomics+0x95/0x310
[   23.998330]  kunit_try_run_case+0x1a5/0x480
[   23.999538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.000437]  kthread+0x337/0x6f0
[   24.001115]  ret_from_fork+0x116/0x1d0
[   24.001569]  ret_from_fork_asm+0x1a/0x30
[   24.001952] 
[   24.002209] The buggy address belongs to the object at ffff8881039d9c80
[   24.002209]  which belongs to the cache kmalloc-64 of size 64
[   24.004256] The buggy address is located 0 bytes to the right of
[   24.004256]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.006102] 
[   24.006445] The buggy address belongs to the physical page:
[   24.007173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.007767] flags: 0x200000000000000(node=0|zone=2)
[   24.008654] page_type: f5(slab)
[   24.008999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.010178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.011488] page dumped because: kasan: bad access detected
[   24.012156] 
[   24.012657] Memory state around the buggy address:
[   24.013557]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.014811]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.016121] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.017118]                                      ^
[   24.017917]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.018922]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.020201] ==================================================================
[   24.737776] ==================================================================
[   24.738473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   24.739224] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.739910] 
[   24.740231] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.740377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.740417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.740748] Call Trace:
[   24.740803]  <TASK>
[   24.740860]  dump_stack_lvl+0x73/0xb0
[   24.741829]  print_report+0xd1/0x650
[   24.741903]  ? __virt_addr_valid+0x1db/0x2d0
[   24.741968]  ? kasan_atomics_helper+0x1079/0x5450
[   24.742041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.742119]  ? kasan_atomics_helper+0x1079/0x5450
[   24.742206]  kasan_report+0x141/0x180
[   24.742290]  ? kasan_atomics_helper+0x1079/0x5450
[   24.742385]  kasan_check_range+0x10c/0x1c0
[   24.742473]  __kasan_check_write+0x18/0x20
[   24.742571]  kasan_atomics_helper+0x1079/0x5450
[   24.742658]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.742741]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.742842]  ? kasan_atomics+0x152/0x310
[   24.742937]  kasan_atomics+0x1dc/0x310
[   24.743022]  ? __pfx_kasan_atomics+0x10/0x10
[   24.743110]  ? __pfx_read_tsc+0x10/0x10
[   24.743191]  ? ktime_get_ts64+0x86/0x230
[   24.744491]  kunit_try_run_case+0x1a5/0x480
[   24.744605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.744683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.744766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.744845]  ? __kthread_parkme+0x82/0x180
[   24.744922]  ? preempt_count_sub+0x50/0x80
[   24.745001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.745085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.745167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.745255]  kthread+0x337/0x6f0
[   24.745328]  ? trace_preempt_on+0x20/0xc0
[   24.745407]  ? __pfx_kthread+0x10/0x10
[   24.745480]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.745593]  ? calculate_sigpending+0x7b/0xa0
[   24.745656]  ? __pfx_kthread+0x10/0x10
[   24.745694]  ret_from_fork+0x116/0x1d0
[   24.745723]  ? __pfx_kthread+0x10/0x10
[   24.745755]  ret_from_fork_asm+0x1a/0x30
[   24.745799]  </TASK>
[   24.745817] 
[   24.764039] Allocated by task 283:
[   24.764532]  kasan_save_stack+0x45/0x70
[   24.765002]  kasan_save_track+0x18/0x40
[   24.765341]  kasan_save_alloc_info+0x3b/0x50
[   24.765961]  __kasan_kmalloc+0xb7/0xc0
[   24.766276]  __kmalloc_cache_noprof+0x189/0x420
[   24.766677]  kasan_atomics+0x95/0x310
[   24.767084]  kunit_try_run_case+0x1a5/0x480
[   24.767866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.768526]  kthread+0x337/0x6f0
[   24.768934]  ret_from_fork+0x116/0x1d0
[   24.769359]  ret_from_fork_asm+0x1a/0x30
[   24.769789] 
[   24.769988] The buggy address belongs to the object at ffff8881039d9c80
[   24.769988]  which belongs to the cache kmalloc-64 of size 64
[   24.770948] The buggy address is located 0 bytes to the right of
[   24.770948]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.772132] 
[   24.772398] The buggy address belongs to the physical page:
[   24.772827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.773352] flags: 0x200000000000000(node=0|zone=2)
[   24.774189] page_type: f5(slab)
[   24.774623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.775315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.775910] page dumped because: kasan: bad access detected
[   24.776411] 
[   24.776626] Memory state around the buggy address:
[   24.776978]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.778210]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.780045] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.780576]                                      ^
[   24.781122]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.781794]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.782488] ==================================================================
[   25.179085] ==================================================================
[   25.180203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   25.180881] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.181177] 
[   25.181611] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.181768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.181812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.181878] Call Trace:
[   25.181934]  <TASK>
[   25.182007]  dump_stack_lvl+0x73/0xb0
[   25.182132]  print_report+0xd1/0x650
[   25.182217]  ? __virt_addr_valid+0x1db/0x2d0
[   25.182426]  ? kasan_atomics_helper+0x1467/0x5450
[   25.182780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.182845]  ? kasan_atomics_helper+0x1467/0x5450
[   25.182906]  kasan_report+0x141/0x180
[   25.182945]  ? kasan_atomics_helper+0x1467/0x5450
[   25.182986]  kasan_check_range+0x10c/0x1c0
[   25.183021]  __kasan_check_write+0x18/0x20
[   25.183050]  kasan_atomics_helper+0x1467/0x5450
[   25.183084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.183117]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.183164]  ? kasan_atomics+0x152/0x310
[   25.183204]  kasan_atomics+0x1dc/0x310
[   25.183295]  ? __pfx_kasan_atomics+0x10/0x10
[   25.183338]  ? __pfx_read_tsc+0x10/0x10
[   25.183373]  ? ktime_get_ts64+0x86/0x230
[   25.183409]  kunit_try_run_case+0x1a5/0x480
[   25.183448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.183484]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.183551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.183589]  ? __kthread_parkme+0x82/0x180
[   25.183620]  ? preempt_count_sub+0x50/0x80
[   25.183655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.183693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.183730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.183767]  kthread+0x337/0x6f0
[   25.183796]  ? trace_preempt_on+0x20/0xc0
[   25.183831]  ? __pfx_kthread+0x10/0x10
[   25.183864]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.183897]  ? calculate_sigpending+0x7b/0xa0
[   25.183933]  ? __pfx_kthread+0x10/0x10
[   25.183963]  ret_from_fork+0x116/0x1d0
[   25.183992]  ? __pfx_kthread+0x10/0x10
[   25.184022]  ret_from_fork_asm+0x1a/0x30
[   25.184065]  </TASK>
[   25.184081] 
[   25.199025] Allocated by task 283:
[   25.199579]  kasan_save_stack+0x45/0x70
[   25.199992]  kasan_save_track+0x18/0x40
[   25.200456]  kasan_save_alloc_info+0x3b/0x50
[   25.200930]  __kasan_kmalloc+0xb7/0xc0
[   25.201349]  __kmalloc_cache_noprof+0x189/0x420
[   25.201912]  kasan_atomics+0x95/0x310
[   25.202377]  kunit_try_run_case+0x1a5/0x480
[   25.202833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.203293]  kthread+0x337/0x6f0
[   25.203783]  ret_from_fork+0x116/0x1d0
[   25.204196]  ret_from_fork_asm+0x1a/0x30
[   25.205025] 
[   25.206314] The buggy address belongs to the object at ffff8881039d9c80
[   25.206314]  which belongs to the cache kmalloc-64 of size 64
[   25.208373] The buggy address is located 0 bytes to the right of
[   25.208373]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.210212] 
[   25.210720] The buggy address belongs to the physical page:
[   25.211203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.212489] flags: 0x200000000000000(node=0|zone=2)
[   25.213005] page_type: f5(slab)
[   25.213461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.214227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.215184] page dumped because: kasan: bad access detected
[   25.215718] 
[   25.215923] Memory state around the buggy address:
[   25.216410]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.217122]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.217819] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.218786]                                      ^
[   25.219550]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.220105]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.221090] ==================================================================
[   25.392524] ==================================================================
[   25.393612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   25.394366] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.395277] 
[   25.395634] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.395773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.395809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.395876] Call Trace:
[   25.395932]  <TASK>
[   25.395986]  dump_stack_lvl+0x73/0xb0
[   25.396084]  print_report+0xd1/0x650
[   25.396168]  ? __virt_addr_valid+0x1db/0x2d0
[   25.396251]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.396333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.396479]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.396714]  kasan_report+0x141/0x180
[   25.396831]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.396926]  kasan_check_range+0x10c/0x1c0
[   25.397010]  __kasan_check_write+0x18/0x20
[   25.397087]  kasan_atomics_helper+0x16e7/0x5450
[   25.397170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.397255]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.397383]  ? kasan_atomics+0x152/0x310
[   25.397568]  kasan_atomics+0x1dc/0x310
[   25.397775]  ? __pfx_kasan_atomics+0x10/0x10
[   25.397906]  ? __pfx_read_tsc+0x10/0x10
[   25.398050]  ? ktime_get_ts64+0x86/0x230
[   25.398138]  kunit_try_run_case+0x1a5/0x480
[   25.398235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.398318]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.398404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.398484]  ? __kthread_parkme+0x82/0x180
[   25.398588]  ? preempt_count_sub+0x50/0x80
[   25.398664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.398744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.398843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.398940]  kthread+0x337/0x6f0
[   25.399012]  ? trace_preempt_on+0x20/0xc0
[   25.399159]  ? __pfx_kthread+0x10/0x10
[   25.399357]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.399536]  ? calculate_sigpending+0x7b/0xa0
[   25.399626]  ? __pfx_kthread+0x10/0x10
[   25.399703]  ret_from_fork+0x116/0x1d0
[   25.399774]  ? __pfx_kthread+0x10/0x10
[   25.399850]  ret_from_fork_asm+0x1a/0x30
[   25.400007]  </TASK>
[   25.400080] 
[   25.419471] Allocated by task 283:
[   25.419941]  kasan_save_stack+0x45/0x70
[   25.420428]  kasan_save_track+0x18/0x40
[   25.420901]  kasan_save_alloc_info+0x3b/0x50
[   25.421364]  __kasan_kmalloc+0xb7/0xc0
[   25.421925]  __kmalloc_cache_noprof+0x189/0x420
[   25.422530]  kasan_atomics+0x95/0x310
[   25.422914]  kunit_try_run_case+0x1a5/0x480
[   25.423312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.423916]  kthread+0x337/0x6f0
[   25.424402]  ret_from_fork+0x116/0x1d0
[   25.424886]  ret_from_fork_asm+0x1a/0x30
[   25.425403] 
[   25.425693] The buggy address belongs to the object at ffff8881039d9c80
[   25.425693]  which belongs to the cache kmalloc-64 of size 64
[   25.426731] The buggy address is located 0 bytes to the right of
[   25.426731]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.427737] 
[   25.428043] The buggy address belongs to the physical page:
[   25.428604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.429311] flags: 0x200000000000000(node=0|zone=2)
[   25.429883] page_type: f5(slab)
[   25.430378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.431064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.431793] page dumped because: kasan: bad access detected
[   25.432273] 
[   25.432542] Memory state around the buggy address:
[   25.432979]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.433705]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.434349] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.435056]                                      ^
[   25.435581]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.436171]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.436927] ==================================================================
[   25.528766] ==================================================================
[   25.529324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   25.530568] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.531712] 
[   25.532112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.532269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.532319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.532387] Call Trace:
[   25.532443]  <TASK>
[   25.532554]  dump_stack_lvl+0x73/0xb0
[   25.532664]  print_report+0xd1/0x650
[   25.532703]  ? __virt_addr_valid+0x1db/0x2d0
[   25.532740]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.532792]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.532860]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.532897]  kasan_report+0x141/0x180
[   25.532932]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.532974]  kasan_check_range+0x10c/0x1c0
[   25.533010]  __kasan_check_write+0x18/0x20
[   25.533037]  kasan_atomics_helper+0x18b1/0x5450
[   25.533070]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.533102]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.533148]  ? kasan_atomics+0x152/0x310
[   25.533187]  kasan_atomics+0x1dc/0x310
[   25.533246]  ? __pfx_kasan_atomics+0x10/0x10
[   25.533302]  ? __pfx_read_tsc+0x10/0x10
[   25.533337]  ? ktime_get_ts64+0x86/0x230
[   25.533374]  kunit_try_run_case+0x1a5/0x480
[   25.533415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.533450]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.533487]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.533553]  ? __kthread_parkme+0x82/0x180
[   25.533587]  ? preempt_count_sub+0x50/0x80
[   25.533641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.533681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.533717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.533754]  kthread+0x337/0x6f0
[   25.533782]  ? trace_preempt_on+0x20/0xc0
[   25.533817]  ? __pfx_kthread+0x10/0x10
[   25.533848]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.533882]  ? calculate_sigpending+0x7b/0xa0
[   25.533916]  ? __pfx_kthread+0x10/0x10
[   25.533947]  ret_from_fork+0x116/0x1d0
[   25.533974]  ? __pfx_kthread+0x10/0x10
[   25.534004]  ret_from_fork_asm+0x1a/0x30
[   25.534047]  </TASK>
[   25.534063] 
[   25.554233] Allocated by task 283:
[   25.555391]  kasan_save_stack+0x45/0x70
[   25.556018]  kasan_save_track+0x18/0x40
[   25.556365]  kasan_save_alloc_info+0x3b/0x50
[   25.556851]  __kasan_kmalloc+0xb7/0xc0
[   25.557194]  __kmalloc_cache_noprof+0x189/0x420
[   25.558193]  kasan_atomics+0x95/0x310
[   25.558830]  kunit_try_run_case+0x1a5/0x480
[   25.559216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.559916]  kthread+0x337/0x6f0
[   25.560207]  ret_from_fork+0x116/0x1d0
[   25.561003]  ret_from_fork_asm+0x1a/0x30
[   25.561487] 
[   25.561767] The buggy address belongs to the object at ffff8881039d9c80
[   25.561767]  which belongs to the cache kmalloc-64 of size 64
[   25.562812] The buggy address is located 0 bytes to the right of
[   25.562812]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.564205] 
[   25.564544] The buggy address belongs to the physical page:
[   25.565089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.565783] flags: 0x200000000000000(node=0|zone=2)
[   25.566317] page_type: f5(slab)
[   25.566790] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.567467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.568230] page dumped because: kasan: bad access detected
[   25.568971] 
[   25.569337] Memory state around the buggy address:
[   25.569915]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.570679]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.571360] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.572083]                                      ^
[   25.572635]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.573372]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.574087] ==================================================================
[   25.438421] ==================================================================
[   25.439051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   25.439745] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.440275] 
[   25.440641] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.440756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.440790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.440847] Call Trace:
[   25.440899]  <TASK>
[   25.440947]  dump_stack_lvl+0x73/0xb0
[   25.441032]  print_report+0xd1/0x650
[   25.441100]  ? __virt_addr_valid+0x1db/0x2d0
[   25.441168]  ? kasan_atomics_helper+0x177f/0x5450
[   25.441309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.441395]  ? kasan_atomics_helper+0x177f/0x5450
[   25.441474]  kasan_report+0x141/0x180
[   25.441578]  ? kasan_atomics_helper+0x177f/0x5450
[   25.441684]  kasan_check_range+0x10c/0x1c0
[   25.441772]  __kasan_check_write+0x18/0x20
[   25.441851]  kasan_atomics_helper+0x177f/0x5450
[   25.442006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.442097]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.442211]  ? kasan_atomics+0x152/0x310
[   25.442415]  kasan_atomics+0x1dc/0x310
[   25.442525]  ? __pfx_kasan_atomics+0x10/0x10
[   25.442689]  ? __pfx_read_tsc+0x10/0x10
[   25.442775]  ? ktime_get_ts64+0x86/0x230
[   25.442870]  kunit_try_run_case+0x1a5/0x480
[   25.443019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.443159]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.443285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.443368]  ? __kthread_parkme+0x82/0x180
[   25.443441]  ? preempt_count_sub+0x50/0x80
[   25.443482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.443555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.443597]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.443635]  kthread+0x337/0x6f0
[   25.443664]  ? trace_preempt_on+0x20/0xc0
[   25.443701]  ? __pfx_kthread+0x10/0x10
[   25.443732]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.443765]  ? calculate_sigpending+0x7b/0xa0
[   25.443801]  ? __pfx_kthread+0x10/0x10
[   25.443833]  ret_from_fork+0x116/0x1d0
[   25.443860]  ? __pfx_kthread+0x10/0x10
[   25.443891]  ret_from_fork_asm+0x1a/0x30
[   25.443934]  </TASK>
[   25.443952] 
[   25.463162] Allocated by task 283:
[   25.463813]  kasan_save_stack+0x45/0x70
[   25.464439]  kasan_save_track+0x18/0x40
[   25.464957]  kasan_save_alloc_info+0x3b/0x50
[   25.465571]  __kasan_kmalloc+0xb7/0xc0
[   25.466025]  __kmalloc_cache_noprof+0x189/0x420
[   25.466714]  kasan_atomics+0x95/0x310
[   25.467135]  kunit_try_run_case+0x1a5/0x480
[   25.467730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.468469]  kthread+0x337/0x6f0
[   25.468908]  ret_from_fork+0x116/0x1d0
[   25.469481]  ret_from_fork_asm+0x1a/0x30
[   25.469875] 
[   25.470343] The buggy address belongs to the object at ffff8881039d9c80
[   25.470343]  which belongs to the cache kmalloc-64 of size 64
[   25.471532] The buggy address is located 0 bytes to the right of
[   25.471532]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.472731] 
[   25.472968] The buggy address belongs to the physical page:
[   25.473528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.474190] flags: 0x200000000000000(node=0|zone=2)
[   25.474922] page_type: f5(slab)
[   25.475422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.476135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.476769] page dumped because: kasan: bad access detected
[   25.477238] 
[   25.477489] Memory state around the buggy address:
[   25.477989]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.478598]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.479132] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.479859]                                      ^
[   25.480423]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.480931]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.481654] ==================================================================
[   24.784161] ==================================================================
[   24.784801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   24.785491] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.786261] 
[   24.786700] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.786829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.786865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.786920] Call Trace:
[   24.786957]  <TASK>
[   24.787002]  dump_stack_lvl+0x73/0xb0
[   24.787087]  print_report+0xd1/0x650
[   24.787159]  ? __virt_addr_valid+0x1db/0x2d0
[   24.787261]  ? kasan_atomics_helper+0x4a1c/0x5450
[   24.787339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.787412]  ? kasan_atomics_helper+0x4a1c/0x5450
[   24.787486]  kasan_report+0x141/0x180
[   24.787687]  ? kasan_atomics_helper+0x4a1c/0x5450
[   24.787815]  __asan_report_load4_noabort+0x18/0x20
[   24.787942]  kasan_atomics_helper+0x4a1c/0x5450
[   24.788027]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.788106]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.788284]  ? kasan_atomics+0x152/0x310
[   24.788380]  kasan_atomics+0x1dc/0x310
[   24.788459]  ? __pfx_kasan_atomics+0x10/0x10
[   24.788562]  ? __pfx_read_tsc+0x10/0x10
[   24.788641]  ? ktime_get_ts64+0x86/0x230
[   24.788724]  kunit_try_run_case+0x1a5/0x480
[   24.788840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.788925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.789008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.789088]  ? __kthread_parkme+0x82/0x180
[   24.789166]  ? preempt_count_sub+0x50/0x80
[   24.789295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.789377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.789426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.789466]  kthread+0x337/0x6f0
[   24.789519]  ? trace_preempt_on+0x20/0xc0
[   24.789568]  ? __pfx_kthread+0x10/0x10
[   24.789601]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.789652]  ? calculate_sigpending+0x7b/0xa0
[   24.789691]  ? __pfx_kthread+0x10/0x10
[   24.789722]  ret_from_fork+0x116/0x1d0
[   24.789750]  ? __pfx_kthread+0x10/0x10
[   24.789779]  ret_from_fork_asm+0x1a/0x30
[   24.789823]  </TASK>
[   24.789839] 
[   24.804790] Allocated by task 283:
[   24.805152]  kasan_save_stack+0x45/0x70
[   24.805575]  kasan_save_track+0x18/0x40
[   24.806007]  kasan_save_alloc_info+0x3b/0x50
[   24.806567]  __kasan_kmalloc+0xb7/0xc0
[   24.807013]  __kmalloc_cache_noprof+0x189/0x420
[   24.807611]  kasan_atomics+0x95/0x310
[   24.808050]  kunit_try_run_case+0x1a5/0x480
[   24.808593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.809473]  kthread+0x337/0x6f0
[   24.809905]  ret_from_fork+0x116/0x1d0
[   24.810322]  ret_from_fork_asm+0x1a/0x30
[   24.810772] 
[   24.811018] The buggy address belongs to the object at ffff8881039d9c80
[   24.811018]  which belongs to the cache kmalloc-64 of size 64
[   24.812834] The buggy address is located 0 bytes to the right of
[   24.812834]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.813656] 
[   24.813857] The buggy address belongs to the physical page:
[   24.814269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.815006] flags: 0x200000000000000(node=0|zone=2)
[   24.815605] page_type: f5(slab)
[   24.816078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.816868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.817592] page dumped because: kasan: bad access detected
[   24.818137] 
[   24.818456] Memory state around the buggy address:
[   24.818925]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.819692]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.820366] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.820919]                                      ^
[   24.821447]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.822044]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.822679] ==================================================================
[   25.668710] ==================================================================
[   25.669319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   25.670122] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.670779] 
[   25.671071] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.671209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.671317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.671414] Call Trace:
[   25.671523]  <TASK>
[   25.671610]  dump_stack_lvl+0x73/0xb0
[   25.671743]  print_report+0xd1/0x650
[   25.671884]  ? __virt_addr_valid+0x1db/0x2d0
[   25.671961]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.672015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.672052]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.672086]  kasan_report+0x141/0x180
[   25.672120]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.672162]  kasan_check_range+0x10c/0x1c0
[   25.672201]  __kasan_check_write+0x18/0x20
[   25.672276]  kasan_atomics_helper+0x1a7f/0x5450
[   25.672322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.672360]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.672405]  ? kasan_atomics+0x152/0x310
[   25.672446]  kasan_atomics+0x1dc/0x310
[   25.672481]  ? __pfx_kasan_atomics+0x10/0x10
[   25.672548]  ? __pfx_read_tsc+0x10/0x10
[   25.672585]  ? ktime_get_ts64+0x86/0x230
[   25.672621]  kunit_try_run_case+0x1a5/0x480
[   25.672663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.672701]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.672738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.672774]  ? __kthread_parkme+0x82/0x180
[   25.672808]  ? preempt_count_sub+0x50/0x80
[   25.672842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.672880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.672919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.672957]  kthread+0x337/0x6f0
[   25.672988]  ? trace_preempt_on+0x20/0xc0
[   25.673023]  ? __pfx_kthread+0x10/0x10
[   25.673053]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.673086]  ? calculate_sigpending+0x7b/0xa0
[   25.673125]  ? __pfx_kthread+0x10/0x10
[   25.673158]  ret_from_fork+0x116/0x1d0
[   25.673186]  ? __pfx_kthread+0x10/0x10
[   25.673218]  ret_from_fork_asm+0x1a/0x30
[   25.673299]  </TASK>
[   25.673318] 
[   25.689000] Allocated by task 283:
[   25.689992]  kasan_save_stack+0x45/0x70
[   25.691538]  kasan_save_track+0x18/0x40
[   25.691885]  kasan_save_alloc_info+0x3b/0x50
[   25.692234]  __kasan_kmalloc+0xb7/0xc0
[   25.692751]  __kmalloc_cache_noprof+0x189/0x420
[   25.693737]  kasan_atomics+0x95/0x310
[   25.694378]  kunit_try_run_case+0x1a5/0x480
[   25.695099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.696546]  kthread+0x337/0x6f0
[   25.696976]  ret_from_fork+0x116/0x1d0
[   25.697254]  ret_from_fork_asm+0x1a/0x30
[   25.698065] 
[   25.698492] The buggy address belongs to the object at ffff8881039d9c80
[   25.698492]  which belongs to the cache kmalloc-64 of size 64
[   25.699579] The buggy address is located 0 bytes to the right of
[   25.699579]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.700870] 
[   25.701425] The buggy address belongs to the physical page:
[   25.701921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.702615] flags: 0x200000000000000(node=0|zone=2)
[   25.703029] page_type: f5(slab)
[   25.703376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.704137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.704812] page dumped because: kasan: bad access detected
[   25.705332] 
[   25.705571] Memory state around the buggy address:
[   25.706085]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.706800]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.707531] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.708157]                                      ^
[   25.708665]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.709344]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.709982] ==================================================================
[   26.205901] ==================================================================
[   26.206623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   26.207449] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.208112] 
[   26.208529] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.208664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.208709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.208775] Call Trace:
[   26.208918]  <TASK>
[   26.208978]  dump_stack_lvl+0x73/0xb0
[   26.209107]  print_report+0xd1/0x650
[   26.209273]  ? __virt_addr_valid+0x1db/0x2d0
[   26.209362]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.209491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.209603]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.209700]  kasan_report+0x141/0x180
[   26.209838]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.209961]  kasan_check_range+0x10c/0x1c0
[   26.210048]  __kasan_check_write+0x18/0x20
[   26.210094]  kasan_atomics_helper+0x20c8/0x5450
[   26.210128]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.210163]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.210211]  ? kasan_atomics+0x152/0x310
[   26.210316]  kasan_atomics+0x1dc/0x310
[   26.210354]  ? __pfx_kasan_atomics+0x10/0x10
[   26.210393]  ? __pfx_read_tsc+0x10/0x10
[   26.210428]  ? ktime_get_ts64+0x86/0x230
[   26.210465]  kunit_try_run_case+0x1a5/0x480
[   26.210532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.210571]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.210608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.210643]  ? __kthread_parkme+0x82/0x180
[   26.210677]  ? preempt_count_sub+0x50/0x80
[   26.210713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.210750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.210785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.210822]  kthread+0x337/0x6f0
[   26.210850]  ? trace_preempt_on+0x20/0xc0
[   26.210885]  ? __pfx_kthread+0x10/0x10
[   26.210915]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.210947]  ? calculate_sigpending+0x7b/0xa0
[   26.210981]  ? __pfx_kthread+0x10/0x10
[   26.211013]  ret_from_fork+0x116/0x1d0
[   26.211039]  ? __pfx_kthread+0x10/0x10
[   26.211070]  ret_from_fork_asm+0x1a/0x30
[   26.211113]  </TASK>
[   26.211130] 
[   26.228308] Allocated by task 283:
[   26.228787]  kasan_save_stack+0x45/0x70
[   26.229302]  kasan_save_track+0x18/0x40
[   26.229664]  kasan_save_alloc_info+0x3b/0x50
[   26.230151]  __kasan_kmalloc+0xb7/0xc0
[   26.230678]  __kmalloc_cache_noprof+0x189/0x420
[   26.231199]  kasan_atomics+0x95/0x310
[   26.231637]  kunit_try_run_case+0x1a5/0x480
[   26.231991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.232541]  kthread+0x337/0x6f0
[   26.232997]  ret_from_fork+0x116/0x1d0
[   26.233520]  ret_from_fork_asm+0x1a/0x30
[   26.233992] 
[   26.234314] The buggy address belongs to the object at ffff8881039d9c80
[   26.234314]  which belongs to the cache kmalloc-64 of size 64
[   26.235449] The buggy address is located 0 bytes to the right of
[   26.235449]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.236339] 
[   26.236609] The buggy address belongs to the physical page:
[   26.237175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.237887] flags: 0x200000000000000(node=0|zone=2)
[   26.238322] page_type: f5(slab)
[   26.238711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.239432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.240086] page dumped because: kasan: bad access detected
[   26.240528] 
[   26.240777] Memory state around the buggy address:
[   26.241351]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.242658]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.243599] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.244311]                                      ^
[   26.244971]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.245521]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.246081] ==================================================================
[   23.352963] ==================================================================
[   23.354002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   23.354856] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.355382] 
[   23.355680] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.355812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.355855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.355907] Call Trace:
[   23.355929]  <TASK>
[   23.355952]  dump_stack_lvl+0x73/0xb0
[   23.356005]  print_report+0xd1/0x650
[   23.356070]  ? __virt_addr_valid+0x1db/0x2d0
[   23.356124]  ? kasan_atomics_helper+0x4b88/0x5450
[   23.356160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.356192]  ? kasan_atomics_helper+0x4b88/0x5450
[   23.356224]  kasan_report+0x141/0x180
[   23.356255]  ? kasan_atomics_helper+0x4b88/0x5450
[   23.356295]  __asan_report_load4_noabort+0x18/0x20
[   23.356333]  kasan_atomics_helper+0x4b88/0x5450
[   23.356367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.356398]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.356442]  ? kasan_atomics+0x152/0x310
[   23.356481]  kasan_atomics+0x1dc/0x310
[   23.356594]  ? __pfx_kasan_atomics+0x10/0x10
[   23.356705]  ? __pfx_read_tsc+0x10/0x10
[   23.356780]  ? ktime_get_ts64+0x86/0x230
[   23.356859]  kunit_try_run_case+0x1a5/0x480
[   23.356945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.357019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.357093]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.357173]  ? __kthread_parkme+0x82/0x180
[   23.357299]  ? preempt_count_sub+0x50/0x80
[   23.357365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.357454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.357538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.357607]  kthread+0x337/0x6f0
[   23.357722]  ? trace_preempt_on+0x20/0xc0
[   23.357802]  ? __pfx_kthread+0x10/0x10
[   23.357860]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.357922]  ? calculate_sigpending+0x7b/0xa0
[   23.357991]  ? __pfx_kthread+0x10/0x10
[   23.358053]  ret_from_fork+0x116/0x1d0
[   23.358115]  ? __pfx_kthread+0x10/0x10
[   23.358183]  ret_from_fork_asm+0x1a/0x30
[   23.358269]  </TASK>
[   23.358289] 
[   23.384355] Allocated by task 283:
[   23.384829]  kasan_save_stack+0x45/0x70
[   23.385880]  kasan_save_track+0x18/0x40
[   23.386535]  kasan_save_alloc_info+0x3b/0x50
[   23.387256]  __kasan_kmalloc+0xb7/0xc0
[   23.388002]  __kmalloc_cache_noprof+0x189/0x420
[   23.388740]  kasan_atomics+0x95/0x310
[   23.389786]  kunit_try_run_case+0x1a5/0x480
[   23.390251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.390824]  kthread+0x337/0x6f0
[   23.391768]  ret_from_fork+0x116/0x1d0
[   23.392214]  ret_from_fork_asm+0x1a/0x30
[   23.393054] 
[   23.393432] The buggy address belongs to the object at ffff8881039d9c80
[   23.393432]  which belongs to the cache kmalloc-64 of size 64
[   23.394857] The buggy address is located 0 bytes to the right of
[   23.394857]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.396034] 
[   23.396218] The buggy address belongs to the physical page:
[   23.397741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.398364] flags: 0x200000000000000(node=0|zone=2)
[   23.398902] page_type: f5(slab)
[   23.399287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.400813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.401683] page dumped because: kasan: bad access detected
[   23.402649] 
[   23.402836] Memory state around the buggy address:
[   23.403186]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.404810]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.405522] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.406372]                                      ^
[   23.407259]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.408073]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.408867] ==================================================================
[   24.918806] ==================================================================
[   24.919460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   24.920197] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.921532] 
[   24.921814] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.921908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.921929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.921965] Call Trace:
[   24.921995]  <TASK>
[   24.922049]  dump_stack_lvl+0x73/0xb0
[   24.922151]  print_report+0xd1/0x650
[   24.922255]  ? __virt_addr_valid+0x1db/0x2d0
[   24.922338]  ? kasan_atomics_helper+0x1217/0x5450
[   24.922413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.922469]  ? kasan_atomics_helper+0x1217/0x5450
[   24.922544]  kasan_report+0x141/0x180
[   24.922580]  ? kasan_atomics_helper+0x1217/0x5450
[   24.922619]  kasan_check_range+0x10c/0x1c0
[   24.922654]  __kasan_check_write+0x18/0x20
[   24.922682]  kasan_atomics_helper+0x1217/0x5450
[   24.922716]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.922748]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.922795]  ? kasan_atomics+0x152/0x310
[   24.922835]  kasan_atomics+0x1dc/0x310
[   24.922869]  ? __pfx_kasan_atomics+0x10/0x10
[   24.922905]  ? __pfx_read_tsc+0x10/0x10
[   24.922938]  ? ktime_get_ts64+0x86/0x230
[   24.922973]  kunit_try_run_case+0x1a5/0x480
[   24.923012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.923048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.923083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.923118]  ? __kthread_parkme+0x82/0x180
[   24.923149]  ? preempt_count_sub+0x50/0x80
[   24.923182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.923224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.923293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.923332]  kthread+0x337/0x6f0
[   24.923362]  ? trace_preempt_on+0x20/0xc0
[   24.923397]  ? __pfx_kthread+0x10/0x10
[   24.923427]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.923459]  ? calculate_sigpending+0x7b/0xa0
[   24.923515]  ? __pfx_kthread+0x10/0x10
[   24.923556]  ret_from_fork+0x116/0x1d0
[   24.923585]  ? __pfx_kthread+0x10/0x10
[   24.923614]  ret_from_fork_asm+0x1a/0x30
[   24.923658]  </TASK>
[   24.923675] 
[   24.938045] Allocated by task 283:
[   24.938465]  kasan_save_stack+0x45/0x70
[   24.938961]  kasan_save_track+0x18/0x40
[   24.939287]  kasan_save_alloc_info+0x3b/0x50
[   24.939762]  __kasan_kmalloc+0xb7/0xc0
[   24.940107]  __kmalloc_cache_noprof+0x189/0x420
[   24.940605]  kasan_atomics+0x95/0x310
[   24.940921]  kunit_try_run_case+0x1a5/0x480
[   24.941257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.941823]  kthread+0x337/0x6f0
[   24.942208]  ret_from_fork+0x116/0x1d0
[   24.942630]  ret_from_fork_asm+0x1a/0x30
[   24.943066] 
[   24.943314] The buggy address belongs to the object at ffff8881039d9c80
[   24.943314]  which belongs to the cache kmalloc-64 of size 64
[   24.944212] The buggy address is located 0 bytes to the right of
[   24.944212]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.945170] 
[   24.945567] The buggy address belongs to the physical page:
[   24.946106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.946648] flags: 0x200000000000000(node=0|zone=2)
[   24.947017] page_type: f5(slab)
[   24.947308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.947961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.948909] page dumped because: kasan: bad access detected
[   24.949722] 
[   24.949908] Memory state around the buggy address:
[   24.950441]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.951132]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.953744] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.954214]                                      ^
[   24.954739]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.956117]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.957148] ==================================================================
[   24.534903] ==================================================================
[   24.535648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   24.536345] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.537795] 
[   24.538129] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.538265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.538310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.538375] Call Trace:
[   24.538433]  <TASK>
[   24.538488]  dump_stack_lvl+0x73/0xb0
[   24.539285]  print_report+0xd1/0x650
[   24.539372]  ? __virt_addr_valid+0x1db/0x2d0
[   24.539477]  ? kasan_atomics_helper+0xe78/0x5450
[   24.539558]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.539639]  ? kasan_atomics_helper+0xe78/0x5450
[   24.539720]  kasan_report+0x141/0x180
[   24.539805]  ? kasan_atomics_helper+0xe78/0x5450
[   24.539851]  kasan_check_range+0x10c/0x1c0
[   24.539888]  __kasan_check_write+0x18/0x20
[   24.539917]  kasan_atomics_helper+0xe78/0x5450
[   24.539952]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.539988]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.540033]  ? kasan_atomics+0x152/0x310
[   24.540074]  kasan_atomics+0x1dc/0x310
[   24.540108]  ? __pfx_kasan_atomics+0x10/0x10
[   24.540147]  ? __pfx_read_tsc+0x10/0x10
[   24.540182]  ? ktime_get_ts64+0x86/0x230
[   24.540221]  kunit_try_run_case+0x1a5/0x480
[   24.540302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.540343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.540379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.540415]  ? __kthread_parkme+0x82/0x180
[   24.540445]  ? preempt_count_sub+0x50/0x80
[   24.540479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.540551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.540638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.540722]  kthread+0x337/0x6f0
[   24.540795]  ? trace_preempt_on+0x20/0xc0
[   24.540866]  ? __pfx_kthread+0x10/0x10
[   24.540943]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.541003]  ? calculate_sigpending+0x7b/0xa0
[   24.541043]  ? __pfx_kthread+0x10/0x10
[   24.541075]  ret_from_fork+0x116/0x1d0
[   24.541103]  ? __pfx_kthread+0x10/0x10
[   24.541138]  ret_from_fork_asm+0x1a/0x30
[   24.541183]  </TASK>
[   24.541199] 
[   24.572163] Allocated by task 283:
[   24.573791]  kasan_save_stack+0x45/0x70
[   24.574052]  kasan_save_track+0x18/0x40
[   24.574241]  kasan_save_alloc_info+0x3b/0x50
[   24.574774]  __kasan_kmalloc+0xb7/0xc0
[   24.575198]  __kmalloc_cache_noprof+0x189/0x420
[   24.575718]  kasan_atomics+0x95/0x310
[   24.576160]  kunit_try_run_case+0x1a5/0x480
[   24.577799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.578953]  kthread+0x337/0x6f0
[   24.579445]  ret_from_fork+0x116/0x1d0
[   24.580078]  ret_from_fork_asm+0x1a/0x30
[   24.581275] 
[   24.581690] The buggy address belongs to the object at ffff8881039d9c80
[   24.581690]  which belongs to the cache kmalloc-64 of size 64
[   24.582949] The buggy address is located 0 bytes to the right of
[   24.582949]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.584192] 
[   24.584481] The buggy address belongs to the physical page:
[   24.585793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.586806] flags: 0x200000000000000(node=0|zone=2)
[   24.587193] page_type: f5(slab)
[   24.588142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.589701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.590260] page dumped because: kasan: bad access detected
[   24.590698] 
[   24.590874] Memory state around the buggy address:
[   24.591258]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.593428]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.594375] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.594940]                                      ^
[   24.595416]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.596212]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.597424] ==================================================================
[   25.134984] ==================================================================
[   25.135985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   25.137002] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.137571] 
[   25.137950] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.138137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.138213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.138286] Call Trace:
[   25.138342]  <TASK>
[   25.138390]  dump_stack_lvl+0x73/0xb0
[   25.138484]  print_report+0xd1/0x650
[   25.138590]  ? __virt_addr_valid+0x1db/0x2d0
[   25.138673]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.138753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.138924]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.139059]  kasan_report+0x141/0x180
[   25.139174]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.139278]  __asan_report_load8_noabort+0x18/0x20
[   25.139349]  kasan_atomics_helper+0x4eae/0x5450
[   25.139390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.139427]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.139474]  ? kasan_atomics+0x152/0x310
[   25.139545]  kasan_atomics+0x1dc/0x310
[   25.139585]  ? __pfx_kasan_atomics+0x10/0x10
[   25.139624]  ? __pfx_read_tsc+0x10/0x10
[   25.139658]  ? ktime_get_ts64+0x86/0x230
[   25.139696]  kunit_try_run_case+0x1a5/0x480
[   25.139737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.139776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.139812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.139847]  ? __kthread_parkme+0x82/0x180
[   25.139879]  ? preempt_count_sub+0x50/0x80
[   25.139912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.139951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.139988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.140026]  kthread+0x337/0x6f0
[   25.140056]  ? trace_preempt_on+0x20/0xc0
[   25.140091]  ? __pfx_kthread+0x10/0x10
[   25.140122]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.140155]  ? calculate_sigpending+0x7b/0xa0
[   25.140192]  ? __pfx_kthread+0x10/0x10
[   25.140235]  ret_from_fork+0x116/0x1d0
[   25.140287]  ? __pfx_kthread+0x10/0x10
[   25.140320]  ret_from_fork_asm+0x1a/0x30
[   25.140364]  </TASK>
[   25.140380] 
[   25.156075] Allocated by task 283:
[   25.156588]  kasan_save_stack+0x45/0x70
[   25.157086]  kasan_save_track+0x18/0x40
[   25.157790]  kasan_save_alloc_info+0x3b/0x50
[   25.158650]  __kasan_kmalloc+0xb7/0xc0
[   25.158974]  __kmalloc_cache_noprof+0x189/0x420
[   25.159341]  kasan_atomics+0x95/0x310
[   25.159762]  kunit_try_run_case+0x1a5/0x480
[   25.160214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.161017]  kthread+0x337/0x6f0
[   25.161777]  ret_from_fork+0x116/0x1d0
[   25.162702]  ret_from_fork_asm+0x1a/0x30
[   25.163154] 
[   25.163424] The buggy address belongs to the object at ffff8881039d9c80
[   25.163424]  which belongs to the cache kmalloc-64 of size 64
[   25.165182] The buggy address is located 0 bytes to the right of
[   25.165182]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.166042] 
[   25.166322] The buggy address belongs to the physical page:
[   25.166881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.167993] flags: 0x200000000000000(node=0|zone=2)
[   25.168442] page_type: f5(slab)
[   25.168881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.169574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.170261] page dumped because: kasan: bad access detected
[   25.170984] 
[   25.171444] Memory state around the buggy address:
[   25.172086]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.172862]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.173591] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.174360]                                      ^
[   25.175027]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.175985]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.176751] ==================================================================
[   25.617360] ==================================================================
[   25.618008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   25.618702] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.619401] 
[   25.620148] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.620643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.620690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.620758] Call Trace:
[   25.620817]  <TASK>
[   25.620874]  dump_stack_lvl+0x73/0xb0
[   25.620980]  print_report+0xd1/0x650
[   25.621064]  ? __virt_addr_valid+0x1db/0x2d0
[   25.621148]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.621227]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.621334]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.621414]  kasan_report+0x141/0x180
[   25.621511]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.621604]  kasan_check_range+0x10c/0x1c0
[   25.621699]  __kasan_check_write+0x18/0x20
[   25.621770]  kasan_atomics_helper+0x19e3/0x5450
[   25.621852]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.621928]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.621989]  ? kasan_atomics+0x152/0x310
[   25.622032]  kasan_atomics+0x1dc/0x310
[   25.622068]  ? __pfx_kasan_atomics+0x10/0x10
[   25.622109]  ? __pfx_read_tsc+0x10/0x10
[   25.622143]  ? ktime_get_ts64+0x86/0x230
[   25.622179]  kunit_try_run_case+0x1a5/0x480
[   25.622226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.622304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.622344]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.622381]  ? __kthread_parkme+0x82/0x180
[   25.622413]  ? preempt_count_sub+0x50/0x80
[   25.622447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.622486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.622553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.622592]  kthread+0x337/0x6f0
[   25.622621]  ? trace_preempt_on+0x20/0xc0
[   25.622657]  ? __pfx_kthread+0x10/0x10
[   25.622686]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.622720]  ? calculate_sigpending+0x7b/0xa0
[   25.622757]  ? __pfx_kthread+0x10/0x10
[   25.622788]  ret_from_fork+0x116/0x1d0
[   25.622816]  ? __pfx_kthread+0x10/0x10
[   25.622846]  ret_from_fork_asm+0x1a/0x30
[   25.622892]  </TASK>
[   25.622910] 
[   25.638141] Allocated by task 283:
[   25.638632]  kasan_save_stack+0x45/0x70
[   25.639152]  kasan_save_track+0x18/0x40
[   25.639595]  kasan_save_alloc_info+0x3b/0x50
[   25.640034]  __kasan_kmalloc+0xb7/0xc0
[   25.640459]  __kmalloc_cache_noprof+0x189/0x420
[   25.640935]  kasan_atomics+0x95/0x310
[   25.642615]  kunit_try_run_case+0x1a5/0x480
[   25.642999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.643546]  kthread+0x337/0x6f0
[   25.648903]  ret_from_fork+0x116/0x1d0
[   25.649833]  ret_from_fork_asm+0x1a/0x30
[   25.650175] 
[   25.651656] The buggy address belongs to the object at ffff8881039d9c80
[   25.651656]  which belongs to the cache kmalloc-64 of size 64
[   25.654119] The buggy address is located 0 bytes to the right of
[   25.654119]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.656987] 
[   25.657180] The buggy address belongs to the physical page:
[   25.658043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.658926] flags: 0x200000000000000(node=0|zone=2)
[   25.659343] page_type: f5(slab)
[   25.659711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.660297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.660931] page dumped because: kasan: bad access detected
[   25.661392] 
[   25.661769] Memory state around the buggy address:
[   25.662387]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.663023]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.663831] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.664411]                                      ^
[   25.665056]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.665809]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.666529] ==================================================================
[   23.900099] ==================================================================
[   23.904305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   23.906596] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.908210] 
[   23.908855] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.908933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.908954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.908988] Call Trace:
[   23.909014]  <TASK>
[   23.909040]  dump_stack_lvl+0x73/0xb0
[   23.909100]  print_report+0xd1/0x650
[   23.909136]  ? __virt_addr_valid+0x1db/0x2d0
[   23.909171]  ? kasan_atomics_helper+0x7c7/0x5450
[   23.909203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.909294]  ? kasan_atomics_helper+0x7c7/0x5450
[   23.909381]  kasan_report+0x141/0x180
[   23.909462]  ? kasan_atomics_helper+0x7c7/0x5450
[   23.909588]  kasan_check_range+0x10c/0x1c0
[   23.909691]  __kasan_check_write+0x18/0x20
[   23.909767]  kasan_atomics_helper+0x7c7/0x5450
[   23.909871]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.909942]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.910021]  ? kasan_atomics+0x152/0x310
[   23.910099]  kasan_atomics+0x1dc/0x310
[   23.910167]  ? __pfx_kasan_atomics+0x10/0x10
[   23.910240]  ? __pfx_read_tsc+0x10/0x10
[   23.910304]  ? ktime_get_ts64+0x86/0x230
[   23.910374]  kunit_try_run_case+0x1a5/0x480
[   23.910455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.910553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.910641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.910702]  ? __kthread_parkme+0x82/0x180
[   23.910737]  ? preempt_count_sub+0x50/0x80
[   23.910774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.910814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.910852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.910891]  kthread+0x337/0x6f0
[   23.910921]  ? trace_preempt_on+0x20/0xc0
[   23.910957]  ? __pfx_kthread+0x10/0x10
[   23.910987]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.911020]  ? calculate_sigpending+0x7b/0xa0
[   23.911056]  ? __pfx_kthread+0x10/0x10
[   23.911087]  ret_from_fork+0x116/0x1d0
[   23.911114]  ? __pfx_kthread+0x10/0x10
[   23.911144]  ret_from_fork_asm+0x1a/0x30
[   23.911189]  </TASK>
[   23.911205] 
[   23.936487] Allocated by task 283:
[   23.937109]  kasan_save_stack+0x45/0x70
[   23.937904]  kasan_save_track+0x18/0x40
[   23.938423]  kasan_save_alloc_info+0x3b/0x50
[   23.939023]  __kasan_kmalloc+0xb7/0xc0
[   23.939515]  __kmalloc_cache_noprof+0x189/0x420
[   23.940974]  kasan_atomics+0x95/0x310
[   23.941353]  kunit_try_run_case+0x1a5/0x480
[   23.942156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.943079]  kthread+0x337/0x6f0
[   23.943656]  ret_from_fork+0x116/0x1d0
[   23.944750]  ret_from_fork_asm+0x1a/0x30
[   23.946007] 
[   23.946412] The buggy address belongs to the object at ffff8881039d9c80
[   23.946412]  which belongs to the cache kmalloc-64 of size 64
[   23.947941] The buggy address is located 0 bytes to the right of
[   23.947941]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.948758] 
[   23.949120] The buggy address belongs to the physical page:
[   23.949755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.951156] flags: 0x200000000000000(node=0|zone=2)
[   23.951657] page_type: f5(slab)
[   23.952016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.953443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.954415] page dumped because: kasan: bad access detected
[   23.955148] 
[   23.955373] Memory state around the buggy address:
[   23.956376]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.957613]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.958294] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.959192]                                      ^
[   23.959836]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.960527]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.961117] ==================================================================
[   26.107988] ==================================================================
[   26.108413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   26.110115] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.111289] 
[   26.111658] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.111842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.111885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.111951] Call Trace:
[   26.112005]  <TASK>
[   26.112059]  dump_stack_lvl+0x73/0xb0
[   26.112160]  print_report+0xd1/0x650
[   26.112264]  ? __virt_addr_valid+0x1db/0x2d0
[   26.112346]  ? kasan_atomics_helper+0x2006/0x5450
[   26.112419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.112536]  ? kasan_atomics_helper+0x2006/0x5450
[   26.112607]  kasan_report+0x141/0x180
[   26.112685]  ? kasan_atomics_helper+0x2006/0x5450
[   26.112778]  kasan_check_range+0x10c/0x1c0
[   26.112860]  __kasan_check_write+0x18/0x20
[   26.112895]  kasan_atomics_helper+0x2006/0x5450
[   26.112930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.112964]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.113009]  ? kasan_atomics+0x152/0x310
[   26.113048]  kasan_atomics+0x1dc/0x310
[   26.113082]  ? __pfx_kasan_atomics+0x10/0x10
[   26.113118]  ? __pfx_read_tsc+0x10/0x10
[   26.113149]  ? ktime_get_ts64+0x86/0x230
[   26.113186]  kunit_try_run_case+0x1a5/0x480
[   26.113256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.113309]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.113347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.113383]  ? __kthread_parkme+0x82/0x180
[   26.113415]  ? preempt_count_sub+0x50/0x80
[   26.113452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.113489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.113559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.113598]  kthread+0x337/0x6f0
[   26.113643]  ? trace_preempt_on+0x20/0xc0
[   26.113681]  ? __pfx_kthread+0x10/0x10
[   26.113712]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.113745]  ? calculate_sigpending+0x7b/0xa0
[   26.113780]  ? __pfx_kthread+0x10/0x10
[   26.113812]  ret_from_fork+0x116/0x1d0
[   26.113840]  ? __pfx_kthread+0x10/0x10
[   26.113871]  ret_from_fork_asm+0x1a/0x30
[   26.113914]  </TASK>
[   26.113931] 
[   26.132997] Allocated by task 283:
[   26.133711]  kasan_save_stack+0x45/0x70
[   26.134205]  kasan_save_track+0x18/0x40
[   26.134803]  kasan_save_alloc_info+0x3b/0x50
[   26.135336]  __kasan_kmalloc+0xb7/0xc0
[   26.135809]  __kmalloc_cache_noprof+0x189/0x420
[   26.136372]  kasan_atomics+0x95/0x310
[   26.136819]  kunit_try_run_case+0x1a5/0x480
[   26.137300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.137947]  kthread+0x337/0x6f0
[   26.138367]  ret_from_fork+0x116/0x1d0
[   26.138902]  ret_from_fork_asm+0x1a/0x30
[   26.139299] 
[   26.139593] The buggy address belongs to the object at ffff8881039d9c80
[   26.139593]  which belongs to the cache kmalloc-64 of size 64
[   26.140817] The buggy address is located 0 bytes to the right of
[   26.140817]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.141915] 
[   26.142112] The buggy address belongs to the physical page:
[   26.142645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.143627] flags: 0x200000000000000(node=0|zone=2)
[   26.144239] page_type: f5(slab)
[   26.144716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.145468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.146021] page dumped because: kasan: bad access detected
[   26.146491] 
[   26.146865] Memory state around the buggy address:
[   26.147723]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.148474]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.148976] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.150077]                                      ^
[   26.150679]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.151310]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.152225] ==================================================================
[   25.044551] ==================================================================
[   25.045341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   25.046197] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.046803] 
[   25.047089] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.047233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.047823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.047868] Call Trace:
[   25.047894]  <TASK>
[   25.047922]  dump_stack_lvl+0x73/0xb0
[   25.047980]  print_report+0xd1/0x650
[   25.048018]  ? __virt_addr_valid+0x1db/0x2d0
[   25.048054]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.048088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.048121]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.048154]  kasan_report+0x141/0x180
[   25.048187]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.048232]  __asan_report_load4_noabort+0x18/0x20
[   25.048314]  kasan_atomics_helper+0x49ce/0x5450
[   25.048356]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.048392]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.048439]  ? kasan_atomics+0x152/0x310
[   25.048480]  kasan_atomics+0x1dc/0x310
[   25.048543]  ? __pfx_kasan_atomics+0x10/0x10
[   25.048586]  ? __pfx_read_tsc+0x10/0x10
[   25.048621]  ? ktime_get_ts64+0x86/0x230
[   25.048659]  kunit_try_run_case+0x1a5/0x480
[   25.048700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.048738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.048775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.048812]  ? __kthread_parkme+0x82/0x180
[   25.048845]  ? preempt_count_sub+0x50/0x80
[   25.048880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.048919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.048955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.048992]  kthread+0x337/0x6f0
[   25.049022]  ? trace_preempt_on+0x20/0xc0
[   25.049059]  ? __pfx_kthread+0x10/0x10
[   25.049090]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.049125]  ? calculate_sigpending+0x7b/0xa0
[   25.049163]  ? __pfx_kthread+0x10/0x10
[   25.049195]  ret_from_fork+0x116/0x1d0
[   25.049233]  ? __pfx_kthread+0x10/0x10
[   25.049286]  ret_from_fork_asm+0x1a/0x30
[   25.049333]  </TASK>
[   25.049352] 
[   25.066182] Allocated by task 283:
[   25.066608]  kasan_save_stack+0x45/0x70
[   25.067082]  kasan_save_track+0x18/0x40
[   25.067645]  kasan_save_alloc_info+0x3b/0x50
[   25.068114]  __kasan_kmalloc+0xb7/0xc0
[   25.068659]  __kmalloc_cache_noprof+0x189/0x420
[   25.069201]  kasan_atomics+0x95/0x310
[   25.069696]  kunit_try_run_case+0x1a5/0x480
[   25.070201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.070719]  kthread+0x337/0x6f0
[   25.071206]  ret_from_fork+0x116/0x1d0
[   25.071823]  ret_from_fork_asm+0x1a/0x30
[   25.072389] 
[   25.072698] The buggy address belongs to the object at ffff8881039d9c80
[   25.072698]  which belongs to the cache kmalloc-64 of size 64
[   25.073781] The buggy address is located 0 bytes to the right of
[   25.073781]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.074654] 
[   25.074996] The buggy address belongs to the physical page:
[   25.075581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.076547] flags: 0x200000000000000(node=0|zone=2)
[   25.076917] page_type: f5(slab)
[   25.077204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.077899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.078708] page dumped because: kasan: bad access detected
[   25.079239] 
[   25.079454] Memory state around the buggy address:
[   25.080755]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.081653]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.082271] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.083021]                                      ^
[   25.083708]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.084229]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.085034] ==================================================================
[   24.698247] ==================================================================
[   24.699766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   24.700461] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.701021] 
[   24.701352] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.701490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.701553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.701679] Call Trace:
[   24.701737]  <TASK>
[   24.701797]  dump_stack_lvl+0x73/0xb0
[   24.701897]  print_report+0xd1/0x650
[   24.702181]  ? __virt_addr_valid+0x1db/0x2d0
[   24.702324]  ? kasan_atomics_helper+0x4a36/0x5450
[   24.702406]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.702489]  ? kasan_atomics_helper+0x4a36/0x5450
[   24.702590]  kasan_report+0x141/0x180
[   24.702671]  ? kasan_atomics_helper+0x4a36/0x5450
[   24.702758]  __asan_report_load4_noabort+0x18/0x20
[   24.702833]  kasan_atomics_helper+0x4a36/0x5450
[   24.702900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.702961]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.703040]  ? kasan_atomics+0x152/0x310
[   24.703107]  kasan_atomics+0x1dc/0x310
[   24.703171]  ? __pfx_kasan_atomics+0x10/0x10
[   24.703241]  ? __pfx_read_tsc+0x10/0x10
[   24.703304]  ? ktime_get_ts64+0x86/0x230
[   24.703370]  kunit_try_run_case+0x1a5/0x480
[   24.703438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.703522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.703592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.703664]  ? __kthread_parkme+0x82/0x180
[   24.703735]  ? preempt_count_sub+0x50/0x80
[   24.703807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.703881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.703945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.703987]  kthread+0x337/0x6f0
[   24.704017]  ? trace_preempt_on+0x20/0xc0
[   24.704053]  ? __pfx_kthread+0x10/0x10
[   24.704082]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.704116]  ? calculate_sigpending+0x7b/0xa0
[   24.704153]  ? __pfx_kthread+0x10/0x10
[   24.704184]  ret_from_fork+0x116/0x1d0
[   24.704211]  ? __pfx_kthread+0x10/0x10
[   24.704291]  ret_from_fork_asm+0x1a/0x30
[   24.704345]  </TASK>
[   24.704365] 
[   24.719462] Allocated by task 283:
[   24.719958]  kasan_save_stack+0x45/0x70
[   24.720552]  kasan_save_track+0x18/0x40
[   24.720966]  kasan_save_alloc_info+0x3b/0x50
[   24.721399]  __kasan_kmalloc+0xb7/0xc0
[   24.721756]  __kmalloc_cache_noprof+0x189/0x420
[   24.722251]  kasan_atomics+0x95/0x310
[   24.722871]  kunit_try_run_case+0x1a5/0x480
[   24.723438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.724013]  kthread+0x337/0x6f0
[   24.724490]  ret_from_fork+0x116/0x1d0
[   24.724846]  ret_from_fork_asm+0x1a/0x30
[   24.725252] 
[   24.725527] The buggy address belongs to the object at ffff8881039d9c80
[   24.725527]  which belongs to the cache kmalloc-64 of size 64
[   24.726560] The buggy address is located 0 bytes to the right of
[   24.726560]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.727455] 
[   24.727750] The buggy address belongs to the physical page:
[   24.728288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.728934] flags: 0x200000000000000(node=0|zone=2)
[   24.729433] page_type: f5(slab)
[   24.729870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.730536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.731232] page dumped because: kasan: bad access detected
[   24.731820] 
[   24.732033] Memory state around the buggy address:
[   24.732384]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.732867]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.733329] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.734043]                                      ^
[   24.734679]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.735353]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.736361] ==================================================================
[   23.738797] ==================================================================
[   23.739453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   23.740262] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.741421] 
[   23.742053] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.742222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.742266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.742388] Call Trace:
[   23.742473]  <TASK>
[   23.742780]  dump_stack_lvl+0x73/0xb0
[   23.742920]  print_report+0xd1/0x650
[   23.743007]  ? __virt_addr_valid+0x1db/0x2d0
[   23.743176]  ? kasan_atomics_helper+0x5fe/0x5450
[   23.743305]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.743398]  ? kasan_atomics_helper+0x5fe/0x5450
[   23.743478]  kasan_report+0x141/0x180
[   23.743815]  ? kasan_atomics_helper+0x5fe/0x5450
[   23.744374]  kasan_check_range+0x10c/0x1c0
[   23.744510]  __kasan_check_write+0x18/0x20
[   23.744591]  kasan_atomics_helper+0x5fe/0x5450
[   23.744674]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.744751]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.744990]  ? kasan_atomics+0x152/0x310
[   23.745086]  kasan_atomics+0x1dc/0x310
[   23.745175]  ? __pfx_kasan_atomics+0x10/0x10
[   23.745418]  ? __pfx_read_tsc+0x10/0x10
[   23.745545]  ? ktime_get_ts64+0x86/0x230
[   23.745711]  kunit_try_run_case+0x1a5/0x480
[   23.745757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.745795]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.745832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.745871]  ? __kthread_parkme+0x82/0x180
[   23.745903]  ? preempt_count_sub+0x50/0x80
[   23.745939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.745976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.746012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.746049]  kthread+0x337/0x6f0
[   23.746079]  ? trace_preempt_on+0x20/0xc0
[   23.746114]  ? __pfx_kthread+0x10/0x10
[   23.746145]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.746178]  ? calculate_sigpending+0x7b/0xa0
[   23.746214]  ? __pfx_kthread+0x10/0x10
[   23.746280]  ret_from_fork+0x116/0x1d0
[   23.746313]  ? __pfx_kthread+0x10/0x10
[   23.746344]  ret_from_fork_asm+0x1a/0x30
[   23.746389]  </TASK>
[   23.746406] 
[   23.769254] Allocated by task 283:
[   23.769583]  kasan_save_stack+0x45/0x70
[   23.770020]  kasan_save_track+0x18/0x40
[   23.770325]  kasan_save_alloc_info+0x3b/0x50
[   23.774742]  __kasan_kmalloc+0xb7/0xc0
[   23.775758]  __kmalloc_cache_noprof+0x189/0x420
[   23.776279]  kasan_atomics+0x95/0x310
[   23.776717]  kunit_try_run_case+0x1a5/0x480
[   23.777003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.777334]  kthread+0x337/0x6f0
[   23.779470]  ret_from_fork+0x116/0x1d0
[   23.780445]  ret_from_fork_asm+0x1a/0x30
[   23.781413] 
[   23.782186] The buggy address belongs to the object at ffff8881039d9c80
[   23.782186]  which belongs to the cache kmalloc-64 of size 64
[   23.783393] The buggy address is located 0 bytes to the right of
[   23.783393]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.784480] 
[   23.784822] The buggy address belongs to the physical page:
[   23.785437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.786102] flags: 0x200000000000000(node=0|zone=2)
[   23.786693] page_type: f5(slab)
[   23.787186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.787972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.788606] page dumped because: kasan: bad access detected
[   23.789209] 
[   23.789560] Memory state around the buggy address:
[   23.789980]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.790934]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.791482] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.793183]                                      ^
[   23.793940]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.794531]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.795322] ==================================================================
[   25.799618] ==================================================================
[   25.800680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   25.801302] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.801918] 
[   25.802199] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.802340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.802388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.802462] Call Trace:
[   25.803310]  <TASK>
[   25.803376]  dump_stack_lvl+0x73/0xb0
[   25.803477]  print_report+0xd1/0x650
[   25.803550]  ? __virt_addr_valid+0x1db/0x2d0
[   25.803591]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.803627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.803662]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.803696]  kasan_report+0x141/0x180
[   25.803729]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.803769]  __asan_report_load8_noabort+0x18/0x20
[   25.803808]  kasan_atomics_helper+0x4f30/0x5450
[   25.803842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.803875]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.803922]  ? kasan_atomics+0x152/0x310
[   25.803961]  kasan_atomics+0x1dc/0x310
[   25.803997]  ? __pfx_kasan_atomics+0x10/0x10
[   25.804035]  ? __pfx_read_tsc+0x10/0x10
[   25.804068]  ? ktime_get_ts64+0x86/0x230
[   25.804106]  kunit_try_run_case+0x1a5/0x480
[   25.804147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.804189]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.804271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.804317]  ? __kthread_parkme+0x82/0x180
[   25.804352]  ? preempt_count_sub+0x50/0x80
[   25.804387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.804427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.804464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.804524]  kthread+0x337/0x6f0
[   25.804560]  ? trace_preempt_on+0x20/0xc0
[   25.804597]  ? __pfx_kthread+0x10/0x10
[   25.804628]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.804663]  ? calculate_sigpending+0x7b/0xa0
[   25.804701]  ? __pfx_kthread+0x10/0x10
[   25.804733]  ret_from_fork+0x116/0x1d0
[   25.804761]  ? __pfx_kthread+0x10/0x10
[   25.804793]  ret_from_fork_asm+0x1a/0x30
[   25.804838]  </TASK>
[   25.804856] 
[   25.822069] Allocated by task 283:
[   25.822555]  kasan_save_stack+0x45/0x70
[   25.822929]  kasan_save_track+0x18/0x40
[   25.823383]  kasan_save_alloc_info+0x3b/0x50
[   25.823924]  __kasan_kmalloc+0xb7/0xc0
[   25.824400]  __kmalloc_cache_noprof+0x189/0x420
[   25.824931]  kasan_atomics+0x95/0x310
[   25.825299]  kunit_try_run_case+0x1a5/0x480
[   25.825718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.826392]  kthread+0x337/0x6f0
[   25.826860]  ret_from_fork+0x116/0x1d0
[   25.827342]  ret_from_fork_asm+0x1a/0x30
[   25.827868] 
[   25.828118] The buggy address belongs to the object at ffff8881039d9c80
[   25.828118]  which belongs to the cache kmalloc-64 of size 64
[   25.829147] The buggy address is located 0 bytes to the right of
[   25.829147]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.830267] 
[   25.830559] The buggy address belongs to the physical page:
[   25.831056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.831811] flags: 0x200000000000000(node=0|zone=2)
[   25.832413] page_type: f5(slab)
[   25.832794] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.833545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.834030] page dumped because: kasan: bad access detected
[   25.834587] 
[   25.834839] Memory state around the buggy address:
[   25.835396]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.836071]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.836601] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.837177]                                      ^
[   25.837777]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.838646]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.839634] ==================================================================
[   25.842186] ==================================================================
[   25.842937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   25.843698] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.844343] 
[   25.844705] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.844823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.844863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.844931] Call Trace:
[   25.844992]  <TASK>
[   25.845052]  dump_stack_lvl+0x73/0xb0
[   25.845155]  print_report+0xd1/0x650
[   25.845292]  ? __virt_addr_valid+0x1db/0x2d0
[   25.845383]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.845464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.845572]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.845670]  kasan_report+0x141/0x180
[   25.845756]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.845835]  kasan_check_range+0x10c/0x1c0
[   25.845919]  __kasan_check_write+0x18/0x20
[   25.845996]  kasan_atomics_helper+0x1ce1/0x5450
[   25.846075]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.846153]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.846300]  ? kasan_atomics+0x152/0x310
[   25.846398]  kasan_atomics+0x1dc/0x310
[   25.846478]  ? __pfx_kasan_atomics+0x10/0x10
[   25.846564]  ? __pfx_read_tsc+0x10/0x10
[   25.846603]  ? ktime_get_ts64+0x86/0x230
[   25.846640]  kunit_try_run_case+0x1a5/0x480
[   25.846681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.846719]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.846756]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.846791]  ? __kthread_parkme+0x82/0x180
[   25.846823]  ? preempt_count_sub+0x50/0x80
[   25.846858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.846895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.846930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.846966]  kthread+0x337/0x6f0
[   25.846995]  ? trace_preempt_on+0x20/0xc0
[   25.847030]  ? __pfx_kthread+0x10/0x10
[   25.847061]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.847093]  ? calculate_sigpending+0x7b/0xa0
[   25.847130]  ? __pfx_kthread+0x10/0x10
[   25.847160]  ret_from_fork+0x116/0x1d0
[   25.847188]  ? __pfx_kthread+0x10/0x10
[   25.847239]  ret_from_fork_asm+0x1a/0x30
[   25.847317]  </TASK>
[   25.847337] 
[   25.863936] Allocated by task 283:
[   25.864441]  kasan_save_stack+0x45/0x70
[   25.864923]  kasan_save_track+0x18/0x40
[   25.865383]  kasan_save_alloc_info+0x3b/0x50
[   25.865770]  __kasan_kmalloc+0xb7/0xc0
[   25.866106]  __kmalloc_cache_noprof+0x189/0x420
[   25.866593]  kasan_atomics+0x95/0x310
[   25.867031]  kunit_try_run_case+0x1a5/0x480
[   25.867655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.868273]  kthread+0x337/0x6f0
[   25.868781]  ret_from_fork+0x116/0x1d0
[   25.869103]  ret_from_fork_asm+0x1a/0x30
[   25.869810] 
[   25.870069] The buggy address belongs to the object at ffff8881039d9c80
[   25.870069]  which belongs to the cache kmalloc-64 of size 64
[   25.872049] The buggy address is located 0 bytes to the right of
[   25.872049]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.874109] 
[   25.875036] The buggy address belongs to the physical page:
[   25.875490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.876267] flags: 0x200000000000000(node=0|zone=2)
[   25.876737] page_type: f5(slab)
[   25.877096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.877802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.878434] page dumped because: kasan: bad access detected
[   25.878934] 
[   25.879170] Memory state around the buggy address:
[   25.879661]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.880314]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.880874] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.881419]                                      ^
[   25.881912]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.882559]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.883114] ==================================================================
[   23.686032] ==================================================================
[   23.686743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   23.687371] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.688050] 
[   23.688347] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.688491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.688550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.688613] Call Trace:
[   23.688665]  <TASK>
[   23.688723]  dump_stack_lvl+0x73/0xb0
[   23.688838]  print_report+0xd1/0x650
[   23.688924]  ? __virt_addr_valid+0x1db/0x2d0
[   23.689007]  ? kasan_atomics_helper+0x565/0x5450
[   23.689090]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.689169]  ? kasan_atomics_helper+0x565/0x5450
[   23.689249]  kasan_report+0x141/0x180
[   23.689345]  ? kasan_atomics_helper+0x565/0x5450
[   23.689440]  kasan_check_range+0x10c/0x1c0
[   23.689544]  __kasan_check_write+0x18/0x20
[   23.689631]  kasan_atomics_helper+0x565/0x5450
[   23.689717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.689801]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.689883]  ? kasan_atomics+0x152/0x310
[   23.689956]  kasan_atomics+0x1dc/0x310
[   23.690036]  ? __pfx_kasan_atomics+0x10/0x10
[   23.690126]  ? __pfx_read_tsc+0x10/0x10
[   23.690215]  ? ktime_get_ts64+0x86/0x230
[   23.690316]  kunit_try_run_case+0x1a5/0x480
[   23.690411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.690494]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.690595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.690680]  ? __kthread_parkme+0x82/0x180
[   23.690755]  ? preempt_count_sub+0x50/0x80
[   23.690839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.690927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.690978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.691018]  kthread+0x337/0x6f0
[   23.691049]  ? trace_preempt_on+0x20/0xc0
[   23.691086]  ? __pfx_kthread+0x10/0x10
[   23.691118]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.691150]  ? calculate_sigpending+0x7b/0xa0
[   23.691186]  ? __pfx_kthread+0x10/0x10
[   23.691219]  ret_from_fork+0x116/0x1d0
[   23.691279]  ? __pfx_kthread+0x10/0x10
[   23.691313]  ret_from_fork_asm+0x1a/0x30
[   23.691357]  </TASK>
[   23.691375] 
[   23.716062] Allocated by task 283:
[   23.716885]  kasan_save_stack+0x45/0x70
[   23.717256]  kasan_save_track+0x18/0x40
[   23.717733]  kasan_save_alloc_info+0x3b/0x50
[   23.718602]  __kasan_kmalloc+0xb7/0xc0
[   23.719336]  __kmalloc_cache_noprof+0x189/0x420
[   23.720004]  kasan_atomics+0x95/0x310
[   23.720587]  kunit_try_run_case+0x1a5/0x480
[   23.721217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.721855]  kthread+0x337/0x6f0
[   23.722176]  ret_from_fork+0x116/0x1d0
[   23.723041]  ret_from_fork_asm+0x1a/0x30
[   23.723857] 
[   23.724082] The buggy address belongs to the object at ffff8881039d9c80
[   23.724082]  which belongs to the cache kmalloc-64 of size 64
[   23.724934] The buggy address is located 0 bytes to the right of
[   23.724934]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.727097] 
[   23.727743] The buggy address belongs to the physical page:
[   23.728343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.729460] flags: 0x200000000000000(node=0|zone=2)
[   23.729906] page_type: f5(slab)
[   23.730332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.730970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.731728] page dumped because: kasan: bad access detected
[   23.732546] 
[   23.732880] Memory state around the buggy address:
[   23.733349]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.734162]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.734842] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.735323]                                      ^
[   23.735931]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.736698]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.737575] ==================================================================
[   24.872931] ==================================================================
[   24.873995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   24.874871] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.875935] 
[   24.876142] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.876212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.876582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.876677] Call Trace:
[   24.876732]  <TASK>
[   24.876787]  dump_stack_lvl+0x73/0xb0
[   24.876888]  print_report+0xd1/0x650
[   24.876971]  ? __virt_addr_valid+0x1db/0x2d0
[   24.877052]  ? kasan_atomics_helper+0x4a02/0x5450
[   24.877132]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.877215]  ? kasan_atomics_helper+0x4a02/0x5450
[   24.877318]  kasan_report+0x141/0x180
[   24.877355]  ? kasan_atomics_helper+0x4a02/0x5450
[   24.877396]  __asan_report_load4_noabort+0x18/0x20
[   24.877434]  kasan_atomics_helper+0x4a02/0x5450
[   24.877467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.877524]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.877574]  ? kasan_atomics+0x152/0x310
[   24.877629]  kasan_atomics+0x1dc/0x310
[   24.877667]  ? __pfx_kasan_atomics+0x10/0x10
[   24.877704]  ? __pfx_read_tsc+0x10/0x10
[   24.877737]  ? ktime_get_ts64+0x86/0x230
[   24.877776]  kunit_try_run_case+0x1a5/0x480
[   24.877816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.877852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.877888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.877923]  ? __kthread_parkme+0x82/0x180
[   24.877954]  ? preempt_count_sub+0x50/0x80
[   24.877988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.878026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.878060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.878096]  kthread+0x337/0x6f0
[   24.878125]  ? trace_preempt_on+0x20/0xc0
[   24.878159]  ? __pfx_kthread+0x10/0x10
[   24.878189]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.878229]  ? calculate_sigpending+0x7b/0xa0
[   24.878294]  ? __pfx_kthread+0x10/0x10
[   24.878327]  ret_from_fork+0x116/0x1d0
[   24.878356]  ? __pfx_kthread+0x10/0x10
[   24.878385]  ret_from_fork_asm+0x1a/0x30
[   24.878429]  </TASK>
[   24.878445] 
[   24.898064] Allocated by task 283:
[   24.898359]  kasan_save_stack+0x45/0x70
[   24.899307]  kasan_save_track+0x18/0x40
[   24.899870]  kasan_save_alloc_info+0x3b/0x50
[   24.900547]  __kasan_kmalloc+0xb7/0xc0
[   24.900921]  __kmalloc_cache_noprof+0x189/0x420
[   24.901570]  kasan_atomics+0x95/0x310
[   24.902017]  kunit_try_run_case+0x1a5/0x480
[   24.902454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.903182]  kthread+0x337/0x6f0
[   24.903589]  ret_from_fork+0x116/0x1d0
[   24.904012]  ret_from_fork_asm+0x1a/0x30
[   24.904412] 
[   24.904762] The buggy address belongs to the object at ffff8881039d9c80
[   24.904762]  which belongs to the cache kmalloc-64 of size 64
[   24.905778] The buggy address is located 0 bytes to the right of
[   24.905778]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.906825] 
[   24.907089] The buggy address belongs to the physical page:
[   24.907711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.908521] flags: 0x200000000000000(node=0|zone=2)
[   24.908965] page_type: f5(slab)
[   24.909520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.910165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.910912] page dumped because: kasan: bad access detected
[   24.911510] 
[   24.911742] Memory state around the buggy address:
[   24.912410]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.912954]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.913790] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.914349]                                      ^
[   24.914896]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.915611]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.916281] ==================================================================
[   24.021383] ==================================================================
[   24.021879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   24.023494] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.024249] 
[   24.025216] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.025368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.025412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.025482] Call Trace:
[   24.025564]  <TASK>
[   24.025639]  dump_stack_lvl+0x73/0xb0
[   24.025765]  print_report+0xd1/0x650
[   24.025852]  ? __virt_addr_valid+0x1db/0x2d0
[   24.025932]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.026007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.026084]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.026121]  kasan_report+0x141/0x180
[   24.026158]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.026197]  kasan_check_range+0x10c/0x1c0
[   24.026251]  __kasan_check_write+0x18/0x20
[   24.026298]  kasan_atomics_helper+0x8f9/0x5450
[   24.026333]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.026365]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.026412]  ? kasan_atomics+0x152/0x310
[   24.026451]  kasan_atomics+0x1dc/0x310
[   24.026484]  ? __pfx_kasan_atomics+0x10/0x10
[   24.026568]  ? __pfx_read_tsc+0x10/0x10
[   24.026651]  ? ktime_get_ts64+0x86/0x230
[   24.026721]  kunit_try_run_case+0x1a5/0x480
[   24.026792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.026857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.026923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.026988]  ? __kthread_parkme+0x82/0x180
[   24.027049]  ? preempt_count_sub+0x50/0x80
[   24.027112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.027186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.027262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.027321]  kthread+0x337/0x6f0
[   24.027353]  ? trace_preempt_on+0x20/0xc0
[   24.027389]  ? __pfx_kthread+0x10/0x10
[   24.027420]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.027454]  ? calculate_sigpending+0x7b/0xa0
[   24.027489]  ? __pfx_kthread+0x10/0x10
[   24.027600]  ret_from_fork+0x116/0x1d0
[   24.027677]  ? __pfx_kthread+0x10/0x10
[   24.027723]  ret_from_fork_asm+0x1a/0x30
[   24.027769]  </TASK>
[   24.027787] 
[   24.059304] Allocated by task 283:
[   24.059685]  kasan_save_stack+0x45/0x70
[   24.060120]  kasan_save_track+0x18/0x40
[   24.060705]  kasan_save_alloc_info+0x3b/0x50
[   24.061285]  __kasan_kmalloc+0xb7/0xc0
[   24.061726]  __kmalloc_cache_noprof+0x189/0x420
[   24.062331]  kasan_atomics+0x95/0x310
[   24.063556]  kunit_try_run_case+0x1a5/0x480
[   24.063985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.064479]  kthread+0x337/0x6f0
[   24.064861]  ret_from_fork+0x116/0x1d0
[   24.065456]  ret_from_fork_asm+0x1a/0x30
[   24.065985] 
[   24.066231] The buggy address belongs to the object at ffff8881039d9c80
[   24.066231]  which belongs to the cache kmalloc-64 of size 64
[   24.067142] The buggy address is located 0 bytes to the right of
[   24.067142]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.068528] 
[   24.068794] The buggy address belongs to the physical page:
[   24.069288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.069948] flags: 0x200000000000000(node=0|zone=2)
[   24.070474] page_type: f5(slab)
[   24.070833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.071452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.073285] page dumped because: kasan: bad access detected
[   24.074006] 
[   24.074221] Memory state around the buggy address:
[   24.074855]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.075404]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.076908] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.077587]                                      ^
[   24.078014]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.078629]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.079229] ==================================================================
[   24.081120] ==================================================================
[   24.081917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   24.083286] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.084876] 
[   24.085364] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.085529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.085572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.085659] Call Trace:
[   24.085716]  <TASK>
[   24.085772]  dump_stack_lvl+0x73/0xb0
[   24.085939]  print_report+0xd1/0x650
[   24.085999]  ? __virt_addr_valid+0x1db/0x2d0
[   24.086036]  ? kasan_atomics_helper+0x992/0x5450
[   24.086070]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.086104]  ? kasan_atomics_helper+0x992/0x5450
[   24.086135]  kasan_report+0x141/0x180
[   24.086168]  ? kasan_atomics_helper+0x992/0x5450
[   24.086206]  kasan_check_range+0x10c/0x1c0
[   24.086284]  __kasan_check_write+0x18/0x20
[   24.086316]  kasan_atomics_helper+0x992/0x5450
[   24.086350]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.086383]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.086428]  ? kasan_atomics+0x152/0x310
[   24.086467]  kasan_atomics+0x1dc/0x310
[   24.086526]  ? __pfx_kasan_atomics+0x10/0x10
[   24.086643]  ? __pfx_read_tsc+0x10/0x10
[   24.086701]  ? ktime_get_ts64+0x86/0x230
[   24.086740]  kunit_try_run_case+0x1a5/0x480
[   24.086782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.086818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.086854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.086889]  ? __kthread_parkme+0x82/0x180
[   24.086921]  ? preempt_count_sub+0x50/0x80
[   24.086954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.086990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.087025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.087062]  kthread+0x337/0x6f0
[   24.087090]  ? trace_preempt_on+0x20/0xc0
[   24.087125]  ? __pfx_kthread+0x10/0x10
[   24.087156]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.087187]  ? calculate_sigpending+0x7b/0xa0
[   24.087222]  ? __pfx_kthread+0x10/0x10
[   24.087285]  ret_from_fork+0x116/0x1d0
[   24.087315]  ? __pfx_kthread+0x10/0x10
[   24.087347]  ret_from_fork_asm+0x1a/0x30
[   24.087390]  </TASK>
[   24.087407] 
[   24.109177] Allocated by task 283:
[   24.109754]  kasan_save_stack+0x45/0x70
[   24.110289]  kasan_save_track+0x18/0x40
[   24.110869]  kasan_save_alloc_info+0x3b/0x50
[   24.111171]  __kasan_kmalloc+0xb7/0xc0
[   24.111490]  __kmalloc_cache_noprof+0x189/0x420
[   24.112054]  kasan_atomics+0x95/0x310
[   24.112533]  kunit_try_run_case+0x1a5/0x480
[   24.112990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.113588]  kthread+0x337/0x6f0
[   24.113983]  ret_from_fork+0x116/0x1d0
[   24.114582]  ret_from_fork_asm+0x1a/0x30
[   24.115031] 
[   24.115415] The buggy address belongs to the object at ffff8881039d9c80
[   24.115415]  which belongs to the cache kmalloc-64 of size 64
[   24.116274] The buggy address is located 0 bytes to the right of
[   24.116274]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.117235] 
[   24.117492] The buggy address belongs to the physical page:
[   24.118404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.120074] flags: 0x200000000000000(node=0|zone=2)
[   24.120830] page_type: f5(slab)
[   24.121269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.122413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.123959] page dumped because: kasan: bad access detected
[   24.124949] 
[   24.125382] Memory state around the buggy address:
[   24.126478]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.128385]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.128888] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.129439]                                      ^
[   24.130689]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.131107]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.132162] ==================================================================
[   24.133314] ==================================================================
[   24.133925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   24.135183] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.136641] 
[   24.137021] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.137149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.137186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.137255] Call Trace:
[   24.137313]  <TASK>
[   24.137980]  dump_stack_lvl+0x73/0xb0
[   24.138109]  print_report+0xd1/0x650
[   24.138194]  ? __virt_addr_valid+0x1db/0x2d0
[   24.138282]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.138360]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.138441]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.138546]  kasan_report+0x141/0x180
[   24.138691]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.138749]  kasan_check_range+0x10c/0x1c0
[   24.138786]  __kasan_check_write+0x18/0x20
[   24.138818]  kasan_atomics_helper+0xa2b/0x5450
[   24.138852]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.138885]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.138930]  ? kasan_atomics+0x152/0x310
[   24.138969]  kasan_atomics+0x1dc/0x310
[   24.139003]  ? __pfx_kasan_atomics+0x10/0x10
[   24.139039]  ? __pfx_read_tsc+0x10/0x10
[   24.139071]  ? ktime_get_ts64+0x86/0x230
[   24.139107]  kunit_try_run_case+0x1a5/0x480
[   24.139146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.139182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.139220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.139289]  ? __kthread_parkme+0x82/0x180
[   24.139323]  ? preempt_count_sub+0x50/0x80
[   24.139358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.139396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.139431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.139468]  kthread+0x337/0x6f0
[   24.139521]  ? trace_preempt_on+0x20/0xc0
[   24.139604]  ? __pfx_kthread+0x10/0x10
[   24.139683]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.139755]  ? calculate_sigpending+0x7b/0xa0
[   24.139794]  ? __pfx_kthread+0x10/0x10
[   24.139827]  ret_from_fork+0x116/0x1d0
[   24.139856]  ? __pfx_kthread+0x10/0x10
[   24.139887]  ret_from_fork_asm+0x1a/0x30
[   24.139930]  </TASK>
[   24.139946] 
[   24.162462] Allocated by task 283:
[   24.163073]  kasan_save_stack+0x45/0x70
[   24.163634]  kasan_save_track+0x18/0x40
[   24.164270]  kasan_save_alloc_info+0x3b/0x50
[   24.164776]  __kasan_kmalloc+0xb7/0xc0
[   24.165775]  __kmalloc_cache_noprof+0x189/0x420
[   24.166279]  kasan_atomics+0x95/0x310
[   24.167082]  kunit_try_run_case+0x1a5/0x480
[   24.167883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.168357]  kthread+0x337/0x6f0
[   24.169097]  ret_from_fork+0x116/0x1d0
[   24.170320]  ret_from_fork_asm+0x1a/0x30
[   24.170731] 
[   24.170990] The buggy address belongs to the object at ffff8881039d9c80
[   24.170990]  which belongs to the cache kmalloc-64 of size 64
[   24.172646] The buggy address is located 0 bytes to the right of
[   24.172646]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.173775] 
[   24.174023] The buggy address belongs to the physical page:
[   24.175065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.175756] flags: 0x200000000000000(node=0|zone=2)
[   24.176094] page_type: f5(slab)
[   24.177276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.178697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.179991] page dumped because: kasan: bad access detected
[   24.180584] 
[   24.181067] Memory state around the buggy address:
[   24.181716]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.182342]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.182887] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.183408]                                      ^
[   24.184691]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.186167]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.187472] ==================================================================
[   26.374675] ==================================================================
[   26.375302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   26.375957] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.376622] 
[   26.376906] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.377038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.377082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.377148] Call Trace:
[   26.377207]  <TASK>
[   26.378195]  dump_stack_lvl+0x73/0xb0
[   26.378313]  print_report+0xd1/0x650
[   26.378398]  ? __virt_addr_valid+0x1db/0x2d0
[   26.378531]  ? kasan_atomics_helper+0x224c/0x5450
[   26.378599]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.378673]  ? kasan_atomics_helper+0x224c/0x5450
[   26.378738]  kasan_report+0x141/0x180
[   26.378801]  ? kasan_atomics_helper+0x224c/0x5450
[   26.378875]  kasan_check_range+0x10c/0x1c0
[   26.378917]  __kasan_check_write+0x18/0x20
[   26.378948]  kasan_atomics_helper+0x224c/0x5450
[   26.378984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.379018]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.379064]  ? kasan_atomics+0x152/0x310
[   26.379103]  kasan_atomics+0x1dc/0x310
[   26.379138]  ? __pfx_kasan_atomics+0x10/0x10
[   26.379176]  ? __pfx_read_tsc+0x10/0x10
[   26.379209]  ? ktime_get_ts64+0x86/0x230
[   26.379293]  kunit_try_run_case+0x1a5/0x480
[   26.379339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.379377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.379415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.379450]  ? __kthread_parkme+0x82/0x180
[   26.379481]  ? preempt_count_sub+0x50/0x80
[   26.379544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.379586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.379622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.379659]  kthread+0x337/0x6f0
[   26.379689]  ? trace_preempt_on+0x20/0xc0
[   26.379725]  ? __pfx_kthread+0x10/0x10
[   26.379756]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.379791]  ? calculate_sigpending+0x7b/0xa0
[   26.379828]  ? __pfx_kthread+0x10/0x10
[   26.379860]  ret_from_fork+0x116/0x1d0
[   26.379888]  ? __pfx_kthread+0x10/0x10
[   26.379918]  ret_from_fork_asm+0x1a/0x30
[   26.379964]  </TASK>
[   26.379981] 
[   26.394862] Allocated by task 283:
[   26.395218]  kasan_save_stack+0x45/0x70
[   26.395685]  kasan_save_track+0x18/0x40
[   26.396169]  kasan_save_alloc_info+0x3b/0x50
[   26.396710]  __kasan_kmalloc+0xb7/0xc0
[   26.397180]  __kmalloc_cache_noprof+0x189/0x420
[   26.397749]  kasan_atomics+0x95/0x310
[   26.399065]  kunit_try_run_case+0x1a5/0x480
[   26.400839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.401698]  kthread+0x337/0x6f0
[   26.402007]  ret_from_fork+0x116/0x1d0
[   26.403051]  ret_from_fork_asm+0x1a/0x30
[   26.403877] 
[   26.404293] The buggy address belongs to the object at ffff8881039d9c80
[   26.404293]  which belongs to the cache kmalloc-64 of size 64
[   26.406483] The buggy address is located 0 bytes to the right of
[   26.406483]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.407960] 
[   26.408388] The buggy address belongs to the physical page:
[   26.408846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.409449] flags: 0x200000000000000(node=0|zone=2)
[   26.410216] page_type: f5(slab)
[   26.410568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.411058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.411774] page dumped because: kasan: bad access detected
[   26.412428] 
[   26.412653] Memory state around the buggy address:
[   26.413114]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.413743]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.414297] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.414872]                                      ^
[   26.415257]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.415896]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.416460] ==================================================================
[   23.294465] ==================================================================
[   23.296009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   23.296916] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   23.297873] 
[   23.298184] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.298350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.298392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.298451] Call Trace:
[   23.298494]  <TASK>
[   23.299094]  dump_stack_lvl+0x73/0xb0
[   23.299197]  print_report+0xd1/0x650
[   23.299322]  ? __virt_addr_valid+0x1db/0x2d0
[   23.299399]  ? kasan_atomics_helper+0x4ba2/0x5450
[   23.299471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.299757]  ? kasan_atomics_helper+0x4ba2/0x5450
[   23.299832]  kasan_report+0x141/0x180
[   23.299910]  ? kasan_atomics_helper+0x4ba2/0x5450
[   23.299997]  __asan_report_store4_noabort+0x1b/0x30
[   23.300072]  kasan_atomics_helper+0x4ba2/0x5450
[   23.300153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.300272]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.300374]  ? kasan_atomics+0x152/0x310
[   23.300460]  kasan_atomics+0x1dc/0x310
[   23.300674]  ? __pfx_kasan_atomics+0x10/0x10
[   23.300763]  ? __pfx_read_tsc+0x10/0x10
[   23.300835]  ? ktime_get_ts64+0x86/0x230
[   23.300913]  kunit_try_run_case+0x1a5/0x480
[   23.300998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.301071]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.301149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.301265]  ? __kthread_parkme+0x82/0x180
[   23.301342]  ? preempt_count_sub+0x50/0x80
[   23.301421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.301520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.301837]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.301887]  kthread+0x337/0x6f0
[   23.301916]  ? trace_preempt_on+0x20/0xc0
[   23.301950]  ? __pfx_kthread+0x10/0x10
[   23.301981]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.302011]  ? calculate_sigpending+0x7b/0xa0
[   23.302046]  ? __pfx_kthread+0x10/0x10
[   23.302076]  ret_from_fork+0x116/0x1d0
[   23.302102]  ? __pfx_kthread+0x10/0x10
[   23.302130]  ret_from_fork_asm+0x1a/0x30
[   23.302170]  </TASK>
[   23.302186] 
[   23.326947] Allocated by task 283:
[   23.327267]  kasan_save_stack+0x45/0x70
[   23.327611]  kasan_save_track+0x18/0x40
[   23.328279]  kasan_save_alloc_info+0x3b/0x50
[   23.329018]  __kasan_kmalloc+0xb7/0xc0
[   23.330010]  __kmalloc_cache_noprof+0x189/0x420
[   23.330929]  kasan_atomics+0x95/0x310
[   23.331555]  kunit_try_run_case+0x1a5/0x480
[   23.332223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.333123]  kthread+0x337/0x6f0
[   23.333854]  ret_from_fork+0x116/0x1d0
[   23.334127]  ret_from_fork_asm+0x1a/0x30
[   23.334671] 
[   23.335333] The buggy address belongs to the object at ffff8881039d9c80
[   23.335333]  which belongs to the cache kmalloc-64 of size 64
[   23.336344] The buggy address is located 0 bytes to the right of
[   23.336344]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   23.337998] 
[   23.338167] The buggy address belongs to the physical page:
[   23.339524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   23.340569] flags: 0x200000000000000(node=0|zone=2)
[   23.341043] page_type: f5(slab)
[   23.341372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.342523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.343428] page dumped because: kasan: bad access detected
[   23.344158] 
[   23.344652] Memory state around the buggy address:
[   23.345135]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.346107]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.347150] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.348160]                                      ^
[   23.348755]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.349411]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.350438] ==================================================================
[   25.262341] ==================================================================
[   25.263701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   25.264409] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.265417] 
[   25.265918] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.266056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.266098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.266167] Call Trace:
[   25.266267]  <TASK>
[   25.266311]  dump_stack_lvl+0x73/0xb0
[   25.266363]  print_report+0xd1/0x650
[   25.266398]  ? __virt_addr_valid+0x1db/0x2d0
[   25.266434]  ? kasan_atomics_helper+0x151d/0x5450
[   25.266467]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.266530]  ? kasan_atomics_helper+0x151d/0x5450
[   25.266568]  kasan_report+0x141/0x180
[   25.266603]  ? kasan_atomics_helper+0x151d/0x5450
[   25.266640]  kasan_check_range+0x10c/0x1c0
[   25.266675]  __kasan_check_write+0x18/0x20
[   25.266704]  kasan_atomics_helper+0x151d/0x5450
[   25.266737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.266771]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.266815]  ? kasan_atomics+0x152/0x310
[   25.266854]  kasan_atomics+0x1dc/0x310
[   25.266887]  ? __pfx_kasan_atomics+0x10/0x10
[   25.266924]  ? __pfx_read_tsc+0x10/0x10
[   25.266957]  ? ktime_get_ts64+0x86/0x230
[   25.266992]  kunit_try_run_case+0x1a5/0x480
[   25.267032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.267067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.267102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.267138]  ? __kthread_parkme+0x82/0x180
[   25.267169]  ? preempt_count_sub+0x50/0x80
[   25.267201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.267288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.267330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.267368]  kthread+0x337/0x6f0
[   25.267398]  ? trace_preempt_on+0x20/0xc0
[   25.267434]  ? __pfx_kthread+0x10/0x10
[   25.267465]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.267523]  ? calculate_sigpending+0x7b/0xa0
[   25.267565]  ? __pfx_kthread+0x10/0x10
[   25.267598]  ret_from_fork+0x116/0x1d0
[   25.267626]  ? __pfx_kthread+0x10/0x10
[   25.267657]  ret_from_fork_asm+0x1a/0x30
[   25.267701]  </TASK>
[   25.267717] 
[   25.284948] Allocated by task 283:
[   25.285457]  kasan_save_stack+0x45/0x70
[   25.286017]  kasan_save_track+0x18/0x40
[   25.286527]  kasan_save_alloc_info+0x3b/0x50
[   25.286873]  __kasan_kmalloc+0xb7/0xc0
[   25.287279]  __kmalloc_cache_noprof+0x189/0x420
[   25.287958]  kasan_atomics+0x95/0x310
[   25.288560]  kunit_try_run_case+0x1a5/0x480
[   25.289068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.289753]  kthread+0x337/0x6f0
[   25.290201]  ret_from_fork+0x116/0x1d0
[   25.290746]  ret_from_fork_asm+0x1a/0x30
[   25.291278] 
[   25.291601] The buggy address belongs to the object at ffff8881039d9c80
[   25.291601]  which belongs to the cache kmalloc-64 of size 64
[   25.292535] The buggy address is located 0 bytes to the right of
[   25.292535]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.293877] 
[   25.294093] The buggy address belongs to the physical page:
[   25.294751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.295602] flags: 0x200000000000000(node=0|zone=2)
[   25.296112] page_type: f5(slab)
[   25.296683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.297441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.298155] page dumped because: kasan: bad access detected
[   25.299741] 
[   25.300136] Memory state around the buggy address:
[   25.300711]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.301366]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.301918] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.302799]                                      ^
[   25.303518]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.304043]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.304827] ==================================================================
[   24.189383] ==================================================================
[   24.190731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   24.191786] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   24.192692] 
[   24.193155] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.193322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.193367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.193437] Call Trace:
[   24.193509]  <TASK>
[   24.193567]  dump_stack_lvl+0x73/0xb0
[   24.193726]  print_report+0xd1/0x650
[   24.193807]  ? __virt_addr_valid+0x1db/0x2d0
[   24.193887]  ? kasan_atomics_helper+0xac7/0x5450
[   24.193961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.194540]  ? kasan_atomics_helper+0xac7/0x5450
[   24.194632]  kasan_report+0x141/0x180
[   24.194685]  ? kasan_atomics_helper+0xac7/0x5450
[   24.194728]  kasan_check_range+0x10c/0x1c0
[   24.194766]  __kasan_check_write+0x18/0x20
[   24.194796]  kasan_atomics_helper+0xac7/0x5450
[   24.194829]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.194864]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.194911]  ? kasan_atomics+0x152/0x310
[   24.194950]  kasan_atomics+0x1dc/0x310
[   24.194983]  ? __pfx_kasan_atomics+0x10/0x10
[   24.195019]  ? __pfx_read_tsc+0x10/0x10
[   24.195052]  ? ktime_get_ts64+0x86/0x230
[   24.195088]  kunit_try_run_case+0x1a5/0x480
[   24.195128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.195165]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.195201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.195252]  ? __kthread_parkme+0x82/0x180
[   24.195319]  ? preempt_count_sub+0x50/0x80
[   24.195385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.195457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.195553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.195634]  kthread+0x337/0x6f0
[   24.195703]  ? trace_preempt_on+0x20/0xc0
[   24.195759]  ? __pfx_kthread+0x10/0x10
[   24.195791]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.195825]  ? calculate_sigpending+0x7b/0xa0
[   24.195860]  ? __pfx_kthread+0x10/0x10
[   24.195891]  ret_from_fork+0x116/0x1d0
[   24.195917]  ? __pfx_kthread+0x10/0x10
[   24.195947]  ret_from_fork_asm+0x1a/0x30
[   24.195991]  </TASK>
[   24.196008] 
[   24.219290] Allocated by task 283:
[   24.220425]  kasan_save_stack+0x45/0x70
[   24.221172]  kasan_save_track+0x18/0x40
[   24.221813]  kasan_save_alloc_info+0x3b/0x50
[   24.222266]  __kasan_kmalloc+0xb7/0xc0
[   24.222929]  __kmalloc_cache_noprof+0x189/0x420
[   24.223405]  kasan_atomics+0x95/0x310
[   24.223812]  kunit_try_run_case+0x1a5/0x480
[   24.224187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.224741]  kthread+0x337/0x6f0
[   24.225138]  ret_from_fork+0x116/0x1d0
[   24.227095]  ret_from_fork_asm+0x1a/0x30
[   24.227680] 
[   24.227935] The buggy address belongs to the object at ffff8881039d9c80
[   24.227935]  which belongs to the cache kmalloc-64 of size 64
[   24.229456] The buggy address is located 0 bytes to the right of
[   24.229456]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   24.230883] 
[   24.231147] The buggy address belongs to the physical page:
[   24.231852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   24.232530] flags: 0x200000000000000(node=0|zone=2)
[   24.233688] page_type: f5(slab)
[   24.234126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.234716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.235768] page dumped because: kasan: bad access detected
[   24.236255] 
[   24.236478] Memory state around the buggy address:
[   24.237736]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.238379]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.239189] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.239955]                                      ^
[   24.240450]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.241742]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.242309] ==================================================================
[   26.286216] ==================================================================
[   26.286926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   26.287439] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   26.288445] 
[   26.288748] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   26.288880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.288923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.288992] Call Trace:
[   26.289049]  <TASK>
[   26.289105]  dump_stack_lvl+0x73/0xb0
[   26.289202]  print_report+0xd1/0x650
[   26.289283]  ? __virt_addr_valid+0x1db/0x2d0
[   26.289371]  ? kasan_atomics_helper+0x218a/0x5450
[   26.289448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.289551]  ? kasan_atomics_helper+0x218a/0x5450
[   26.289655]  kasan_report+0x141/0x180
[   26.289735]  ? kasan_atomics_helper+0x218a/0x5450
[   26.289825]  kasan_check_range+0x10c/0x1c0
[   26.289911]  __kasan_check_write+0x18/0x20
[   26.289983]  kasan_atomics_helper+0x218a/0x5450
[   26.290063]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.290140]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.290240]  ? kasan_atomics+0x152/0x310
[   26.290330]  kasan_atomics+0x1dc/0x310
[   26.290407]  ? __pfx_kasan_atomics+0x10/0x10
[   26.290491]  ? __pfx_read_tsc+0x10/0x10
[   26.290596]  ? ktime_get_ts64+0x86/0x230
[   26.290678]  kunit_try_run_case+0x1a5/0x480
[   26.290768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.290850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.290930]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.291012]  ? __kthread_parkme+0x82/0x180
[   26.291090]  ? preempt_count_sub+0x50/0x80
[   26.291174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.291260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.291342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.291443]  kthread+0x337/0x6f0
[   26.291517]  ? trace_preempt_on+0x20/0xc0
[   26.291597]  ? __pfx_kthread+0x10/0x10
[   26.291674]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.291754]  ? calculate_sigpending+0x7b/0xa0
[   26.291843]  ? __pfx_kthread+0x10/0x10
[   26.291924]  ret_from_fork+0x116/0x1d0
[   26.291995]  ? __pfx_kthread+0x10/0x10
[   26.292072]  ret_from_fork_asm+0x1a/0x30
[   26.292170]  </TASK>
[   26.292214] 
[   26.307464] Allocated by task 283:
[   26.307835]  kasan_save_stack+0x45/0x70
[   26.308200]  kasan_save_track+0x18/0x40
[   26.308578]  kasan_save_alloc_info+0x3b/0x50
[   26.309003]  __kasan_kmalloc+0xb7/0xc0
[   26.309470]  __kmalloc_cache_noprof+0x189/0x420
[   26.309995]  kasan_atomics+0x95/0x310
[   26.310549]  kunit_try_run_case+0x1a5/0x480
[   26.310934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.311454]  kthread+0x337/0x6f0
[   26.311818]  ret_from_fork+0x116/0x1d0
[   26.312133]  ret_from_fork_asm+0x1a/0x30
[   26.312713] 
[   26.312964] The buggy address belongs to the object at ffff8881039d9c80
[   26.312964]  which belongs to the cache kmalloc-64 of size 64
[   26.314075] The buggy address is located 0 bytes to the right of
[   26.314075]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   26.315313] 
[   26.315532] The buggy address belongs to the physical page:
[   26.315906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   26.316413] flags: 0x200000000000000(node=0|zone=2)
[   26.316898] page_type: f5(slab)
[   26.317267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.318197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.319140] page dumped because: kasan: bad access detected
[   26.319975] 
[   26.320182] Memory state around the buggy address:
[   26.320588]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.321034]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.321481] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.322119]                                      ^
[   26.322595]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.323242]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.323902] ==================================================================
[   25.306490] ==================================================================
[   25.308305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   25.308958] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283
[   25.309959] 
[   25.310202] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   25.310336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.310405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.310472] Call Trace:
[   25.310549]  <TASK>
[   25.310606]  dump_stack_lvl+0x73/0xb0
[   25.310737]  print_report+0xd1/0x650
[   25.310829]  ? __virt_addr_valid+0x1db/0x2d0
[   25.310914]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.310986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.311025]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.311057]  kasan_report+0x141/0x180
[   25.311091]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.311129]  kasan_check_range+0x10c/0x1c0
[   25.311164]  __kasan_check_write+0x18/0x20
[   25.311193]  kasan_atomics_helper+0x15b6/0x5450
[   25.311236]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.311315]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.311364]  ? kasan_atomics+0x152/0x310
[   25.311404]  kasan_atomics+0x1dc/0x310
[   25.311439]  ? __pfx_kasan_atomics+0x10/0x10
[   25.311477]  ? __pfx_read_tsc+0x10/0x10
[   25.311537]  ? ktime_get_ts64+0x86/0x230
[   25.311576]  kunit_try_run_case+0x1a5/0x480
[   25.311618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.311655]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.311690]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.311724]  ? __kthread_parkme+0x82/0x180
[   25.311755]  ? preempt_count_sub+0x50/0x80
[   25.311789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.311828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.311862]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.311898]  kthread+0x337/0x6f0
[   25.311927]  ? trace_preempt_on+0x20/0xc0
[   25.311963]  ? __pfx_kthread+0x10/0x10
[   25.311994]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.312027]  ? calculate_sigpending+0x7b/0xa0
[   25.312066]  ? __pfx_kthread+0x10/0x10
[   25.312097]  ret_from_fork+0x116/0x1d0
[   25.312124]  ? __pfx_kthread+0x10/0x10
[   25.312154]  ret_from_fork_asm+0x1a/0x30
[   25.312199]  </TASK>
[   25.312214] 
[   25.331127] Allocated by task 283:
[   25.331662]  kasan_save_stack+0x45/0x70
[   25.332293]  kasan_save_track+0x18/0x40
[   25.332776]  kasan_save_alloc_info+0x3b/0x50
[   25.333343]  __kasan_kmalloc+0xb7/0xc0
[   25.333840]  __kmalloc_cache_noprof+0x189/0x420
[   25.334432]  kasan_atomics+0x95/0x310
[   25.334924]  kunit_try_run_case+0x1a5/0x480
[   25.335614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.336204]  kthread+0x337/0x6f0
[   25.336776]  ret_from_fork+0x116/0x1d0
[   25.337203]  ret_from_fork_asm+0x1a/0x30
[   25.337767] 
[   25.338084] The buggy address belongs to the object at ffff8881039d9c80
[   25.338084]  which belongs to the cache kmalloc-64 of size 64
[   25.339025] The buggy address is located 0 bytes to the right of
[   25.339025]  allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0)
[   25.340202] 
[   25.340481] The buggy address belongs to the physical page:
[   25.341030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9
[   25.341771] flags: 0x200000000000000(node=0|zone=2)
[   25.342139] page_type: f5(slab)
[   25.342463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.343287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.344148] page dumped because: kasan: bad access detected
[   25.344814] 
[   25.345036] Memory state around the buggy address:
[   25.345538]  ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.346301]  ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.347097] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.347778]                                      ^
[   25.348335]  ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.349061]  ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.349861] ==================================================================

[   23.855379] ==================================================================
[   23.856218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   23.856830] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.857366] 
[   23.857637] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.857735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.857757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.857788] Call Trace:
[   23.857808]  <TASK>
[   23.857828]  dump_stack_lvl+0x73/0xb0
[   23.858312]  print_report+0xd1/0x650
[   23.858426]  ? __virt_addr_valid+0x1db/0x2d0
[   23.858504]  ? kasan_atomics_helper+0x177f/0x5450
[   23.858579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.858657]  ? kasan_atomics_helper+0x177f/0x5450
[   23.858733]  kasan_report+0x141/0x180
[   23.858812]  ? kasan_atomics_helper+0x177f/0x5450
[   23.858913]  kasan_check_range+0x10c/0x1c0
[   23.858960]  __kasan_check_write+0x18/0x20
[   23.858993]  kasan_atomics_helper+0x177f/0x5450
[   23.859028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.859063]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.859126]  ? kasan_save_alloc_info+0x3b/0x50
[   23.859180]  ? kasan_atomics+0x152/0x310
[   23.859223]  kasan_atomics+0x1dc/0x310
[   23.859258]  ? __pfx_kasan_atomics+0x10/0x10
[   23.859296]  ? __pfx_read_tsc+0x10/0x10
[   23.859328]  ? ktime_get_ts64+0x86/0x230
[   23.859362]  kunit_try_run_case+0x1a5/0x480
[   23.859400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.859436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.859473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.859509]  ? __kthread_parkme+0x82/0x180
[   23.859540]  ? preempt_count_sub+0x50/0x80
[   23.859574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.859612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.859648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.859685]  kthread+0x337/0x6f0
[   23.859716]  ? trace_preempt_on+0x20/0xc0
[   23.859750]  ? __pfx_kthread+0x10/0x10
[   23.859781]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.859816]  ? calculate_sigpending+0x7b/0xa0
[   23.859851]  ? __pfx_kthread+0x10/0x10
[   23.859911]  ret_from_fork+0x116/0x1d0
[   23.859945]  ? __pfx_kthread+0x10/0x10
[   23.859978]  ret_from_fork_asm+0x1a/0x30
[   23.860024]  </TASK>
[   23.860040] 
[   23.877518] Allocated by task 283:
[   23.877861]  kasan_save_stack+0x45/0x70
[   23.878504]  kasan_save_track+0x18/0x40
[   23.878942]  kasan_save_alloc_info+0x3b/0x50
[   23.879426]  __kasan_kmalloc+0xb7/0xc0
[   23.879748]  __kmalloc_cache_noprof+0x189/0x420
[   23.880161]  kasan_atomics+0x95/0x310
[   23.880603]  kunit_try_run_case+0x1a5/0x480
[   23.881065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.881616]  kthread+0x337/0x6f0
[   23.882072]  ret_from_fork+0x116/0x1d0
[   23.882517]  ret_from_fork_asm+0x1a/0x30
[   23.882946] 
[   23.883137] The buggy address belongs to the object at ffff8881038ee700
[   23.883137]  which belongs to the cache kmalloc-64 of size 64
[   23.883912] The buggy address is located 0 bytes to the right of
[   23.883912]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.885247] 
[   23.885480] The buggy address belongs to the physical page:
[   23.886109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.886709] flags: 0x200000000000000(node=0|zone=2)
[   23.887222] page_type: f5(slab)
[   23.887584] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.888289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.888980] page dumped because: kasan: bad access detected
[   23.889507] 
[   23.889716] Memory state around the buggy address:
[   23.890206]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.890741]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.892110] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.892559]                                      ^
[   23.892923]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.893378]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.894125] ==================================================================
[   23.626913] ==================================================================
[   23.627375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   23.628163] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.628980] 
[   23.629226] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.629350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.629397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.629464] Call Trace:
[   23.629514]  <TASK>
[   23.629561]  dump_stack_lvl+0x73/0xb0
[   23.629648]  print_report+0xd1/0x650
[   23.629730]  ? __virt_addr_valid+0x1db/0x2d0
[   23.629813]  ? kasan_atomics_helper+0x50d4/0x5450
[   23.629908]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.629993]  ? kasan_atomics_helper+0x50d4/0x5450
[   23.630072]  kasan_report+0x141/0x180
[   23.630153]  ? kasan_atomics_helper+0x50d4/0x5450
[   23.630247]  __asan_report_store8_noabort+0x1b/0x30
[   23.630342]  kasan_atomics_helper+0x50d4/0x5450
[   23.630422]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.630505]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.630588]  ? kasan_save_alloc_info+0x3b/0x50
[   23.630667]  ? kasan_atomics+0x152/0x310
[   23.630752]  kasan_atomics+0x1dc/0x310
[   23.630832]  ? __pfx_kasan_atomics+0x10/0x10
[   23.630931]  ? __pfx_read_tsc+0x10/0x10
[   23.631005]  ? ktime_get_ts64+0x86/0x230
[   23.631085]  kunit_try_run_case+0x1a5/0x480
[   23.631170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.631248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.631326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.631407]  ? __kthread_parkme+0x82/0x180
[   23.631480]  ? preempt_count_sub+0x50/0x80
[   23.631561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.631640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.631719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.631799]  kthread+0x337/0x6f0
[   23.631869]  ? trace_preempt_on+0x20/0xc0
[   23.631965]  ? __pfx_kthread+0x10/0x10
[   23.632039]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.632104]  ? calculate_sigpending+0x7b/0xa0
[   23.632173]  ? __pfx_kthread+0x10/0x10
[   23.632250]  ret_from_fork+0x116/0x1d0
[   23.632322]  ? __pfx_kthread+0x10/0x10
[   23.632398]  ret_from_fork_asm+0x1a/0x30
[   23.632495]  </TASK>
[   23.632539] 
[   23.647209] Allocated by task 283:
[   23.647580]  kasan_save_stack+0x45/0x70
[   23.648023]  kasan_save_track+0x18/0x40
[   23.648462]  kasan_save_alloc_info+0x3b/0x50
[   23.648819]  __kasan_kmalloc+0xb7/0xc0
[   23.649309]  __kmalloc_cache_noprof+0x189/0x420
[   23.649732]  kasan_atomics+0x95/0x310
[   23.650116]  kunit_try_run_case+0x1a5/0x480
[   23.650554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.651007]  kthread+0x337/0x6f0
[   23.651627]  ret_from_fork+0x116/0x1d0
[   23.652028]  ret_from_fork_asm+0x1a/0x30
[   23.652451] 
[   23.652687] The buggy address belongs to the object at ffff8881038ee700
[   23.652687]  which belongs to the cache kmalloc-64 of size 64
[   23.653788] The buggy address is located 0 bytes to the right of
[   23.653788]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.655070] 
[   23.655301] The buggy address belongs to the physical page:
[   23.655828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.656354] flags: 0x200000000000000(node=0|zone=2)
[   23.656718] page_type: f5(slab)
[   23.657065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.658091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.659139] page dumped because: kasan: bad access detected
[   23.659660] 
[   23.659918] Memory state around the buggy address:
[   23.660404]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.662471]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.663179] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.663840]                                      ^
[   23.664262]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.664719]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.667186] ==================================================================
[   22.325387] ==================================================================
[   22.326148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   22.326846] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.328150] 
[   22.328379] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.328488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.328526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.328585] Call Trace:
[   22.328636]  <TASK>
[   22.328681]  dump_stack_lvl+0x73/0xb0
[   22.328770]  print_report+0xd1/0x650
[   22.328852]  ? __virt_addr_valid+0x1db/0x2d0
[   22.328957]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.329033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.329110]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.329191]  kasan_report+0x141/0x180
[   22.329272]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.329360]  kasan_check_range+0x10c/0x1c0
[   22.329446]  __kasan_check_write+0x18/0x20
[   22.329662]  kasan_atomics_helper+0x5fe/0x5450
[   22.329746]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.329825]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.329925]  ? kasan_save_alloc_info+0x3b/0x50
[   22.330005]  ? kasan_atomics+0x152/0x310
[   22.330090]  kasan_atomics+0x1dc/0x310
[   22.330173]  ? __pfx_kasan_atomics+0x10/0x10
[   22.330266]  ? __pfx_read_tsc+0x10/0x10
[   22.330340]  ? ktime_get_ts64+0x86/0x230
[   22.330421]  kunit_try_run_case+0x1a5/0x480
[   22.330506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.330580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.330619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.330655]  ? __kthread_parkme+0x82/0x180
[   22.330687]  ? preempt_count_sub+0x50/0x80
[   22.330719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.330758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.330794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.330830]  kthread+0x337/0x6f0
[   22.330858]  ? trace_preempt_on+0x20/0xc0
[   22.330921]  ? __pfx_kthread+0x10/0x10
[   22.330955]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.330988]  ? calculate_sigpending+0x7b/0xa0
[   22.331022]  ? __pfx_kthread+0x10/0x10
[   22.331053]  ret_from_fork+0x116/0x1d0
[   22.331079]  ? __pfx_kthread+0x10/0x10
[   22.331141]  ret_from_fork_asm+0x1a/0x30
[   22.331190]  </TASK>
[   22.331208] 
[   22.347330] Allocated by task 283:
[   22.347708]  kasan_save_stack+0x45/0x70
[   22.348394]  kasan_save_track+0x18/0x40
[   22.349437]  kasan_save_alloc_info+0x3b/0x50
[   22.349934]  __kasan_kmalloc+0xb7/0xc0
[   22.350405]  __kmalloc_cache_noprof+0x189/0x420
[   22.351113]  kasan_atomics+0x95/0x310
[   22.351494]  kunit_try_run_case+0x1a5/0x480
[   22.352079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.352661]  kthread+0x337/0x6f0
[   22.352980]  ret_from_fork+0x116/0x1d0
[   22.353547]  ret_from_fork_asm+0x1a/0x30
[   22.354455] 
[   22.354689] The buggy address belongs to the object at ffff8881038ee700
[   22.354689]  which belongs to the cache kmalloc-64 of size 64
[   22.356183] The buggy address is located 0 bytes to the right of
[   22.356183]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.357193] 
[   22.357440] The buggy address belongs to the physical page:
[   22.358226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.358972] flags: 0x200000000000000(node=0|zone=2)
[   22.359651] page_type: f5(slab)
[   22.360047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.360680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.361167] page dumped because: kasan: bad access detected
[   22.361634] 
[   22.362115] Memory state around the buggy address:
[   22.362774]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.363642]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.365147] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.365924]                                      ^
[   22.366734]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.367455]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.368279] ==================================================================
[   23.894891] ==================================================================
[   23.895534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   23.897616] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.898528] 
[   23.898998] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.899214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.899259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.899319] Call Trace:
[   23.899367]  <TASK>
[   23.899416]  dump_stack_lvl+0x73/0xb0
[   23.899506]  print_report+0xd1/0x650
[   23.899582]  ? __virt_addr_valid+0x1db/0x2d0
[   23.899662]  ? kasan_atomics_helper+0x1818/0x5450
[   23.899737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.899816]  ? kasan_atomics_helper+0x1818/0x5450
[   23.899914]  kasan_report+0x141/0x180
[   23.899996]  ? kasan_atomics_helper+0x1818/0x5450
[   23.900054]  kasan_check_range+0x10c/0x1c0
[   23.900111]  __kasan_check_write+0x18/0x20
[   23.900176]  kasan_atomics_helper+0x1818/0x5450
[   23.900212]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.900247]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.900283]  ? kasan_save_alloc_info+0x3b/0x50
[   23.900320]  ? kasan_atomics+0x152/0x310
[   23.900358]  kasan_atomics+0x1dc/0x310
[   23.900392]  ? __pfx_kasan_atomics+0x10/0x10
[   23.900429]  ? __pfx_read_tsc+0x10/0x10
[   23.900460]  ? ktime_get_ts64+0x86/0x230
[   23.900494]  kunit_try_run_case+0x1a5/0x480
[   23.900531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.900567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.900601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.900637]  ? __kthread_parkme+0x82/0x180
[   23.900667]  ? preempt_count_sub+0x50/0x80
[   23.900700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.900737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.900772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.900809]  kthread+0x337/0x6f0
[   23.900838]  ? trace_preempt_on+0x20/0xc0
[   23.900871]  ? __pfx_kthread+0x10/0x10
[   23.900931]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.900965]  ? calculate_sigpending+0x7b/0xa0
[   23.901001]  ? __pfx_kthread+0x10/0x10
[   23.901032]  ret_from_fork+0x116/0x1d0
[   23.901059]  ? __pfx_kthread+0x10/0x10
[   23.901089]  ret_from_fork_asm+0x1a/0x30
[   23.901162]  </TASK>
[   23.901181] 
[   23.917191] Allocated by task 283:
[   23.917583]  kasan_save_stack+0x45/0x70
[   23.918040]  kasan_save_track+0x18/0x40
[   23.918465]  kasan_save_alloc_info+0x3b/0x50
[   23.918955]  __kasan_kmalloc+0xb7/0xc0
[   23.919374]  __kmalloc_cache_noprof+0x189/0x420
[   23.920112]  kasan_atomics+0x95/0x310
[   23.920538]  kunit_try_run_case+0x1a5/0x480
[   23.921936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.923466]  kthread+0x337/0x6f0
[   23.924357]  ret_from_fork+0x116/0x1d0
[   23.924942]  ret_from_fork_asm+0x1a/0x30
[   23.926086] 
[   23.926905] The buggy address belongs to the object at ffff8881038ee700
[   23.926905]  which belongs to the cache kmalloc-64 of size 64
[   23.927825] The buggy address is located 0 bytes to the right of
[   23.927825]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.928981] 
[   23.929298] The buggy address belongs to the physical page:
[   23.929900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.930735] flags: 0x200000000000000(node=0|zone=2)
[   23.931232] page_type: f5(slab)
[   23.931605] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.932233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.932727] page dumped because: kasan: bad access detected
[   23.933338] 
[   23.933552] Memory state around the buggy address:
[   23.934002]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.934770]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.935472] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.936081]                                      ^
[   23.936695]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.937263]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.938025] ==================================================================
[   22.712054] ==================================================================
[   22.712634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   22.713387] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.714007] 
[   22.714363] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.714486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.714530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.714624] Call Trace:
[   22.714670]  <TASK>
[   22.714704]  dump_stack_lvl+0x73/0xb0
[   22.714774]  print_report+0xd1/0x650
[   22.714849]  ? __virt_addr_valid+0x1db/0x2d0
[   22.714954]  ? kasan_atomics_helper+0xac7/0x5450
[   22.715028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.715111]  ? kasan_atomics_helper+0xac7/0x5450
[   22.715198]  kasan_report+0x141/0x180
[   22.715281]  ? kasan_atomics_helper+0xac7/0x5450
[   22.715368]  kasan_check_range+0x10c/0x1c0
[   22.715491]  __kasan_check_write+0x18/0x20
[   22.715564]  kasan_atomics_helper+0xac7/0x5450
[   22.715644]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.715694]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.715732]  ? kasan_save_alloc_info+0x3b/0x50
[   22.715768]  ? kasan_atomics+0x152/0x310
[   22.715807]  kasan_atomics+0x1dc/0x310
[   22.715841]  ? __pfx_kasan_atomics+0x10/0x10
[   22.715903]  ? __pfx_read_tsc+0x10/0x10
[   22.715938]  ? ktime_get_ts64+0x86/0x230
[   22.715973]  kunit_try_run_case+0x1a5/0x480
[   22.716010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.716046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.716080]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.716151]  ? __kthread_parkme+0x82/0x180
[   22.716188]  ? preempt_count_sub+0x50/0x80
[   22.716221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.716258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.716293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.716329]  kthread+0x337/0x6f0
[   22.716358]  ? trace_preempt_on+0x20/0xc0
[   22.716390]  ? __pfx_kthread+0x10/0x10
[   22.716420]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.716452]  ? calculate_sigpending+0x7b/0xa0
[   22.716487]  ? __pfx_kthread+0x10/0x10
[   22.716518]  ret_from_fork+0x116/0x1d0
[   22.716545]  ? __pfx_kthread+0x10/0x10
[   22.716575]  ret_from_fork_asm+0x1a/0x30
[   22.716618]  </TASK>
[   22.716634] 
[   22.734940] Allocated by task 283:
[   22.735474]  kasan_save_stack+0x45/0x70
[   22.736006]  kasan_save_track+0x18/0x40
[   22.736493]  kasan_save_alloc_info+0x3b/0x50
[   22.736958]  __kasan_kmalloc+0xb7/0xc0
[   22.737357]  __kmalloc_cache_noprof+0x189/0x420
[   22.738067]  kasan_atomics+0x95/0x310
[   22.738602]  kunit_try_run_case+0x1a5/0x480
[   22.739050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.739751]  kthread+0x337/0x6f0
[   22.740234]  ret_from_fork+0x116/0x1d0
[   22.740758]  ret_from_fork_asm+0x1a/0x30
[   22.741259] 
[   22.741609] The buggy address belongs to the object at ffff8881038ee700
[   22.741609]  which belongs to the cache kmalloc-64 of size 64
[   22.742755] The buggy address is located 0 bytes to the right of
[   22.742755]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.743932] 
[   22.744244] The buggy address belongs to the physical page:
[   22.744623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.745483] flags: 0x200000000000000(node=0|zone=2)
[   22.746067] page_type: f5(slab)
[   22.746453] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.747184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.747971] page dumped because: kasan: bad access detected
[   22.748572] 
[   22.748858] Memory state around the buggy address:
[   22.749449]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.750161]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.750958] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.751777]                                      ^
[   22.752147]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.752936]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.753683] ==================================================================
[   22.664528] ==================================================================
[   22.666924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   22.668468] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.669872] 
[   22.670357] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.670571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.670641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.670687] Call Trace:
[   22.670712]  <TASK>
[   22.670735]  dump_stack_lvl+0x73/0xb0
[   22.670782]  print_report+0xd1/0x650
[   22.670818]  ? __virt_addr_valid+0x1db/0x2d0
[   22.670853]  ? kasan_atomics_helper+0xa2b/0x5450
[   22.670924]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.670972]  ? kasan_atomics_helper+0xa2b/0x5450
[   22.671007]  kasan_report+0x141/0x180
[   22.671042]  ? kasan_atomics_helper+0xa2b/0x5450
[   22.671080]  kasan_check_range+0x10c/0x1c0
[   22.671165]  __kasan_check_write+0x18/0x20
[   22.671199]  kasan_atomics_helper+0xa2b/0x5450
[   22.671233]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.671266]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.671303]  ? kasan_save_alloc_info+0x3b/0x50
[   22.671338]  ? kasan_atomics+0x152/0x310
[   22.671376]  kasan_atomics+0x1dc/0x310
[   22.671412]  ? __pfx_kasan_atomics+0x10/0x10
[   22.671448]  ? __pfx_read_tsc+0x10/0x10
[   22.671481]  ? ktime_get_ts64+0x86/0x230
[   22.671515]  kunit_try_run_case+0x1a5/0x480
[   22.671553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.671588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.671623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.671658]  ? __kthread_parkme+0x82/0x180
[   22.671688]  ? preempt_count_sub+0x50/0x80
[   22.671721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.671758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.671792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.671829]  kthread+0x337/0x6f0
[   22.671858]  ? trace_preempt_on+0x20/0xc0
[   22.671923]  ? __pfx_kthread+0x10/0x10
[   22.671956]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.671991]  ? calculate_sigpending+0x7b/0xa0
[   22.672028]  ? __pfx_kthread+0x10/0x10
[   22.672060]  ret_from_fork+0x116/0x1d0
[   22.672087]  ? __pfx_kthread+0x10/0x10
[   22.672159]  ret_from_fork_asm+0x1a/0x30
[   22.672209]  </TASK>
[   22.672225] 
[   22.690866] Allocated by task 283:
[   22.691168]  kasan_save_stack+0x45/0x70
[   22.691600]  kasan_save_track+0x18/0x40
[   22.692047]  kasan_save_alloc_info+0x3b/0x50
[   22.692892]  __kasan_kmalloc+0xb7/0xc0
[   22.693713]  __kmalloc_cache_noprof+0x189/0x420
[   22.694325]  kasan_atomics+0x95/0x310
[   22.694643]  kunit_try_run_case+0x1a5/0x480
[   22.695527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.696023]  kthread+0x337/0x6f0
[   22.696354]  ret_from_fork+0x116/0x1d0
[   22.696665]  ret_from_fork_asm+0x1a/0x30
[   22.697009] 
[   22.697197] The buggy address belongs to the object at ffff8881038ee700
[   22.697197]  which belongs to the cache kmalloc-64 of size 64
[   22.698414] The buggy address is located 0 bytes to the right of
[   22.698414]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.699843] 
[   22.700061] The buggy address belongs to the physical page:
[   22.700910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.701975] flags: 0x200000000000000(node=0|zone=2)
[   22.702998] page_type: f5(slab)
[   22.703602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.704462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.705096] page dumped because: kasan: bad access detected
[   22.705872] 
[   22.706089] Memory state around the buggy address:
[   22.706509]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.707049]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.707986] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.708943]                                      ^
[   22.709807]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.710323]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.711009] ==================================================================
[   22.059850] ==================================================================
[   22.060358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   22.062250] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.062783] 
[   22.063089] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.063948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.063995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.064056] Call Trace:
[   22.064080]  <TASK>
[   22.064107]  dump_stack_lvl+0x73/0xb0
[   22.064186]  print_report+0xd1/0x650
[   22.064223]  ? __virt_addr_valid+0x1db/0x2d0
[   22.064256]  ? kasan_atomics_helper+0x4b6e/0x5450
[   22.064288]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.064321]  ? kasan_atomics_helper+0x4b6e/0x5450
[   22.064354]  kasan_report+0x141/0x180
[   22.064387]  ? kasan_atomics_helper+0x4b6e/0x5450
[   22.064426]  __asan_report_store4_noabort+0x1b/0x30
[   22.064455]  kasan_atomics_helper+0x4b6e/0x5450
[   22.064490]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.064523]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.064559]  ? kasan_save_alloc_info+0x3b/0x50
[   22.064594]  ? kasan_atomics+0x152/0x310
[   22.064632]  kasan_atomics+0x1dc/0x310
[   22.064665]  ? __pfx_kasan_atomics+0x10/0x10
[   22.064701]  ? __pfx_read_tsc+0x10/0x10
[   22.064731]  ? ktime_get_ts64+0x86/0x230
[   22.064767]  kunit_try_run_case+0x1a5/0x480
[   22.064803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.064838]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.064892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.064938]  ? __kthread_parkme+0x82/0x180
[   22.064971]  ? preempt_count_sub+0x50/0x80
[   22.065004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.065041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.065076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.065149]  kthread+0x337/0x6f0
[   22.065184]  ? trace_preempt_on+0x20/0xc0
[   22.065219]  ? __pfx_kthread+0x10/0x10
[   22.065250]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.065283]  ? calculate_sigpending+0x7b/0xa0
[   22.065318]  ? __pfx_kthread+0x10/0x10
[   22.065349]  ret_from_fork+0x116/0x1d0
[   22.065376]  ? __pfx_kthread+0x10/0x10
[   22.065406]  ret_from_fork_asm+0x1a/0x30
[   22.065448]  </TASK>
[   22.065467] 
[   22.085179] Allocated by task 283:
[   22.085608]  kasan_save_stack+0x45/0x70
[   22.086069]  kasan_save_track+0x18/0x40
[   22.086536]  kasan_save_alloc_info+0x3b/0x50
[   22.087082]  __kasan_kmalloc+0xb7/0xc0
[   22.087539]  __kmalloc_cache_noprof+0x189/0x420
[   22.088011]  kasan_atomics+0x95/0x310
[   22.088390]  kunit_try_run_case+0x1a5/0x480
[   22.088775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.089542]  kthread+0x337/0x6f0
[   22.089991]  ret_from_fork+0x116/0x1d0
[   22.090459]  ret_from_fork_asm+0x1a/0x30
[   22.091045] 
[   22.091314] The buggy address belongs to the object at ffff8881038ee700
[   22.091314]  which belongs to the cache kmalloc-64 of size 64
[   22.092536] The buggy address is located 0 bytes to the right of
[   22.092536]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.093490] 
[   22.093686] The buggy address belongs to the physical page:
[   22.094086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.095454] flags: 0x200000000000000(node=0|zone=2)
[   22.096391] page_type: f5(slab)
[   22.097021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.098173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.098771] page dumped because: kasan: bad access detected
[   22.099289] 
[   22.099623] Memory state around the buggy address:
[   22.100123]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.100817]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.101439] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.102011]                                      ^
[   22.102440]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.102980]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.103639] ==================================================================
[   22.196323] ==================================================================
[   22.196975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   22.197791] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.198454] 
[   22.198754] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.198892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.198937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.198997] Call Trace:
[   22.199042]  <TASK>
[   22.199089]  dump_stack_lvl+0x73/0xb0
[   22.199220]  print_report+0xd1/0x650
[   22.199300]  ? __virt_addr_valid+0x1db/0x2d0
[   22.199383]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.199457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.199579]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.199658]  kasan_report+0x141/0x180
[   22.199736]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.199821]  kasan_check_range+0x10c/0x1c0
[   22.199926]  __kasan_check_write+0x18/0x20
[   22.200002]  kasan_atomics_helper+0x4a0/0x5450
[   22.200087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.200214]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.200296]  ? kasan_save_alloc_info+0x3b/0x50
[   22.200377]  ? kasan_atomics+0x152/0x310
[   22.200468]  kasan_atomics+0x1dc/0x310
[   22.200551]  ? __pfx_kasan_atomics+0x10/0x10
[   22.200636]  ? __pfx_read_tsc+0x10/0x10
[   22.200711]  ? ktime_get_ts64+0x86/0x230
[   22.200794]  kunit_try_run_case+0x1a5/0x480
[   22.200897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.200978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.201054]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.201180]  ? __kthread_parkme+0x82/0x180
[   22.201257]  ? preempt_count_sub+0x50/0x80
[   22.201335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.201419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.201501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.201552]  kthread+0x337/0x6f0
[   22.201583]  ? trace_preempt_on+0x20/0xc0
[   22.201619]  ? __pfx_kthread+0x10/0x10
[   22.201650]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.201683]  ? calculate_sigpending+0x7b/0xa0
[   22.201717]  ? __pfx_kthread+0x10/0x10
[   22.201748]  ret_from_fork+0x116/0x1d0
[   22.201774]  ? __pfx_kthread+0x10/0x10
[   22.201804]  ret_from_fork_asm+0x1a/0x30
[   22.201846]  </TASK>
[   22.201864] 
[   22.223230] Allocated by task 283:
[   22.224006]  kasan_save_stack+0x45/0x70
[   22.224481]  kasan_save_track+0x18/0x40
[   22.224800]  kasan_save_alloc_info+0x3b/0x50
[   22.225962]  __kasan_kmalloc+0xb7/0xc0
[   22.226317]  __kmalloc_cache_noprof+0x189/0x420
[   22.226925]  kasan_atomics+0x95/0x310
[   22.227528]  kunit_try_run_case+0x1a5/0x480
[   22.228032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.228672]  kthread+0x337/0x6f0
[   22.229046]  ret_from_fork+0x116/0x1d0
[   22.229892]  ret_from_fork_asm+0x1a/0x30
[   22.230443] 
[   22.230692] The buggy address belongs to the object at ffff8881038ee700
[   22.230692]  which belongs to the cache kmalloc-64 of size 64
[   22.231642] The buggy address is located 0 bytes to the right of
[   22.231642]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.232701] 
[   22.232989] The buggy address belongs to the physical page:
[   22.233409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.234108] flags: 0x200000000000000(node=0|zone=2)
[   22.234739] page_type: f5(slab)
[   22.235102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.235868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.236627] page dumped because: kasan: bad access detected
[   22.237138] 
[   22.237409] Memory state around the buggy address:
[   22.237781]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.239175]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.239942] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.240546]                                      ^
[   22.241007]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.241657]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.242304] ==================================================================
[   22.515682] ==================================================================
[   22.516551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   22.517104] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.517824] 
[   22.518829] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.519236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.519263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.519301] Call Trace:
[   22.519324]  <TASK>
[   22.519348]  dump_stack_lvl+0x73/0xb0
[   22.519397]  print_report+0xd1/0x650
[   22.519431]  ? __virt_addr_valid+0x1db/0x2d0
[   22.519466]  ? kasan_atomics_helper+0x860/0x5450
[   22.519498]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.519531]  ? kasan_atomics_helper+0x860/0x5450
[   22.519563]  kasan_report+0x141/0x180
[   22.519595]  ? kasan_atomics_helper+0x860/0x5450
[   22.519632]  kasan_check_range+0x10c/0x1c0
[   22.519667]  __kasan_check_write+0x18/0x20
[   22.519696]  kasan_atomics_helper+0x860/0x5450
[   22.519730]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.519761]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.519798]  ? kasan_save_alloc_info+0x3b/0x50
[   22.519832]  ? kasan_atomics+0x152/0x310
[   22.519870]  kasan_atomics+0x1dc/0x310
[   22.519935]  ? __pfx_kasan_atomics+0x10/0x10
[   22.519973]  ? __pfx_read_tsc+0x10/0x10
[   22.520006]  ? ktime_get_ts64+0x86/0x230
[   22.520039]  kunit_try_run_case+0x1a5/0x480
[   22.520077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.520143]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.520185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.520222]  ? __kthread_parkme+0x82/0x180
[   22.520254]  ? preempt_count_sub+0x50/0x80
[   22.520288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.520325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.520360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.520398]  kthread+0x337/0x6f0
[   22.520427]  ? trace_preempt_on+0x20/0xc0
[   22.520459]  ? __pfx_kthread+0x10/0x10
[   22.520490]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.520521]  ? calculate_sigpending+0x7b/0xa0
[   22.520557]  ? __pfx_kthread+0x10/0x10
[   22.520587]  ret_from_fork+0x116/0x1d0
[   22.520614]  ? __pfx_kthread+0x10/0x10
[   22.520643]  ret_from_fork_asm+0x1a/0x30
[   22.520687]  </TASK>
[   22.520703] 
[   22.543219] Allocated by task 283:
[   22.544008]  kasan_save_stack+0x45/0x70
[   22.544455]  kasan_save_track+0x18/0x40
[   22.544817]  kasan_save_alloc_info+0x3b/0x50
[   22.545698]  __kasan_kmalloc+0xb7/0xc0
[   22.546061]  __kmalloc_cache_noprof+0x189/0x420
[   22.546698]  kasan_atomics+0x95/0x310
[   22.547290]  kunit_try_run_case+0x1a5/0x480
[   22.547701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.548480]  kthread+0x337/0x6f0
[   22.549049]  ret_from_fork+0x116/0x1d0
[   22.549441]  ret_from_fork_asm+0x1a/0x30
[   22.550092] 
[   22.550369] The buggy address belongs to the object at ffff8881038ee700
[   22.550369]  which belongs to the cache kmalloc-64 of size 64
[   22.551578] The buggy address is located 0 bytes to the right of
[   22.551578]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.552926] 
[   22.553431] The buggy address belongs to the physical page:
[   22.553836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.554857] flags: 0x200000000000000(node=0|zone=2)
[   22.555231] page_type: f5(slab)
[   22.555994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.556778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.557616] page dumped because: kasan: bad access detected
[   22.558362] 
[   22.558760] Memory state around the buggy address:
[   22.559206]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.560078]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.560699] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.561779]                                      ^
[   22.562744]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.563230]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.563782] ==================================================================
[   22.286015] ==================================================================
[   22.286581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   22.287731] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.288301] 
[   22.288605] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.288726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.288767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.288828] Call Trace:
[   22.288872]  <TASK>
[   22.288933]  dump_stack_lvl+0x73/0xb0
[   22.289022]  print_report+0xd1/0x650
[   22.289107]  ? __virt_addr_valid+0x1db/0x2d0
[   22.289204]  ? kasan_atomics_helper+0x565/0x5450
[   22.289284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.289403]  ? kasan_atomics_helper+0x565/0x5450
[   22.289482]  kasan_report+0x141/0x180
[   22.289559]  ? kasan_atomics_helper+0x565/0x5450
[   22.289651]  kasan_check_range+0x10c/0x1c0
[   22.289768]  __kasan_check_write+0x18/0x20
[   22.289851]  kasan_atomics_helper+0x565/0x5450
[   22.289951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.290031]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.290113]  ? kasan_save_alloc_info+0x3b/0x50
[   22.290197]  ? kasan_atomics+0x152/0x310
[   22.290290]  kasan_atomics+0x1dc/0x310
[   22.290330]  ? __pfx_kasan_atomics+0x10/0x10
[   22.290368]  ? __pfx_read_tsc+0x10/0x10
[   22.290399]  ? ktime_get_ts64+0x86/0x230
[   22.290436]  kunit_try_run_case+0x1a5/0x480
[   22.290472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.290508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.290542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.290578]  ? __kthread_parkme+0x82/0x180
[   22.290607]  ? preempt_count_sub+0x50/0x80
[   22.290640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.290675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.290710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.290747]  kthread+0x337/0x6f0
[   22.290775]  ? trace_preempt_on+0x20/0xc0
[   22.290808]  ? __pfx_kthread+0x10/0x10
[   22.290840]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.290892]  ? calculate_sigpending+0x7b/0xa0
[   22.290940]  ? __pfx_kthread+0x10/0x10
[   22.290974]  ret_from_fork+0x116/0x1d0
[   22.291000]  ? __pfx_kthread+0x10/0x10
[   22.291031]  ret_from_fork_asm+0x1a/0x30
[   22.291074]  </TASK>
[   22.291091] 
[   22.306497] Allocated by task 283:
[   22.306896]  kasan_save_stack+0x45/0x70
[   22.307411]  kasan_save_track+0x18/0x40
[   22.307845]  kasan_save_alloc_info+0x3b/0x50
[   22.308367]  __kasan_kmalloc+0xb7/0xc0
[   22.308800]  __kmalloc_cache_noprof+0x189/0x420
[   22.309213]  kasan_atomics+0x95/0x310
[   22.309533]  kunit_try_run_case+0x1a5/0x480
[   22.309893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.310386]  kthread+0x337/0x6f0
[   22.310825]  ret_from_fork+0x116/0x1d0
[   22.311285]  ret_from_fork_asm+0x1a/0x30
[   22.311982] 
[   22.312258] The buggy address belongs to the object at ffff8881038ee700
[   22.312258]  which belongs to the cache kmalloc-64 of size 64
[   22.312998] The buggy address is located 0 bytes to the right of
[   22.312998]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.314086] 
[   22.314368] The buggy address belongs to the physical page:
[   22.314772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.315575] flags: 0x200000000000000(node=0|zone=2)
[   22.316102] page_type: f5(slab)
[   22.316519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.317172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.317793] page dumped because: kasan: bad access detected
[   22.318179] 
[   22.318380] Memory state around the buggy address:
[   22.318719]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.319397]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.320263] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.321099]                                      ^
[   22.321520]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.322108]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.324535] ==================================================================
[   22.566077] ==================================================================
[   22.566682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   22.567507] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.568079] 
[   22.568988] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.569058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.569078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.569126] Call Trace:
[   22.569166]  <TASK>
[   22.569191]  dump_stack_lvl+0x73/0xb0
[   22.569238]  print_report+0xd1/0x650
[   22.569273]  ? __virt_addr_valid+0x1db/0x2d0
[   22.569326]  ? kasan_atomics_helper+0x8f9/0x5450
[   22.569366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.569399]  ? kasan_atomics_helper+0x8f9/0x5450
[   22.569432]  kasan_report+0x141/0x180
[   22.569464]  ? kasan_atomics_helper+0x8f9/0x5450
[   22.569502]  kasan_check_range+0x10c/0x1c0
[   22.569537]  __kasan_check_write+0x18/0x20
[   22.569565]  kasan_atomics_helper+0x8f9/0x5450
[   22.569598]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.569631]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.569668]  ? kasan_save_alloc_info+0x3b/0x50
[   22.569704]  ? kasan_atomics+0x152/0x310
[   22.569741]  kasan_atomics+0x1dc/0x310
[   22.569773]  ? __pfx_kasan_atomics+0x10/0x10
[   22.569809]  ? __pfx_read_tsc+0x10/0x10
[   22.569839]  ? ktime_get_ts64+0x86/0x230
[   22.569892]  kunit_try_run_case+0x1a5/0x480
[   22.569941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.569977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.570015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.570051]  ? __kthread_parkme+0x82/0x180
[   22.570081]  ? preempt_count_sub+0x50/0x80
[   22.570147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.570191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.570228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.570277]  kthread+0x337/0x6f0
[   22.570308]  ? trace_preempt_on+0x20/0xc0
[   22.570344]  ? __pfx_kthread+0x10/0x10
[   22.570375]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.570407]  ? calculate_sigpending+0x7b/0xa0
[   22.570443]  ? __pfx_kthread+0x10/0x10
[   22.570473]  ret_from_fork+0x116/0x1d0
[   22.570499]  ? __pfx_kthread+0x10/0x10
[   22.570529]  ret_from_fork_asm+0x1a/0x30
[   22.570571]  </TASK>
[   22.570588] 
[   22.590620] Allocated by task 283:
[   22.590772]  kasan_save_stack+0x45/0x70
[   22.591058]  kasan_save_track+0x18/0x40
[   22.591396]  kasan_save_alloc_info+0x3b/0x50
[   22.591738]  __kasan_kmalloc+0xb7/0xc0
[   22.592051]  __kmalloc_cache_noprof+0x189/0x420
[   22.593792]  kasan_atomics+0x95/0x310
[   22.594140]  kunit_try_run_case+0x1a5/0x480
[   22.594555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.595014]  kthread+0x337/0x6f0
[   22.595738]  ret_from_fork+0x116/0x1d0
[   22.596308]  ret_from_fork_asm+0x1a/0x30
[   22.597007] 
[   22.597220] The buggy address belongs to the object at ffff8881038ee700
[   22.597220]  which belongs to the cache kmalloc-64 of size 64
[   22.598780] The buggy address is located 0 bytes to the right of
[   22.598780]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.600046] 
[   22.600826] The buggy address belongs to the physical page:
[   22.601279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.602084] flags: 0x200000000000000(node=0|zone=2)
[   22.602743] page_type: f5(slab)
[   22.603272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.604044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.604706] page dumped because: kasan: bad access detected
[   22.605622] 
[   22.605806] Memory state around the buggy address:
[   22.606719]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.607560]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.608220] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.608985]                                      ^
[   22.609658]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.610461]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.611338] ==================================================================
[   23.590391] ==================================================================
[   23.591729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   23.592620] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.593073] 
[   23.593270] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.594161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.594201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.594238] Call Trace:
[   23.594268]  <TASK>
[   23.594288]  dump_stack_lvl+0x73/0xb0
[   23.594368]  print_report+0xd1/0x650
[   23.594412]  ? __virt_addr_valid+0x1db/0x2d0
[   23.594447]  ? kasan_atomics_helper+0x1467/0x5450
[   23.594479]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.594512]  ? kasan_atomics_helper+0x1467/0x5450
[   23.594544]  kasan_report+0x141/0x180
[   23.594577]  ? kasan_atomics_helper+0x1467/0x5450
[   23.594614]  kasan_check_range+0x10c/0x1c0
[   23.594649]  __kasan_check_write+0x18/0x20
[   23.594678]  kasan_atomics_helper+0x1467/0x5450
[   23.594711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.594744]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.594780]  ? kasan_save_alloc_info+0x3b/0x50
[   23.594815]  ? kasan_atomics+0x152/0x310
[   23.594852]  kasan_atomics+0x1dc/0x310
[   23.594924]  ? __pfx_kasan_atomics+0x10/0x10
[   23.595014]  ? __pfx_read_tsc+0x10/0x10
[   23.595090]  ? ktime_get_ts64+0x86/0x230
[   23.595193]  kunit_try_run_case+0x1a5/0x480
[   23.595237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.595276]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.595313]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.595349]  ? __kthread_parkme+0x82/0x180
[   23.595379]  ? preempt_count_sub+0x50/0x80
[   23.595412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.595447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.595482]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.595522]  kthread+0x337/0x6f0
[   23.595552]  ? trace_preempt_on+0x20/0xc0
[   23.595584]  ? __pfx_kthread+0x10/0x10
[   23.595615]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.595646]  ? calculate_sigpending+0x7b/0xa0
[   23.595682]  ? __pfx_kthread+0x10/0x10
[   23.595767]  ret_from_fork+0x116/0x1d0
[   23.595840]  ? __pfx_kthread+0x10/0x10
[   23.595898]  ret_from_fork_asm+0x1a/0x30
[   23.595944]  </TASK>
[   23.595963] 
[   23.610816] Allocated by task 283:
[   23.611230]  kasan_save_stack+0x45/0x70
[   23.611675]  kasan_save_track+0x18/0x40
[   23.612141]  kasan_save_alloc_info+0x3b/0x50
[   23.612554]  __kasan_kmalloc+0xb7/0xc0
[   23.612949]  __kmalloc_cache_noprof+0x189/0x420
[   23.613674]  kasan_atomics+0x95/0x310
[   23.614042]  kunit_try_run_case+0x1a5/0x480
[   23.614532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.614947]  kthread+0x337/0x6f0
[   23.615292]  ret_from_fork+0x116/0x1d0
[   23.615707]  ret_from_fork_asm+0x1a/0x30
[   23.616350] 
[   23.616578] The buggy address belongs to the object at ffff8881038ee700
[   23.616578]  which belongs to the cache kmalloc-64 of size 64
[   23.617538] The buggy address is located 0 bytes to the right of
[   23.617538]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.618506] 
[   23.618745] The buggy address belongs to the physical page:
[   23.619322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.619825] flags: 0x200000000000000(node=0|zone=2)
[   23.620313] page_type: f5(slab)
[   23.620685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.621177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.621548] page dumped because: kasan: bad access detected
[   23.621839] 
[   23.621996] Memory state around the buggy address:
[   23.622385]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.623024]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.623698] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.624276]                                      ^
[   23.624919]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.625464]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.625922] ==================================================================
[   23.050610] ==================================================================
[   23.051312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   23.051797] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.052611] 
[   23.053011] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.053123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.053168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.053228] Call Trace:
[   23.053269]  <TASK>
[   23.053311]  dump_stack_lvl+0x73/0xb0
[   23.053399]  print_report+0xd1/0x650
[   23.053475]  ? __virt_addr_valid+0x1db/0x2d0
[   23.053555]  ? kasan_atomics_helper+0xfa9/0x5450
[   23.053630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.053706]  ? kasan_atomics_helper+0xfa9/0x5450
[   23.053778]  kasan_report+0x141/0x180
[   23.053854]  ? kasan_atomics_helper+0xfa9/0x5450
[   23.053964]  kasan_check_range+0x10c/0x1c0
[   23.054042]  __kasan_check_write+0x18/0x20
[   23.054115]  kasan_atomics_helper+0xfa9/0x5450
[   23.054193]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.054286]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.054372]  ? kasan_save_alloc_info+0x3b/0x50
[   23.054445]  ? kasan_atomics+0x152/0x310
[   23.054525]  kasan_atomics+0x1dc/0x310
[   23.054608]  ? __pfx_kasan_atomics+0x10/0x10
[   23.054689]  ? __pfx_read_tsc+0x10/0x10
[   23.054756]  ? ktime_get_ts64+0x86/0x230
[   23.054856]  kunit_try_run_case+0x1a5/0x480
[   23.054966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.055051]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.055136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.055221]  ? __kthread_parkme+0x82/0x180
[   23.055299]  ? preempt_count_sub+0x50/0x80
[   23.055382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.055469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.055571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.055651]  kthread+0x337/0x6f0
[   23.055711]  ? trace_preempt_on+0x20/0xc0
[   23.055789]  ? __pfx_kthread+0x10/0x10
[   23.055867]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.055964]  ? calculate_sigpending+0x7b/0xa0
[   23.056046]  ? __pfx_kthread+0x10/0x10
[   23.056121]  ret_from_fork+0x116/0x1d0
[   23.056192]  ? __pfx_kthread+0x10/0x10
[   23.056267]  ret_from_fork_asm+0x1a/0x30
[   23.056370]  </TASK>
[   23.056414] 
[   23.080033] Allocated by task 283:
[   23.080786]  kasan_save_stack+0x45/0x70
[   23.081332]  kasan_save_track+0x18/0x40
[   23.081649]  kasan_save_alloc_info+0x3b/0x50
[   23.082037]  __kasan_kmalloc+0xb7/0xc0
[   23.082541]  __kmalloc_cache_noprof+0x189/0x420
[   23.082975]  kasan_atomics+0x95/0x310
[   23.083391]  kunit_try_run_case+0x1a5/0x480
[   23.084029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.084615]  kthread+0x337/0x6f0
[   23.085094]  ret_from_fork+0x116/0x1d0
[   23.085803]  ret_from_fork_asm+0x1a/0x30
[   23.086186] 
[   23.086586] The buggy address belongs to the object at ffff8881038ee700
[   23.086586]  which belongs to the cache kmalloc-64 of size 64
[   23.087631] The buggy address is located 0 bytes to the right of
[   23.087631]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.088993] 
[   23.089238] The buggy address belongs to the physical page:
[   23.089685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.090872] flags: 0x200000000000000(node=0|zone=2)
[   23.091222] page_type: f5(slab)
[   23.091926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.092818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.093692] page dumped because: kasan: bad access detected
[   23.094119] 
[   23.094675] Memory state around the buggy address:
[   23.095071]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.096091]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.096956] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.097915]                                      ^
[   23.098344]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.098597]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.098835] ==================================================================
[   24.384823] ==================================================================
[   24.386350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   24.386948] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.387649] 
[   24.387950] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.388066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.388153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.388217] Call Trace:
[   24.388259]  <TASK>
[   24.388299]  dump_stack_lvl+0x73/0xb0
[   24.388387]  print_report+0xd1/0x650
[   24.388467]  ? __virt_addr_valid+0x1db/0x2d0
[   24.388551]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.388648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.388759]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.388834]  kasan_report+0x141/0x180
[   24.388933]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.389021]  kasan_check_range+0x10c/0x1c0
[   24.389141]  __kasan_check_write+0x18/0x20
[   24.389221]  kasan_atomics_helper+0x1eaa/0x5450
[   24.389301]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.389379]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.389514]  ? kasan_save_alloc_info+0x3b/0x50
[   24.389601]  ? kasan_atomics+0x152/0x310
[   24.389691]  kasan_atomics+0x1dc/0x310
[   24.389822]  ? __pfx_kasan_atomics+0x10/0x10
[   24.389925]  ? __pfx_read_tsc+0x10/0x10
[   24.389990]  ? ktime_get_ts64+0x86/0x230
[   24.390031]  kunit_try_run_case+0x1a5/0x480
[   24.390070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.390153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.390197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.390235]  ? __kthread_parkme+0x82/0x180
[   24.390277]  ? preempt_count_sub+0x50/0x80
[   24.390311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.390349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.390385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.390421]  kthread+0x337/0x6f0
[   24.390450]  ? trace_preempt_on+0x20/0xc0
[   24.390484]  ? __pfx_kthread+0x10/0x10
[   24.390514]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.390546]  ? calculate_sigpending+0x7b/0xa0
[   24.390581]  ? __pfx_kthread+0x10/0x10
[   24.390613]  ret_from_fork+0x116/0x1d0
[   24.390639]  ? __pfx_kthread+0x10/0x10
[   24.390669]  ret_from_fork_asm+0x1a/0x30
[   24.390712]  </TASK>
[   24.390727] 
[   24.412368] Allocated by task 283:
[   24.412689]  kasan_save_stack+0x45/0x70
[   24.413827]  kasan_save_track+0x18/0x40
[   24.414567]  kasan_save_alloc_info+0x3b/0x50
[   24.415120]  __kasan_kmalloc+0xb7/0xc0
[   24.415563]  __kmalloc_cache_noprof+0x189/0x420
[   24.416053]  kasan_atomics+0x95/0x310
[   24.416444]  kunit_try_run_case+0x1a5/0x480
[   24.416946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.417425]  kthread+0x337/0x6f0
[   24.417859]  ret_from_fork+0x116/0x1d0
[   24.418377]  ret_from_fork_asm+0x1a/0x30
[   24.418753] 
[   24.418995] The buggy address belongs to the object at ffff8881038ee700
[   24.418995]  which belongs to the cache kmalloc-64 of size 64
[   24.420692] The buggy address is located 0 bytes to the right of
[   24.420692]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.422027] 
[   24.422414] The buggy address belongs to the physical page:
[   24.422865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.423766] flags: 0x200000000000000(node=0|zone=2)
[   24.424171] page_type: f5(slab)
[   24.424548] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.425134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.425705] page dumped because: kasan: bad access detected
[   24.426852] 
[   24.427059] Memory state around the buggy address:
[   24.427845]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.428641]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.429408] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.430550]                                      ^
[   24.431096]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.431864]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.432800] ==================================================================
[   24.478474] ==================================================================
[   24.479067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   24.479746] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.480487] 
[   24.480796] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.480938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.480979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.481043] Call Trace:
[   24.481084]  <TASK>
[   24.481165]  dump_stack_lvl+0x73/0xb0
[   24.481258]  print_report+0xd1/0x650
[   24.481333]  ? __virt_addr_valid+0x1db/0x2d0
[   24.481411]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.481487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.481567]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.481683]  kasan_report+0x141/0x180
[   24.481774]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.481918]  __asan_report_load8_noabort+0x18/0x20
[   24.482008]  kasan_atomics_helper+0x4f71/0x5450
[   24.482089]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.482215]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.482309]  ? kasan_save_alloc_info+0x3b/0x50
[   24.482391]  ? kasan_atomics+0x152/0x310
[   24.482477]  kasan_atomics+0x1dc/0x310
[   24.482525]  ? __pfx_kasan_atomics+0x10/0x10
[   24.482564]  ? __pfx_read_tsc+0x10/0x10
[   24.482595]  ? ktime_get_ts64+0x86/0x230
[   24.482630]  kunit_try_run_case+0x1a5/0x480
[   24.482667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.482704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.482739]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.482774]  ? __kthread_parkme+0x82/0x180
[   24.482802]  ? preempt_count_sub+0x50/0x80
[   24.482835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.482906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.482999]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.483060]  kthread+0x337/0x6f0
[   24.483096]  ? trace_preempt_on+0x20/0xc0
[   24.483322]  ? __pfx_kthread+0x10/0x10
[   24.483360]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.483394]  ? calculate_sigpending+0x7b/0xa0
[   24.483430]  ? __pfx_kthread+0x10/0x10
[   24.483463]  ret_from_fork+0x116/0x1d0
[   24.483489]  ? __pfx_kthread+0x10/0x10
[   24.483524]  ret_from_fork_asm+0x1a/0x30
[   24.483568]  </TASK>
[   24.483584] 
[   24.501947] Allocated by task 283:
[   24.502589]  kasan_save_stack+0x45/0x70
[   24.502955]  kasan_save_track+0x18/0x40
[   24.503324]  kasan_save_alloc_info+0x3b/0x50
[   24.504161]  __kasan_kmalloc+0xb7/0xc0
[   24.504692]  __kmalloc_cache_noprof+0x189/0x420
[   24.505210]  kasan_atomics+0x95/0x310
[   24.505621]  kunit_try_run_case+0x1a5/0x480
[   24.506325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.506896]  kthread+0x337/0x6f0
[   24.507397]  ret_from_fork+0x116/0x1d0
[   24.507939]  ret_from_fork_asm+0x1a/0x30
[   24.508474] 
[   24.508709] The buggy address belongs to the object at ffff8881038ee700
[   24.508709]  which belongs to the cache kmalloc-64 of size 64
[   24.509719] The buggy address is located 0 bytes to the right of
[   24.509719]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.510672] 
[   24.510986] The buggy address belongs to the physical page:
[   24.511660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.512357] flags: 0x200000000000000(node=0|zone=2)
[   24.512850] page_type: f5(slab)
[   24.513336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.514060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.514817] page dumped because: kasan: bad access detected
[   24.515434] 
[   24.515649] Memory state around the buggy address:
[   24.516223]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.516921]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.517667] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.518308]                                      ^
[   24.518749]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.519499]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.520144] ==================================================================
[   23.497641] ==================================================================
[   23.498362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   23.499035] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.499547] 
[   23.499768] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.499902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.499948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.500008] Call Trace:
[   23.500053]  <TASK>
[   23.500137]  dump_stack_lvl+0x73/0xb0
[   23.500234]  print_report+0xd1/0x650
[   23.500315]  ? __virt_addr_valid+0x1db/0x2d0
[   23.500394]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.500471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.500551]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.500635]  kasan_report+0x141/0x180
[   23.500711]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.500796]  kasan_check_range+0x10c/0x1c0
[   23.500896]  __kasan_check_read+0x15/0x20
[   23.500972]  kasan_atomics_helper+0x13b5/0x5450
[   23.501050]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.501174]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.501259]  ? kasan_save_alloc_info+0x3b/0x50
[   23.501343]  ? kasan_atomics+0x152/0x310
[   23.501437]  kasan_atomics+0x1dc/0x310
[   23.501522]  ? __pfx_kasan_atomics+0x10/0x10
[   23.501609]  ? __pfx_read_tsc+0x10/0x10
[   23.501686]  ? ktime_get_ts64+0x86/0x230
[   23.501774]  kunit_try_run_case+0x1a5/0x480
[   23.501861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.501959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.502040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.502155]  ? __kthread_parkme+0x82/0x180
[   23.502198]  ? preempt_count_sub+0x50/0x80
[   23.502233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.502284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.502322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.502359]  kthread+0x337/0x6f0
[   23.502390]  ? trace_preempt_on+0x20/0xc0
[   23.502425]  ? __pfx_kthread+0x10/0x10
[   23.502455]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.502489]  ? calculate_sigpending+0x7b/0xa0
[   23.502524]  ? __pfx_kthread+0x10/0x10
[   23.502555]  ret_from_fork+0x116/0x1d0
[   23.502584]  ? __pfx_kthread+0x10/0x10
[   23.502615]  ret_from_fork_asm+0x1a/0x30
[   23.502657]  </TASK>
[   23.502672] 
[   23.521381] Allocated by task 283:
[   23.521839]  kasan_save_stack+0x45/0x70
[   23.522183]  kasan_save_track+0x18/0x40
[   23.523652]  kasan_save_alloc_info+0x3b/0x50
[   23.524162]  __kasan_kmalloc+0xb7/0xc0
[   23.524860]  __kmalloc_cache_noprof+0x189/0x420
[   23.525275]  kasan_atomics+0x95/0x310
[   23.525900]  kunit_try_run_case+0x1a5/0x480
[   23.526525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.527433]  kthread+0x337/0x6f0
[   23.527822]  ret_from_fork+0x116/0x1d0
[   23.528215]  ret_from_fork_asm+0x1a/0x30
[   23.528593] 
[   23.528831] The buggy address belongs to the object at ffff8881038ee700
[   23.528831]  which belongs to the cache kmalloc-64 of size 64
[   23.529901] The buggy address is located 0 bytes to the right of
[   23.529901]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.530853] 
[   23.531664] The buggy address belongs to the physical page:
[   23.532035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.533052] flags: 0x200000000000000(node=0|zone=2)
[   23.533710] page_type: f5(slab)
[   23.534092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.534965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.535826] page dumped because: kasan: bad access detected
[   23.536594] 
[   23.536793] Memory state around the buggy address:
[   23.537148]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.537811]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.538420] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.539492]                                      ^
[   23.539800]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.540861]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.541719] ==================================================================
[   23.762756] ==================================================================
[   23.763482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   23.764291] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.764887] 
[   23.765227] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.765367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.765437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.765501] Call Trace:
[   23.765543]  <TASK>
[   23.765587]  dump_stack_lvl+0x73/0xb0
[   23.765677]  print_report+0xd1/0x650
[   23.765761]  ? __virt_addr_valid+0x1db/0x2d0
[   23.765847]  ? kasan_atomics_helper+0x164f/0x5450
[   23.765949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.766078]  ? kasan_atomics_helper+0x164f/0x5450
[   23.766200]  kasan_report+0x141/0x180
[   23.766291]  ? kasan_atomics_helper+0x164f/0x5450
[   23.766381]  kasan_check_range+0x10c/0x1c0
[   23.766467]  __kasan_check_write+0x18/0x20
[   23.766561]  kasan_atomics_helper+0x164f/0x5450
[   23.766678]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.766764]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.766856]  ? kasan_save_alloc_info+0x3b/0x50
[   23.766977]  ? kasan_atomics+0x152/0x310
[   23.767088]  kasan_atomics+0x1dc/0x310
[   23.767179]  ? __pfx_kasan_atomics+0x10/0x10
[   23.767222]  ? __pfx_read_tsc+0x10/0x10
[   23.767256]  ? ktime_get_ts64+0x86/0x230
[   23.767294]  kunit_try_run_case+0x1a5/0x480
[   23.767334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.767371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.767407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.767442]  ? __kthread_parkme+0x82/0x180
[   23.767472]  ? preempt_count_sub+0x50/0x80
[   23.767504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.767541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.767576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.767613]  kthread+0x337/0x6f0
[   23.767641]  ? trace_preempt_on+0x20/0xc0
[   23.767674]  ? __pfx_kthread+0x10/0x10
[   23.767703]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.767737]  ? calculate_sigpending+0x7b/0xa0
[   23.767773]  ? __pfx_kthread+0x10/0x10
[   23.767804]  ret_from_fork+0x116/0x1d0
[   23.767831]  ? __pfx_kthread+0x10/0x10
[   23.767863]  ret_from_fork_asm+0x1a/0x30
[   23.767933]  </TASK>
[   23.767950] 
[   23.790007] Allocated by task 283:
[   23.790788]  kasan_save_stack+0x45/0x70
[   23.791659]  kasan_save_track+0x18/0x40
[   23.792029]  kasan_save_alloc_info+0x3b/0x50
[   23.792976]  __kasan_kmalloc+0xb7/0xc0
[   23.793434]  __kmalloc_cache_noprof+0x189/0x420
[   23.793913]  kasan_atomics+0x95/0x310
[   23.794323]  kunit_try_run_case+0x1a5/0x480
[   23.794786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.795307]  kthread+0x337/0x6f0
[   23.795687]  ret_from_fork+0x116/0x1d0
[   23.796098]  ret_from_fork_asm+0x1a/0x30
[   23.796531] 
[   23.796722] The buggy address belongs to the object at ffff8881038ee700
[   23.796722]  which belongs to the cache kmalloc-64 of size 64
[   23.797796] The buggy address is located 0 bytes to the right of
[   23.797796]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.798828] 
[   23.799305] The buggy address belongs to the physical page:
[   23.799726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.800507] flags: 0x200000000000000(node=0|zone=2)
[   23.801014] page_type: f5(slab)
[   23.801412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.802067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.802772] page dumped because: kasan: bad access detected
[   23.803186] 
[   23.803490] Memory state around the buggy address:
[   23.803992]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.804690]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.805386] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.805912]                                      ^
[   23.806580]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.807266]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.807815] ==================================================================
[   24.618306] ==================================================================
[   24.619280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   24.620453] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.621585] 
[   24.621870] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.622082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.622126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.622186] Call Trace:
[   24.622231]  <TASK>
[   24.622328]  dump_stack_lvl+0x73/0xb0
[   24.622378]  print_report+0xd1/0x650
[   24.622415]  ? __virt_addr_valid+0x1db/0x2d0
[   24.622448]  ? kasan_atomics_helper+0x20c8/0x5450
[   24.622479]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.622513]  ? kasan_atomics_helper+0x20c8/0x5450
[   24.622548]  kasan_report+0x141/0x180
[   24.622582]  ? kasan_atomics_helper+0x20c8/0x5450
[   24.622622]  kasan_check_range+0x10c/0x1c0
[   24.622657]  __kasan_check_write+0x18/0x20
[   24.622686]  kasan_atomics_helper+0x20c8/0x5450
[   24.622719]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.622750]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.622786]  ? kasan_save_alloc_info+0x3b/0x50
[   24.622820]  ? kasan_atomics+0x152/0x310
[   24.622857]  kasan_atomics+0x1dc/0x310
[   24.622918]  ? __pfx_kasan_atomics+0x10/0x10
[   24.622958]  ? __pfx_read_tsc+0x10/0x10
[   24.622990]  ? ktime_get_ts64+0x86/0x230
[   24.623024]  kunit_try_run_case+0x1a5/0x480
[   24.623061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.623094]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.623165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.623207]  ? __kthread_parkme+0x82/0x180
[   24.623240]  ? preempt_count_sub+0x50/0x80
[   24.623274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.623313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.623348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.623385]  kthread+0x337/0x6f0
[   24.623414]  ? trace_preempt_on+0x20/0xc0
[   24.623447]  ? __pfx_kthread+0x10/0x10
[   24.623478]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.623510]  ? calculate_sigpending+0x7b/0xa0
[   24.623544]  ? __pfx_kthread+0x10/0x10
[   24.623575]  ret_from_fork+0x116/0x1d0
[   24.623601]  ? __pfx_kthread+0x10/0x10
[   24.623632]  ret_from_fork_asm+0x1a/0x30
[   24.623674]  </TASK>
[   24.623689] 
[   24.641247] Allocated by task 283:
[   24.641608]  kasan_save_stack+0x45/0x70
[   24.641956]  kasan_save_track+0x18/0x40
[   24.642289]  kasan_save_alloc_info+0x3b/0x50
[   24.642772]  __kasan_kmalloc+0xb7/0xc0
[   24.643112]  __kmalloc_cache_noprof+0x189/0x420
[   24.643467]  kasan_atomics+0x95/0x310
[   24.643835]  kunit_try_run_case+0x1a5/0x480
[   24.644535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.645144]  kthread+0x337/0x6f0
[   24.645560]  ret_from_fork+0x116/0x1d0
[   24.646019]  ret_from_fork_asm+0x1a/0x30
[   24.646564] 
[   24.646853] The buggy address belongs to the object at ffff8881038ee700
[   24.646853]  which belongs to the cache kmalloc-64 of size 64
[   24.648103] The buggy address is located 0 bytes to the right of
[   24.648103]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.649445] 
[   24.649714] The buggy address belongs to the physical page:
[   24.650289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.651029] flags: 0x200000000000000(node=0|zone=2)
[   24.651570] page_type: f5(slab)
[   24.652080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.652796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.653826] page dumped because: kasan: bad access detected
[   24.655616] 
[   24.656048] Memory state around the buggy address:
[   24.656840]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.658015]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.658865] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.659557]                                      ^
[   24.660000]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.660665]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.661285] ==================================================================
[   22.973319] ==================================================================
[   22.974963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   22.975896] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.976917] 
[   22.977552] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.977659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.977695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.977731] Call Trace:
[   22.977753]  <TASK>
[   22.977773]  dump_stack_lvl+0x73/0xb0
[   22.977819]  print_report+0xd1/0x650
[   22.977853]  ? __virt_addr_valid+0x1db/0x2d0
[   22.977925]  ? kasan_atomics_helper+0xe78/0x5450
[   22.978004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.978074]  ? kasan_atomics_helper+0xe78/0x5450
[   22.978151]  kasan_report+0x141/0x180
[   22.978192]  ? kasan_atomics_helper+0xe78/0x5450
[   22.978231]  kasan_check_range+0x10c/0x1c0
[   22.978277]  __kasan_check_write+0x18/0x20
[   22.978307]  kasan_atomics_helper+0xe78/0x5450
[   22.978341]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.978373]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.978411]  ? kasan_save_alloc_info+0x3b/0x50
[   22.978445]  ? kasan_atomics+0x152/0x310
[   22.978483]  kasan_atomics+0x1dc/0x310
[   22.978517]  ? __pfx_kasan_atomics+0x10/0x10
[   22.978553]  ? __pfx_read_tsc+0x10/0x10
[   22.978585]  ? ktime_get_ts64+0x86/0x230
[   22.978622]  kunit_try_run_case+0x1a5/0x480
[   22.978658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.978693]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.978728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.978763]  ? __kthread_parkme+0x82/0x180
[   22.978793]  ? preempt_count_sub+0x50/0x80
[   22.978826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.978863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.978925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.978964]  kthread+0x337/0x6f0
[   22.978994]  ? trace_preempt_on+0x20/0xc0
[   22.979028]  ? __pfx_kthread+0x10/0x10
[   22.979058]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.979090]  ? calculate_sigpending+0x7b/0xa0
[   22.979164]  ? __pfx_kthread+0x10/0x10
[   22.979198]  ret_from_fork+0x116/0x1d0
[   22.979226]  ? __pfx_kthread+0x10/0x10
[   22.979257]  ret_from_fork_asm+0x1a/0x30
[   22.979301]  </TASK>
[   22.979318] 
[   22.994478] Allocated by task 283:
[   22.994769]  kasan_save_stack+0x45/0x70
[   22.995223]  kasan_save_track+0x18/0x40
[   22.995680]  kasan_save_alloc_info+0x3b/0x50
[   22.996182]  __kasan_kmalloc+0xb7/0xc0
[   22.996613]  __kmalloc_cache_noprof+0x189/0x420
[   22.997255]  kasan_atomics+0x95/0x310
[   22.997574]  kunit_try_run_case+0x1a5/0x480
[   22.997975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.998892]  kthread+0x337/0x6f0
[   22.999385]  ret_from_fork+0x116/0x1d0
[   22.999828]  ret_from_fork_asm+0x1a/0x30
[   23.000184] 
[   23.000418] The buggy address belongs to the object at ffff8881038ee700
[   23.000418]  which belongs to the cache kmalloc-64 of size 64
[   23.001381] The buggy address is located 0 bytes to the right of
[   23.001381]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.002166] 
[   23.002376] The buggy address belongs to the physical page:
[   23.002749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.003494] flags: 0x200000000000000(node=0|zone=2)
[   23.004026] page_type: f5(slab)
[   23.004541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.005434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.005920] page dumped because: kasan: bad access detected
[   23.006680] 
[   23.006931] Memory state around the buggy address:
[   23.007631]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.008243]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.008863] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.009573]                                      ^
[   23.009939]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.010470]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.011104] ==================================================================
[   22.612190] ==================================================================
[   22.612773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   22.613566] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.615092] 
[   22.615521] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.615585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.615606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.615636] Call Trace:
[   22.615655]  <TASK>
[   22.615673]  dump_stack_lvl+0x73/0xb0
[   22.615716]  print_report+0xd1/0x650
[   22.615750]  ? __virt_addr_valid+0x1db/0x2d0
[   22.615783]  ? kasan_atomics_helper+0x992/0x5450
[   22.615814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.615848]  ? kasan_atomics_helper+0x992/0x5450
[   22.615911]  kasan_report+0x141/0x180
[   22.615999]  ? kasan_atomics_helper+0x992/0x5450
[   22.616319]  kasan_check_range+0x10c/0x1c0
[   22.616707]  __kasan_check_write+0x18/0x20
[   22.616744]  kasan_atomics_helper+0x992/0x5450
[   22.616780]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.616815]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.616852]  ? kasan_save_alloc_info+0x3b/0x50
[   22.616912]  ? kasan_atomics+0x152/0x310
[   22.616954]  kasan_atomics+0x1dc/0x310
[   22.616988]  ? __pfx_kasan_atomics+0x10/0x10
[   22.617025]  ? __pfx_read_tsc+0x10/0x10
[   22.617059]  ? ktime_get_ts64+0x86/0x230
[   22.617098]  kunit_try_run_case+0x1a5/0x480
[   22.617179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.617218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.617255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.617291]  ? __kthread_parkme+0x82/0x180
[   22.617321]  ? preempt_count_sub+0x50/0x80
[   22.617355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.617392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.617428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.617465]  kthread+0x337/0x6f0
[   22.617494]  ? trace_preempt_on+0x20/0xc0
[   22.617528]  ? __pfx_kthread+0x10/0x10
[   22.617558]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.617590]  ? calculate_sigpending+0x7b/0xa0
[   22.617625]  ? __pfx_kthread+0x10/0x10
[   22.617657]  ret_from_fork+0x116/0x1d0
[   22.617683]  ? __pfx_kthread+0x10/0x10
[   22.617713]  ret_from_fork_asm+0x1a/0x30
[   22.617756]  </TASK>
[   22.617772] 
[   22.638730] Allocated by task 283:
[   22.639676]  kasan_save_stack+0x45/0x70
[   22.640025]  kasan_save_track+0x18/0x40
[   22.640563]  kasan_save_alloc_info+0x3b/0x50
[   22.641160]  __kasan_kmalloc+0xb7/0xc0
[   22.641746]  __kmalloc_cache_noprof+0x189/0x420
[   22.642411]  kasan_atomics+0x95/0x310
[   22.642992]  kunit_try_run_case+0x1a5/0x480
[   22.644068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.644510]  kthread+0x337/0x6f0
[   22.645021]  ret_from_fork+0x116/0x1d0
[   22.645698]  ret_from_fork_asm+0x1a/0x30
[   22.646172] 
[   22.646338] The buggy address belongs to the object at ffff8881038ee700
[   22.646338]  which belongs to the cache kmalloc-64 of size 64
[   22.647787] The buggy address is located 0 bytes to the right of
[   22.647787]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.648985] 
[   22.649229] The buggy address belongs to the physical page:
[   22.649939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.651043] flags: 0x200000000000000(node=0|zone=2)
[   22.651368] page_type: f5(slab)
[   22.651743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.652451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.653615] page dumped because: kasan: bad access detected
[   22.654212] 
[   22.654394] Memory state around the buggy address:
[   22.654745]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.657292]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.657974] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.659861]                                      ^
[   22.660664]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.662339]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.663576] ==================================================================
[   23.312205] ==================================================================
[   23.315166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   23.316133] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.316788] 
[   23.317373] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.317591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.317638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.317702] Call Trace:
[   23.317749]  <TASK>
[   23.317794]  dump_stack_lvl+0x73/0xb0
[   23.317902]  print_report+0xd1/0x650
[   23.317982]  ? __virt_addr_valid+0x1db/0x2d0
[   23.318061]  ? kasan_atomics_helper+0x1217/0x5450
[   23.318154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.318232]  ? kasan_atomics_helper+0x1217/0x5450
[   23.318315]  kasan_report+0x141/0x180
[   23.318403]  ? kasan_atomics_helper+0x1217/0x5450
[   23.318484]  kasan_check_range+0x10c/0x1c0
[   23.318527]  __kasan_check_write+0x18/0x20
[   23.318559]  kasan_atomics_helper+0x1217/0x5450
[   23.318594]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.318669]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.318711]  ? kasan_save_alloc_info+0x3b/0x50
[   23.318749]  ? kasan_atomics+0x152/0x310
[   23.318789]  kasan_atomics+0x1dc/0x310
[   23.318825]  ? __pfx_kasan_atomics+0x10/0x10
[   23.318862]  ? __pfx_read_tsc+0x10/0x10
[   23.319030]  ? ktime_get_ts64+0x86/0x230
[   23.319118]  kunit_try_run_case+0x1a5/0x480
[   23.319208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.319288]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.319338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.319377]  ? __kthread_parkme+0x82/0x180
[   23.319409]  ? preempt_count_sub+0x50/0x80
[   23.319445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.319483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.319520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.319556]  kthread+0x337/0x6f0
[   23.319586]  ? trace_preempt_on+0x20/0xc0
[   23.319620]  ? __pfx_kthread+0x10/0x10
[   23.319650]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.319684]  ? calculate_sigpending+0x7b/0xa0
[   23.319719]  ? __pfx_kthread+0x10/0x10
[   23.319751]  ret_from_fork+0x116/0x1d0
[   23.319777]  ? __pfx_kthread+0x10/0x10
[   23.319807]  ret_from_fork_asm+0x1a/0x30
[   23.319850]  </TASK>
[   23.319865] 
[   23.339364] Allocated by task 283:
[   23.339858]  kasan_save_stack+0x45/0x70
[   23.340444]  kasan_save_track+0x18/0x40
[   23.340931]  kasan_save_alloc_info+0x3b/0x50
[   23.341508]  __kasan_kmalloc+0xb7/0xc0
[   23.342008]  __kmalloc_cache_noprof+0x189/0x420
[   23.342586]  kasan_atomics+0x95/0x310
[   23.343022]  kunit_try_run_case+0x1a5/0x480
[   23.343592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.344291]  kthread+0x337/0x6f0
[   23.344697]  ret_from_fork+0x116/0x1d0
[   23.345271]  ret_from_fork_asm+0x1a/0x30
[   23.345610] 
[   23.345945] The buggy address belongs to the object at ffff8881038ee700
[   23.345945]  which belongs to the cache kmalloc-64 of size 64
[   23.347174] The buggy address is located 0 bytes to the right of
[   23.347174]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.348292] 
[   23.348589] The buggy address belongs to the physical page:
[   23.349137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.349991] flags: 0x200000000000000(node=0|zone=2)
[   23.350533] page_type: f5(slab)
[   23.351010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.351788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.352522] page dumped because: kasan: bad access detected
[   23.353016] 
[   23.353270] Memory state around the buggy address:
[   23.353684]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.354345]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.355077] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.356179]                                      ^
[   23.356706]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.357407]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.357962] ==================================================================
[   23.358944] ==================================================================
[   23.359637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   23.360320] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.360945] 
[   23.361260] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.361410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.361455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.361514] Call Trace:
[   23.361557]  <TASK>
[   23.361601]  dump_stack_lvl+0x73/0xb0
[   23.361691]  print_report+0xd1/0x650
[   23.361769]  ? __virt_addr_valid+0x1db/0x2d0
[   23.361866]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.361977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.362056]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.362178]  kasan_report+0x141/0x180
[   23.362267]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.362313]  __asan_report_load4_noabort+0x18/0x20
[   23.362351]  kasan_atomics_helper+0x49e8/0x5450
[   23.362386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.362422]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.362458]  ? kasan_save_alloc_info+0x3b/0x50
[   23.362495]  ? kasan_atomics+0x152/0x310
[   23.362534]  kasan_atomics+0x1dc/0x310
[   23.362568]  ? __pfx_kasan_atomics+0x10/0x10
[   23.362604]  ? __pfx_read_tsc+0x10/0x10
[   23.362634]  ? ktime_get_ts64+0x86/0x230
[   23.362670]  kunit_try_run_case+0x1a5/0x480
[   23.362706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.362742]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.362777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.362812]  ? __kthread_parkme+0x82/0x180
[   23.362842]  ? preempt_count_sub+0x50/0x80
[   23.362900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.362947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.362984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.363022]  kthread+0x337/0x6f0
[   23.363050]  ? trace_preempt_on+0x20/0xc0
[   23.363085]  ? __pfx_kthread+0x10/0x10
[   23.363163]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.363199]  ? calculate_sigpending+0x7b/0xa0
[   23.363234]  ? __pfx_kthread+0x10/0x10
[   23.363267]  ret_from_fork+0x116/0x1d0
[   23.363294]  ? __pfx_kthread+0x10/0x10
[   23.363325]  ret_from_fork_asm+0x1a/0x30
[   23.363367]  </TASK>
[   23.363387] 
[   23.384177] Allocated by task 283:
[   23.384723]  kasan_save_stack+0x45/0x70
[   23.385308]  kasan_save_track+0x18/0x40
[   23.385645]  kasan_save_alloc_info+0x3b/0x50
[   23.386018]  __kasan_kmalloc+0xb7/0xc0
[   23.387520]  __kmalloc_cache_noprof+0x189/0x420
[   23.388111]  kasan_atomics+0x95/0x310
[   23.388706]  kunit_try_run_case+0x1a5/0x480
[   23.389156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.389744]  kthread+0x337/0x6f0
[   23.390100]  ret_from_fork+0x116/0x1d0
[   23.390958]  ret_from_fork_asm+0x1a/0x30
[   23.391638] 
[   23.392041] The buggy address belongs to the object at ffff8881038ee700
[   23.392041]  which belongs to the cache kmalloc-64 of size 64
[   23.393422] The buggy address is located 0 bytes to the right of
[   23.393422]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.394615] 
[   23.394866] The buggy address belongs to the physical page:
[   23.395705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.396610] flags: 0x200000000000000(node=0|zone=2)
[   23.397003] page_type: f5(slab)
[   23.397928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.398695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.399475] page dumped because: kasan: bad access detected
[   23.399904] 
[   23.400067] Memory state around the buggy address:
[   23.401151]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.401849]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.402564] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.403164]                                      ^
[   23.403944]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.404711]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.405518] ==================================================================
[   23.979916] ==================================================================
[   23.980351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   23.981477] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.982283] 
[   23.982578] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.982723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.982767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.982828] Call Trace:
[   23.982871]  <TASK>
[   23.982988]  dump_stack_lvl+0x73/0xb0
[   23.983104]  print_report+0xd1/0x650
[   23.983206]  ? __virt_addr_valid+0x1db/0x2d0
[   23.983346]  ? kasan_atomics_helper+0x194a/0x5450
[   23.983455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.983540]  ? kasan_atomics_helper+0x194a/0x5450
[   23.983671]  kasan_report+0x141/0x180
[   23.983789]  ? kasan_atomics_helper+0x194a/0x5450
[   23.983900]  kasan_check_range+0x10c/0x1c0
[   23.984067]  __kasan_check_write+0x18/0x20
[   23.984146]  kasan_atomics_helper+0x194a/0x5450
[   23.984232]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.984395]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.984482]  ? kasan_save_alloc_info+0x3b/0x50
[   23.984615]  ? kasan_atomics+0x152/0x310
[   23.984740]  kasan_atomics+0x1dc/0x310
[   23.984848]  ? __pfx_kasan_atomics+0x10/0x10
[   23.985008]  ? __pfx_read_tsc+0x10/0x10
[   23.985121]  ? ktime_get_ts64+0x86/0x230
[   23.985227]  kunit_try_run_case+0x1a5/0x480
[   23.985373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.985488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.985549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.985589]  ? __kthread_parkme+0x82/0x180
[   23.985621]  ? preempt_count_sub+0x50/0x80
[   23.985657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.985695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.985750]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.985806]  kthread+0x337/0x6f0
[   23.985847]  ? trace_preempt_on+0x20/0xc0
[   23.985925]  ? __pfx_kthread+0x10/0x10
[   23.985961]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.986016]  ? calculate_sigpending+0x7b/0xa0
[   23.986055]  ? __pfx_kthread+0x10/0x10
[   23.986121]  ret_from_fork+0x116/0x1d0
[   23.986175]  ? __pfx_kthread+0x10/0x10
[   23.986216]  ret_from_fork_asm+0x1a/0x30
[   23.986283]  </TASK>
[   23.986304] 
[   24.010941] Allocated by task 283:
[   24.011366]  kasan_save_stack+0x45/0x70
[   24.012230]  kasan_save_track+0x18/0x40
[   24.012761]  kasan_save_alloc_info+0x3b/0x50
[   24.013458]  __kasan_kmalloc+0xb7/0xc0
[   24.014059]  __kmalloc_cache_noprof+0x189/0x420
[   24.014648]  kasan_atomics+0x95/0x310
[   24.015238]  kunit_try_run_case+0x1a5/0x480
[   24.015673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.016276]  kthread+0x337/0x6f0
[   24.016888]  ret_from_fork+0x116/0x1d0
[   24.017497]  ret_from_fork_asm+0x1a/0x30
[   24.017828] 
[   24.018006] The buggy address belongs to the object at ffff8881038ee700
[   24.018006]  which belongs to the cache kmalloc-64 of size 64
[   24.019768] The buggy address is located 0 bytes to the right of
[   24.019768]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.020919] 
[   24.021797] The buggy address belongs to the physical page:
[   24.022331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.023042] flags: 0x200000000000000(node=0|zone=2)
[   24.023728] page_type: f5(slab)
[   24.024094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.025054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.025800] page dumped because: kasan: bad access detected
[   24.026415] 
[   24.026661] Memory state around the buggy address:
[   24.027431]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.028602]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.029137] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.029850]                                      ^
[   24.030732]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.031513]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.032163] ==================================================================
[   23.939040] ==================================================================
[   23.939696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   23.940405] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.941065] 
[   23.941393] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.941511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.941556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.941616] Call Trace:
[   23.941662]  <TASK>
[   23.941705]  dump_stack_lvl+0x73/0xb0
[   23.941795]  print_report+0xd1/0x650
[   23.941836]  ? __virt_addr_valid+0x1db/0x2d0
[   23.941892]  ? kasan_atomics_helper+0x18b1/0x5450
[   23.941961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.941999]  ? kasan_atomics_helper+0x18b1/0x5450
[   23.942032]  kasan_report+0x141/0x180
[   23.942066]  ? kasan_atomics_helper+0x18b1/0x5450
[   23.942137]  kasan_check_range+0x10c/0x1c0
[   23.942273]  __kasan_check_write+0x18/0x20
[   23.942379]  kasan_atomics_helper+0x18b1/0x5450
[   23.942493]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.942574]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.942655]  ? kasan_save_alloc_info+0x3b/0x50
[   23.942726]  ? kasan_atomics+0x152/0x310
[   23.942771]  kasan_atomics+0x1dc/0x310
[   23.942808]  ? __pfx_kasan_atomics+0x10/0x10
[   23.942848]  ? __pfx_read_tsc+0x10/0x10
[   23.942902]  ? ktime_get_ts64+0x86/0x230
[   23.942943]  kunit_try_run_case+0x1a5/0x480
[   23.942981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.943015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.943052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.943087]  ? __kthread_parkme+0x82/0x180
[   23.943158]  ? preempt_count_sub+0x50/0x80
[   23.943196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.943233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.943269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.943306]  kthread+0x337/0x6f0
[   23.943336]  ? trace_preempt_on+0x20/0xc0
[   23.943369]  ? __pfx_kthread+0x10/0x10
[   23.943399]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.943433]  ? calculate_sigpending+0x7b/0xa0
[   23.943468]  ? __pfx_kthread+0x10/0x10
[   23.943499]  ret_from_fork+0x116/0x1d0
[   23.943526]  ? __pfx_kthread+0x10/0x10
[   23.943556]  ret_from_fork_asm+0x1a/0x30
[   23.943597]  </TASK>
[   23.943614] 
[   23.960122] Allocated by task 283:
[   23.960550]  kasan_save_stack+0x45/0x70
[   23.961301]  kasan_save_track+0x18/0x40
[   23.961903]  kasan_save_alloc_info+0x3b/0x50
[   23.962414]  __kasan_kmalloc+0xb7/0xc0
[   23.962897]  __kmalloc_cache_noprof+0x189/0x420
[   23.963534]  kasan_atomics+0x95/0x310
[   23.964032]  kunit_try_run_case+0x1a5/0x480
[   23.964655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.965185]  kthread+0x337/0x6f0
[   23.965647]  ret_from_fork+0x116/0x1d0
[   23.966061]  ret_from_fork_asm+0x1a/0x30
[   23.966536] 
[   23.966922] The buggy address belongs to the object at ffff8881038ee700
[   23.966922]  which belongs to the cache kmalloc-64 of size 64
[   23.968137] The buggy address is located 0 bytes to the right of
[   23.968137]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.969034] 
[   23.969413] The buggy address belongs to the physical page:
[   23.970066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.970749] flags: 0x200000000000000(node=0|zone=2)
[   23.971310] page_type: f5(slab)
[   23.971741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.972540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.973320] page dumped because: kasan: bad access detected
[   23.973869] 
[   23.974180] Memory state around the buggy address:
[   23.974692]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.975199]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.976041] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.976762]                                      ^
[   23.977146]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.977806]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.978663] ==================================================================
[   24.167681] ==================================================================
[   24.168837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   24.169517] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.170196] 
[   24.170589] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.170709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.170749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.170808] Call Trace:
[   24.170853]  <TASK>
[   24.170915]  dump_stack_lvl+0x73/0xb0
[   24.171009]  print_report+0xd1/0x650
[   24.171158]  ? __virt_addr_valid+0x1db/0x2d0
[   24.171250]  ? kasan_atomics_helper+0x1c18/0x5450
[   24.171331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.171409]  ? kasan_atomics_helper+0x1c18/0x5450
[   24.171447]  kasan_report+0x141/0x180
[   24.171484]  ? kasan_atomics_helper+0x1c18/0x5450
[   24.171524]  kasan_check_range+0x10c/0x1c0
[   24.171560]  __kasan_check_write+0x18/0x20
[   24.171589]  kasan_atomics_helper+0x1c18/0x5450
[   24.171621]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.171654]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.171689]  ? kasan_save_alloc_info+0x3b/0x50
[   24.171723]  ? kasan_atomics+0x152/0x310
[   24.171761]  kasan_atomics+0x1dc/0x310
[   24.171794]  ? __pfx_kasan_atomics+0x10/0x10
[   24.171830]  ? __pfx_read_tsc+0x10/0x10
[   24.171859]  ? ktime_get_ts64+0x86/0x230
[   24.171923]  kunit_try_run_case+0x1a5/0x480
[   24.171963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.172000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.172034]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.172069]  ? __kthread_parkme+0x82/0x180
[   24.172121]  ? preempt_count_sub+0x50/0x80
[   24.172172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.172210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.172248]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.172284]  kthread+0x337/0x6f0
[   24.172312]  ? trace_preempt_on+0x20/0xc0
[   24.172346]  ? __pfx_kthread+0x10/0x10
[   24.172376]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.172407]  ? calculate_sigpending+0x7b/0xa0
[   24.172442]  ? __pfx_kthread+0x10/0x10
[   24.172473]  ret_from_fork+0x116/0x1d0
[   24.172499]  ? __pfx_kthread+0x10/0x10
[   24.172529]  ret_from_fork_asm+0x1a/0x30
[   24.172571]  </TASK>
[   24.172587] 
[   24.193831] Allocated by task 283:
[   24.194095]  kasan_save_stack+0x45/0x70
[   24.195250]  kasan_save_track+0x18/0x40
[   24.195791]  kasan_save_alloc_info+0x3b/0x50
[   24.196435]  __kasan_kmalloc+0xb7/0xc0
[   24.196615]  __kmalloc_cache_noprof+0x189/0x420
[   24.196805]  kasan_atomics+0x95/0x310
[   24.197275]  kunit_try_run_case+0x1a5/0x480
[   24.197737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.198538]  kthread+0x337/0x6f0
[   24.198946]  ret_from_fork+0x116/0x1d0
[   24.199226]  ret_from_fork_asm+0x1a/0x30
[   24.200105] 
[   24.200468] The buggy address belongs to the object at ffff8881038ee700
[   24.200468]  which belongs to the cache kmalloc-64 of size 64
[   24.201360] The buggy address is located 0 bytes to the right of
[   24.201360]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.202826] 
[   24.203614] The buggy address belongs to the physical page:
[   24.204044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.204934] flags: 0x200000000000000(node=0|zone=2)
[   24.205551] page_type: f5(slab)
[   24.206050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.206853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.207456] page dumped because: kasan: bad access detected
[   24.208060] 
[   24.208285] Memory state around the buggy address:
[   24.208791]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.209646]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.210280] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.211015]                                      ^
[   24.211534]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.212244]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.212972] ==================================================================
[   24.213798] ==================================================================
[   24.214405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   24.215183] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.215749] 
[   24.216057] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.216218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.216258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.216317] Call Trace:
[   24.216359]  <TASK>
[   24.216439]  dump_stack_lvl+0x73/0xb0
[   24.216533]  print_report+0xd1/0x650
[   24.216619]  ? __virt_addr_valid+0x1db/0x2d0
[   24.216702]  ? kasan_atomics_helper+0x4f30/0x5450
[   24.216782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.216860]  ? kasan_atomics_helper+0x4f30/0x5450
[   24.216993]  kasan_report+0x141/0x180
[   24.217080]  ? kasan_atomics_helper+0x4f30/0x5450
[   24.217215]  __asan_report_load8_noabort+0x18/0x20
[   24.217298]  kasan_atomics_helper+0x4f30/0x5450
[   24.217377]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.217458]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.217581]  ? kasan_save_alloc_info+0x3b/0x50
[   24.217667]  ? kasan_atomics+0x152/0x310
[   24.217757]  kasan_atomics+0x1dc/0x310
[   24.217838]  ? __pfx_kasan_atomics+0x10/0x10
[   24.217934]  ? __pfx_read_tsc+0x10/0x10
[   24.217973]  ? ktime_get_ts64+0x86/0x230
[   24.218011]  kunit_try_run_case+0x1a5/0x480
[   24.218050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.218087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.218217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.218320]  ? __kthread_parkme+0x82/0x180
[   24.218372]  ? preempt_count_sub+0x50/0x80
[   24.218409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.218447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.218483]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.218520]  kthread+0x337/0x6f0
[   24.218548]  ? trace_preempt_on+0x20/0xc0
[   24.218582]  ? __pfx_kthread+0x10/0x10
[   24.218612]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.218644]  ? calculate_sigpending+0x7b/0xa0
[   24.218680]  ? __pfx_kthread+0x10/0x10
[   24.218710]  ret_from_fork+0x116/0x1d0
[   24.218737]  ? __pfx_kthread+0x10/0x10
[   24.218768]  ret_from_fork_asm+0x1a/0x30
[   24.218810]  </TASK>
[   24.218826] 
[   24.234103] Allocated by task 283:
[   24.234537]  kasan_save_stack+0x45/0x70
[   24.235018]  kasan_save_track+0x18/0x40
[   24.235437]  kasan_save_alloc_info+0x3b/0x50
[   24.235933]  __kasan_kmalloc+0xb7/0xc0
[   24.236390]  __kmalloc_cache_noprof+0x189/0x420
[   24.236826]  kasan_atomics+0x95/0x310
[   24.237731]  kunit_try_run_case+0x1a5/0x480
[   24.238432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.239460]  kthread+0x337/0x6f0
[   24.239813]  ret_from_fork+0x116/0x1d0
[   24.240158]  ret_from_fork_asm+0x1a/0x30
[   24.240495] 
[   24.240727] The buggy address belongs to the object at ffff8881038ee700
[   24.240727]  which belongs to the cache kmalloc-64 of size 64
[   24.242985] The buggy address is located 0 bytes to the right of
[   24.242985]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.244990] 
[   24.245413] The buggy address belongs to the physical page:
[   24.246395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.247914] flags: 0x200000000000000(node=0|zone=2)
[   24.248817] page_type: f5(slab)
[   24.249544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.250541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.250800] page dumped because: kasan: bad access detected
[   24.251161] 
[   24.251432] Memory state around the buggy address:
[   24.251864]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.252567]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.253103] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.253736]                                      ^
[   24.254227]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.254934]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.255665] ==================================================================
[   22.796188] ==================================================================
[   22.796679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   22.797460] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.798399] 
[   22.798749] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.798859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.798921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.798983] Call Trace:
[   22.799022]  <TASK>
[   22.799060]  dump_stack_lvl+0x73/0xb0
[   22.799192]  print_report+0xd1/0x650
[   22.799270]  ? __virt_addr_valid+0x1db/0x2d0
[   22.799353]  ? kasan_atomics_helper+0xc70/0x5450
[   22.799427]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.799559]  ? kasan_atomics_helper+0xc70/0x5450
[   22.799644]  kasan_report+0x141/0x180
[   22.799724]  ? kasan_atomics_helper+0xc70/0x5450
[   22.799864]  kasan_check_range+0x10c/0x1c0
[   22.799965]  __kasan_check_write+0x18/0x20
[   22.800036]  kasan_atomics_helper+0xc70/0x5450
[   22.800157]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.800243]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.800347]  ? kasan_save_alloc_info+0x3b/0x50
[   22.800456]  ? kasan_atomics+0x152/0x310
[   22.800549]  kasan_atomics+0x1dc/0x310
[   22.800648]  ? __pfx_kasan_atomics+0x10/0x10
[   22.800764]  ? __pfx_read_tsc+0x10/0x10
[   22.800846]  ? ktime_get_ts64+0x86/0x230
[   22.800920]  kunit_try_run_case+0x1a5/0x480
[   22.800965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.801004]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.801039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.801075]  ? __kthread_parkme+0x82/0x180
[   22.801150]  ? preempt_count_sub+0x50/0x80
[   22.801191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.801229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.801265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.801302]  kthread+0x337/0x6f0
[   22.801330]  ? trace_preempt_on+0x20/0xc0
[   22.801365]  ? __pfx_kthread+0x10/0x10
[   22.801396]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.801429]  ? calculate_sigpending+0x7b/0xa0
[   22.801464]  ? __pfx_kthread+0x10/0x10
[   22.801495]  ret_from_fork+0x116/0x1d0
[   22.801522]  ? __pfx_kthread+0x10/0x10
[   22.801552]  ret_from_fork_asm+0x1a/0x30
[   22.801594]  </TASK>
[   22.801609] 
[   22.820054] Allocated by task 283:
[   22.820357]  kasan_save_stack+0x45/0x70
[   22.821132]  kasan_save_track+0x18/0x40
[   22.821630]  kasan_save_alloc_info+0x3b/0x50
[   22.822053]  __kasan_kmalloc+0xb7/0xc0
[   22.822558]  __kmalloc_cache_noprof+0x189/0x420
[   22.823132]  kasan_atomics+0x95/0x310
[   22.823596]  kunit_try_run_case+0x1a5/0x480
[   22.823976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.824649]  kthread+0x337/0x6f0
[   22.825075]  ret_from_fork+0x116/0x1d0
[   22.825544]  ret_from_fork_asm+0x1a/0x30
[   22.826051] 
[   22.826316] The buggy address belongs to the object at ffff8881038ee700
[   22.826316]  which belongs to the cache kmalloc-64 of size 64
[   22.827447] The buggy address is located 0 bytes to the right of
[   22.827447]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.828616] 
[   22.828863] The buggy address belongs to the physical page:
[   22.829349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.830138] flags: 0x200000000000000(node=0|zone=2)
[   22.830699] page_type: f5(slab)
[   22.831145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.832005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.832693] page dumped because: kasan: bad access detected
[   22.833140] 
[   22.833305] Memory state around the buggy address:
[   22.833668]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.835821]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.836558] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.837361]                                      ^
[   22.837837]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.838842]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.839922] ==================================================================
[   22.920176] ==================================================================
[   22.920821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   22.922810] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.923356] 
[   22.923573] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.923691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.923734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.923795] Call Trace:
[   22.923837]  <TASK>
[   22.923901]  dump_stack_lvl+0x73/0xb0
[   22.923974]  print_report+0xd1/0x650
[   22.924031]  ? __virt_addr_valid+0x1db/0x2d0
[   22.924088]  ? kasan_atomics_helper+0xde0/0x5450
[   22.924146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.924202]  ? kasan_atomics_helper+0xde0/0x5450
[   22.924260]  kasan_report+0x141/0x180
[   22.924316]  ? kasan_atomics_helper+0xde0/0x5450
[   22.924382]  kasan_check_range+0x10c/0x1c0
[   22.924440]  __kasan_check_write+0x18/0x20
[   22.924489]  kasan_atomics_helper+0xde0/0x5450
[   22.924592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.924679]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.924763]  ? kasan_save_alloc_info+0x3b/0x50
[   22.924847]  ? kasan_atomics+0x152/0x310
[   22.925060]  kasan_atomics+0x1dc/0x310
[   22.925168]  ? __pfx_kasan_atomics+0x10/0x10
[   22.925254]  ? __pfx_read_tsc+0x10/0x10
[   22.926308]  ? ktime_get_ts64+0x86/0x230
[   22.926385]  kunit_try_run_case+0x1a5/0x480
[   22.926450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.926509]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.926568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.927934]  ? __kthread_parkme+0x82/0x180
[   22.928019]  ? preempt_count_sub+0x50/0x80
[   22.928098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.928870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.928973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.929049]  kthread+0x337/0x6f0
[   22.929947]  ? trace_preempt_on+0x20/0xc0
[   22.930023]  ? __pfx_kthread+0x10/0x10
[   22.930089]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.930202]  ? calculate_sigpending+0x7b/0xa0
[   22.930283]  ? __pfx_kthread+0x10/0x10
[   22.930345]  ret_from_fork+0x116/0x1d0
[   22.930395]  ? __pfx_kthread+0x10/0x10
[   22.930451]  ret_from_fork_asm+0x1a/0x30
[   22.930536]  </TASK>
[   22.930569] 
[   22.952241] Allocated by task 283:
[   22.952904]  kasan_save_stack+0x45/0x70
[   22.953267]  kasan_save_track+0x18/0x40
[   22.953589]  kasan_save_alloc_info+0x3b/0x50
[   22.954280]  __kasan_kmalloc+0xb7/0xc0
[   22.954998]  __kmalloc_cache_noprof+0x189/0x420
[   22.955482]  kasan_atomics+0x95/0x310
[   22.956055]  kunit_try_run_case+0x1a5/0x480
[   22.956463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.957181]  kthread+0x337/0x6f0
[   22.957578]  ret_from_fork+0x116/0x1d0
[   22.958097]  ret_from_fork_asm+0x1a/0x30
[   22.958665] 
[   22.958855] The buggy address belongs to the object at ffff8881038ee700
[   22.958855]  which belongs to the cache kmalloc-64 of size 64
[   22.960198] The buggy address is located 0 bytes to the right of
[   22.960198]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.961629] 
[   22.962082] The buggy address belongs to the physical page:
[   22.962956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.963675] flags: 0x200000000000000(node=0|zone=2)
[   22.964085] page_type: f5(slab)
[   22.964788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.965576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.966432] page dumped because: kasan: bad access detected
[   22.967020] 
[   22.967333] Memory state around the buggy address:
[   22.967864]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.968748]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.969613] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.970216]                                      ^
[   22.970735]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.971412]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.972114] ==================================================================
[   23.717352] ==================================================================
[   23.717755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   23.718548] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.720195] 
[   23.721118] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.721228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.721267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.721323] Call Trace:
[   23.721366]  <TASK>
[   23.721406]  dump_stack_lvl+0x73/0xb0
[   23.721477]  print_report+0xd1/0x650
[   23.721546]  ? __virt_addr_valid+0x1db/0x2d0
[   23.721618]  ? kasan_atomics_helper+0x15b6/0x5450
[   23.721689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.721762]  ? kasan_atomics_helper+0x15b6/0x5450
[   23.721836]  kasan_report+0x141/0x180
[   23.722318]  ? kasan_atomics_helper+0x15b6/0x5450
[   23.722407]  kasan_check_range+0x10c/0x1c0
[   23.722474]  __kasan_check_write+0x18/0x20
[   23.722531]  kasan_atomics_helper+0x15b6/0x5450
[   23.722598]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.722663]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.722726]  ? kasan_save_alloc_info+0x3b/0x50
[   23.722792]  ? kasan_atomics+0x152/0x310
[   23.722858]  kasan_atomics+0x1dc/0x310
[   23.722967]  ? __pfx_kasan_atomics+0x10/0x10
[   23.723043]  ? __pfx_read_tsc+0x10/0x10
[   23.723105]  ? ktime_get_ts64+0x86/0x230
[   23.723197]  kunit_try_run_case+0x1a5/0x480
[   23.723277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.723347]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.723419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.723494]  ? __kthread_parkme+0x82/0x180
[   23.723560]  ? preempt_count_sub+0x50/0x80
[   23.723621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.723693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.723768]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.723831]  kthread+0x337/0x6f0
[   23.723911]  ? trace_preempt_on+0x20/0xc0
[   23.723974]  ? __pfx_kthread+0x10/0x10
[   23.724027]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.724082]  ? calculate_sigpending+0x7b/0xa0
[   23.724166]  ? __pfx_kthread+0x10/0x10
[   23.724226]  ret_from_fork+0x116/0x1d0
[   23.724273]  ? __pfx_kthread+0x10/0x10
[   23.724329]  ret_from_fork_asm+0x1a/0x30
[   23.724402]  </TASK>
[   23.724432] 
[   23.744160] Allocated by task 283:
[   23.744864]  kasan_save_stack+0x45/0x70
[   23.745641]  kasan_save_track+0x18/0x40
[   23.745817]  kasan_save_alloc_info+0x3b/0x50
[   23.746271]  __kasan_kmalloc+0xb7/0xc0
[   23.746702]  __kmalloc_cache_noprof+0x189/0x420
[   23.747169]  kasan_atomics+0x95/0x310
[   23.747493]  kunit_try_run_case+0x1a5/0x480
[   23.748024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.748595]  kthread+0x337/0x6f0
[   23.749091]  ret_from_fork+0x116/0x1d0
[   23.749499]  ret_from_fork_asm+0x1a/0x30
[   23.750041] 
[   23.750312] The buggy address belongs to the object at ffff8881038ee700
[   23.750312]  which belongs to the cache kmalloc-64 of size 64
[   23.751419] The buggy address is located 0 bytes to the right of
[   23.751419]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.752442] 
[   23.752734] The buggy address belongs to the physical page:
[   23.753301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.754031] flags: 0x200000000000000(node=0|zone=2)
[   23.754549] page_type: f5(slab)
[   23.754991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.755608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.756382] page dumped because: kasan: bad access detected
[   23.756918] 
[   23.757198] Memory state around the buggy address:
[   23.757689]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.758327]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.759024] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.759595]                                      ^
[   23.760180]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.760801]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.761514] ==================================================================
[   24.522353] ==================================================================
[   24.523607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   24.524056] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.525715] 
[   24.526322] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.526422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.526455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.526505] Call Trace:
[   24.526538]  <TASK>
[   24.526570]  dump_stack_lvl+0x73/0xb0
[   24.526636]  print_report+0xd1/0x650
[   24.526693]  ? __virt_addr_valid+0x1db/0x2d0
[   24.526747]  ? kasan_atomics_helper+0x2006/0x5450
[   24.526801]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.526856]  ? kasan_atomics_helper+0x2006/0x5450
[   24.527018]  kasan_report+0x141/0x180
[   24.527928]  ? kasan_atomics_helper+0x2006/0x5450
[   24.528027]  kasan_check_range+0x10c/0x1c0
[   24.528111]  __kasan_check_write+0x18/0x20
[   24.528206]  kasan_atomics_helper+0x2006/0x5450
[   24.528289]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.528385]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.528498]  ? kasan_save_alloc_info+0x3b/0x50
[   24.528604]  ? kasan_atomics+0x152/0x310
[   24.528742]  kasan_atomics+0x1dc/0x310
[   24.528837]  ? __pfx_kasan_atomics+0x10/0x10
[   24.528951]  ? __pfx_read_tsc+0x10/0x10
[   24.529053]  ? ktime_get_ts64+0x86/0x230
[   24.529277]  kunit_try_run_case+0x1a5/0x480
[   24.529368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.529445]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.529518]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.529598]  ? __kthread_parkme+0x82/0x180
[   24.529668]  ? preempt_count_sub+0x50/0x80
[   24.529740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.529809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.529920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.529996]  kthread+0x337/0x6f0
[   24.530055]  ? trace_preempt_on+0x20/0xc0
[   24.530131]  ? __pfx_kthread+0x10/0x10
[   24.530200]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.530279]  ? calculate_sigpending+0x7b/0xa0
[   24.530355]  ? __pfx_kthread+0x10/0x10
[   24.530427]  ret_from_fork+0x116/0x1d0
[   24.530487]  ? __pfx_kthread+0x10/0x10
[   24.530556]  ret_from_fork_asm+0x1a/0x30
[   24.530640]  </TASK>
[   24.530675] 
[   24.551684] Allocated by task 283:
[   24.552448]  kasan_save_stack+0x45/0x70
[   24.553022]  kasan_save_track+0x18/0x40
[   24.553564]  kasan_save_alloc_info+0x3b/0x50
[   24.554016]  __kasan_kmalloc+0xb7/0xc0
[   24.554700]  __kmalloc_cache_noprof+0x189/0x420
[   24.555103]  kasan_atomics+0x95/0x310
[   24.555747]  kunit_try_run_case+0x1a5/0x480
[   24.556231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.556950]  kthread+0x337/0x6f0
[   24.557330]  ret_from_fork+0x116/0x1d0
[   24.557747]  ret_from_fork_asm+0x1a/0x30
[   24.558166] 
[   24.558383] The buggy address belongs to the object at ffff8881038ee700
[   24.558383]  which belongs to the cache kmalloc-64 of size 64
[   24.559902] The buggy address is located 0 bytes to the right of
[   24.559902]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.561176] 
[   24.561580] The buggy address belongs to the physical page:
[   24.562226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.563102] flags: 0x200000000000000(node=0|zone=2)
[   24.564063] page_type: f5(slab)
[   24.564352] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.565372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.565923] page dumped because: kasan: bad access detected
[   24.566896] 
[   24.567067] Memory state around the buggy address:
[   24.567408]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.568282]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.569090] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.569745]                                      ^
[   24.570398]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.571072]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.571783] ==================================================================
[   22.755081] ==================================================================
[   22.756197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   22.757513] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.758051] 
[   22.758397] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.758501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.758541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.758600] Call Trace:
[   22.758640]  <TASK>
[   22.758683]  dump_stack_lvl+0x73/0xb0
[   22.758770]  print_report+0xd1/0x650
[   22.758852]  ? __virt_addr_valid+0x1db/0x2d0
[   22.758958]  ? kasan_atomics_helper+0xb6a/0x5450
[   22.759056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.759162]  ? kasan_atomics_helper+0xb6a/0x5450
[   22.759242]  kasan_report+0x141/0x180
[   22.759322]  ? kasan_atomics_helper+0xb6a/0x5450
[   22.759407]  kasan_check_range+0x10c/0x1c0
[   22.759490]  __kasan_check_write+0x18/0x20
[   22.759561]  kasan_atomics_helper+0xb6a/0x5450
[   22.759642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.759699]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.759737]  ? kasan_save_alloc_info+0x3b/0x50
[   22.759774]  ? kasan_atomics+0x152/0x310
[   22.759814]  kasan_atomics+0x1dc/0x310
[   22.759847]  ? __pfx_kasan_atomics+0x10/0x10
[   22.759909]  ? __pfx_read_tsc+0x10/0x10
[   22.759946]  ? ktime_get_ts64+0x86/0x230
[   22.759982]  kunit_try_run_case+0x1a5/0x480
[   22.760019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.760056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.760090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.760167]  ? __kthread_parkme+0x82/0x180
[   22.760200]  ? preempt_count_sub+0x50/0x80
[   22.760233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.760270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.760306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.760342]  kthread+0x337/0x6f0
[   22.760372]  ? trace_preempt_on+0x20/0xc0
[   22.760403]  ? __pfx_kthread+0x10/0x10
[   22.760433]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.760466]  ? calculate_sigpending+0x7b/0xa0
[   22.760500]  ? __pfx_kthread+0x10/0x10
[   22.760532]  ret_from_fork+0x116/0x1d0
[   22.760559]  ? __pfx_kthread+0x10/0x10
[   22.760589]  ret_from_fork_asm+0x1a/0x30
[   22.760631]  </TASK>
[   22.760646] 
[   22.776722] Allocated by task 283:
[   22.777116]  kasan_save_stack+0x45/0x70
[   22.777547]  kasan_save_track+0x18/0x40
[   22.777999]  kasan_save_alloc_info+0x3b/0x50
[   22.778479]  __kasan_kmalloc+0xb7/0xc0
[   22.778942]  __kmalloc_cache_noprof+0x189/0x420
[   22.779611]  kasan_atomics+0x95/0x310
[   22.780093]  kunit_try_run_case+0x1a5/0x480
[   22.780614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.781145]  kthread+0x337/0x6f0
[   22.781509]  ret_from_fork+0x116/0x1d0
[   22.781956]  ret_from_fork_asm+0x1a/0x30
[   22.782531] 
[   22.782729] The buggy address belongs to the object at ffff8881038ee700
[   22.782729]  which belongs to the cache kmalloc-64 of size 64
[   22.783437] The buggy address is located 0 bytes to the right of
[   22.783437]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.784463] 
[   22.784711] The buggy address belongs to the physical page:
[   22.785256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.786032] flags: 0x200000000000000(node=0|zone=2)
[   22.786470] page_type: f5(slab)
[   22.786759] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.787249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.787778] page dumped because: kasan: bad access detected
[   22.789743] 
[   22.790003] Memory state around the buggy address:
[   22.790977]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.791667]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.792363] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.792948]                                      ^
[   22.793523]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.794182]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.794814] ==================================================================
[   24.703346] ==================================================================
[   24.704106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   24.704653] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.705380] 
[   24.705648] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.705711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.705730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.705772] Call Trace:
[   24.705808]  <TASK>
[   24.705842]  dump_stack_lvl+0x73/0xb0
[   24.705939]  print_report+0xd1/0x650
[   24.706020]  ? __virt_addr_valid+0x1db/0x2d0
[   24.706140]  ? kasan_atomics_helper+0x218a/0x5450
[   24.706220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.706313]  ? kasan_atomics_helper+0x218a/0x5450
[   24.706389]  kasan_report+0x141/0x180
[   24.706518]  ? kasan_atomics_helper+0x218a/0x5450
[   24.706610]  kasan_check_range+0x10c/0x1c0
[   24.706697]  __kasan_check_write+0x18/0x20
[   24.706797]  kasan_atomics_helper+0x218a/0x5450
[   24.706921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.707005]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.707087]  ? kasan_save_alloc_info+0x3b/0x50
[   24.707207]  ? kasan_atomics+0x152/0x310
[   24.707324]  kasan_atomics+0x1dc/0x310
[   24.707406]  ? __pfx_kasan_atomics+0x10/0x10
[   24.707542]  ? __pfx_read_tsc+0x10/0x10
[   24.707624]  ? ktime_get_ts64+0x86/0x230
[   24.707708]  kunit_try_run_case+0x1a5/0x480
[   24.707842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.707947]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.708031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.708117]  ? __kthread_parkme+0x82/0x180
[   24.708219]  ? preempt_count_sub+0x50/0x80
[   24.708327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.708414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.708523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.708638]  kthread+0x337/0x6f0
[   24.708712]  ? trace_preempt_on+0x20/0xc0
[   24.708814]  ? __pfx_kthread+0x10/0x10
[   24.708937]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.709010]  ? calculate_sigpending+0x7b/0xa0
[   24.709052]  ? __pfx_kthread+0x10/0x10
[   24.709087]  ret_from_fork+0x116/0x1d0
[   24.709155]  ? __pfx_kthread+0x10/0x10
[   24.709192]  ret_from_fork_asm+0x1a/0x30
[   24.709236]  </TASK>
[   24.709255] 
[   24.727327] Allocated by task 283:
[   24.727815]  kasan_save_stack+0x45/0x70
[   24.728398]  kasan_save_track+0x18/0x40
[   24.728867]  kasan_save_alloc_info+0x3b/0x50
[   24.729239]  __kasan_kmalloc+0xb7/0xc0
[   24.729712]  __kmalloc_cache_noprof+0x189/0x420
[   24.730238]  kasan_atomics+0x95/0x310
[   24.730793]  kunit_try_run_case+0x1a5/0x480
[   24.731256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.731732]  kthread+0x337/0x6f0
[   24.732109]  ret_from_fork+0x116/0x1d0
[   24.732577]  ret_from_fork_asm+0x1a/0x30
[   24.733134] 
[   24.733376] The buggy address belongs to the object at ffff8881038ee700
[   24.733376]  which belongs to the cache kmalloc-64 of size 64
[   24.734162] The buggy address is located 0 bytes to the right of
[   24.734162]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.735539] 
[   24.735730] The buggy address belongs to the physical page:
[   24.736230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.737022] flags: 0x200000000000000(node=0|zone=2)
[   24.737551] page_type: f5(slab)
[   24.737840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.738354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.738840] page dumped because: kasan: bad access detected
[   24.739434] 
[   24.739710] Memory state around the buggy address:
[   24.740075]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.740984]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.741850] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.742658]                                      ^
[   24.743190]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.743784]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.744451] ==================================================================
[   24.745264] ==================================================================
[   24.747253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   24.747694] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.748234] 
[   24.748804] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.748942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.748987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.749045] Call Trace:
[   24.749088]  <TASK>
[   24.749148]  dump_stack_lvl+0x73/0xb0
[   24.749224]  print_report+0xd1/0x650
[   24.749261]  ? __virt_addr_valid+0x1db/0x2d0
[   24.749296]  ? kasan_atomics_helper+0x4fa5/0x5450
[   24.749328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.749402]  ? kasan_atomics_helper+0x4fa5/0x5450
[   24.749440]  kasan_report+0x141/0x180
[   24.749474]  ? kasan_atomics_helper+0x4fa5/0x5450
[   24.749512]  __asan_report_load8_noabort+0x18/0x20
[   24.749552]  kasan_atomics_helper+0x4fa5/0x5450
[   24.749584]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.749617]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.749653]  ? kasan_save_alloc_info+0x3b/0x50
[   24.749687]  ? kasan_atomics+0x152/0x310
[   24.749725]  kasan_atomics+0x1dc/0x310
[   24.749759]  ? __pfx_kasan_atomics+0x10/0x10
[   24.749795]  ? __pfx_read_tsc+0x10/0x10
[   24.749826]  ? ktime_get_ts64+0x86/0x230
[   24.749859]  kunit_try_run_case+0x1a5/0x480
[   24.749950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.750030]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.750106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.750187]  ? __kthread_parkme+0x82/0x180
[   24.750276]  ? preempt_count_sub+0x50/0x80
[   24.750360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.750442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.750524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.750606]  kthread+0x337/0x6f0
[   24.750680]  ? trace_preempt_on+0x20/0xc0
[   24.750739]  ? __pfx_kthread+0x10/0x10
[   24.750772]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.750804]  ? calculate_sigpending+0x7b/0xa0
[   24.750839]  ? __pfx_kthread+0x10/0x10
[   24.750888]  ret_from_fork+0x116/0x1d0
[   24.750924]  ? __pfx_kthread+0x10/0x10
[   24.750957]  ret_from_fork_asm+0x1a/0x30
[   24.751001]  </TASK>
[   24.751018] 
[   24.772161] Allocated by task 283:
[   24.772714]  kasan_save_stack+0x45/0x70
[   24.773586]  kasan_save_track+0x18/0x40
[   24.774132]  kasan_save_alloc_info+0x3b/0x50
[   24.775078]  __kasan_kmalloc+0xb7/0xc0
[   24.775444]  __kmalloc_cache_noprof+0x189/0x420
[   24.776046]  kasan_atomics+0x95/0x310
[   24.776630]  kunit_try_run_case+0x1a5/0x480
[   24.777246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.777941]  kthread+0x337/0x6f0
[   24.778461]  ret_from_fork+0x116/0x1d0
[   24.778838]  ret_from_fork_asm+0x1a/0x30
[   24.779530] 
[   24.779770] The buggy address belongs to the object at ffff8881038ee700
[   24.779770]  which belongs to the cache kmalloc-64 of size 64
[   24.780994] The buggy address is located 0 bytes to the right of
[   24.780994]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.782559] 
[   24.782748] The buggy address belongs to the physical page:
[   24.783597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.784508] flags: 0x200000000000000(node=0|zone=2)
[   24.785065] page_type: f5(slab)
[   24.785621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.786391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.786828] page dumped because: kasan: bad access detected
[   24.787754] 
[   24.788064] Memory state around the buggy address:
[   24.789614]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.790676]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.792035] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.793629]                                      ^
[   24.793986]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.795932]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.797621] ==================================================================
[   24.801060] ==================================================================
[   24.802082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   24.802966] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.803544] 
[   24.803817] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.803960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.803994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.804029] Call Trace:
[   24.804051]  <TASK>
[   24.804071]  dump_stack_lvl+0x73/0xb0
[   24.804581]  print_report+0xd1/0x650
[   24.804630]  ? __virt_addr_valid+0x1db/0x2d0
[   24.804669]  ? kasan_atomics_helper+0x224c/0x5450
[   24.804703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.804737]  ? kasan_atomics_helper+0x224c/0x5450
[   24.804769]  kasan_report+0x141/0x180
[   24.804801]  ? kasan_atomics_helper+0x224c/0x5450
[   24.804838]  kasan_check_range+0x10c/0x1c0
[   24.804895]  __kasan_check_write+0x18/0x20
[   24.804942]  kasan_atomics_helper+0x224c/0x5450
[   24.804978]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.805011]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.805047]  ? kasan_save_alloc_info+0x3b/0x50
[   24.805083]  ? kasan_atomics+0x152/0x310
[   24.805162]  kasan_atomics+0x1dc/0x310
[   24.805202]  ? __pfx_kasan_atomics+0x10/0x10
[   24.805239]  ? __pfx_read_tsc+0x10/0x10
[   24.805272]  ? ktime_get_ts64+0x86/0x230
[   24.805307]  kunit_try_run_case+0x1a5/0x480
[   24.805344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.805379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.805414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.805448]  ? __kthread_parkme+0x82/0x180
[   24.805478]  ? preempt_count_sub+0x50/0x80
[   24.805511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.805547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.805582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.805618]  kthread+0x337/0x6f0
[   24.805648]  ? trace_preempt_on+0x20/0xc0
[   24.805682]  ? __pfx_kthread+0x10/0x10
[   24.805712]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.805744]  ? calculate_sigpending+0x7b/0xa0
[   24.805780]  ? __pfx_kthread+0x10/0x10
[   24.805812]  ret_from_fork+0x116/0x1d0
[   24.805839]  ? __pfx_kthread+0x10/0x10
[   24.805868]  ret_from_fork_asm+0x1a/0x30
[   24.805967]  </TASK>
[   24.805986] 
[   24.828758] Allocated by task 283:
[   24.829153]  kasan_save_stack+0x45/0x70
[   24.829580]  kasan_save_track+0x18/0x40
[   24.829946]  kasan_save_alloc_info+0x3b/0x50
[   24.830809]  __kasan_kmalloc+0xb7/0xc0
[   24.831374]  __kmalloc_cache_noprof+0x189/0x420
[   24.832061]  kasan_atomics+0x95/0x310
[   24.832462]  kunit_try_run_case+0x1a5/0x480
[   24.833123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.833893]  kthread+0x337/0x6f0
[   24.834186]  ret_from_fork+0x116/0x1d0
[   24.835057]  ret_from_fork_asm+0x1a/0x30
[   24.835544] 
[   24.835786] The buggy address belongs to the object at ffff8881038ee700
[   24.835786]  which belongs to the cache kmalloc-64 of size 64
[   24.837054] The buggy address is located 0 bytes to the right of
[   24.837054]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.838331] 
[   24.838704] The buggy address belongs to the physical page:
[   24.839128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.839892] flags: 0x200000000000000(node=0|zone=2)
[   24.840390] page_type: f5(slab)
[   24.840688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.841478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.841939] page dumped because: kasan: bad access detected
[   24.842290] 
[   24.842470] Memory state around the buggy address:
[   24.843825]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.844567]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.845021] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.845432]                                      ^
[   24.845773]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.847507]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.848476] ==================================================================
[   23.453128] ==================================================================
[   23.454980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   23.455745] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.456780] 
[   23.457035] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.457136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.457169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.457218] Call Trace:
[   23.457248]  <TASK>
[   23.457279]  dump_stack_lvl+0x73/0xb0
[   23.457347]  print_report+0xd1/0x650
[   23.457402]  ? __virt_addr_valid+0x1db/0x2d0
[   23.457458]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.457512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.457568]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.457620]  kasan_report+0x141/0x180
[   23.457678]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.457743]  __asan_report_load4_noabort+0x18/0x20
[   23.457802]  kasan_atomics_helper+0x49ce/0x5450
[   23.457860]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.457944]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.458762]  ? kasan_save_alloc_info+0x3b/0x50
[   23.458836]  ? kasan_atomics+0x152/0x310
[   23.458932]  kasan_atomics+0x1dc/0x310
[   23.459495]  ? __pfx_kasan_atomics+0x10/0x10
[   23.459592]  ? __pfx_read_tsc+0x10/0x10
[   23.459655]  ? ktime_get_ts64+0x86/0x230
[   23.459716]  kunit_try_run_case+0x1a5/0x480
[   23.459778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.459836]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.459922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.460010]  ? __kthread_parkme+0x82/0x180
[   23.460090]  ? preempt_count_sub+0x50/0x80
[   23.460568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.460731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.460810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.460917]  kthread+0x337/0x6f0
[   23.460993]  ? trace_preempt_on+0x20/0xc0
[   23.461070]  ? __pfx_kthread+0x10/0x10
[   23.461146]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.461220]  ? calculate_sigpending+0x7b/0xa0
[   23.461298]  ? __pfx_kthread+0x10/0x10
[   23.461372]  ret_from_fork+0x116/0x1d0
[   23.461439]  ? __pfx_kthread+0x10/0x10
[   23.461508]  ret_from_fork_asm+0x1a/0x30
[   23.461598]  </TASK>
[   23.461633] 
[   23.479466] Allocated by task 283:
[   23.479849]  kasan_save_stack+0x45/0x70
[   23.480598]  kasan_save_track+0x18/0x40
[   23.480934]  kasan_save_alloc_info+0x3b/0x50
[   23.481773]  __kasan_kmalloc+0xb7/0xc0
[   23.482547]  __kmalloc_cache_noprof+0x189/0x420
[   23.483414]  kasan_atomics+0x95/0x310
[   23.483751]  kunit_try_run_case+0x1a5/0x480
[   23.484081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.484661]  kthread+0x337/0x6f0
[   23.485061]  ret_from_fork+0x116/0x1d0
[   23.485525]  ret_from_fork_asm+0x1a/0x30
[   23.485933] 
[   23.486217] The buggy address belongs to the object at ffff8881038ee700
[   23.486217]  which belongs to the cache kmalloc-64 of size 64
[   23.487168] The buggy address is located 0 bytes to the right of
[   23.487168]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.488172] 
[   23.488392] The buggy address belongs to the physical page:
[   23.488947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.489560] flags: 0x200000000000000(node=0|zone=2)
[   23.490057] page_type: f5(slab)
[   23.490473] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.491071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.491774] page dumped because: kasan: bad access detected
[   23.492341] 
[   23.492529] Memory state around the buggy address:
[   23.492991]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.493603]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.494301] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.494870]                                      ^
[   23.495402]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.495946]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.496597] ==================================================================
[   22.153760] ==================================================================
[   22.154417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   22.155009] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.155765] 
[   22.156052] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.156236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.156271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.156333] Call Trace:
[   22.156386]  <TASK>
[   22.156434]  dump_stack_lvl+0x73/0xb0
[   22.156551]  print_report+0xd1/0x650
[   22.156676]  ? __virt_addr_valid+0x1db/0x2d0
[   22.156780]  ? kasan_atomics_helper+0x4b54/0x5450
[   22.156900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.156984]  ? kasan_atomics_helper+0x4b54/0x5450
[   22.157060]  kasan_report+0x141/0x180
[   22.157186]  ? kasan_atomics_helper+0x4b54/0x5450
[   22.157278]  __asan_report_load4_noabort+0x18/0x20
[   22.157449]  kasan_atomics_helper+0x4b54/0x5450
[   22.157550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.157618]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.157688]  ? kasan_save_alloc_info+0x3b/0x50
[   22.157764]  ? kasan_atomics+0x152/0x310
[   22.157855]  kasan_atomics+0x1dc/0x310
[   22.157988]  ? __pfx_kasan_atomics+0x10/0x10
[   22.158146]  ? __pfx_read_tsc+0x10/0x10
[   22.158224]  ? ktime_get_ts64+0x86/0x230
[   22.158322]  kunit_try_run_case+0x1a5/0x480
[   22.158431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.158543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.158613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.158653]  ? __kthread_parkme+0x82/0x180
[   22.158688]  ? preempt_count_sub+0x50/0x80
[   22.158731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.158803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.158843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.158907]  kthread+0x337/0x6f0
[   22.158940]  ? trace_preempt_on+0x20/0xc0
[   22.158976]  ? __pfx_kthread+0x10/0x10
[   22.159007]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.159039]  ? calculate_sigpending+0x7b/0xa0
[   22.159075]  ? __pfx_kthread+0x10/0x10
[   22.159157]  ret_from_fork+0x116/0x1d0
[   22.159191]  ? __pfx_kthread+0x10/0x10
[   22.159223]  ret_from_fork_asm+0x1a/0x30
[   22.159267]  </TASK>
[   22.159285] 
[   22.178747] Allocated by task 283:
[   22.179685]  kasan_save_stack+0x45/0x70
[   22.180035]  kasan_save_track+0x18/0x40
[   22.180489]  kasan_save_alloc_info+0x3b/0x50
[   22.180894]  __kasan_kmalloc+0xb7/0xc0
[   22.181309]  __kmalloc_cache_noprof+0x189/0x420
[   22.181716]  kasan_atomics+0x95/0x310
[   22.182621]  kunit_try_run_case+0x1a5/0x480
[   22.183291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.183766]  kthread+0x337/0x6f0
[   22.184172]  ret_from_fork+0x116/0x1d0
[   22.184549]  ret_from_fork_asm+0x1a/0x30
[   22.184967] 
[   22.185260] The buggy address belongs to the object at ffff8881038ee700
[   22.185260]  which belongs to the cache kmalloc-64 of size 64
[   22.186169] The buggy address is located 0 bytes to the right of
[   22.186169]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.187147] 
[   22.187402] The buggy address belongs to the physical page:
[   22.187789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.188488] flags: 0x200000000000000(node=0|zone=2)
[   22.189002] page_type: f5(slab)
[   22.189424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.189944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.190617] page dumped because: kasan: bad access detected
[   22.191174] 
[   22.191411] Memory state around the buggy address:
[   22.191787]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.192421]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.193055] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.193685]                                      ^
[   22.194056]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.194720]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.195357] ==================================================================
[   22.014917] ==================================================================
[   22.015551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   22.016386] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.017097] 
[   22.017666] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.017791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.017832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.017869] Call Trace:
[   22.017920]  <TASK>
[   22.017963]  dump_stack_lvl+0x73/0xb0
[   22.018009]  print_report+0xd1/0x650
[   22.018042]  ? __virt_addr_valid+0x1db/0x2d0
[   22.018076]  ? kasan_atomics_helper+0x4b88/0x5450
[   22.018125]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.018306]  ? kasan_atomics_helper+0x4b88/0x5450
[   22.018346]  kasan_report+0x141/0x180
[   22.018408]  ? kasan_atomics_helper+0x4b88/0x5450
[   22.018450]  __asan_report_load4_noabort+0x18/0x20
[   22.018488]  kasan_atomics_helper+0x4b88/0x5450
[   22.018522]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.018555]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.018591]  ? kasan_save_alloc_info+0x3b/0x50
[   22.018626]  ? kasan_atomics+0x152/0x310
[   22.018663]  kasan_atomics+0x1dc/0x310
[   22.018697]  ? __pfx_kasan_atomics+0x10/0x10
[   22.018733]  ? __pfx_read_tsc+0x10/0x10
[   22.018766]  ? ktime_get_ts64+0x86/0x230
[   22.018801]  kunit_try_run_case+0x1a5/0x480
[   22.018838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.018892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.018937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.018974]  ? __kthread_parkme+0x82/0x180
[   22.019005]  ? preempt_count_sub+0x50/0x80
[   22.019038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.019075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.019169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.019261]  kthread+0x337/0x6f0
[   22.019333]  ? trace_preempt_on+0x20/0xc0
[   22.019411]  ? __pfx_kthread+0x10/0x10
[   22.019448]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.019482]  ? calculate_sigpending+0x7b/0xa0
[   22.019519]  ? __pfx_kthread+0x10/0x10
[   22.019551]  ret_from_fork+0x116/0x1d0
[   22.019579]  ? __pfx_kthread+0x10/0x10
[   22.019610]  ret_from_fork_asm+0x1a/0x30
[   22.019651]  </TASK>
[   22.019667] 
[   22.039779] Allocated by task 283:
[   22.040023]  kasan_save_stack+0x45/0x70
[   22.040353]  kasan_save_track+0x18/0x40
[   22.041456]  kasan_save_alloc_info+0x3b/0x50
[   22.041918]  __kasan_kmalloc+0xb7/0xc0
[   22.042321]  __kmalloc_cache_noprof+0x189/0x420
[   22.042772]  kasan_atomics+0x95/0x310
[   22.043158]  kunit_try_run_case+0x1a5/0x480
[   22.043551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.044598]  kthread+0x337/0x6f0
[   22.044870]  ret_from_fork+0x116/0x1d0
[   22.045581]  ret_from_fork_asm+0x1a/0x30
[   22.046159] 
[   22.046555] The buggy address belongs to the object at ffff8881038ee700
[   22.046555]  which belongs to the cache kmalloc-64 of size 64
[   22.047798] The buggy address is located 0 bytes to the right of
[   22.047798]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.049167] 
[   22.049356] The buggy address belongs to the physical page:
[   22.049848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.050758] flags: 0x200000000000000(node=0|zone=2)
[   22.051336] page_type: f5(slab)
[   22.051830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.052647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.053328] page dumped because: kasan: bad access detected
[   22.053825] 
[   22.054061] Memory state around the buggy address:
[   22.054493]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.055365]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.055799] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.056661]                                      ^
[   22.057288]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.057980]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.058828] ==================================================================
[   24.345011] ==================================================================
[   24.345762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   24.346514] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.347397] 
[   24.347615] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.347729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.347773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.347831] Call Trace:
[   24.347943]  <TASK>
[   24.348019]  dump_stack_lvl+0x73/0xb0
[   24.348205]  print_report+0xd1/0x650
[   24.348288]  ? __virt_addr_valid+0x1db/0x2d0
[   24.348370]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.348450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.348615]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.348700]  kasan_report+0x141/0x180
[   24.348777]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.348864]  kasan_check_range+0x10c/0x1c0
[   24.348933]  __kasan_check_write+0x18/0x20
[   24.348967]  kasan_atomics_helper+0x1e12/0x5450
[   24.349005]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.349039]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.349075]  ? kasan_save_alloc_info+0x3b/0x50
[   24.349154]  ? kasan_atomics+0x152/0x310
[   24.349197]  kasan_atomics+0x1dc/0x310
[   24.349233]  ? __pfx_kasan_atomics+0x10/0x10
[   24.349268]  ? __pfx_read_tsc+0x10/0x10
[   24.349299]  ? ktime_get_ts64+0x86/0x230
[   24.349334]  kunit_try_run_case+0x1a5/0x480
[   24.349370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.349405]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.349438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.349473]  ? __kthread_parkme+0x82/0x180
[   24.349501]  ? preempt_count_sub+0x50/0x80
[   24.349535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.349572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.349607]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.349644]  kthread+0x337/0x6f0
[   24.349672]  ? trace_preempt_on+0x20/0xc0
[   24.349705]  ? __pfx_kthread+0x10/0x10
[   24.349736]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.349768]  ? calculate_sigpending+0x7b/0xa0
[   24.349802]  ? __pfx_kthread+0x10/0x10
[   24.349835]  ret_from_fork+0x116/0x1d0
[   24.349862]  ? __pfx_kthread+0x10/0x10
[   24.349920]  ret_from_fork_asm+0x1a/0x30
[   24.349965]  </TASK>
[   24.349981] 
[   24.366856] Allocated by task 283:
[   24.367318]  kasan_save_stack+0x45/0x70
[   24.367752]  kasan_save_track+0x18/0x40
[   24.368226]  kasan_save_alloc_info+0x3b/0x50
[   24.368680]  __kasan_kmalloc+0xb7/0xc0
[   24.369180]  __kmalloc_cache_noprof+0x189/0x420
[   24.369652]  kasan_atomics+0x95/0x310
[   24.370199]  kunit_try_run_case+0x1a5/0x480
[   24.370570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.371207]  kthread+0x337/0x6f0
[   24.371576]  ret_from_fork+0x116/0x1d0
[   24.371916]  ret_from_fork_asm+0x1a/0x30
[   24.372305] 
[   24.372518] The buggy address belongs to the object at ffff8881038ee700
[   24.372518]  which belongs to the cache kmalloc-64 of size 64
[   24.373679] The buggy address is located 0 bytes to the right of
[   24.373679]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.374824] 
[   24.375032] The buggy address belongs to the physical page:
[   24.375442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.376261] flags: 0x200000000000000(node=0|zone=2)
[   24.376737] page_type: f5(slab)
[   24.377222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.377958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.378595] page dumped because: kasan: bad access detected
[   24.379201] 
[   24.379440] Memory state around the buggy address:
[   24.379947]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.380622]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.381268] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.381846]                                      ^
[   24.382424]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.382905]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.383551] ==================================================================
[   22.469272] ==================================================================
[   22.470008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   22.470692] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.471412] 
[   22.471686] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.471844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.471908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.471971] Call Trace:
[   22.472016]  <TASK>
[   22.472062]  dump_stack_lvl+0x73/0xb0
[   22.472223]  print_report+0xd1/0x650
[   22.472309]  ? __virt_addr_valid+0x1db/0x2d0
[   22.472376]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.472412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.472447]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.472480]  kasan_report+0x141/0x180
[   22.472546]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.472613]  kasan_check_range+0x10c/0x1c0
[   22.472689]  __kasan_check_write+0x18/0x20
[   22.472798]  kasan_atomics_helper+0x7c7/0x5450
[   22.472899]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.472977]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.473062]  ? kasan_save_alloc_info+0x3b/0x50
[   22.473217]  ? kasan_atomics+0x152/0x310
[   22.473306]  kasan_atomics+0x1dc/0x310
[   22.473390]  ? __pfx_kasan_atomics+0x10/0x10
[   22.473515]  ? __pfx_read_tsc+0x10/0x10
[   22.473594]  ? ktime_get_ts64+0x86/0x230
[   22.473679]  kunit_try_run_case+0x1a5/0x480
[   22.473797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.473894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.473976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.474060]  ? __kthread_parkme+0x82/0x180
[   22.474214]  ? preempt_count_sub+0x50/0x80
[   22.474312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.474401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.474521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.474609]  kthread+0x337/0x6f0
[   22.474684]  ? trace_preempt_on+0x20/0xc0
[   22.474744]  ? __pfx_kthread+0x10/0x10
[   22.474780]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.474817]  ? calculate_sigpending+0x7b/0xa0
[   22.474853]  ? __pfx_kthread+0x10/0x10
[   22.474912]  ret_from_fork+0x116/0x1d0
[   22.474945]  ? __pfx_kthread+0x10/0x10
[   22.474976]  ret_from_fork_asm+0x1a/0x30
[   22.475019]  </TASK>
[   22.475034] 
[   22.492380] Allocated by task 283:
[   22.492844]  kasan_save_stack+0x45/0x70
[   22.493316]  kasan_save_track+0x18/0x40
[   22.493894]  kasan_save_alloc_info+0x3b/0x50
[   22.494384]  __kasan_kmalloc+0xb7/0xc0
[   22.494705]  __kmalloc_cache_noprof+0x189/0x420
[   22.496787]  kasan_atomics+0x95/0x310
[   22.497158]  kunit_try_run_case+0x1a5/0x480
[   22.497736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.498740]  kthread+0x337/0x6f0
[   22.499060]  ret_from_fork+0x116/0x1d0
[   22.499493]  ret_from_fork_asm+0x1a/0x30
[   22.499894] 
[   22.500502] The buggy address belongs to the object at ffff8881038ee700
[   22.500502]  which belongs to the cache kmalloc-64 of size 64
[   22.501323] The buggy address is located 0 bytes to the right of
[   22.501323]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.503018] 
[   22.503305] The buggy address belongs to the physical page:
[   22.503772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.504728] flags: 0x200000000000000(node=0|zone=2)
[   22.505170] page_type: f5(slab)
[   22.505861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.506733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.507579] page dumped because: kasan: bad access detected
[   22.508340] 
[   22.508609] Memory state around the buggy address:
[   22.508957]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.510222]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.510717] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.511587]                                      ^
[   22.512213]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.512813]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.513588] ==================================================================
[   21.964756] ==================================================================
[   21.966425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   21.967245] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   21.967893] 
[   21.968165] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.968291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.968333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.968392] Call Trace:
[   21.968445]  <TASK>
[   21.968492]  dump_stack_lvl+0x73/0xb0
[   21.968576]  print_report+0xd1/0x650
[   21.968649]  ? __virt_addr_valid+0x1db/0x2d0
[   21.968726]  ? kasan_atomics_helper+0x4ba2/0x5450
[   21.968794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.968868]  ? kasan_atomics_helper+0x4ba2/0x5450
[   21.968963]  kasan_report+0x141/0x180
[   21.969036]  ? kasan_atomics_helper+0x4ba2/0x5450
[   21.969084]  __asan_report_store4_noabort+0x1b/0x30
[   21.969157]  kasan_atomics_helper+0x4ba2/0x5450
[   21.969198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.969231]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.969267]  ? kasan_save_alloc_info+0x3b/0x50
[   21.969301]  ? kasan_atomics+0x152/0x310
[   21.969338]  kasan_atomics+0x1dc/0x310
[   21.969370]  ? __pfx_kasan_atomics+0x10/0x10
[   21.969405]  ? __pfx_read_tsc+0x10/0x10
[   21.969435]  ? ktime_get_ts64+0x86/0x230
[   21.969470]  kunit_try_run_case+0x1a5/0x480
[   21.969507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.969541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.969575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.969608]  ? __kthread_parkme+0x82/0x180
[   21.969637]  ? preempt_count_sub+0x50/0x80
[   21.969669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.969704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.969738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.969773]  kthread+0x337/0x6f0
[   21.969800]  ? trace_preempt_on+0x20/0xc0
[   21.969832]  ? __pfx_kthread+0x10/0x10
[   21.969860]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.969919]  ? calculate_sigpending+0x7b/0xa0
[   21.969957]  ? __pfx_kthread+0x10/0x10
[   21.969986]  ret_from_fork+0x116/0x1d0
[   21.970012]  ? __pfx_kthread+0x10/0x10
[   21.970041]  ret_from_fork_asm+0x1a/0x30
[   21.970082]  </TASK>
[   21.970099] 
[   21.991222] Allocated by task 283:
[   21.991692]  kasan_save_stack+0x45/0x70
[   21.992966]  kasan_save_track+0x18/0x40
[   21.993423]  kasan_save_alloc_info+0x3b/0x50
[   21.994137]  __kasan_kmalloc+0xb7/0xc0
[   21.994745]  __kmalloc_cache_noprof+0x189/0x420
[   21.995326]  kasan_atomics+0x95/0x310
[   21.995891]  kunit_try_run_case+0x1a5/0x480
[   21.996474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.996915]  kthread+0x337/0x6f0
[   21.997929]  ret_from_fork+0x116/0x1d0
[   21.998318]  ret_from_fork_asm+0x1a/0x30
[   21.998765] 
[   21.999283] The buggy address belongs to the object at ffff8881038ee700
[   21.999283]  which belongs to the cache kmalloc-64 of size 64
[   22.000119] The buggy address is located 0 bytes to the right of
[   22.000119]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.001654] 
[   22.001841] The buggy address belongs to the physical page:
[   22.002812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.003664] flags: 0x200000000000000(node=0|zone=2)
[   22.004069] page_type: f5(slab)
[   22.004671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.005497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.006046] page dumped because: kasan: bad access detected
[   22.006753] 
[   22.006996] Memory state around the buggy address:
[   22.007475]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.008534]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.009258] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.009760]                                      ^
[   22.010215]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.010722]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.011835] ==================================================================
[   22.105961] ==================================================================
[   22.106960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   22.107586] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.108539] 
[   22.108732] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.108794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.108815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.108845] Call Trace:
[   22.108862]  <TASK>
[   22.108909]  dump_stack_lvl+0x73/0xb0
[   22.108996]  print_report+0xd1/0x650
[   22.109074]  ? __virt_addr_valid+0x1db/0x2d0
[   22.109154]  ? kasan_atomics_helper+0x3df/0x5450
[   22.109228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.109558]  ? kasan_atomics_helper+0x3df/0x5450
[   22.109644]  kasan_report+0x141/0x180
[   22.109789]  ? kasan_atomics_helper+0x3df/0x5450
[   22.109899]  kasan_check_range+0x10c/0x1c0
[   22.109946]  __kasan_check_read+0x15/0x20
[   22.109978]  kasan_atomics_helper+0x3df/0x5450
[   22.110014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.110048]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.110086]  ? kasan_save_alloc_info+0x3b/0x50
[   22.110151]  ? kasan_atomics+0x152/0x310
[   22.110192]  kasan_atomics+0x1dc/0x310
[   22.110227]  ? __pfx_kasan_atomics+0x10/0x10
[   22.110274]  ? __pfx_read_tsc+0x10/0x10
[   22.110309]  ? ktime_get_ts64+0x86/0x230
[   22.110344]  kunit_try_run_case+0x1a5/0x480
[   22.110382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.110417]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.110451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.110486]  ? __kthread_parkme+0x82/0x180
[   22.110515]  ? preempt_count_sub+0x50/0x80
[   22.110549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.110585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.110620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.110655]  kthread+0x337/0x6f0
[   22.110684]  ? trace_preempt_on+0x20/0xc0
[   22.110716]  ? __pfx_kthread+0x10/0x10
[   22.110747]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.110779]  ? calculate_sigpending+0x7b/0xa0
[   22.110813]  ? __pfx_kthread+0x10/0x10
[   22.110844]  ret_from_fork+0x116/0x1d0
[   22.110869]  ? __pfx_kthread+0x10/0x10
[   22.110929]  ret_from_fork_asm+0x1a/0x30
[   22.110973]  </TASK>
[   22.110990] 
[   22.129335] Allocated by task 283:
[   22.132970]  kasan_save_stack+0x45/0x70
[   22.133841]  kasan_save_track+0x18/0x40
[   22.135255]  kasan_save_alloc_info+0x3b/0x50
[   22.136950]  __kasan_kmalloc+0xb7/0xc0
[   22.137408]  __kmalloc_cache_noprof+0x189/0x420
[   22.137898]  kasan_atomics+0x95/0x310
[   22.138330]  kunit_try_run_case+0x1a5/0x480
[   22.138795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.139507]  kthread+0x337/0x6f0
[   22.139989]  ret_from_fork+0x116/0x1d0
[   22.140451]  ret_from_fork_asm+0x1a/0x30
[   22.140960] 
[   22.141249] The buggy address belongs to the object at ffff8881038ee700
[   22.141249]  which belongs to the cache kmalloc-64 of size 64
[   22.142330] The buggy address is located 0 bytes to the right of
[   22.142330]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.143387] 
[   22.143629] The buggy address belongs to the physical page:
[   22.144255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.144933] flags: 0x200000000000000(node=0|zone=2)
[   22.145498] page_type: f5(slab)
[   22.145936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.146562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.147342] page dumped because: kasan: bad access detected
[   22.147731] 
[   22.148016] Memory state around the buggy address:
[   22.148545]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.149270]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.149920] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.150558]                                      ^
[   22.151020]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.151697]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.152381] ==================================================================
[   24.300312] ==================================================================
[   24.301246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   24.301926] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.302628] 
[   24.302919] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.303036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.303076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.303178] Call Trace:
[   24.303222]  <TASK>
[   24.303261]  dump_stack_lvl+0x73/0xb0
[   24.303347]  print_report+0xd1/0x650
[   24.303424]  ? __virt_addr_valid+0x1db/0x2d0
[   24.303498]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.303573]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.303648]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.303722]  kasan_report+0x141/0x180
[   24.303804]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.303911]  kasan_check_range+0x10c/0x1c0
[   24.304000]  __kasan_check_write+0x18/0x20
[   24.304079]  kasan_atomics_helper+0x1d7a/0x5450
[   24.304208]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.304290]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.304373]  ? kasan_save_alloc_info+0x3b/0x50
[   24.304454]  ? kasan_atomics+0x152/0x310
[   24.304545]  kasan_atomics+0x1dc/0x310
[   24.304629]  ? __pfx_kasan_atomics+0x10/0x10
[   24.304701]  ? __pfx_read_tsc+0x10/0x10
[   24.304759]  ? ktime_get_ts64+0x86/0x230
[   24.304841]  kunit_try_run_case+0x1a5/0x480
[   24.304948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.305033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.305157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.305245]  ? __kthread_parkme+0x82/0x180
[   24.305323]  ? preempt_count_sub+0x50/0x80
[   24.305409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.305494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.305578]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.305664]  kthread+0x337/0x6f0
[   24.305736]  ? trace_preempt_on+0x20/0xc0
[   24.305814]  ? __pfx_kthread+0x10/0x10
[   24.305905]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.305984]  ? calculate_sigpending+0x7b/0xa0
[   24.306062]  ? __pfx_kthread+0x10/0x10
[   24.306183]  ret_from_fork+0x116/0x1d0
[   24.306260]  ? __pfx_kthread+0x10/0x10
[   24.306334]  ret_from_fork_asm+0x1a/0x30
[   24.306428]  </TASK>
[   24.306469] 
[   24.326691] Allocated by task 283:
[   24.326997]  kasan_save_stack+0x45/0x70
[   24.328057]  kasan_save_track+0x18/0x40
[   24.328439]  kasan_save_alloc_info+0x3b/0x50
[   24.328661]  __kasan_kmalloc+0xb7/0xc0
[   24.328826]  __kmalloc_cache_noprof+0x189/0x420
[   24.329038]  kasan_atomics+0x95/0x310
[   24.330349]  kunit_try_run_case+0x1a5/0x480
[   24.330810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.331322]  kthread+0x337/0x6f0
[   24.331683]  ret_from_fork+0x116/0x1d0
[   24.332040]  ret_from_fork_asm+0x1a/0x30
[   24.332404] 
[   24.332644] The buggy address belongs to the object at ffff8881038ee700
[   24.332644]  which belongs to the cache kmalloc-64 of size 64
[   24.333564] The buggy address is located 0 bytes to the right of
[   24.333564]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.334549] 
[   24.334860] The buggy address belongs to the physical page:
[   24.335445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.336313] flags: 0x200000000000000(node=0|zone=2)
[   24.336700] page_type: f5(slab)
[   24.337214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.337987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.338721] page dumped because: kasan: bad access detected
[   24.339151] 
[   24.339386] Memory state around the buggy address:
[   24.339951]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.340698]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.341372] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.342031]                                      ^
[   24.342599]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.343329]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.343971] ==================================================================
[   24.033244] ==================================================================
[   24.034011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   24.034960] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.035462] 
[   24.035694] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.035800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.035897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.035966] Call Trace:
[   24.036018]  <TASK>
[   24.036108]  dump_stack_lvl+0x73/0xb0
[   24.036201]  print_report+0xd1/0x650
[   24.036281]  ? __virt_addr_valid+0x1db/0x2d0
[   24.036358]  ? kasan_atomics_helper+0x19e3/0x5450
[   24.036433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.036511]  ? kasan_atomics_helper+0x19e3/0x5450
[   24.036588]  kasan_report+0x141/0x180
[   24.036664]  ? kasan_atomics_helper+0x19e3/0x5450
[   24.036754]  kasan_check_range+0x10c/0x1c0
[   24.036834]  __kasan_check_write+0x18/0x20
[   24.036967]  kasan_atomics_helper+0x19e3/0x5450
[   24.037058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.037150]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.037235]  ? kasan_save_alloc_info+0x3b/0x50
[   24.037320]  ? kasan_atomics+0x152/0x310
[   24.037407]  kasan_atomics+0x1dc/0x310
[   24.037529]  ? __pfx_kasan_atomics+0x10/0x10
[   24.037618]  ? __pfx_read_tsc+0x10/0x10
[   24.037690]  ? ktime_get_ts64+0x86/0x230
[   24.037772]  kunit_try_run_case+0x1a5/0x480
[   24.037823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.037861]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.037926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.037962]  ? __kthread_parkme+0x82/0x180
[   24.037995]  ? preempt_count_sub+0x50/0x80
[   24.038031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.038070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.038124]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.038177]  kthread+0x337/0x6f0
[   24.038208]  ? trace_preempt_on+0x20/0xc0
[   24.038243]  ? __pfx_kthread+0x10/0x10
[   24.038284]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.038318]  ? calculate_sigpending+0x7b/0xa0
[   24.038354]  ? __pfx_kthread+0x10/0x10
[   24.038385]  ret_from_fork+0x116/0x1d0
[   24.038414]  ? __pfx_kthread+0x10/0x10
[   24.038445]  ret_from_fork_asm+0x1a/0x30
[   24.038489]  </TASK>
[   24.038505] 
[   24.057444] Allocated by task 283:
[   24.057829]  kasan_save_stack+0x45/0x70
[   24.058269]  kasan_save_track+0x18/0x40
[   24.058740]  kasan_save_alloc_info+0x3b/0x50
[   24.059225]  __kasan_kmalloc+0xb7/0xc0
[   24.059657]  __kmalloc_cache_noprof+0x189/0x420
[   24.060049]  kasan_atomics+0x95/0x310
[   24.060455]  kunit_try_run_case+0x1a5/0x480
[   24.060971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.061510]  kthread+0x337/0x6f0
[   24.061809]  ret_from_fork+0x116/0x1d0
[   24.062327]  ret_from_fork_asm+0x1a/0x30
[   24.062817] 
[   24.063106] The buggy address belongs to the object at ffff8881038ee700
[   24.063106]  which belongs to the cache kmalloc-64 of size 64
[   24.064048] The buggy address is located 0 bytes to the right of
[   24.064048]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.066980] 
[   24.067278] The buggy address belongs to the physical page:
[   24.067700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.068227] flags: 0x200000000000000(node=0|zone=2)
[   24.068717] page_type: f5(slab)
[   24.069151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.070065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.070738] page dumped because: kasan: bad access detected
[   24.071144] 
[   24.071384] Memory state around the buggy address:
[   24.071901]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.072539]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.073032] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.073956]                                      ^
[   24.074754]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.075418]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.075948] ==================================================================
[   24.122241] ==================================================================
[   24.123393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   24.123930] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.124554] 
[   24.125027] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.125154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.125195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.125259] Call Trace:
[   24.125302]  <TASK>
[   24.125345]  dump_stack_lvl+0x73/0xb0
[   24.125437]  print_report+0xd1/0x650
[   24.125508]  ? __virt_addr_valid+0x1db/0x2d0
[   24.125592]  ? kasan_atomics_helper+0x1b22/0x5450
[   24.125739]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.126078]  ? kasan_atomics_helper+0x1b22/0x5450
[   24.126186]  kasan_report+0x141/0x180
[   24.126280]  ? kasan_atomics_helper+0x1b22/0x5450
[   24.126371]  kasan_check_range+0x10c/0x1c0
[   24.126455]  __kasan_check_write+0x18/0x20
[   24.126528]  kasan_atomics_helper+0x1b22/0x5450
[   24.126608]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.126688]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.126770]  ? kasan_save_alloc_info+0x3b/0x50
[   24.127062]  ? kasan_atomics+0x152/0x310
[   24.127178]  kasan_atomics+0x1dc/0x310
[   24.127260]  ? __pfx_kasan_atomics+0x10/0x10
[   24.127311]  ? __pfx_read_tsc+0x10/0x10
[   24.127348]  ? ktime_get_ts64+0x86/0x230
[   24.127384]  kunit_try_run_case+0x1a5/0x480
[   24.127425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.127462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.127499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.127536]  ? __kthread_parkme+0x82/0x180
[   24.127566]  ? preempt_count_sub+0x50/0x80
[   24.127599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.127636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.127673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.127711]  kthread+0x337/0x6f0
[   24.127739]  ? trace_preempt_on+0x20/0xc0
[   24.127774]  ? __pfx_kthread+0x10/0x10
[   24.127804]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.127837]  ? calculate_sigpending+0x7b/0xa0
[   24.127871]  ? __pfx_kthread+0x10/0x10
[   24.127934]  ret_from_fork+0x116/0x1d0
[   24.127964]  ? __pfx_kthread+0x10/0x10
[   24.127996]  ret_from_fork_asm+0x1a/0x30
[   24.128039]  </TASK>
[   24.128055] 
[   24.146460] Allocated by task 283:
[   24.147049]  kasan_save_stack+0x45/0x70
[   24.147533]  kasan_save_track+0x18/0x40
[   24.147916]  kasan_save_alloc_info+0x3b/0x50
[   24.148546]  __kasan_kmalloc+0xb7/0xc0
[   24.149084]  __kmalloc_cache_noprof+0x189/0x420
[   24.149610]  kasan_atomics+0x95/0x310
[   24.150300]  kunit_try_run_case+0x1a5/0x480
[   24.150749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.151511]  kthread+0x337/0x6f0
[   24.152151]  ret_from_fork+0x116/0x1d0
[   24.152511]  ret_from_fork_asm+0x1a/0x30
[   24.153082] 
[   24.153372] The buggy address belongs to the object at ffff8881038ee700
[   24.153372]  which belongs to the cache kmalloc-64 of size 64
[   24.154474] The buggy address is located 0 bytes to the right of
[   24.154474]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.155503] 
[   24.155931] The buggy address belongs to the physical page:
[   24.156514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.157388] flags: 0x200000000000000(node=0|zone=2)
[   24.158032] page_type: f5(slab)
[   24.158634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.159426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.160177] page dumped because: kasan: bad access detected
[   24.161034] 
[   24.161277] Memory state around the buggy address:
[   24.161628]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.162426]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.163258] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.163999]                                      ^
[   24.164811]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.165525]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.166325] ==================================================================
[   22.422566] ==================================================================
[   22.423796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   22.424331] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.424951] 
[   22.426189] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.426270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.426292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.426325] Call Trace:
[   22.426350]  <TASK>
[   22.426372]  dump_stack_lvl+0x73/0xb0
[   22.426417]  print_report+0xd1/0x650
[   22.426450]  ? __virt_addr_valid+0x1db/0x2d0
[   22.426485]  ? kasan_atomics_helper+0x72f/0x5450
[   22.426518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.426550]  ? kasan_atomics_helper+0x72f/0x5450
[   22.426583]  kasan_report+0x141/0x180
[   22.426614]  ? kasan_atomics_helper+0x72f/0x5450
[   22.426652]  kasan_check_range+0x10c/0x1c0
[   22.426687]  __kasan_check_write+0x18/0x20
[   22.426715]  kasan_atomics_helper+0x72f/0x5450
[   22.426749]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.426781]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.426817]  ? kasan_save_alloc_info+0x3b/0x50
[   22.426851]  ? kasan_atomics+0x152/0x310
[   22.426915]  kasan_atomics+0x1dc/0x310
[   22.426954]  ? __pfx_kasan_atomics+0x10/0x10
[   22.426990]  ? __pfx_read_tsc+0x10/0x10
[   22.427022]  ? ktime_get_ts64+0x86/0x230
[   22.427057]  kunit_try_run_case+0x1a5/0x480
[   22.427095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.427174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.427211]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.427249]  ? __kthread_parkme+0x82/0x180
[   22.427279]  ? preempt_count_sub+0x50/0x80
[   22.427312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.427348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.427383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.427419]  kthread+0x337/0x6f0
[   22.427446]  ? trace_preempt_on+0x20/0xc0
[   22.427479]  ? __pfx_kthread+0x10/0x10
[   22.427509]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.427541]  ? calculate_sigpending+0x7b/0xa0
[   22.427577]  ? __pfx_kthread+0x10/0x10
[   22.427608]  ret_from_fork+0x116/0x1d0
[   22.427637]  ? __pfx_kthread+0x10/0x10
[   22.427667]  ret_from_fork_asm+0x1a/0x30
[   22.427710]  </TASK>
[   22.427725] 
[   22.448664] Allocated by task 283:
[   22.448988]  kasan_save_stack+0x45/0x70
[   22.449721]  kasan_save_track+0x18/0x40
[   22.450163]  kasan_save_alloc_info+0x3b/0x50
[   22.450852]  __kasan_kmalloc+0xb7/0xc0
[   22.451477]  __kmalloc_cache_noprof+0x189/0x420
[   22.451971]  kasan_atomics+0x95/0x310
[   22.452630]  kunit_try_run_case+0x1a5/0x480
[   22.453089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.453938]  kthread+0x337/0x6f0
[   22.454571]  ret_from_fork+0x116/0x1d0
[   22.455034]  ret_from_fork_asm+0x1a/0x30
[   22.455764] 
[   22.456012] The buggy address belongs to the object at ffff8881038ee700
[   22.456012]  which belongs to the cache kmalloc-64 of size 64
[   22.456905] The buggy address is located 0 bytes to the right of
[   22.456905]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.458586] 
[   22.459028] The buggy address belongs to the physical page:
[   22.459702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.460638] flags: 0x200000000000000(node=0|zone=2)
[   22.461081] page_type: f5(slab)
[   22.461693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.462498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.463353] page dumped because: kasan: bad access detected
[   22.463759] 
[   22.464261] Memory state around the buggy address:
[   22.464648]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.465201]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.465734] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.466374]                                      ^
[   22.466784]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.467538]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.468170] ==================================================================
[   23.182361] ==================================================================
[   23.182770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   23.183158] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.183506] 
[   23.183670] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.183765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.183794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.183839] Call Trace:
[   23.184269]  <TASK>
[   23.184321]  dump_stack_lvl+0x73/0xb0
[   23.184403]  print_report+0xd1/0x650
[   23.184473]  ? __virt_addr_valid+0x1db/0x2d0
[   23.184544]  ? kasan_atomics_helper+0x4a1c/0x5450
[   23.184608]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.188653]  ? kasan_atomics_helper+0x4a1c/0x5450
[   23.188718]  kasan_report+0x141/0x180
[   23.188772]  ? kasan_atomics_helper+0x4a1c/0x5450
[   23.188835]  __asan_report_load4_noabort+0x18/0x20
[   23.188924]  kasan_atomics_helper+0x4a1c/0x5450
[   23.188987]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.189039]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.189126]  ? kasan_save_alloc_info+0x3b/0x50
[   23.189189]  ? kasan_atomics+0x152/0x310
[   23.189250]  kasan_atomics+0x1dc/0x310
[   23.189303]  ? __pfx_kasan_atomics+0x10/0x10
[   23.189359]  ? __pfx_read_tsc+0x10/0x10
[   23.189408]  ? ktime_get_ts64+0x86/0x230
[   23.189462]  kunit_try_run_case+0x1a5/0x480
[   23.189519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.189572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.189625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.189689]  ? __kthread_parkme+0x82/0x180
[   23.189763]  ? preempt_count_sub+0x50/0x80
[   23.189844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.189999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.190061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.190698]  kthread+0x337/0x6f0
[   23.190770]  ? trace_preempt_on+0x20/0xc0
[   23.190853]  ? __pfx_kthread+0x10/0x10
[   23.190942]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.191010]  ? calculate_sigpending+0x7b/0xa0
[   23.191081]  ? __pfx_kthread+0x10/0x10
[   23.191276]  ret_from_fork+0x116/0x1d0
[   23.191349]  ? __pfx_kthread+0x10/0x10
[   23.191422]  ret_from_fork_asm+0x1a/0x30
[   23.191512]  </TASK>
[   23.191552] 
[   23.210741] Allocated by task 283:
[   23.211091]  kasan_save_stack+0x45/0x70
[   23.211509]  kasan_save_track+0x18/0x40
[   23.211959]  kasan_save_alloc_info+0x3b/0x50
[   23.212442]  __kasan_kmalloc+0xb7/0xc0
[   23.212858]  __kmalloc_cache_noprof+0x189/0x420
[   23.213244]  kasan_atomics+0x95/0x310
[   23.213495]  kunit_try_run_case+0x1a5/0x480
[   23.213760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.214078]  kthread+0x337/0x6f0
[   23.214426]  ret_from_fork+0x116/0x1d0
[   23.214838]  ret_from_fork_asm+0x1a/0x30
[   23.215326] 
[   23.215564] The buggy address belongs to the object at ffff8881038ee700
[   23.215564]  which belongs to the cache kmalloc-64 of size 64
[   23.216396] The buggy address is located 0 bytes to the right of
[   23.216396]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.217226] 
[   23.217372] The buggy address belongs to the physical page:
[   23.217650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.218186] flags: 0x200000000000000(node=0|zone=2)
[   23.218477] page_type: f5(slab)
[   23.218695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.219234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.219712] page dumped because: kasan: bad access detected
[   23.222243] 
[   23.222601] Memory state around the buggy address:
[   23.223650]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.224231]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.224734] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.225097]                                      ^
[   23.226135]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.226659]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.227824] ==================================================================
[   23.406802] ==================================================================
[   23.408194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   23.408859] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.410065] 
[   23.410526] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.410591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.410612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.410642] Call Trace:
[   23.410661]  <TASK>
[   23.410679]  dump_stack_lvl+0x73/0xb0
[   23.410723]  print_report+0xd1/0x650
[   23.410758]  ? __virt_addr_valid+0x1db/0x2d0
[   23.410796]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.410831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.410864]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.410940]  kasan_report+0x141/0x180
[   23.410976]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.411015]  kasan_check_range+0x10c/0x1c0
[   23.411051]  __kasan_check_write+0x18/0x20
[   23.411112]  kasan_atomics_helper+0x12e6/0x5450
[   23.411198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.411466]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.411527]  ? kasan_save_alloc_info+0x3b/0x50
[   23.411567]  ? kasan_atomics+0x152/0x310
[   23.411607]  kasan_atomics+0x1dc/0x310
[   23.411643]  ? __pfx_kasan_atomics+0x10/0x10
[   23.411682]  ? __pfx_read_tsc+0x10/0x10
[   23.411714]  ? ktime_get_ts64+0x86/0x230
[   23.411752]  kunit_try_run_case+0x1a5/0x480
[   23.411790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.411826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.411861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.411924]  ? __kthread_parkme+0x82/0x180
[   23.411959]  ? preempt_count_sub+0x50/0x80
[   23.411993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.412031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.412068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.412117]  kthread+0x337/0x6f0
[   23.412167]  ? trace_preempt_on+0x20/0xc0
[   23.412202]  ? __pfx_kthread+0x10/0x10
[   23.412232]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.412266]  ? calculate_sigpending+0x7b/0xa0
[   23.412301]  ? __pfx_kthread+0x10/0x10
[   23.412335]  ret_from_fork+0x116/0x1d0
[   23.412363]  ? __pfx_kthread+0x10/0x10
[   23.412394]  ret_from_fork_asm+0x1a/0x30
[   23.412436]  </TASK>
[   23.412453] 
[   23.433297] Allocated by task 283:
[   23.433549]  kasan_save_stack+0x45/0x70
[   23.434363]  kasan_save_track+0x18/0x40
[   23.434895]  kasan_save_alloc_info+0x3b/0x50
[   23.435537]  __kasan_kmalloc+0xb7/0xc0
[   23.435930]  __kmalloc_cache_noprof+0x189/0x420
[   23.436566]  kasan_atomics+0x95/0x310
[   23.436992]  kunit_try_run_case+0x1a5/0x480
[   23.437599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.438208]  kthread+0x337/0x6f0
[   23.438567]  ret_from_fork+0x116/0x1d0
[   23.439004]  ret_from_fork_asm+0x1a/0x30
[   23.439702] 
[   23.439965] The buggy address belongs to the object at ffff8881038ee700
[   23.439965]  which belongs to the cache kmalloc-64 of size 64
[   23.441070] The buggy address is located 0 bytes to the right of
[   23.441070]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.442228] 
[   23.442475] The buggy address belongs to the physical page:
[   23.442963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.444151] flags: 0x200000000000000(node=0|zone=2)
[   23.444631] page_type: f5(slab)
[   23.445304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.445993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.446843] page dumped because: kasan: bad access detected
[   23.447456] 
[   23.447666] Memory state around the buggy address:
[   23.448399]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.448857]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.449436] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.449964]                                      ^
[   23.451495]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.451963]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.452363] ==================================================================
[   24.662368] ==================================================================
[   24.663131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   24.663555] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.664358] 
[   24.664625] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.664761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.664831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.664931] Call Trace:
[   24.664976]  <TASK>
[   24.665015]  dump_stack_lvl+0x73/0xb0
[   24.665101]  print_report+0xd1/0x650
[   24.665187]  ? __virt_addr_valid+0x1db/0x2d0
[   24.665272]  ? kasan_atomics_helper+0x4fb2/0x5450
[   24.665352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.665433]  ? kasan_atomics_helper+0x4fb2/0x5450
[   24.665537]  kasan_report+0x141/0x180
[   24.665646]  ? kasan_atomics_helper+0x4fb2/0x5450
[   24.665735]  __asan_report_load8_noabort+0x18/0x20
[   24.665812]  kasan_atomics_helper+0x4fb2/0x5450
[   24.665872]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.665966]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.666067]  ? kasan_save_alloc_info+0x3b/0x50
[   24.666176]  ? kasan_atomics+0x152/0x310
[   24.666296]  kasan_atomics+0x1dc/0x310
[   24.666386]  ? __pfx_kasan_atomics+0x10/0x10
[   24.666473]  ? __pfx_read_tsc+0x10/0x10
[   24.666549]  ? ktime_get_ts64+0x86/0x230
[   24.666632]  kunit_try_run_case+0x1a5/0x480
[   24.666720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.666803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.666928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.667041]  ? __kthread_parkme+0x82/0x180
[   24.667119]  ? preempt_count_sub+0x50/0x80
[   24.667214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.667299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.667379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.667461]  kthread+0x337/0x6f0
[   24.667529]  ? trace_preempt_on+0x20/0xc0
[   24.667606]  ? __pfx_kthread+0x10/0x10
[   24.667647]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.667683]  ? calculate_sigpending+0x7b/0xa0
[   24.667718]  ? __pfx_kthread+0x10/0x10
[   24.667751]  ret_from_fork+0x116/0x1d0
[   24.667780]  ? __pfx_kthread+0x10/0x10
[   24.667813]  ret_from_fork_asm+0x1a/0x30
[   24.667855]  </TASK>
[   24.667870] 
[   24.683367] Allocated by task 283:
[   24.683766]  kasan_save_stack+0x45/0x70
[   24.684680]  kasan_save_track+0x18/0x40
[   24.685099]  kasan_save_alloc_info+0x3b/0x50
[   24.686094]  __kasan_kmalloc+0xb7/0xc0
[   24.687620]  __kmalloc_cache_noprof+0x189/0x420
[   24.688758]  kasan_atomics+0x95/0x310
[   24.689147]  kunit_try_run_case+0x1a5/0x480
[   24.689490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.689931]  kthread+0x337/0x6f0
[   24.690231]  ret_from_fork+0x116/0x1d0
[   24.690681]  ret_from_fork_asm+0x1a/0x30
[   24.691182] 
[   24.691371] The buggy address belongs to the object at ffff8881038ee700
[   24.691371]  which belongs to the cache kmalloc-64 of size 64
[   24.692401] The buggy address is located 0 bytes to the right of
[   24.692401]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.693525] 
[   24.693749] The buggy address belongs to the physical page:
[   24.694341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.695038] flags: 0x200000000000000(node=0|zone=2)
[   24.695517] page_type: f5(slab)
[   24.695812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.696586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.697393] page dumped because: kasan: bad access detected
[   24.697830] 
[   24.698155] Memory state around the buggy address:
[   24.698692]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.699445]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.700032] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.700625]                                      ^
[   24.701187]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.701668]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.702394] ==================================================================
[   24.850707] ==================================================================
[   24.852144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   24.852763] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.853865] 
[   24.854537] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.854603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.854652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.854714] Call Trace:
[   24.854757]  <TASK>
[   24.854803]  dump_stack_lvl+0x73/0xb0
[   24.854945]  print_report+0xd1/0x650
[   24.855029]  ? __virt_addr_valid+0x1db/0x2d0
[   24.855107]  ? kasan_atomics_helper+0x5115/0x5450
[   24.855179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.855216]  ? kasan_atomics_helper+0x5115/0x5450
[   24.855248]  kasan_report+0x141/0x180
[   24.855283]  ? kasan_atomics_helper+0x5115/0x5450
[   24.855322]  __asan_report_load8_noabort+0x18/0x20
[   24.855360]  kasan_atomics_helper+0x5115/0x5450
[   24.855393]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.855425]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.855460]  ? kasan_save_alloc_info+0x3b/0x50
[   24.855495]  ? kasan_atomics+0x152/0x310
[   24.855532]  kasan_atomics+0x1dc/0x310
[   24.855566]  ? __pfx_kasan_atomics+0x10/0x10
[   24.855602]  ? __pfx_read_tsc+0x10/0x10
[   24.855632]  ? ktime_get_ts64+0x86/0x230
[   24.855668]  kunit_try_run_case+0x1a5/0x480
[   24.855704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.855739]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.855773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.855808]  ? __kthread_parkme+0x82/0x180
[   24.855837]  ? preempt_count_sub+0x50/0x80
[   24.855870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.855934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.855972]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.856008]  kthread+0x337/0x6f0
[   24.856037]  ? trace_preempt_on+0x20/0xc0
[   24.856071]  ? __pfx_kthread+0x10/0x10
[   24.856112]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.856164]  ? calculate_sigpending+0x7b/0xa0
[   24.856202]  ? __pfx_kthread+0x10/0x10
[   24.856234]  ret_from_fork+0x116/0x1d0
[   24.856261]  ? __pfx_kthread+0x10/0x10
[   24.856290]  ret_from_fork_asm+0x1a/0x30
[   24.856334]  </TASK>
[   24.856351] 
[   24.875011] Allocated by task 283:
[   24.875541]  kasan_save_stack+0x45/0x70
[   24.876584]  kasan_save_track+0x18/0x40
[   24.877261]  kasan_save_alloc_info+0x3b/0x50
[   24.877723]  __kasan_kmalloc+0xb7/0xc0
[   24.878158]  __kmalloc_cache_noprof+0x189/0x420
[   24.878765]  kasan_atomics+0x95/0x310
[   24.879140]  kunit_try_run_case+0x1a5/0x480
[   24.879638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.880190]  kthread+0x337/0x6f0
[   24.880551]  ret_from_fork+0x116/0x1d0
[   24.880986]  ret_from_fork_asm+0x1a/0x30
[   24.881427] 
[   24.881699] The buggy address belongs to the object at ffff8881038ee700
[   24.881699]  which belongs to the cache kmalloc-64 of size 64
[   24.882819] The buggy address is located 0 bytes to the right of
[   24.882819]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.883765] 
[   24.884063] The buggy address belongs to the physical page:
[   24.884556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.885165] flags: 0x200000000000000(node=0|zone=2)
[   24.885674] page_type: f5(slab)
[   24.886262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.886855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.887501] page dumped because: kasan: bad access detected
[   24.887891] 
[   24.888157] Memory state around the buggy address:
[   24.888655]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.889422]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.890067] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.890692]                                      ^
[   24.891203]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.891802]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.892495] ==================================================================
[   21.920860] ==================================================================
[   21.922268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   21.922955] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   21.924161] 
[   21.924646] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.924773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.924800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.924834] Call Trace:
[   21.924851]  <TASK>
[   21.924891]  dump_stack_lvl+0x73/0xb0
[   21.924945]  print_report+0xd1/0x650
[   21.924978]  ? __virt_addr_valid+0x1db/0x2d0
[   21.925011]  ? kasan_atomics_helper+0x4bbc/0x5450
[   21.925042]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.925072]  ? kasan_atomics_helper+0x4bbc/0x5450
[   21.925115]  kasan_report+0x141/0x180
[   21.925167]  ? kasan_atomics_helper+0x4bbc/0x5450
[   21.925203]  __asan_report_load4_noabort+0x18/0x20
[   21.925239]  kasan_atomics_helper+0x4bbc/0x5450
[   21.925274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.925305]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.925341]  ? kasan_save_alloc_info+0x3b/0x50
[   21.925374]  ? kasan_atomics+0x152/0x310
[   21.925410]  kasan_atomics+0x1dc/0x310
[   21.925442]  ? __pfx_kasan_atomics+0x10/0x10
[   21.925476]  ? __pfx_read_tsc+0x10/0x10
[   21.925505]  ? ktime_get_ts64+0x86/0x230
[   21.925538]  kunit_try_run_case+0x1a5/0x480
[   21.925574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.925607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.925640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.925674]  ? __kthread_parkme+0x82/0x180
[   21.925701]  ? preempt_count_sub+0x50/0x80
[   21.925734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.925769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.925802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.925836]  kthread+0x337/0x6f0
[   21.925863]  ? trace_preempt_on+0x20/0xc0
[   21.925920]  ? __pfx_kthread+0x10/0x10
[   21.925950]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.925982]  ? calculate_sigpending+0x7b/0xa0
[   21.926016]  ? __pfx_kthread+0x10/0x10
[   21.926046]  ret_from_fork+0x116/0x1d0
[   21.926071]  ? __pfx_kthread+0x10/0x10
[   21.926109]  ret_from_fork_asm+0x1a/0x30
[   21.926171]  </TASK>
[   21.926188] 
[   21.946787] Allocated by task 283:
[   21.947106]  kasan_save_stack+0x45/0x70
[   21.947312]  kasan_save_track+0x18/0x40
[   21.947475]  kasan_save_alloc_info+0x3b/0x50
[   21.947650]  __kasan_kmalloc+0xb7/0xc0
[   21.947808]  __kmalloc_cache_noprof+0x189/0x420
[   21.948139]  kasan_atomics+0x95/0x310
[   21.948522]  kunit_try_run_case+0x1a5/0x480
[   21.949059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.949666]  kthread+0x337/0x6f0
[   21.950098]  ret_from_fork+0x116/0x1d0
[   21.950602]  ret_from_fork_asm+0x1a/0x30
[   21.951053] 
[   21.951300] The buggy address belongs to the object at ffff8881038ee700
[   21.951300]  which belongs to the cache kmalloc-64 of size 64
[   21.952164] The buggy address is located 0 bytes to the right of
[   21.952164]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   21.953283] 
[   21.953581] The buggy address belongs to the physical page:
[   21.954338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   21.955078] flags: 0x200000000000000(node=0|zone=2)
[   21.955707] page_type: f5(slab)
[   21.956065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.956546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.957259] page dumped because: kasan: bad access detected
[   21.958087] 
[   21.958321] Memory state around the buggy address:
[   21.958898]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.959489]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.960162] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.960809]                                      ^
[   21.961385]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.962018]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.962686] ==================================================================
[   22.243250] ==================================================================
[   22.243741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   22.244324] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.245108] 
[   22.245343] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.245459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.245498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.245555] Call Trace:
[   22.245593]  <TASK>
[   22.245635]  dump_stack_lvl+0x73/0xb0
[   22.245730]  print_report+0xd1/0x650
[   22.245818]  ? __virt_addr_valid+0x1db/0x2d0
[   22.245920]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.246000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.246120]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.246201]  kasan_report+0x141/0x180
[   22.246327]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.246421]  __asan_report_store4_noabort+0x1b/0x30
[   22.246499]  kasan_atomics_helper+0x4b3a/0x5450
[   22.246580]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.246660]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.246782]  ? kasan_save_alloc_info+0x3b/0x50
[   22.246869]  ? kasan_atomics+0x152/0x310
[   22.246978]  kasan_atomics+0x1dc/0x310
[   22.247099]  ? __pfx_kasan_atomics+0x10/0x10
[   22.247202]  ? __pfx_read_tsc+0x10/0x10
[   22.247276]  ? ktime_get_ts64+0x86/0x230
[   22.247335]  kunit_try_run_case+0x1a5/0x480
[   22.247377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.247413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.247459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.247539]  ? __kthread_parkme+0x82/0x180
[   22.247651]  ? preempt_count_sub+0x50/0x80
[   22.247738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.247826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.247933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.248061]  kthread+0x337/0x6f0
[   22.248137]  ? trace_preempt_on+0x20/0xc0
[   22.248218]  ? __pfx_kthread+0x10/0x10
[   22.248277]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.248312]  ? calculate_sigpending+0x7b/0xa0
[   22.248347]  ? __pfx_kthread+0x10/0x10
[   22.248382]  ret_from_fork+0x116/0x1d0
[   22.248412]  ? __pfx_kthread+0x10/0x10
[   22.248444]  ret_from_fork_asm+0x1a/0x30
[   22.248487]  </TASK>
[   22.248505] 
[   22.264919] Allocated by task 283:
[   22.265293]  kasan_save_stack+0x45/0x70
[   22.265783]  kasan_save_track+0x18/0x40
[   22.266215]  kasan_save_alloc_info+0x3b/0x50
[   22.266594]  __kasan_kmalloc+0xb7/0xc0
[   22.266974]  __kmalloc_cache_noprof+0x189/0x420
[   22.267726]  kasan_atomics+0x95/0x310
[   22.268200]  kunit_try_run_case+0x1a5/0x480
[   22.268558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.269023]  kthread+0x337/0x6f0
[   22.270703]  ret_from_fork+0x116/0x1d0
[   22.271160]  ret_from_fork_asm+0x1a/0x30
[   22.271612] 
[   22.271842] The buggy address belongs to the object at ffff8881038ee700
[   22.271842]  which belongs to the cache kmalloc-64 of size 64
[   22.273705] The buggy address is located 0 bytes to the right of
[   22.273705]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.274457] 
[   22.275690] The buggy address belongs to the physical page:
[   22.276470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.277418] flags: 0x200000000000000(node=0|zone=2)
[   22.277932] page_type: f5(slab)
[   22.278336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.279007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.279713] page dumped because: kasan: bad access detected
[   22.280237] 
[   22.280500] Memory state around the buggy address:
[   22.280996]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.281621]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.282331] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.283117]                                      ^
[   22.283608]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.284204]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.284920] ==================================================================
[   23.099897] ==================================================================
[   23.100781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   23.101410] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.102100] 
[   23.102395] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.102517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.102557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.102618] Call Trace:
[   23.102660]  <TASK>
[   23.102704]  dump_stack_lvl+0x73/0xb0
[   23.102788]  print_report+0xd1/0x650
[   23.102866]  ? __virt_addr_valid+0x1db/0x2d0
[   23.103006]  ? kasan_atomics_helper+0x4a36/0x5450
[   23.103095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.103213]  ? kasan_atomics_helper+0x4a36/0x5450
[   23.103303]  kasan_report+0x141/0x180
[   23.103463]  ? kasan_atomics_helper+0x4a36/0x5450
[   23.103559]  __asan_report_load4_noabort+0x18/0x20
[   23.103643]  kasan_atomics_helper+0x4a36/0x5450
[   23.103724]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.103804]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.103906]  ? kasan_save_alloc_info+0x3b/0x50
[   23.104032]  ? kasan_atomics+0x152/0x310
[   23.104126]  kasan_atomics+0x1dc/0x310
[   23.104217]  ? __pfx_kasan_atomics+0x10/0x10
[   23.104340]  ? __pfx_read_tsc+0x10/0x10
[   23.104421]  ? ktime_get_ts64+0x86/0x230
[   23.104509]  kunit_try_run_case+0x1a5/0x480
[   23.104581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.104622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.104657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.104695]  ? __kthread_parkme+0x82/0x180
[   23.104726]  ? preempt_count_sub+0x50/0x80
[   23.104759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.104796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.104831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.104867]  kthread+0x337/0x6f0
[   23.104927]  ? trace_preempt_on+0x20/0xc0
[   23.104962]  ? __pfx_kthread+0x10/0x10
[   23.104993]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.105026]  ? calculate_sigpending+0x7b/0xa0
[   23.105063]  ? __pfx_kthread+0x10/0x10
[   23.105102]  ret_from_fork+0x116/0x1d0
[   23.105173]  ? __pfx_kthread+0x10/0x10
[   23.105207]  ret_from_fork_asm+0x1a/0x30
[   23.105252]  </TASK>
[   23.105271] 
[   23.117705] Allocated by task 283:
[   23.118230]  kasan_save_stack+0x45/0x70
[   23.118687]  kasan_save_track+0x18/0x40
[   23.119145]  kasan_save_alloc_info+0x3b/0x50
[   23.119901]  __kasan_kmalloc+0xb7/0xc0
[   23.120442]  __kmalloc_cache_noprof+0x189/0x420
[   23.120965]  kasan_atomics+0x95/0x310
[   23.121357]  kunit_try_run_case+0x1a5/0x480
[   23.121655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.122189]  kthread+0x337/0x6f0
[   23.122661]  ret_from_fork+0x116/0x1d0
[   23.123162]  ret_from_fork_asm+0x1a/0x30
[   23.123601] 
[   23.124181] The buggy address belongs to the object at ffff8881038ee700
[   23.124181]  which belongs to the cache kmalloc-64 of size 64
[   23.125296] The buggy address is located 0 bytes to the right of
[   23.125296]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.126389] 
[   23.126634] The buggy address belongs to the physical page:
[   23.128041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.130310] flags: 0x200000000000000(node=0|zone=2)
[   23.130676] page_type: f5(slab)
[   23.133200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.133859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.135525] page dumped because: kasan: bad access detected
[   23.135820] 
[   23.135980] Memory state around the buggy address:
[   23.136256]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.136613]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.137627] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.138134]                                      ^
[   23.139430]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.140631]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.141118] ==================================================================
[   24.434030] ==================================================================
[   24.435557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   24.436175] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.436788] 
[   24.437869] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.437981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.438002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.438034] Call Trace:
[   24.438053]  <TASK>
[   24.438070]  dump_stack_lvl+0x73/0xb0
[   24.438153]  print_report+0xd1/0x650
[   24.438193]  ? __virt_addr_valid+0x1db/0x2d0
[   24.438228]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.438271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.438306]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.438339]  kasan_report+0x141/0x180
[   24.438373]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.438414]  kasan_check_range+0x10c/0x1c0
[   24.438448]  __kasan_check_write+0x18/0x20
[   24.438477]  kasan_atomics_helper+0x1f43/0x5450
[   24.438509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.438542]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.438578]  ? kasan_save_alloc_info+0x3b/0x50
[   24.438614]  ? kasan_atomics+0x152/0x310
[   24.438652]  kasan_atomics+0x1dc/0x310
[   24.438686]  ? __pfx_kasan_atomics+0x10/0x10
[   24.438723]  ? __pfx_read_tsc+0x10/0x10
[   24.438753]  ? ktime_get_ts64+0x86/0x230
[   24.438786]  kunit_try_run_case+0x1a5/0x480
[   24.438822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.438857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.438918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.438957]  ? __kthread_parkme+0x82/0x180
[   24.438988]  ? preempt_count_sub+0x50/0x80
[   24.439022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.439059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.439100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.439174]  kthread+0x337/0x6f0
[   24.439205]  ? trace_preempt_on+0x20/0xc0
[   24.439239]  ? __pfx_kthread+0x10/0x10
[   24.439270]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.439302]  ? calculate_sigpending+0x7b/0xa0
[   24.439337]  ? __pfx_kthread+0x10/0x10
[   24.439370]  ret_from_fork+0x116/0x1d0
[   24.439397]  ? __pfx_kthread+0x10/0x10
[   24.439428]  ret_from_fork_asm+0x1a/0x30
[   24.439470]  </TASK>
[   24.439487] 
[   24.459011] Allocated by task 283:
[   24.459486]  kasan_save_stack+0x45/0x70
[   24.460256]  kasan_save_track+0x18/0x40
[   24.460581]  kasan_save_alloc_info+0x3b/0x50
[   24.460947]  __kasan_kmalloc+0xb7/0xc0
[   24.461651]  __kmalloc_cache_noprof+0x189/0x420
[   24.462285]  kasan_atomics+0x95/0x310
[   24.462790]  kunit_try_run_case+0x1a5/0x480
[   24.463413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.463936]  kthread+0x337/0x6f0
[   24.464360]  ret_from_fork+0x116/0x1d0
[   24.465010]  ret_from_fork_asm+0x1a/0x30
[   24.465540] 
[   24.465896] The buggy address belongs to the object at ffff8881038ee700
[   24.465896]  which belongs to the cache kmalloc-64 of size 64
[   24.467090] The buggy address is located 0 bytes to the right of
[   24.467090]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.468442] 
[   24.468681] The buggy address belongs to the physical page:
[   24.469391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.470212] flags: 0x200000000000000(node=0|zone=2)
[   24.470716] page_type: f5(slab)
[   24.471152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.471765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.472435] page dumped because: kasan: bad access detected
[   24.472931] 
[   24.473229] Memory state around the buggy address:
[   24.473681]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.474380]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.475030] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.475650]                                      ^
[   24.476189]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.476718]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.477452] ==================================================================
[   24.572690] ==================================================================
[   24.573175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   24.575051] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.575632] 
[   24.576225] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.576295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.576315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.576348] Call Trace:
[   24.576367]  <TASK>
[   24.576386]  dump_stack_lvl+0x73/0xb0
[   24.576431]  print_report+0xd1/0x650
[   24.576467]  ? __virt_addr_valid+0x1db/0x2d0
[   24.576501]  ? kasan_atomics_helper+0x4f98/0x5450
[   24.576532]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.576567]  ? kasan_atomics_helper+0x4f98/0x5450
[   24.576600]  kasan_report+0x141/0x180
[   24.576632]  ? kasan_atomics_helper+0x4f98/0x5450
[   24.576670]  __asan_report_load8_noabort+0x18/0x20
[   24.576707]  kasan_atomics_helper+0x4f98/0x5450
[   24.576740]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.576772]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.576808]  ? kasan_save_alloc_info+0x3b/0x50
[   24.576842]  ? kasan_atomics+0x152/0x310
[   24.576902]  kasan_atomics+0x1dc/0x310
[   24.576941]  ? __pfx_kasan_atomics+0x10/0x10
[   24.576979]  ? __pfx_read_tsc+0x10/0x10
[   24.577009]  ? ktime_get_ts64+0x86/0x230
[   24.577044]  kunit_try_run_case+0x1a5/0x480
[   24.577079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.577150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.577191]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.577228]  ? __kthread_parkme+0x82/0x180
[   24.577259]  ? preempt_count_sub+0x50/0x80
[   24.577291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.577328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.577364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.577403]  kthread+0x337/0x6f0
[   24.577432]  ? trace_preempt_on+0x20/0xc0
[   24.577466]  ? __pfx_kthread+0x10/0x10
[   24.577497]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.577530]  ? calculate_sigpending+0x7b/0xa0
[   24.577564]  ? __pfx_kthread+0x10/0x10
[   24.577595]  ret_from_fork+0x116/0x1d0
[   24.577622]  ? __pfx_kthread+0x10/0x10
[   24.577651]  ret_from_fork_asm+0x1a/0x30
[   24.577693]  </TASK>
[   24.577711] 
[   24.597380] Allocated by task 283:
[   24.597755]  kasan_save_stack+0x45/0x70
[   24.598188]  kasan_save_track+0x18/0x40
[   24.598588]  kasan_save_alloc_info+0x3b/0x50
[   24.599683]  __kasan_kmalloc+0xb7/0xc0
[   24.600017]  __kmalloc_cache_noprof+0x189/0x420
[   24.600745]  kasan_atomics+0x95/0x310
[   24.601370]  kunit_try_run_case+0x1a5/0x480
[   24.601939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.602608]  kthread+0x337/0x6f0
[   24.603014]  ret_from_fork+0x116/0x1d0
[   24.603646]  ret_from_fork_asm+0x1a/0x30
[   24.604251] 
[   24.604481] The buggy address belongs to the object at ffff8881038ee700
[   24.604481]  which belongs to the cache kmalloc-64 of size 64
[   24.605920] The buggy address is located 0 bytes to the right of
[   24.605920]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.606942] 
[   24.607595] The buggy address belongs to the physical page:
[   24.608023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.608964] flags: 0x200000000000000(node=0|zone=2)
[   24.609427] page_type: f5(slab)
[   24.609800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.610778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.611569] page dumped because: kasan: bad access detected
[   24.612239] 
[   24.612436] Memory state around the buggy address:
[   24.613076]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.614108]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.614504] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.614751]                                      ^
[   24.615078]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.616567]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.617387] ==================================================================
[   23.142682] ==================================================================
[   23.143275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   23.144512] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.145171] 
[   23.145435] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.145555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.145598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.145657] Call Trace:
[   23.145682]  <TASK>
[   23.145703]  dump_stack_lvl+0x73/0xb0
[   23.145747]  print_report+0xd1/0x650
[   23.145781]  ? __virt_addr_valid+0x1db/0x2d0
[   23.145850]  ? kasan_atomics_helper+0x1079/0x5450
[   23.145934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.146014]  ? kasan_atomics_helper+0x1079/0x5450
[   23.146094]  kasan_report+0x141/0x180
[   23.146220]  ? kasan_atomics_helper+0x1079/0x5450
[   23.146321]  kasan_check_range+0x10c/0x1c0
[   23.146405]  __kasan_check_write+0x18/0x20
[   23.146480]  kasan_atomics_helper+0x1079/0x5450
[   23.146562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.146639]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.146718]  ? kasan_save_alloc_info+0x3b/0x50
[   23.146799]  ? kasan_atomics+0x152/0x310
[   23.146870]  kasan_atomics+0x1dc/0x310
[   23.146932]  ? __pfx_kasan_atomics+0x10/0x10
[   23.146972]  ? __pfx_read_tsc+0x10/0x10
[   23.147005]  ? ktime_get_ts64+0x86/0x230
[   23.147041]  kunit_try_run_case+0x1a5/0x480
[   23.147078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.147150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.147190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.147228]  ? __kthread_parkme+0x82/0x180
[   23.147271]  ? preempt_count_sub+0x50/0x80
[   23.147307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.147344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.147380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.147416]  kthread+0x337/0x6f0
[   23.147444]  ? trace_preempt_on+0x20/0xc0
[   23.147478]  ? __pfx_kthread+0x10/0x10
[   23.147508]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.147568]  ? calculate_sigpending+0x7b/0xa0
[   23.147605]  ? __pfx_kthread+0x10/0x10
[   23.147637]  ret_from_fork+0x116/0x1d0
[   23.147664]  ? __pfx_kthread+0x10/0x10
[   23.147695]  ret_from_fork_asm+0x1a/0x30
[   23.147737]  </TASK>
[   23.147754] 
[   23.160194] Allocated by task 283:
[   23.160812]  kasan_save_stack+0x45/0x70
[   23.161279]  kasan_save_track+0x18/0x40
[   23.161727]  kasan_save_alloc_info+0x3b/0x50
[   23.162180]  __kasan_kmalloc+0xb7/0xc0
[   23.162506]  __kmalloc_cache_noprof+0x189/0x420
[   23.162857]  kasan_atomics+0x95/0x310
[   23.163288]  kunit_try_run_case+0x1a5/0x480
[   23.163826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.164900]  kthread+0x337/0x6f0
[   23.166934]  ret_from_fork+0x116/0x1d0
[   23.167208]  ret_from_fork_asm+0x1a/0x30
[   23.167464] 
[   23.167864] The buggy address belongs to the object at ffff8881038ee700
[   23.167864]  which belongs to the cache kmalloc-64 of size 64
[   23.170545] The buggy address is located 0 bytes to the right of
[   23.170545]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.171171] 
[   23.171311] The buggy address belongs to the physical page:
[   23.171585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.172336] flags: 0x200000000000000(node=0|zone=2)
[   23.172626] page_type: f5(slab)
[   23.172840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.173338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.174588] page dumped because: kasan: bad access detected
[   23.175149] 
[   23.175371] Memory state around the buggy address:
[   23.175828]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.176254]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.177726] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.178613]                                      ^
[   23.179127]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.179930]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.180630] ==================================================================
[   23.273156] ==================================================================
[   23.274002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   23.274903] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.275820] 
[   23.276465] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.276589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.276612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.276659] Call Trace:
[   23.276684]  <TASK>
[   23.276706]  dump_stack_lvl+0x73/0xb0
[   23.276777]  print_report+0xd1/0x650
[   23.276826]  ? __virt_addr_valid+0x1db/0x2d0
[   23.276862]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.276944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.277023]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.277085]  kasan_report+0x141/0x180
[   23.277156]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.277199]  __asan_report_load4_noabort+0x18/0x20
[   23.277237]  kasan_atomics_helper+0x4a02/0x5450
[   23.277271]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.277306]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.277343]  ? kasan_save_alloc_info+0x3b/0x50
[   23.277378]  ? kasan_atomics+0x152/0x310
[   23.277417]  kasan_atomics+0x1dc/0x310
[   23.277451]  ? __pfx_kasan_atomics+0x10/0x10
[   23.277487]  ? __pfx_read_tsc+0x10/0x10
[   23.277519]  ? ktime_get_ts64+0x86/0x230
[   23.277555]  kunit_try_run_case+0x1a5/0x480
[   23.277591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.277628]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.277662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.277698]  ? __kthread_parkme+0x82/0x180
[   23.277727]  ? preempt_count_sub+0x50/0x80
[   23.277761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.277797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.277832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.277868]  kthread+0x337/0x6f0
[   23.277925]  ? trace_preempt_on+0x20/0xc0
[   23.277960]  ? __pfx_kthread+0x10/0x10
[   23.277991]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.278023]  ? calculate_sigpending+0x7b/0xa0
[   23.278058]  ? __pfx_kthread+0x10/0x10
[   23.278090]  ret_from_fork+0x116/0x1d0
[   23.278147]  ? __pfx_kthread+0x10/0x10
[   23.278181]  ret_from_fork_asm+0x1a/0x30
[   23.278225]  </TASK>
[   23.278243] 
[   23.295048] Allocated by task 283:
[   23.295344]  kasan_save_stack+0x45/0x70
[   23.295791]  kasan_save_track+0x18/0x40
[   23.296238]  kasan_save_alloc_info+0x3b/0x50
[   23.296710]  __kasan_kmalloc+0xb7/0xc0
[   23.297158]  __kmalloc_cache_noprof+0x189/0x420
[   23.297631]  kasan_atomics+0x95/0x310
[   23.298019]  kunit_try_run_case+0x1a5/0x480
[   23.298446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.298865]  kthread+0x337/0x6f0
[   23.299187]  ret_from_fork+0x116/0x1d0
[   23.299853]  ret_from_fork_asm+0x1a/0x30
[   23.300292] 
[   23.300537] The buggy address belongs to the object at ffff8881038ee700
[   23.300537]  which belongs to the cache kmalloc-64 of size 64
[   23.301609] The buggy address is located 0 bytes to the right of
[   23.301609]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.302386] 
[   23.302577] The buggy address belongs to the physical page:
[   23.303106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.303991] flags: 0x200000000000000(node=0|zone=2)
[   23.304706] page_type: f5(slab)
[   23.305109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.305639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.306393] page dumped because: kasan: bad access detected
[   23.306870] 
[   23.307079] Memory state around the buggy address:
[   23.307542]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.308173]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.308696] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.309165]                                      ^
[   23.309513]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.310183]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.311110] ==================================================================
[   24.256925] ==================================================================
[   24.258248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   24.260359] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.261869] 
[   24.262085] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.262185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.262217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.262280] Call Trace:
[   24.262311]  <TASK>
[   24.262340]  dump_stack_lvl+0x73/0xb0
[   24.262408]  print_report+0xd1/0x650
[   24.262464]  ? __virt_addr_valid+0x1db/0x2d0
[   24.262572]  ? kasan_atomics_helper+0x1ce1/0x5450
[   24.262653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.262737]  ? kasan_atomics_helper+0x1ce1/0x5450
[   24.263013]  kasan_report+0x141/0x180
[   24.263143]  ? kasan_atomics_helper+0x1ce1/0x5450
[   24.263236]  kasan_check_range+0x10c/0x1c0
[   24.263305]  __kasan_check_write+0x18/0x20
[   24.263356]  kasan_atomics_helper+0x1ce1/0x5450
[   24.263410]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.263467]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.263531]  ? kasan_save_alloc_info+0x3b/0x50
[   24.263607]  ? kasan_atomics+0x152/0x310
[   24.263690]  kasan_atomics+0x1dc/0x310
[   24.263770]  ? __pfx_kasan_atomics+0x10/0x10
[   24.263849]  ? __pfx_read_tsc+0x10/0x10
[   24.264489]  ? ktime_get_ts64+0x86/0x230
[   24.264574]  kunit_try_run_case+0x1a5/0x480
[   24.264658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.264734]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.264809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.264921]  ? __kthread_parkme+0x82/0x180
[   24.264998]  ? preempt_count_sub+0x50/0x80
[   24.265073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.265168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.265238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.265310]  kthread+0x337/0x6f0
[   24.265371]  ? trace_preempt_on+0x20/0xc0
[   24.265438]  ? __pfx_kthread+0x10/0x10
[   24.265497]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.265558]  ? calculate_sigpending+0x7b/0xa0
[   24.265626]  ? __pfx_kthread+0x10/0x10
[   24.265692]  ret_from_fork+0x116/0x1d0
[   24.265751]  ? __pfx_kthread+0x10/0x10
[   24.265821]  ret_from_fork_asm+0x1a/0x30
[   24.265927]  </TASK>
[   24.265964] 
[   24.283703] Allocated by task 283:
[   24.284127]  kasan_save_stack+0x45/0x70
[   24.284514]  kasan_save_track+0x18/0x40
[   24.284944]  kasan_save_alloc_info+0x3b/0x50
[   24.285448]  __kasan_kmalloc+0xb7/0xc0
[   24.285797]  __kmalloc_cache_noprof+0x189/0x420
[   24.286350]  kasan_atomics+0x95/0x310
[   24.286751]  kunit_try_run_case+0x1a5/0x480
[   24.287173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.287699]  kthread+0x337/0x6f0
[   24.288065]  ret_from_fork+0x116/0x1d0
[   24.288520]  ret_from_fork_asm+0x1a/0x30
[   24.288957] 
[   24.289233] The buggy address belongs to the object at ffff8881038ee700
[   24.289233]  which belongs to the cache kmalloc-64 of size 64
[   24.290084] The buggy address is located 0 bytes to the right of
[   24.290084]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.291142] 
[   24.291336] The buggy address belongs to the physical page:
[   24.291838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.292557] flags: 0x200000000000000(node=0|zone=2)
[   24.292981] page_type: f5(slab)
[   24.293397] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.294016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.294675] page dumped because: kasan: bad access detected
[   24.295070] 
[   24.295316] Memory state around the buggy address:
[   24.295664]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.296299]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.296982] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.297680]                                      ^
[   24.298228]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.298920]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.299409] ==================================================================
[   23.809021] ==================================================================
[   23.809719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   23.810427] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.810859] 
[   23.811098] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.811217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.811259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.811321] Call Trace:
[   23.811362]  <TASK>
[   23.811407]  dump_stack_lvl+0x73/0xb0
[   23.811496]  print_report+0xd1/0x650
[   23.811616]  ? __virt_addr_valid+0x1db/0x2d0
[   23.811702]  ? kasan_atomics_helper+0x16e7/0x5450
[   23.811778]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.811856]  ? kasan_atomics_helper+0x16e7/0x5450
[   23.811953]  kasan_report+0x141/0x180
[   23.812031]  ? kasan_atomics_helper+0x16e7/0x5450
[   23.812121]  kasan_check_range+0x10c/0x1c0
[   23.812214]  __kasan_check_write+0x18/0x20
[   23.812326]  kasan_atomics_helper+0x16e7/0x5450
[   23.812417]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.812537]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.812624]  ? kasan_save_alloc_info+0x3b/0x50
[   23.812709]  ? kasan_atomics+0x152/0x310
[   23.812798]  kasan_atomics+0x1dc/0x310
[   23.812897]  ? __pfx_kasan_atomics+0x10/0x10
[   23.812986]  ? __pfx_read_tsc+0x10/0x10
[   23.813059]  ? ktime_get_ts64+0x86/0x230
[   23.813161]  kunit_try_run_case+0x1a5/0x480
[   23.813251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.813308]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.813349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.813389]  ? __kthread_parkme+0x82/0x180
[   23.813421]  ? preempt_count_sub+0x50/0x80
[   23.813454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.813491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.813528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.813566]  kthread+0x337/0x6f0
[   23.813594]  ? trace_preempt_on+0x20/0xc0
[   23.813629]  ? __pfx_kthread+0x10/0x10
[   23.813659]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.813691]  ? calculate_sigpending+0x7b/0xa0
[   23.813727]  ? __pfx_kthread+0x10/0x10
[   23.813760]  ret_from_fork+0x116/0x1d0
[   23.813787]  ? __pfx_kthread+0x10/0x10
[   23.813818]  ret_from_fork_asm+0x1a/0x30
[   23.813860]  </TASK>
[   23.813901] 
[   23.835318] Allocated by task 283:
[   23.835693]  kasan_save_stack+0x45/0x70
[   23.836139]  kasan_save_track+0x18/0x40
[   23.836495]  kasan_save_alloc_info+0x3b/0x50
[   23.836962]  __kasan_kmalloc+0xb7/0xc0
[   23.837474]  __kmalloc_cache_noprof+0x189/0x420
[   23.837834]  kasan_atomics+0x95/0x310
[   23.838483]  kunit_try_run_case+0x1a5/0x480
[   23.838999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.839700]  kthread+0x337/0x6f0
[   23.840228]  ret_from_fork+0x116/0x1d0
[   23.840672]  ret_from_fork_asm+0x1a/0x30
[   23.841230] 
[   23.841499] The buggy address belongs to the object at ffff8881038ee700
[   23.841499]  which belongs to the cache kmalloc-64 of size 64
[   23.842563] The buggy address is located 0 bytes to the right of
[   23.842563]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.843715] 
[   23.844053] The buggy address belongs to the physical page:
[   23.844624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.845524] flags: 0x200000000000000(node=0|zone=2)
[   23.846083] page_type: f5(slab)
[   23.846557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.847271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.847978] page dumped because: kasan: bad access detected
[   23.848562] 
[   23.848924] Memory state around the buggy address:
[   23.849498]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.850192]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.850813] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.851526]                                      ^
[   23.851993]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.852746]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.853405] ==================================================================
[   23.012374] ==================================================================
[   23.013070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   23.013680] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.014322] 
[   23.014555] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.014671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.014712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.014772] Call Trace:
[   23.014812]  <TASK>
[   23.014854]  dump_stack_lvl+0x73/0xb0
[   23.014963]  print_report+0xd1/0x650
[   23.015046]  ? __virt_addr_valid+0x1db/0x2d0
[   23.015128]  ? kasan_atomics_helper+0xf10/0x5450
[   23.015211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.015291]  ? kasan_atomics_helper+0xf10/0x5450
[   23.015373]  kasan_report+0x141/0x180
[   23.015455]  ? kasan_atomics_helper+0xf10/0x5450
[   23.015543]  kasan_check_range+0x10c/0x1c0
[   23.015628]  __kasan_check_write+0x18/0x20
[   23.015703]  kasan_atomics_helper+0xf10/0x5450
[   23.015788]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.015909]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.015997]  ? kasan_save_alloc_info+0x3b/0x50
[   23.016080]  ? kasan_atomics+0x152/0x310
[   23.016169]  kasan_atomics+0x1dc/0x310
[   23.016250]  ? __pfx_kasan_atomics+0x10/0x10
[   23.016333]  ? __pfx_read_tsc+0x10/0x10
[   23.016404]  ? ktime_get_ts64+0x86/0x230
[   23.016489]  kunit_try_run_case+0x1a5/0x480
[   23.016571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.016648]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.016725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.016808]  ? __kthread_parkme+0x82/0x180
[   23.016902]  ? preempt_count_sub+0x50/0x80
[   23.016984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.017068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.017139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.017215]  kthread+0x337/0x6f0
[   23.017286]  ? trace_preempt_on+0x20/0xc0
[   23.017367]  ? __pfx_kthread+0x10/0x10
[   23.017445]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.017527]  ? calculate_sigpending+0x7b/0xa0
[   23.017608]  ? __pfx_kthread+0x10/0x10
[   23.017683]  ret_from_fork+0x116/0x1d0
[   23.017754]  ? __pfx_kthread+0x10/0x10
[   23.017831]  ret_from_fork_asm+0x1a/0x30
[   23.017946]  </TASK>
[   23.017990] 
[   23.032900] Allocated by task 283:
[   23.033388]  kasan_save_stack+0x45/0x70
[   23.033811]  kasan_save_track+0x18/0x40
[   23.034387]  kasan_save_alloc_info+0x3b/0x50
[   23.034837]  __kasan_kmalloc+0xb7/0xc0
[   23.035341]  __kmalloc_cache_noprof+0x189/0x420
[   23.035739]  kasan_atomics+0x95/0x310
[   23.036147]  kunit_try_run_case+0x1a5/0x480
[   23.036608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.037122]  kthread+0x337/0x6f0
[   23.037498]  ret_from_fork+0x116/0x1d0
[   23.037816]  ret_from_fork_asm+0x1a/0x30
[   23.038248] 
[   23.038499] The buggy address belongs to the object at ffff8881038ee700
[   23.038499]  which belongs to the cache kmalloc-64 of size 64
[   23.039811] The buggy address is located 0 bytes to the right of
[   23.039811]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.040718] 
[   23.040973] The buggy address belongs to the physical page:
[   23.041655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.042472] flags: 0x200000000000000(node=0|zone=2)
[   23.042910] page_type: f5(slab)
[   23.043235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.043722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.044378] page dumped because: kasan: bad access detected
[   23.044941] 
[   23.045200] Memory state around the buggy address:
[   23.045671]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.046296]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.046895] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.047460]                                      ^
[   23.047806]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.048532]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.049149] ==================================================================
[   22.370774] ==================================================================
[   22.371430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   22.372239] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.372909] 
[   22.373187] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.373318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.373363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.373428] Call Trace:
[   22.373471]  <TASK>
[   22.373497]  dump_stack_lvl+0x73/0xb0
[   22.373545]  print_report+0xd1/0x650
[   22.373583]  ? __virt_addr_valid+0x1db/0x2d0
[   22.373658]  ? kasan_atomics_helper+0x697/0x5450
[   22.373732]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.373816]  ? kasan_atomics_helper+0x697/0x5450
[   22.374296]  kasan_report+0x141/0x180
[   22.374387]  ? kasan_atomics_helper+0x697/0x5450
[   22.374478]  kasan_check_range+0x10c/0x1c0
[   22.374560]  __kasan_check_write+0x18/0x20
[   22.374630]  kasan_atomics_helper+0x697/0x5450
[   22.374708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.374788]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.374868]  ? kasan_save_alloc_info+0x3b/0x50
[   22.374970]  ? kasan_atomics+0x152/0x310
[   22.375054]  kasan_atomics+0x1dc/0x310
[   22.375176]  ? __pfx_kasan_atomics+0x10/0x10
[   22.375221]  ? __pfx_read_tsc+0x10/0x10
[   22.375255]  ? ktime_get_ts64+0x86/0x230
[   22.375293]  kunit_try_run_case+0x1a5/0x480
[   22.375331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.375367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.375401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.375436]  ? __kthread_parkme+0x82/0x180
[   22.375466]  ? preempt_count_sub+0x50/0x80
[   22.375499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.375535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.375570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.375606]  kthread+0x337/0x6f0
[   22.375634]  ? trace_preempt_on+0x20/0xc0
[   22.375667]  ? __pfx_kthread+0x10/0x10
[   22.375697]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.375729]  ? calculate_sigpending+0x7b/0xa0
[   22.375763]  ? __pfx_kthread+0x10/0x10
[   22.375794]  ret_from_fork+0x116/0x1d0
[   22.375820]  ? __pfx_kthread+0x10/0x10
[   22.375850]  ret_from_fork_asm+0x1a/0x30
[   22.375915]  </TASK>
[   22.375936] 
[   22.397203] Allocated by task 283:
[   22.397496]  kasan_save_stack+0x45/0x70
[   22.397805]  kasan_save_track+0x18/0x40
[   22.398659]  kasan_save_alloc_info+0x3b/0x50
[   22.401413]  __kasan_kmalloc+0xb7/0xc0
[   22.401995]  __kmalloc_cache_noprof+0x189/0x420
[   22.402823]  kasan_atomics+0x95/0x310
[   22.404020]  kunit_try_run_case+0x1a5/0x480
[   22.404728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.405232]  kthread+0x337/0x6f0
[   22.405582]  ret_from_fork+0x116/0x1d0
[   22.406065]  ret_from_fork_asm+0x1a/0x30
[   22.406470] 
[   22.406711] The buggy address belongs to the object at ffff8881038ee700
[   22.406711]  which belongs to the cache kmalloc-64 of size 64
[   22.408468] The buggy address is located 0 bytes to the right of
[   22.408468]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.409940] 
[   22.410151] The buggy address belongs to the physical page:
[   22.410633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.411826] flags: 0x200000000000000(node=0|zone=2)
[   22.412225] page_type: f5(slab)
[   22.412899] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.413785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.414616] page dumped because: kasan: bad access detected
[   22.415486] 
[   22.415728] Memory state around the buggy address:
[   22.416496]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.417362]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.418498] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.419008]                                      ^
[   22.419475]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.420649]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.421494] ==================================================================
[   22.878406] ==================================================================
[   22.879332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   22.879922] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.880565] 
[   22.880774] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.880911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.880956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.881017] Call Trace:
[   22.881060]  <TASK>
[   22.881103]  dump_stack_lvl+0x73/0xb0
[   22.881194]  print_report+0xd1/0x650
[   22.881278]  ? __virt_addr_valid+0x1db/0x2d0
[   22.881359]  ? kasan_atomics_helper+0xd47/0x5450
[   22.881433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.881493]  ? kasan_atomics_helper+0xd47/0x5450
[   22.881570]  kasan_report+0x141/0x180
[   22.881651]  ? kasan_atomics_helper+0xd47/0x5450
[   22.881742]  kasan_check_range+0x10c/0x1c0
[   22.881823]  __kasan_check_write+0x18/0x20
[   22.882071]  kasan_atomics_helper+0xd47/0x5450
[   22.882164]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.882245]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.882341]  ? kasan_save_alloc_info+0x3b/0x50
[   22.882424]  ? kasan_atomics+0x152/0x310
[   22.882512]  kasan_atomics+0x1dc/0x310
[   22.882605]  ? __pfx_kasan_atomics+0x10/0x10
[   22.882685]  ? __pfx_read_tsc+0x10/0x10
[   22.882739]  ? ktime_get_ts64+0x86/0x230
[   22.882820]  kunit_try_run_case+0x1a5/0x480
[   22.882925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.883007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.883091]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.883202]  ? __kthread_parkme+0x82/0x180
[   22.883277]  ? preempt_count_sub+0x50/0x80
[   22.883356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.883440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.883518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.883601]  kthread+0x337/0x6f0
[   22.883672]  ? trace_preempt_on+0x20/0xc0
[   22.883748]  ? __pfx_kthread+0x10/0x10
[   22.883819]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.883915]  ? calculate_sigpending+0x7b/0xa0
[   22.883996]  ? __pfx_kthread+0x10/0x10
[   22.884069]  ret_from_fork+0x116/0x1d0
[   22.884138]  ? __pfx_kthread+0x10/0x10
[   22.884212]  ret_from_fork_asm+0x1a/0x30
[   22.884306]  </TASK>
[   22.884344] 
[   22.899360] Allocated by task 283:
[   22.899640]  kasan_save_stack+0x45/0x70
[   22.900006]  kasan_save_track+0x18/0x40
[   22.900449]  kasan_save_alloc_info+0x3b/0x50
[   22.900913]  __kasan_kmalloc+0xb7/0xc0
[   22.901505]  __kmalloc_cache_noprof+0x189/0x420
[   22.902012]  kasan_atomics+0x95/0x310
[   22.902556]  kunit_try_run_case+0x1a5/0x480
[   22.902919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.903723]  kthread+0x337/0x6f0
[   22.904113]  ret_from_fork+0x116/0x1d0
[   22.904488]  ret_from_fork_asm+0x1a/0x30
[   22.904848] 
[   22.905055] The buggy address belongs to the object at ffff8881038ee700
[   22.905055]  which belongs to the cache kmalloc-64 of size 64
[   22.905742] The buggy address is located 0 bytes to the right of
[   22.905742]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.906749] 
[   22.907002] The buggy address belongs to the physical page:
[   22.907892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.909024] flags: 0x200000000000000(node=0|zone=2)
[   22.909535] page_type: f5(slab)
[   22.909864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.910561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.911068] page dumped because: kasan: bad access detected
[   22.911574] 
[   22.911806] Memory state around the buggy address:
[   22.912381]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.912946]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.913569] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.914152]                                      ^
[   22.914575]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.915086]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.915718] ==================================================================
[   24.077106] ==================================================================
[   24.077988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   24.078480] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   24.079241] 
[   24.079549] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   24.079668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.079710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.079771] Call Trace:
[   24.079811]  <TASK>
[   24.079854]  dump_stack_lvl+0x73/0xb0
[   24.080029]  print_report+0xd1/0x650
[   24.080156]  ? __virt_addr_valid+0x1db/0x2d0
[   24.080239]  ? kasan_atomics_helper+0x1a7f/0x5450
[   24.080320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.080401]  ? kasan_atomics_helper+0x1a7f/0x5450
[   24.080481]  kasan_report+0x141/0x180
[   24.080606]  ? kasan_atomics_helper+0x1a7f/0x5450
[   24.080691]  kasan_check_range+0x10c/0x1c0
[   24.080774]  __kasan_check_write+0x18/0x20
[   24.080844]  kasan_atomics_helper+0x1a7f/0x5450
[   24.080940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.081015]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.081098]  ? kasan_save_alloc_info+0x3b/0x50
[   24.081173]  ? kasan_atomics+0x152/0x310
[   24.081252]  kasan_atomics+0x1dc/0x310
[   24.081328]  ? __pfx_kasan_atomics+0x10/0x10
[   24.081870]  ? __pfx_read_tsc+0x10/0x10
[   24.081970]  ? ktime_get_ts64+0x86/0x230
[   24.082054]  kunit_try_run_case+0x1a5/0x480
[   24.082158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.082242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.082337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.082379]  ? __kthread_parkme+0x82/0x180
[   24.082412]  ? preempt_count_sub+0x50/0x80
[   24.082447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.082484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.082521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.082559]  kthread+0x337/0x6f0
[   24.082587]  ? trace_preempt_on+0x20/0xc0
[   24.082621]  ? __pfx_kthread+0x10/0x10
[   24.082652]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.082686]  ? calculate_sigpending+0x7b/0xa0
[   24.082722]  ? __pfx_kthread+0x10/0x10
[   24.082755]  ret_from_fork+0x116/0x1d0
[   24.082782]  ? __pfx_kthread+0x10/0x10
[   24.082813]  ret_from_fork_asm+0x1a/0x30
[   24.082859]  </TASK>
[   24.082896] 
[   24.102012] Allocated by task 283:
[   24.102558]  kasan_save_stack+0x45/0x70
[   24.103045]  kasan_save_track+0x18/0x40
[   24.103536]  kasan_save_alloc_info+0x3b/0x50
[   24.103959]  __kasan_kmalloc+0xb7/0xc0
[   24.104283]  __kmalloc_cache_noprof+0x189/0x420
[   24.104937]  kasan_atomics+0x95/0x310
[   24.105356]  kunit_try_run_case+0x1a5/0x480
[   24.105959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.106888]  kthread+0x337/0x6f0
[   24.107212]  ret_from_fork+0x116/0x1d0
[   24.107525]  ret_from_fork_asm+0x1a/0x30
[   24.107964] 
[   24.108315] The buggy address belongs to the object at ffff8881038ee700
[   24.108315]  which belongs to the cache kmalloc-64 of size 64
[   24.109618] The buggy address is located 0 bytes to the right of
[   24.109618]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   24.111501] 
[   24.111698] The buggy address belongs to the physical page:
[   24.112463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   24.113117] flags: 0x200000000000000(node=0|zone=2)
[   24.113591] page_type: f5(slab)
[   24.113975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.114896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.115671] page dumped because: kasan: bad access detected
[   24.116237] 
[   24.116608] Memory state around the buggy address:
[   24.117039]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.118038]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.118715] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.119331]                                      ^
[   24.119521]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.119765]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.120162] ==================================================================
[   23.543130] ==================================================================
[   23.544154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   23.544798] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.545989] 
[   23.546293] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.546646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.546672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.546705] Call Trace:
[   23.546728]  <TASK>
[   23.546749]  dump_stack_lvl+0x73/0xb0
[   23.546793]  print_report+0xd1/0x650
[   23.546827]  ? __virt_addr_valid+0x1db/0x2d0
[   23.546859]  ? kasan_atomics_helper+0x4eae/0x5450
[   23.546919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.546955]  ? kasan_atomics_helper+0x4eae/0x5450
[   23.546988]  kasan_report+0x141/0x180
[   23.547022]  ? kasan_atomics_helper+0x4eae/0x5450
[   23.547060]  __asan_report_load8_noabort+0x18/0x20
[   23.547104]  kasan_atomics_helper+0x4eae/0x5450
[   23.547178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.547213]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.547249]  ? kasan_save_alloc_info+0x3b/0x50
[   23.547284]  ? kasan_atomics+0x152/0x310
[   23.547322]  kasan_atomics+0x1dc/0x310
[   23.547355]  ? __pfx_kasan_atomics+0x10/0x10
[   23.547393]  ? __pfx_read_tsc+0x10/0x10
[   23.547424]  ? ktime_get_ts64+0x86/0x230
[   23.547459]  kunit_try_run_case+0x1a5/0x480
[   23.547495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.547530]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.547565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.547600]  ? __kthread_parkme+0x82/0x180
[   23.547630]  ? preempt_count_sub+0x50/0x80
[   23.547663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.547700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.547735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.547771]  kthread+0x337/0x6f0
[   23.547801]  ? trace_preempt_on+0x20/0xc0
[   23.547835]  ? __pfx_kthread+0x10/0x10
[   23.547865]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.547928]  ? calculate_sigpending+0x7b/0xa0
[   23.547965]  ? __pfx_kthread+0x10/0x10
[   23.547998]  ret_from_fork+0x116/0x1d0
[   23.548026]  ? __pfx_kthread+0x10/0x10
[   23.548056]  ret_from_fork_asm+0x1a/0x30
[   23.548104]  </TASK>
[   23.548139] 
[   23.568721] Allocated by task 283:
[   23.569102]  kasan_save_stack+0x45/0x70
[   23.569992]  kasan_save_track+0x18/0x40
[   23.570556]  kasan_save_alloc_info+0x3b/0x50
[   23.571166]  __kasan_kmalloc+0xb7/0xc0
[   23.571725]  __kmalloc_cache_noprof+0x189/0x420
[   23.572398]  kasan_atomics+0x95/0x310
[   23.572976]  kunit_try_run_case+0x1a5/0x480
[   23.573538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.574037]  kthread+0x337/0x6f0
[   23.574768]  ret_from_fork+0x116/0x1d0
[   23.575428]  ret_from_fork_asm+0x1a/0x30
[   23.576034] 
[   23.576260] The buggy address belongs to the object at ffff8881038ee700
[   23.576260]  which belongs to the cache kmalloc-64 of size 64
[   23.577113] The buggy address is located 0 bytes to the right of
[   23.577113]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.578534] 
[   23.579062] The buggy address belongs to the physical page:
[   23.579530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.580446] flags: 0x200000000000000(node=0|zone=2)
[   23.581065] page_type: f5(slab)
[   23.581557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.582392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.583174] page dumped because: kasan: bad access detected
[   23.583826] 
[   23.584256] Memory state around the buggy address:
[   23.584891]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.585810]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.586357] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.587145]                                      ^
[   23.587689]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.588332]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.588849] ==================================================================
[   23.669306] ==================================================================
[   23.670722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   23.671533] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.673152] 
[   23.673426] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.673493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.673513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.673545] Call Trace:
[   23.673566]  <TASK>
[   23.673585]  dump_stack_lvl+0x73/0xb0
[   23.673631]  print_report+0xd1/0x650
[   23.673664]  ? __virt_addr_valid+0x1db/0x2d0
[   23.673695]  ? kasan_atomics_helper+0x151d/0x5450
[   23.673728]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.673760]  ? kasan_atomics_helper+0x151d/0x5450
[   23.673791]  kasan_report+0x141/0x180
[   23.673824]  ? kasan_atomics_helper+0x151d/0x5450
[   23.673861]  kasan_check_range+0x10c/0x1c0
[   23.673950]  __kasan_check_write+0x18/0x20
[   23.674024]  kasan_atomics_helper+0x151d/0x5450
[   23.674146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.674256]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.674326]  ? kasan_save_alloc_info+0x3b/0x50
[   23.674367]  ? kasan_atomics+0x152/0x310
[   23.674406]  kasan_atomics+0x1dc/0x310
[   23.674440]  ? __pfx_kasan_atomics+0x10/0x10
[   23.674476]  ? __pfx_read_tsc+0x10/0x10
[   23.674506]  ? ktime_get_ts64+0x86/0x230
[   23.674543]  kunit_try_run_case+0x1a5/0x480
[   23.674579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.674616]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.674651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.674687]  ? __kthread_parkme+0x82/0x180
[   23.674716]  ? preempt_count_sub+0x50/0x80
[   23.674749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.674786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.674821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.674855]  kthread+0x337/0x6f0
[   23.674917]  ? trace_preempt_on+0x20/0xc0
[   23.674960]  ? __pfx_kthread+0x10/0x10
[   23.675009]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.675048]  ? calculate_sigpending+0x7b/0xa0
[   23.675084]  ? __pfx_kthread+0x10/0x10
[   23.675181]  ret_from_fork+0x116/0x1d0
[   23.675215]  ? __pfx_kthread+0x10/0x10
[   23.675247]  ret_from_fork_asm+0x1a/0x30
[   23.675289]  </TASK>
[   23.675306] 
[   23.696933] Allocated by task 283:
[   23.697568]  kasan_save_stack+0x45/0x70
[   23.697976]  kasan_save_track+0x18/0x40
[   23.698500]  kasan_save_alloc_info+0x3b/0x50
[   23.699298]  __kasan_kmalloc+0xb7/0xc0
[   23.699855]  __kmalloc_cache_noprof+0x189/0x420
[   23.700079]  kasan_atomics+0x95/0x310
[   23.700841]  kunit_try_run_case+0x1a5/0x480
[   23.701235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.701629]  kthread+0x337/0x6f0
[   23.701907]  ret_from_fork+0x116/0x1d0
[   23.702075]  ret_from_fork_asm+0x1a/0x30
[   23.702778] 
[   23.703151] The buggy address belongs to the object at ffff8881038ee700
[   23.703151]  which belongs to the cache kmalloc-64 of size 64
[   23.704631] The buggy address is located 0 bytes to the right of
[   23.704631]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.705654] 
[   23.706491] The buggy address belongs to the physical page:
[   23.706916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.707600] flags: 0x200000000000000(node=0|zone=2)
[   23.708021] page_type: f5(slab)
[   23.708741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.709252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.710086] page dumped because: kasan: bad access detected
[   23.710651] 
[   23.710902] Memory state around the buggy address:
[   23.711789]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.712578]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.713352] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.714045]                                      ^
[   23.714587]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.715242]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.715809] ==================================================================
[   22.840935] ==================================================================
[   22.842376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   22.843416] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   22.844221] 
[   22.844491] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.844654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.844698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.844757] Call Trace:
[   22.844803]  <TASK>
[   22.844846]  dump_stack_lvl+0x73/0xb0
[   22.844996]  print_report+0xd1/0x650
[   22.845078]  ? __virt_addr_valid+0x1db/0x2d0
[   22.845223]  ? kasan_atomics_helper+0x4a84/0x5450
[   22.845323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.845406]  ? kasan_atomics_helper+0x4a84/0x5450
[   22.845482]  kasan_report+0x141/0x180
[   22.845521]  ? kasan_atomics_helper+0x4a84/0x5450
[   22.845562]  __asan_report_load4_noabort+0x18/0x20
[   22.845599]  kasan_atomics_helper+0x4a84/0x5450
[   22.845633]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.845666]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.845702]  ? kasan_save_alloc_info+0x3b/0x50
[   22.845736]  ? kasan_atomics+0x152/0x310
[   22.845774]  kasan_atomics+0x1dc/0x310
[   22.845807]  ? __pfx_kasan_atomics+0x10/0x10
[   22.845843]  ? __pfx_read_tsc+0x10/0x10
[   22.845894]  ? ktime_get_ts64+0x86/0x230
[   22.845939]  kunit_try_run_case+0x1a5/0x480
[   22.845978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.846015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.846052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.846087]  ? __kthread_parkme+0x82/0x180
[   22.846176]  ? preempt_count_sub+0x50/0x80
[   22.846212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.846250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.846301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.846337]  kthread+0x337/0x6f0
[   22.846367]  ? trace_preempt_on+0x20/0xc0
[   22.846400]  ? __pfx_kthread+0x10/0x10
[   22.846430]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.846463]  ? calculate_sigpending+0x7b/0xa0
[   22.846498]  ? __pfx_kthread+0x10/0x10
[   22.846529]  ret_from_fork+0x116/0x1d0
[   22.846556]  ? __pfx_kthread+0x10/0x10
[   22.846586]  ret_from_fork_asm+0x1a/0x30
[   22.846628]  </TASK>
[   22.846644] 
[   22.861788] Allocated by task 283:
[   22.862105]  kasan_save_stack+0x45/0x70
[   22.862452]  kasan_save_track+0x18/0x40
[   22.862779]  kasan_save_alloc_info+0x3b/0x50
[   22.863272]  __kasan_kmalloc+0xb7/0xc0
[   22.863706]  __kmalloc_cache_noprof+0x189/0x420
[   22.864312]  kasan_atomics+0x95/0x310
[   22.864744]  kunit_try_run_case+0x1a5/0x480
[   22.865109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.865640]  kthread+0x337/0x6f0
[   22.866040]  ret_from_fork+0x116/0x1d0
[   22.866481]  ret_from_fork_asm+0x1a/0x30
[   22.866870] 
[   22.867157] The buggy address belongs to the object at ffff8881038ee700
[   22.867157]  which belongs to the cache kmalloc-64 of size 64
[   22.868008] The buggy address is located 0 bytes to the right of
[   22.868008]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   22.868825] 
[   22.869082] The buggy address belongs to the physical page:
[   22.869585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   22.870434] flags: 0x200000000000000(node=0|zone=2)
[   22.870934] page_type: f5(slab)
[   22.871314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.871811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.872302] page dumped because: kasan: bad access detected
[   22.872674] 
[   22.872860] Memory state around the buggy address:
[   22.873323]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.874002]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.874652] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.875769]                                      ^
[   22.876264]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.876718]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.877466] ==================================================================
[   23.228745] ==================================================================
[   23.229965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   23.230486] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283
[   23.231911] 
[   23.232325] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.232390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.232410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.232440] Call Trace:
[   23.232460]  <TASK>
[   23.232479]  dump_stack_lvl+0x73/0xb0
[   23.232522]  print_report+0xd1/0x650
[   23.232556]  ? __virt_addr_valid+0x1db/0x2d0
[   23.232590]  ? kasan_atomics_helper+0x1148/0x5450
[   23.232620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.232654]  ? kasan_atomics_helper+0x1148/0x5450
[   23.232687]  kasan_report+0x141/0x180
[   23.232719]  ? kasan_atomics_helper+0x1148/0x5450
[   23.232757]  kasan_check_range+0x10c/0x1c0
[   23.232794]  __kasan_check_write+0x18/0x20
[   23.232824]  kasan_atomics_helper+0x1148/0x5450
[   23.232858]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.232943]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.233027]  ? kasan_save_alloc_info+0x3b/0x50
[   23.233090]  ? kasan_atomics+0x152/0x310
[   23.233330]  kasan_atomics+0x1dc/0x310
[   23.233479]  ? __pfx_kasan_atomics+0x10/0x10
[   23.233541]  ? __pfx_read_tsc+0x10/0x10
[   23.233577]  ? ktime_get_ts64+0x86/0x230
[   23.233615]  kunit_try_run_case+0x1a5/0x480
[   23.233652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.233688]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.233723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.233759]  ? __kthread_parkme+0x82/0x180
[   23.233789]  ? preempt_count_sub+0x50/0x80
[   23.233821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.233858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.233921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.233960]  kthread+0x337/0x6f0
[   23.233990]  ? trace_preempt_on+0x20/0xc0
[   23.234024]  ? __pfx_kthread+0x10/0x10
[   23.234054]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.234087]  ? calculate_sigpending+0x7b/0xa0
[   23.234153]  ? __pfx_kthread+0x10/0x10
[   23.234188]  ret_from_fork+0x116/0x1d0
[   23.234216]  ? __pfx_kthread+0x10/0x10
[   23.234247]  ret_from_fork_asm+0x1a/0x30
[   23.234303]  </TASK>
[   23.234320] 
[   23.250155] Allocated by task 283:
[   23.250458]  kasan_save_stack+0x45/0x70
[   23.250789]  kasan_save_track+0x18/0x40
[   23.254595]  kasan_save_alloc_info+0x3b/0x50
[   23.254973]  __kasan_kmalloc+0xb7/0xc0
[   23.255417]  __kmalloc_cache_noprof+0x189/0x420
[   23.255867]  kasan_atomics+0x95/0x310
[   23.256279]  kunit_try_run_case+0x1a5/0x480
[   23.256717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.257668]  kthread+0x337/0x6f0
[   23.257961]  ret_from_fork+0x116/0x1d0
[   23.258719]  ret_from_fork_asm+0x1a/0x30
[   23.259110] 
[   23.259731] The buggy address belongs to the object at ffff8881038ee700
[   23.259731]  which belongs to the cache kmalloc-64 of size 64
[   23.260572] The buggy address is located 0 bytes to the right of
[   23.260572]  allocated 48-byte region [ffff8881038ee700, ffff8881038ee730)
[   23.262034] 
[   23.262671] The buggy address belongs to the physical page:
[   23.263111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee
[   23.263827] flags: 0x200000000000000(node=0|zone=2)
[   23.264499] page_type: f5(slab)
[   23.264870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.265802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.266445] page dumped because: kasan: bad access detected
[   23.266854] 
[   23.267418] Memory state around the buggy address:
[   23.267746]  ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.268830]  ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.269306] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.270091]                                      ^
[   23.270546]  ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.271141]  ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.272040] ==================================================================