Hay
Date
July 19, 2025, 11:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.334883] ==================================================================
[   18.335224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.335288] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.335340] 
[   18.335550] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.335645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.335674] Hardware name: linux,dummy-virt (DT)
[   18.335708] Call trace:
[   18.335733]  show_stack+0x20/0x38 (C)
[   18.336356]  dump_stack_lvl+0x8c/0xd0
[   18.336475]  print_report+0x118/0x5d0
[   18.336544]  kasan_report+0xdc/0x128
[   18.336906]  kasan_check_range+0x100/0x1a8
[   18.337033]  __kasan_check_write+0x20/0x30
[   18.337293]  kasan_atomics_helper+0x17ec/0x4858
[   18.337490]  kasan_atomics+0x198/0x2e0
[   18.337575]  kunit_try_run_case+0x170/0x3f0
[   18.337628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.337784]  kthread+0x328/0x630
[   18.337874]  ret_from_fork+0x10/0x20
[   18.338273] 
[   18.338331] Allocated by task 266:
[   18.338585]  kasan_save_stack+0x3c/0x68
[   18.338804]  kasan_save_track+0x20/0x40
[   18.338887]  kasan_save_alloc_info+0x40/0x58
[   18.339018]  __kasan_kmalloc+0xd4/0xd8
[   18.339126]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.339269]  kasan_atomics+0xb8/0x2e0
[   18.339309]  kunit_try_run_case+0x170/0x3f0
[   18.339405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.339761]  kthread+0x328/0x630
[   18.340038]  ret_from_fork+0x10/0x20
[   18.340131] 
[   18.340303] The buggy address belongs to the object at fff00000c63b4480
[   18.340303]  which belongs to the cache kmalloc-64 of size 64
[   18.340391] The buggy address is located 0 bytes to the right of
[   18.340391]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.340853] 
[   18.340941] The buggy address belongs to the physical page:
[   18.340996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.341271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.341420] page_type: f5(slab)
[   18.341602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.341860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.342078] page dumped because: kasan: bad access detected
[   18.342247] 
[   18.342293] Memory state around the buggy address:
[   18.342331]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.342780]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.343156] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.343226]                                      ^
[   18.343276]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.343525]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.343714] ==================================================================
[   17.994306] ==================================================================
[   17.994379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   17.994706] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   17.994777] 
[   17.994812] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.994995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.995052] Hardware name: linux,dummy-virt (DT)
[   17.995228] Call trace:
[   17.995262]  show_stack+0x20/0x38 (C)
[   17.995475]  dump_stack_lvl+0x8c/0xd0
[   17.995692]  print_report+0x118/0x5d0
[   17.995929]  kasan_report+0xdc/0x128
[   17.996016]  kasan_check_range+0x100/0x1a8
[   17.996070]  __kasan_check_write+0x20/0x30
[   17.996136]  kasan_atomics_helper+0xad4/0x4858
[   17.996559]  kasan_atomics+0x198/0x2e0
[   17.996716]  kunit_try_run_case+0x170/0x3f0
[   17.996801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.996908]  kthread+0x328/0x630
[   17.996975]  ret_from_fork+0x10/0x20
[   17.997052] 
[   17.997092] Allocated by task 266:
[   17.997124]  kasan_save_stack+0x3c/0x68
[   17.997168]  kasan_save_track+0x20/0x40
[   17.997597]  kasan_save_alloc_info+0x40/0x58
[   17.997712]  __kasan_kmalloc+0xd4/0xd8
[   17.997790]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.997932]  kasan_atomics+0xb8/0x2e0
[   17.998010]  kunit_try_run_case+0x170/0x3f0
[   17.998052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.998312]  kthread+0x328/0x630
[   17.998706]  ret_from_fork+0x10/0x20
[   17.998896] 
[   17.998953] The buggy address belongs to the object at fff00000c63b4480
[   17.998953]  which belongs to the cache kmalloc-64 of size 64
[   17.999053] The buggy address is located 0 bytes to the right of
[   17.999053]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   17.999193] 
[   17.999244] The buggy address belongs to the physical page:
[   17.999347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   17.999444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.999512] page_type: f5(slab)
[   17.999794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.000037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.000184] page dumped because: kasan: bad access detected
[   18.000277] 
[   18.000336] Memory state around the buggy address:
[   18.000471]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.000549]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.000767] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.000943]                                      ^
[   18.000985]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.003103] 
[   18.003393] Call trace:
[   18.003581]  dump_stack_lvl+0x8c/0xd0
[   18.004703]  kthread+0x328/0x630
[   18.005251]  kasan_save_track+0x20/0x40
[   18.005311]  kasan_save_alloc_info+0x40/0x58
[   18.005395]  __kasan_kmalloc+0xd4/0xd8
[   18.005915]  kasan_atomics+0xb8/0x2e0
[   18.006895] The buggy address is located 0 bytes to the right of
[   18.006895]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.007517] page dumped because: kasan: bad access detected
[   18.007770]                                      ^
[   18.007806]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.008571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   18.009319]  show_stack+0x20/0x38 (C)
[   18.012007]  ret_from_fork+0x10/0x20
[   18.013101]  kasan_save_alloc_info+0x40/0x58
[   18.013240]  __kasan_kmalloc+0xd4/0xd8
[   18.013450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.013572]  kasan_atomics+0xb8/0x2e0
[   18.014347] 
[   18.014844] 
[   18.015255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.016101] page dumped because: kasan: bad access detected
[   18.016778] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.018500] Read of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.020443]  kasan_atomics+0x198/0x2e0
[   18.022061]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.022288]  kasan_atomics+0xb8/0x2e0
[   18.022337]  kunit_try_run_case+0x170/0x3f0
[   18.022550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.023082] 
[   18.023507] 
[   18.023984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.024678] page dumped because: kasan: bad access detected
[   18.025165]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.027160] ==================================================================
[   18.292862] ==================================================================
[   18.292960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.293155] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.293223] 
[   18.293255] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.293337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.293366] Hardware name: linux,dummy-virt (DT)
[   18.293543] Call trace:
[   18.293598]  show_stack+0x20/0x38 (C)
[   18.293714]  dump_stack_lvl+0x8c/0xd0
[   18.293882]  print_report+0x118/0x5d0
[   18.293973]  kasan_report+0xdc/0x128
[   18.294262]  __asan_report_load8_noabort+0x20/0x30
[   18.294324]  kasan_atomics_helper+0x3df4/0x4858
[   18.294453]  kasan_atomics+0x198/0x2e0
[   18.294805]  kunit_try_run_case+0x170/0x3f0
[   18.294953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.295252]  kthread+0x328/0x630
[   18.295393]  ret_from_fork+0x10/0x20
[   18.295613] 
[   18.295720] Allocated by task 266:
[   18.295825]  kasan_save_stack+0x3c/0x68
[   18.295869]  kasan_save_track+0x20/0x40
[   18.295910]  kasan_save_alloc_info+0x40/0x58
[   18.295968]  __kasan_kmalloc+0xd4/0xd8
[   18.296363]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.296434]  kasan_atomics+0xb8/0x2e0
[   18.296472]  kunit_try_run_case+0x170/0x3f0
[   18.296513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.296570]  kthread+0x328/0x630
[   18.296604]  ret_from_fork+0x10/0x20
[   18.296652] 
[   18.296945] The buggy address belongs to the object at fff00000c63b4480
[   18.296945]  which belongs to the cache kmalloc-64 of size 64
[   18.297022] The buggy address is located 0 bytes to the right of
[   18.297022]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.297355] 
[   18.297459] The buggy address belongs to the physical page:
[   18.297613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.297845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.297902] page_type: f5(slab)
[   18.297943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.297997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.298209] page dumped because: kasan: bad access detected
[   18.298437] 
[   18.298773] Memory state around the buggy address:
[   18.299096]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.299314]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.299380] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.299422]                                      ^
[   18.299965]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.300139]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.300681] ==================================================================
[   18.301474] ==================================================================
[   18.301528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.301592] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.301644] 
[   18.301677] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.302339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.302453] Hardware name: linux,dummy-virt (DT)
[   18.302666] Call trace:
[   18.302714]  show_stack+0x20/0x38 (C)
[   18.302771]  dump_stack_lvl+0x8c/0xd0
[   18.302830]  print_report+0x118/0x5d0
[   18.303060]  kasan_report+0xdc/0x128
[   18.303434]  kasan_check_range+0x100/0x1a8
[   18.303721]  __kasan_check_write+0x20/0x30
[   18.303816]  kasan_atomics_helper+0x16d0/0x4858
[   18.303980]  kasan_atomics+0x198/0x2e0
[   18.304061]  kunit_try_run_case+0x170/0x3f0
[   18.304313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.304815]  kthread+0x328/0x630
[   18.305072]  ret_from_fork+0x10/0x20
[   18.305255] 
[   18.305323] Allocated by task 266:
[   18.305356]  kasan_save_stack+0x3c/0x68
[   18.305595]  kasan_save_track+0x20/0x40
[   18.305806]  kasan_save_alloc_info+0x40/0x58
[   18.305900]  __kasan_kmalloc+0xd4/0xd8
[   18.306126]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.306209]  kasan_atomics+0xb8/0x2e0
[   18.306395]  kunit_try_run_case+0x170/0x3f0
[   18.306474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.306687]  kthread+0x328/0x630
[   18.306730]  ret_from_fork+0x10/0x20
[   18.306909] 
[   18.307207] The buggy address belongs to the object at fff00000c63b4480
[   18.307207]  which belongs to the cache kmalloc-64 of size 64
[   18.307391] The buggy address is located 0 bytes to the right of
[   18.307391]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.307639] 
[   18.307878] The buggy address belongs to the physical page:
[   18.307922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.308056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.308142] page_type: f5(slab)
[   18.308183] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.308246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.308301] page dumped because: kasan: bad access detected
[   18.308344] 
[   18.308374] Memory state around the buggy address:
[   18.308423]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.308469]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.308515] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.308566]                                      ^
[   18.308613]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.308655]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.308704] ==================================================================
[   17.824388] ==================================================================
[   17.825989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   17.827134] Call trace:
[   17.828146]  ret_from_fork+0x10/0x20
[   17.828653]  ret_from_fork+0x10/0x20
[   17.828861] 
[   17.828927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   17.829147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.829415]                                      ^
[   17.831929] ==================================================================
[   18.142480] ==================================================================
[   18.142556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.142608] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.143053] 
[   18.143105] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.143279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.143325] Hardware name: linux,dummy-virt (DT)
[   18.143361] Call trace:
[   18.143385]  show_stack+0x20/0x38 (C)
[   18.143438]  dump_stack_lvl+0x8c/0xd0
[   18.143803]  print_report+0x118/0x5d0
[   18.143872]  kasan_report+0xdc/0x128
[   18.143920]  kasan_check_range+0x100/0x1a8
[   18.143970]  __kasan_check_write+0x20/0x30
[   18.144017]  kasan_atomics_helper+0xff0/0x4858
[   18.144066]  kasan_atomics+0x198/0x2e0
[   18.144114]  kunit_try_run_case+0x170/0x3f0
[   18.144161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.144214]  kthread+0x328/0x630
[   18.144258]  ret_from_fork+0x10/0x20
[   18.144367] 
[   18.144390] Allocated by task 266:
[   18.144445]  kasan_save_stack+0x3c/0x68
[   18.144502]  kasan_save_track+0x20/0x40
[   18.144553]  kasan_save_alloc_info+0x40/0x58
[   18.144606]  __kasan_kmalloc+0xd4/0xd8
[   18.144645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.144687]  kasan_atomics+0xb8/0x2e0
[   18.144724]  kunit_try_run_case+0x170/0x3f0
[   18.144764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.144810]  kthread+0x328/0x630
[   18.144854]  ret_from_fork+0x10/0x20
[   18.144908] 
[   18.144939] The buggy address belongs to the object at fff00000c63b4480
[   18.144939]  which belongs to the cache kmalloc-64 of size 64
[   18.145002] The buggy address is located 0 bytes to the right of
[   18.145002]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.145067] 
[   18.145090] The buggy address belongs to the physical page:
[   18.145122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.145174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.145232] page_type: f5(slab)
[   18.145274] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.145327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.145371] page dumped because: kasan: bad access detected
[   18.145413] 
[   18.145434] Memory state around the buggy address:
[   18.145476]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.145522]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.146585] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.146955]                                      ^
[   18.147003]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.147155]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.147542] ==================================================================
[   18.159861] ==================================================================
[   18.159924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.159999] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.160361] 
[   18.160769] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.160966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.161033] Hardware name: linux,dummy-virt (DT)
[   18.161069] Call trace:
[   18.161096]  show_stack+0x20/0x38 (C)
[   18.161356]  dump_stack_lvl+0x8c/0xd0
[   18.161732]  print_report+0x118/0x5d0
[   18.161940]  kasan_report+0xdc/0x128
[   18.162149]  kasan_check_range+0x100/0x1a8
[   18.162277]  __kasan_check_write+0x20/0x30
[   18.162367]  kasan_atomics_helper+0x10c0/0x4858
[   18.162426]  kasan_atomics+0x198/0x2e0
[   18.162473]  kunit_try_run_case+0x170/0x3f0
[   18.162939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.163366]  kthread+0x328/0x630
[   18.163440]  ret_from_fork+0x10/0x20
[   18.163643] 
[   18.163713] Allocated by task 266:
[   18.163745]  kasan_save_stack+0x3c/0x68
[   18.163985]  kasan_save_track+0x20/0x40
[   18.164222]  kasan_save_alloc_info+0x40/0x58
[   18.164307]  __kasan_kmalloc+0xd4/0xd8
[   18.164654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.164810]  kasan_atomics+0xb8/0x2e0
[   18.165120]  kunit_try_run_case+0x170/0x3f0
[   18.165345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.165734]  kthread+0x328/0x630
[   18.165906]  ret_from_fork+0x10/0x20
[   18.166111] 
[   18.166141] The buggy address belongs to the object at fff00000c63b4480
[   18.166141]  which belongs to the cache kmalloc-64 of size 64
[   18.166238] The buggy address is located 0 bytes to the right of
[   18.166238]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.166551] 
[   18.166700] The buggy address belongs to the physical page:
[   18.166944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.167006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.167249] page_type: f5(slab)
[   18.167312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.167368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.167412] page dumped because: kasan: bad access detected
[   18.167447] 
[   18.167818] Memory state around the buggy address:
[   18.168009]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.168563]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.168945] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.168994]                                      ^
[   18.169031]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169784]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169856] ==================================================================
[   18.231177] ==================================================================
[   18.231231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.231283] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.231336] 
[   18.231855] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.232124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.232300] Hardware name: linux,dummy-virt (DT)
[   18.232345] Call trace:
[   18.232372]  show_stack+0x20/0x38 (C)
[   18.232659]  dump_stack_lvl+0x8c/0xd0
[   18.232739]  print_report+0x118/0x5d0
[   18.232858]  kasan_report+0xdc/0x128
[   18.232912]  kasan_check_range+0x100/0x1a8
[   18.232969]  __kasan_check_write+0x20/0x30
[   18.233024]  kasan_atomics_helper+0x1414/0x4858
[   18.233074]  kasan_atomics+0x198/0x2e0
[   18.233586]  kunit_try_run_case+0x170/0x3f0
[   18.233664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.233852]  kthread+0x328/0x630
[   18.233952]  ret_from_fork+0x10/0x20
[   18.234004] 
[   18.234053] Allocated by task 266:
[   18.234390]  kasan_save_stack+0x3c/0x68
[   18.234739]  kasan_save_track+0x20/0x40
[   18.234924]  kasan_save_alloc_info+0x40/0x58
[   18.235020]  __kasan_kmalloc+0xd4/0xd8
[   18.235109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.235238]  kasan_atomics+0xb8/0x2e0
[   18.235307]  kunit_try_run_case+0x170/0x3f0
[   18.235742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.236066]  kthread+0x328/0x630
[   18.236490]  ret_from_fork+0x10/0x20
[   18.236816] 
[   18.236847] The buggy address belongs to the object at fff00000c63b4480
[   18.236847]  which belongs to the cache kmalloc-64 of size 64
[   18.236944] The buggy address is located 0 bytes to the right of
[   18.236944]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.237152] 
[   18.237230] The buggy address belongs to the physical page:
[   18.237490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.237935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.238027] page_type: f5(slab)
[   18.238327] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.238394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.238897] page dumped because: kasan: bad access detected
[   18.239397] 
[   18.239590] Memory state around the buggy address:
[   18.239816]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.240048]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.240434] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.240649]                                      ^
[   18.240719]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.241110]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.241592] ==================================================================
[   18.067498] ==================================================================
[   18.067602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.067696] Read of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.067949] 
[   18.068067] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.068155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.068193] Hardware name: linux,dummy-virt (DT)
[   18.068226] Call trace:
[   18.068314]  show_stack+0x20/0x38 (C)
[   18.068389]  dump_stack_lvl+0x8c/0xd0
[   18.068454]  print_report+0x118/0x5d0
[   18.068699]  kasan_report+0xdc/0x128
[   18.068753]  __asan_report_load4_noabort+0x20/0x30
[   18.068918]  kasan_atomics_helper+0x3e04/0x4858
[   18.069012]  kasan_atomics+0x198/0x2e0
[   18.069059]  kunit_try_run_case+0x170/0x3f0
[   18.069108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.069164]  kthread+0x328/0x630
[   18.069219]  ret_from_fork+0x10/0x20
[   18.069269] 
[   18.069289] Allocated by task 266:
[   18.069320]  kasan_save_stack+0x3c/0x68
[   18.069363]  kasan_save_track+0x20/0x40
[   18.069403]  kasan_save_alloc_info+0x40/0x58
[   18.069449]  __kasan_kmalloc+0xd4/0xd8
[   18.069498]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.069707]  kasan_atomics+0xb8/0x2e0
[   18.069929]  kunit_try_run_case+0x170/0x3f0
[   18.070263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.070353]  kthread+0x328/0x630
[   18.070396]  ret_from_fork+0x10/0x20
[   18.070583] 
[   18.070686] The buggy address belongs to the object at fff00000c63b4480
[   18.070686]  which belongs to the cache kmalloc-64 of size 64
[   18.070858] The buggy address is located 0 bytes to the right of
[   18.070858]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.071085] 
[   18.071175] The buggy address belongs to the physical page:
[   18.071269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.071406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.071466] page_type: f5(slab)
[   18.071505] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.072161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.072313] page dumped because: kasan: bad access detected
[   18.072433] 
[   18.072554] Memory state around the buggy address:
[   18.072661]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.072747]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.073050] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.073235]                                      ^
[   18.073410]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.073482]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.073525] ==================================================================
[   18.223630] ==================================================================
[   18.223693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.223746] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.223799] 
[   18.223875] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.223962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.223992] Hardware name: linux,dummy-virt (DT)
[   18.224163] Call trace:
[   18.224448]  show_stack+0x20/0x38 (C)
[   18.224523]  dump_stack_lvl+0x8c/0xd0
[   18.224921]  print_report+0x118/0x5d0
[   18.225344]  kasan_report+0xdc/0x128
[   18.225563]  __asan_report_load8_noabort+0x20/0x30
[   18.225644]  kasan_atomics_helper+0x3f04/0x4858
[   18.225761]  kasan_atomics+0x198/0x2e0
[   18.225814]  kunit_try_run_case+0x170/0x3f0
[   18.225866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.225927]  kthread+0x328/0x630
[   18.226230]  ret_from_fork+0x10/0x20
[   18.226809] 
[   18.226873] Allocated by task 266:
[   18.226988]  kasan_save_stack+0x3c/0x68
[   18.227084]  kasan_save_track+0x20/0x40
[   18.227321]  kasan_save_alloc_info+0x40/0x58
[   18.227382]  __kasan_kmalloc+0xd4/0xd8
[   18.227617]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.227671]  kasan_atomics+0xb8/0x2e0
[   18.227721]  kunit_try_run_case+0x170/0x3f0
[   18.227761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.227826]  kthread+0x328/0x630
[   18.227869]  ret_from_fork+0x10/0x20
[   18.227907] 
[   18.227929] The buggy address belongs to the object at fff00000c63b4480
[   18.227929]  which belongs to the cache kmalloc-64 of size 64
[   18.228000] The buggy address is located 0 bytes to the right of
[   18.228000]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.228077] 
[   18.228114] The buggy address belongs to the physical page:
[   18.228170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.228235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.228284] page_type: f5(slab)
[   18.228331] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.228386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.228429] page dumped because: kasan: bad access detected
[   18.228473] 
[   18.228494] Memory state around the buggy address:
[   18.228539]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.228893]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.228965] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.229298]                                      ^
[   18.229373]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.229705]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.229799] ==================================================================
[   18.132334] ==================================================================
[   18.132431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.132494] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.132606] 
[   18.132649] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.132963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.133009] Hardware name: linux,dummy-virt (DT)
[   18.133048] Call trace:
[   18.133074]  show_stack+0x20/0x38 (C)
[   18.133125]  dump_stack_lvl+0x8c/0xd0
[   18.133174]  print_report+0x118/0x5d0
[   18.133221]  kasan_report+0xdc/0x128
[   18.133269]  kasan_check_range+0x100/0x1a8
[   18.133317]  __kasan_check_write+0x20/0x30
[   18.133479]  kasan_atomics_helper+0xf88/0x4858
[   18.133558]  kasan_atomics+0x198/0x2e0
[   18.133608]  kunit_try_run_case+0x170/0x3f0
[   18.133657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.134233]  kthread+0x328/0x630
[   18.134345]  ret_from_fork+0x10/0x20
[   18.134464] 
[   18.134485] Allocated by task 266:
[   18.134518]  kasan_save_stack+0x3c/0x68
[   18.134573]  kasan_save_track+0x20/0x40
[   18.134614]  kasan_save_alloc_info+0x40/0x58
[   18.135263]  __kasan_kmalloc+0xd4/0xd8
[   18.135476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.135745]  kasan_atomics+0xb8/0x2e0
[   18.135906]  kunit_try_run_case+0x170/0x3f0
[   18.136394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.136872]  kthread+0x328/0x630
[   18.136942]  ret_from_fork+0x10/0x20
[   18.137146] 
[   18.137255] The buggy address belongs to the object at fff00000c63b4480
[   18.137255]  which belongs to the cache kmalloc-64 of size 64
[   18.137489] The buggy address is located 0 bytes to the right of
[   18.137489]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.137902] 
[   18.137929] The buggy address belongs to the physical page:
[   18.137964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.138152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.138544] page_type: f5(slab)
[   18.138769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.138990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.139421] page dumped because: kasan: bad access detected
[   18.139469] 
[   18.139821] Memory state around the buggy address:
[   18.140015]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.140381]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.140844] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.141018]                                      ^
[   18.141161]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.141591]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.141662] ==================================================================
[   18.170687] ==================================================================
[   18.170781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.170966] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.171028] 
[   18.171064] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.171153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.171307] Hardware name: linux,dummy-virt (DT)
[   18.171637] Call trace:
[   18.171762]  show_stack+0x20/0x38 (C)
[   18.171823]  dump_stack_lvl+0x8c/0xd0
[   18.171945]  print_report+0x118/0x5d0
[   18.172000]  kasan_report+0xdc/0x128
[   18.172075]  kasan_check_range+0x100/0x1a8
[   18.172202]  __kasan_check_write+0x20/0x30
[   18.172256]  kasan_atomics_helper+0x1128/0x4858
[   18.172313]  kasan_atomics+0x198/0x2e0
[   18.172366]  kunit_try_run_case+0x170/0x3f0
[   18.172798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.172877]  kthread+0x328/0x630
[   18.172923]  ret_from_fork+0x10/0x20
[   18.172971] 
[   18.172994] Allocated by task 266:
[   18.173153]  kasan_save_stack+0x3c/0x68
[   18.173221]  kasan_save_track+0x20/0x40
[   18.173262]  kasan_save_alloc_info+0x40/0x58
[   18.173313]  __kasan_kmalloc+0xd4/0xd8
[   18.173351]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.173392]  kasan_atomics+0xb8/0x2e0
[   18.173431]  kunit_try_run_case+0x170/0x3f0
[   18.173478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.173525]  kthread+0x328/0x630
[   18.173994]  ret_from_fork+0x10/0x20
[   18.174036] 
[   18.174059] The buggy address belongs to the object at fff00000c63b4480
[   18.174059]  which belongs to the cache kmalloc-64 of size 64
[   18.174602] The buggy address is located 0 bytes to the right of
[   18.174602]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.174838] 
[   18.174910] The buggy address belongs to the physical page:
[   18.174945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.175351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.175563] page_type: f5(slab)
[   18.175639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.175848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.176195] page dumped because: kasan: bad access detected
[   18.176264] 
[   18.176670] Memory state around the buggy address:
[   18.176738]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.177020]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.177205] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.177300]                                      ^
[   18.177596]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.177655]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.177697] ==================================================================
[   17.797273] ==================================================================
[   17.798272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   17.799017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.799551]  print_report+0x118/0x5d0
[   17.800013]  kasan_atomics+0x198/0x2e0
[   17.801776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.803134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   17.803625] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.803814] ==================================================================
[   18.112698] ==================================================================
[   18.113332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.113404] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.113456] 
[   18.113499] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.113860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.113912] Hardware name: linux,dummy-virt (DT)
[   18.114378] Call trace:
[   18.114424]  show_stack+0x20/0x38 (C)
[   18.114578]  dump_stack_lvl+0x8c/0xd0
[   18.114684]  print_report+0x118/0x5d0
[   18.114736]  kasan_report+0xdc/0x128
[   18.115068]  kasan_check_range+0x100/0x1a8
[   18.115409]  __kasan_check_write+0x20/0x30
[   18.115602]  kasan_atomics_helper+0xeb8/0x4858
[   18.115717]  kasan_atomics+0x198/0x2e0
[   18.115840]  kunit_try_run_case+0x170/0x3f0
[   18.115936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.116051]  kthread+0x328/0x630
[   18.116407]  ret_from_fork+0x10/0x20
[   18.116805] 
[   18.116947] Allocated by task 266:
[   18.117113]  kasan_save_stack+0x3c/0x68
[   18.117357]  kasan_save_track+0x20/0x40
[   18.117574]  kasan_save_alloc_info+0x40/0x58
[   18.117735]  __kasan_kmalloc+0xd4/0xd8
[   18.117828]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.117879]  kasan_atomics+0xb8/0x2e0
[   18.117918]  kunit_try_run_case+0x170/0x3f0
[   18.117958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.118628]  kthread+0x328/0x630
[   18.118679]  ret_from_fork+0x10/0x20
[   18.118720] 
[   18.118766] The buggy address belongs to the object at fff00000c63b4480
[   18.118766]  which belongs to the cache kmalloc-64 of size 64
[   18.118840] The buggy address is located 0 bytes to the right of
[   18.118840]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.118916] 
[   18.118940] The buggy address belongs to the physical page:
[   18.118982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.119040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.119091] page_type: f5(slab)
[   18.119146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.119217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.119260] page dumped because: kasan: bad access detected
[   18.119295] 
[   18.119331] Memory state around the buggy address:
[   18.119373]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.119423]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.119476] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.119517]                                      ^
[   18.119564]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.119608]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.119658] ==================================================================
[   18.287364] ==================================================================
[   18.287438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.287670] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.287781] 
[   18.287827] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.288107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.288149] Hardware name: linux,dummy-virt (DT)
[   18.288219] Call trace:
[   18.288600]  show_stack+0x20/0x38 (C)
[   18.288718]  dump_stack_lvl+0x8c/0xd0
[   18.288770]  print_report+0x118/0x5d0
[   18.288984]  kasan_report+0xdc/0x128
[   18.289224]  kasan_check_range+0x100/0x1a8
[   18.289278]  __kasan_check_write+0x20/0x30
[   18.289353]  kasan_atomics_helper+0x1644/0x4858
[   18.289545]  kasan_atomics+0x198/0x2e0
[   18.289611]  kunit_try_run_case+0x170/0x3f0
[   18.289662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.289832]  kthread+0x328/0x630
[   18.289983]  ret_from_fork+0x10/0x20
[   18.290107] 
[   18.290262] Allocated by task 266:
[   18.290358]  kasan_save_stack+0x3c/0x68
[   18.290519]  kasan_save_track+0x20/0x40
[   18.290571]  kasan_save_alloc_info+0x40/0x58
[   18.290648]  __kasan_kmalloc+0xd4/0xd8
[   18.290687]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.290728]  kasan_atomics+0xb8/0x2e0
[   18.290766]  kunit_try_run_case+0x170/0x3f0
[   18.290806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.290849]  kthread+0x328/0x630
[   18.290885]  ret_from_fork+0x10/0x20
[   18.291091] 
[   18.291141] The buggy address belongs to the object at fff00000c63b4480
[   18.291141]  which belongs to the cache kmalloc-64 of size 64
[   18.291263] The buggy address is located 0 bytes to the right of
[   18.291263]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.291377] 
[   18.291401] The buggy address belongs to the physical page:
[   18.291435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.291489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.291743] page_type: f5(slab)
[   18.291881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.291989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.292057] page dumped because: kasan: bad access detected
[   18.292104] 
[   18.292124] Memory state around the buggy address:
[   18.292159]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.292205]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.292492] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.292548]                                      ^
[   18.292597]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.292654]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.292703] ==================================================================
[   18.178868] ==================================================================
[   18.178929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.178994] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.179093] 
[   18.179156] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.179426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.179462] Hardware name: linux,dummy-virt (DT)
[   18.179506] Call trace:
[   18.179635]  show_stack+0x20/0x38 (C)
[   18.179698]  dump_stack_lvl+0x8c/0xd0
[   18.179986]  print_report+0x118/0x5d0
[   18.180056]  kasan_report+0xdc/0x128
[   18.180224]  kasan_check_range+0x100/0x1a8
[   18.180476]  __kasan_check_write+0x20/0x30
[   18.180557]  kasan_atomics_helper+0x1190/0x4858
[   18.180804]  kasan_atomics+0x198/0x2e0
[   18.180875]  kunit_try_run_case+0x170/0x3f0
[   18.181270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.181565]  kthread+0x328/0x630
[   18.181754]  ret_from_fork+0x10/0x20
[   18.181871] 
[   18.181923] Allocated by task 266:
[   18.182007]  kasan_save_stack+0x3c/0x68
[   18.182087]  kasan_save_track+0x20/0x40
[   18.182228]  kasan_save_alloc_info+0x40/0x58
[   18.182291]  __kasan_kmalloc+0xd4/0xd8
[   18.182331]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.182378]  kasan_atomics+0xb8/0x2e0
[   18.182420]  kunit_try_run_case+0x170/0x3f0
[   18.183153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.183379]  kthread+0x328/0x630
[   18.183499]  ret_from_fork+0x10/0x20
[   18.183648] 
[   18.183707] The buggy address belongs to the object at fff00000c63b4480
[   18.183707]  which belongs to the cache kmalloc-64 of size 64
[   18.183836] The buggy address is located 0 bytes to the right of
[   18.183836]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.183970] 
[   18.184063] The buggy address belongs to the physical page:
[   18.184128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.184182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.184237] page_type: f5(slab)
[   18.184313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.184369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.184413] page dumped because: kasan: bad access detected
[   18.184456] 
[   18.184476] Memory state around the buggy address:
[   18.184525]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.184581]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.184626] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.184666]                                      ^
[   18.184714]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.184759]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.184798] ==================================================================
[   18.203658] ==================================================================
[   18.203708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.203757] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.203809] 
[   18.203862] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.203945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.203975] Hardware name: linux,dummy-virt (DT)
[   18.204008] Call trace:
[   18.204043]  show_stack+0x20/0x38 (C)
[   18.204094]  dump_stack_lvl+0x8c/0xd0
[   18.204142]  print_report+0x118/0x5d0
[   18.204191]  kasan_report+0xdc/0x128
[   18.204238]  kasan_check_range+0x100/0x1a8
[   18.204293]  __kasan_check_write+0x20/0x30
[   18.204341]  kasan_atomics_helper+0x12d8/0x4858
[   18.204391]  kasan_atomics+0x198/0x2e0
[   18.204445]  kunit_try_run_case+0x170/0x3f0
[   18.204496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.205381]  kthread+0x328/0x630
[   18.205458]  ret_from_fork+0x10/0x20
[   18.205523] 
[   18.205563] Allocated by task 266:
[   18.205603]  kasan_save_stack+0x3c/0x68
[   18.205648]  kasan_save_track+0x20/0x40
[   18.206011]  kasan_save_alloc_info+0x40/0x58
[   18.206159]  __kasan_kmalloc+0xd4/0xd8
[   18.206385]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.206448]  kasan_atomics+0xb8/0x2e0
[   18.206488]  kunit_try_run_case+0x170/0x3f0
[   18.206538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.206583]  kthread+0x328/0x630
[   18.207212]  ret_from_fork+0x10/0x20
[   18.207411] 
[   18.207543] The buggy address belongs to the object at fff00000c63b4480
[   18.207543]  which belongs to the cache kmalloc-64 of size 64
[   18.208037] The buggy address is located 0 bytes to the right of
[   18.208037]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.208443] 
[   18.208496] The buggy address belongs to the physical page:
[   18.208564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.208805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.208865] page_type: f5(slab)
[   18.209439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.209512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.210159] page dumped because: kasan: bad access detected
[   18.210461] 
[   18.210502] Memory state around the buggy address:
[   18.210563]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.210612]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.210657] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.211089]                                      ^
[   18.211446]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.211496]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.211688] ==================================================================
[   18.212813] ==================================================================
[   18.213019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.213223] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.213307] 
[   18.213342] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.213846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.214115] Hardware name: linux,dummy-virt (DT)
[   18.214198] Call trace:
[   18.214279]  show_stack+0x20/0x38 (C)
[   18.214414]  dump_stack_lvl+0x8c/0xd0
[   18.214468]  print_report+0x118/0x5d0
[   18.214518]  kasan_report+0xdc/0x128
[   18.214580]  kasan_check_range+0x100/0x1a8
[   18.214944]  __kasan_check_write+0x20/0x30
[   18.215198]  kasan_atomics_helper+0x1384/0x4858
[   18.215418]  kasan_atomics+0x198/0x2e0
[   18.215594]  kunit_try_run_case+0x170/0x3f0
[   18.215716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.215774]  kthread+0x328/0x630
[   18.216032]  ret_from_fork+0x10/0x20
[   18.216431] 
[   18.216494] Allocated by task 266:
[   18.216698]  kasan_save_stack+0x3c/0x68
[   18.216805]  kasan_save_track+0x20/0x40
[   18.216964]  kasan_save_alloc_info+0x40/0x58
[   18.217010]  __kasan_kmalloc+0xd4/0xd8
[   18.217210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.217273]  kasan_atomics+0xb8/0x2e0
[   18.217483]  kunit_try_run_case+0x170/0x3f0
[   18.217844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.218020]  kthread+0x328/0x630
[   18.218107]  ret_from_fork+0x10/0x20
[   18.218227] 
[   18.218251] The buggy address belongs to the object at fff00000c63b4480
[   18.218251]  which belongs to the cache kmalloc-64 of size 64
[   18.218327] The buggy address is located 0 bytes to the right of
[   18.218327]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.218542] 
[   18.218941] The buggy address belongs to the physical page:
[   18.219178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.219303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.219364] page_type: f5(slab)
[   18.219757] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.219849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.220180] page dumped because: kasan: bad access detected
[   18.220225] 
[   18.220593] Memory state around the buggy address:
[   18.220881]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.221119]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.221386] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.221565]                                      ^
[   18.221759]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.222016]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.222434] ==================================================================
[   17.966859] ==================================================================
[   17.966959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   17.967494] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   17.967660] 
[   17.967696] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.968156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.968213] Hardware name: linux,dummy-virt (DT)
[   17.968302] Call trace:
[   17.968331]  show_stack+0x20/0x38 (C)
[   17.968384]  dump_stack_lvl+0x8c/0xd0
[   17.968431]  print_report+0x118/0x5d0
[   17.968637]  kasan_report+0xdc/0x128
[   17.968753]  kasan_check_range+0x100/0x1a8
[   17.968916]  __kasan_check_write+0x20/0x30
[   17.969231]  kasan_atomics_helper+0x99c/0x4858
[   17.969309]  kasan_atomics+0x198/0x2e0
[   17.969360]  kunit_try_run_case+0x170/0x3f0
[   17.969729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.970019]  kthread+0x328/0x630
[   17.970165]  ret_from_fork+0x10/0x20
[   17.970218] 
[   17.970268] Allocated by task 266:
[   17.970300]  kasan_save_stack+0x3c/0x68
[   17.970460]  kasan_save_track+0x20/0x40
[   17.970679]  kasan_save_alloc_info+0x40/0x58
[   17.970833]  __kasan_kmalloc+0xd4/0xd8
[   17.970921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.971080]  kasan_atomics+0xb8/0x2e0
[   17.971169]  kunit_try_run_case+0x170/0x3f0
[   17.971228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.971631]  kthread+0x328/0x630
[   17.971833]  ret_from_fork+0x10/0x20
[   17.971920] 
[   17.972038] The buggy address belongs to the object at fff00000c63b4480
[   17.972038]  which belongs to the cache kmalloc-64 of size 64
[   17.972129] The buggy address is located 0 bytes to the right of
[   17.972129]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   17.972229] 
[   17.972383] The buggy address belongs to the physical page:
[   17.972485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   17.972650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.972729] page_type: f5(slab)
[   17.972770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.972829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.972884] page dumped because: kasan: bad access detected
[   17.972933] 
[   17.972954] Memory state around the buggy address:
[   17.973009]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.973055]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.973109] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.973150]                                      ^
[   17.973186]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.973240]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.975294] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   17.978138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.978244]  kthread+0x328/0x630
[   17.978408]  ret_from_fork+0x10/0x20
[   17.978582] 
[   17.978660] Allocated by task 266:
[   17.978799]  kasan_save_stack+0x3c/0x68
[   17.978970]  kasan_save_track+0x20/0x40
[   17.979059]  kasan_save_alloc_info+0x40/0x58
[   17.979247]  __kasan_kmalloc+0xd4/0xd8
[   17.979580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.979701]  kasan_atomics+0xb8/0x2e0
[   17.979750]  kunit_try_run_case+0x170/0x3f0
[   17.980068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.980192]  kthread+0x328/0x630
[   17.980269]  ret_from_fork+0x10/0x20
[   17.980461] 
[   17.980635] The buggy address belongs to the object at fff00000c63b4480
[   17.980635]  which belongs to the cache kmalloc-64 of size 64
[   17.980742] The buggy address is located 0 bytes to the right of
[   17.980742]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   17.981015] 
[   17.981157] The buggy address belongs to the physical page:
[   17.981381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   17.981598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.981790] page_type: f5(slab)
[   17.982073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.982133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.982337] page dumped because: kasan: bad access detected
[   17.982582] 
[   17.982642] Memory state around the buggy address:
[   17.982699]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.983106]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.983240] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.983312]                                      ^
[   17.983351]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.983541]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.983754] ==================================================================
[   18.310151] ==================================================================
[   18.310240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.310295] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.310346] 
[   18.310378] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.310898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.311130] Hardware name: linux,dummy-virt (DT)
[   18.311194] Call trace:
[   18.311234]  show_stack+0x20/0x38 (C)
[   18.311479]  dump_stack_lvl+0x8c/0xd0
[   18.311642]  print_report+0x118/0x5d0
[   18.311715]  kasan_report+0xdc/0x128
[   18.311763]  __asan_report_load8_noabort+0x20/0x30
[   18.311832]  kasan_atomics_helper+0x3e10/0x4858
[   18.312073]  kasan_atomics+0x198/0x2e0
[   18.312404]  kunit_try_run_case+0x170/0x3f0
[   18.312604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.312674]  kthread+0x328/0x630
[   18.312719]  ret_from_fork+0x10/0x20
[   18.312901] 
[   18.312937] Allocated by task 266:
[   18.312970]  kasan_save_stack+0x3c/0x68
[   18.313016]  kasan_save_track+0x20/0x40
[   18.313376]  kasan_save_alloc_info+0x40/0x58
[   18.313647]  __kasan_kmalloc+0xd4/0xd8
[   18.313899]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.313983]  kasan_atomics+0xb8/0x2e0
[   18.314095]  kunit_try_run_case+0x170/0x3f0
[   18.314183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.314231]  kthread+0x328/0x630
[   18.314274]  ret_from_fork+0x10/0x20
[   18.314501] 
[   18.314739] The buggy address belongs to the object at fff00000c63b4480
[   18.314739]  which belongs to the cache kmalloc-64 of size 64
[   18.314840] The buggy address is located 0 bytes to the right of
[   18.314840]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.315260] 
[   18.315935] The buggy address belongs to the physical page:
[   18.316007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.316097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.316149] page_type: f5(slab)
[   18.316441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.316817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.316968] page dumped because: kasan: bad access detected
[   18.317078] 
[   18.317137] Memory state around the buggy address:
[   18.317173]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.317423]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.317521] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.317743]                                      ^
[   18.317929]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.317984]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.318025] ==================================================================
[   18.101236] ==================================================================
[   18.101312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.101366] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.101739] 
[   18.101803] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.101895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.102341] Hardware name: linux,dummy-virt (DT)
[   18.102749] Call trace:
[   18.102839]  show_stack+0x20/0x38 (C)
[   18.102988]  dump_stack_lvl+0x8c/0xd0
[   18.103074]  print_report+0x118/0x5d0
[   18.103177]  kasan_report+0xdc/0x128
[   18.103464]  __asan_report_store8_noabort+0x20/0x30
[   18.103796]  kasan_atomics_helper+0x3e5c/0x4858
[   18.104058]  kasan_atomics+0x198/0x2e0
[   18.104175]  kunit_try_run_case+0x170/0x3f0
[   18.104393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.104465]  kthread+0x328/0x630
[   18.104756]  ret_from_fork+0x10/0x20
[   18.105752] 
[   18.105802] Allocated by task 266:
[   18.105862]  kasan_save_stack+0x3c/0x68
[   18.105925]  kasan_save_track+0x20/0x40
[   18.105965]  kasan_save_alloc_info+0x40/0x58
[   18.106009]  __kasan_kmalloc+0xd4/0xd8
[   18.106048]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.106291]  kasan_atomics+0xb8/0x2e0
[   18.106750]  kunit_try_run_case+0x170/0x3f0
[   18.107161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.107326]  kthread+0x328/0x630
[   18.107528]  ret_from_fork+0x10/0x20
[   18.107909] 
[   18.108007] The buggy address belongs to the object at fff00000c63b4480
[   18.108007]  which belongs to the cache kmalloc-64 of size 64
[   18.108228] The buggy address is located 0 bytes to the right of
[   18.108228]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.108422] 
[   18.108445] The buggy address belongs to the physical page:
[   18.108878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.109297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.109764] page_type: f5(slab)
[   18.110006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.110094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.110331] page dumped because: kasan: bad access detected
[   18.110415] 
[   18.110673] Memory state around the buggy address:
[   18.110803]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.111086]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.111132] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.111214]                                      ^
[   18.111251]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.111459]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.111524] ==================================================================
[   18.242626] ==================================================================
[   18.242686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.242740] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.242984] 
[   18.243475] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.243589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.243621] Hardware name: linux,dummy-virt (DT)
[   18.243656] Call trace:
[   18.243682]  show_stack+0x20/0x38 (C)
[   18.243736]  dump_stack_lvl+0x8c/0xd0
[   18.243782]  print_report+0x118/0x5d0
[   18.243831]  kasan_report+0xdc/0x128
[   18.243899]  kasan_check_range+0x100/0x1a8
[   18.243950]  __kasan_check_write+0x20/0x30
[   18.244002]  kasan_atomics_helper+0x147c/0x4858
[   18.244053]  kasan_atomics+0x198/0x2e0
[   18.244111]  kunit_try_run_case+0x170/0x3f0
[   18.244159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.244213]  kthread+0x328/0x630
[   18.244258]  ret_from_fork+0x10/0x20
[   18.244307] 
[   18.244337] Allocated by task 266:
[   18.244375]  kasan_save_stack+0x3c/0x68
[   18.244418]  kasan_save_track+0x20/0x40
[   18.244460]  kasan_save_alloc_info+0x40/0x58
[   18.244514]  __kasan_kmalloc+0xd4/0xd8
[   18.244953]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.245247]  kasan_atomics+0xb8/0x2e0
[   18.245300]  kunit_try_run_case+0x170/0x3f0
[   18.245492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.245619]  kthread+0x328/0x630
[   18.245979]  ret_from_fork+0x10/0x20
[   18.246114] 
[   18.246159] The buggy address belongs to the object at fff00000c63b4480
[   18.246159]  which belongs to the cache kmalloc-64 of size 64
[   18.246228] The buggy address is located 0 bytes to the right of
[   18.246228]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.246521] 
[   18.246628] The buggy address belongs to the physical page:
[   18.246892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.247167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.247475] page_type: f5(slab)
[   18.247683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.247954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.248004] page dumped because: kasan: bad access detected
[   18.248345] 
[   18.248523] Memory state around the buggy address:
[   18.248828]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.249084]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.249459] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.249642]                                      ^
[   18.249683]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.249730]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.250209] ==================================================================
[   18.052526] ==================================================================
[   18.052625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.052747] Read of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.052802] 
[   18.052832] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.053074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.053351] Hardware name: linux,dummy-virt (DT)
[   18.053414] Call trace:
[   18.053573]  show_stack+0x20/0x38 (C)
[   18.053636]  dump_stack_lvl+0x8c/0xd0
[   18.053735]  print_report+0x118/0x5d0
[   18.053974]  kasan_report+0xdc/0x128
[   18.054060]  __asan_report_load4_noabort+0x20/0x30
[   18.054125]  kasan_atomics_helper+0x3dd8/0x4858
[   18.054176]  kasan_atomics+0x198/0x2e0
[   18.054224]  kunit_try_run_case+0x170/0x3f0
[   18.054275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.054629]  kthread+0x328/0x630
[   18.055151]  ret_from_fork+0x10/0x20
[   18.055259] 
[   18.055615] Allocated by task 266:
[   18.055700]  kasan_save_stack+0x3c/0x68
[   18.055816]  kasan_save_track+0x20/0x40
[   18.055888]  kasan_save_alloc_info+0x40/0x58
[   18.055938]  __kasan_kmalloc+0xd4/0xd8
[   18.055999]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.056040]  kasan_atomics+0xb8/0x2e0
[   18.056079]  kunit_try_run_case+0x170/0x3f0
[   18.056125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.056179]  kthread+0x328/0x630
[   18.056225]  ret_from_fork+0x10/0x20
[   18.056273] 
[   18.056304] The buggy address belongs to the object at fff00000c63b4480
[   18.056304]  which belongs to the cache kmalloc-64 of size 64
[   18.056372] The buggy address is located 0 bytes to the right of
[   18.056372]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.056437] 
[   18.056459] The buggy address belongs to the physical page:
[   18.056502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.056892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.056997] page_type: f5(slab)
[   18.057061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.057492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.057620] page dumped because: kasan: bad access detected
[   18.057848] 
[   18.057946] Memory state around the buggy address:
[   18.057984]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.058293]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.058487] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.058627]                                      ^
[   18.058886]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.059099]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.059195] ==================================================================
[   18.324851] ==================================================================
[   18.324904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.324956] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.325258] 
[   18.325323] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.325418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.325448] Hardware name: linux,dummy-virt (DT)
[   18.325863] Call trace:
[   18.326111]  show_stack+0x20/0x38 (C)
[   18.326200]  dump_stack_lvl+0x8c/0xd0
[   18.326389]  print_report+0x118/0x5d0
[   18.326496]  kasan_report+0xdc/0x128
[   18.326705]  __asan_report_load8_noabort+0x20/0x30
[   18.326763]  kasan_atomics_helper+0x3e20/0x4858
[   18.326822]  kasan_atomics+0x198/0x2e0
[   18.327078]  kunit_try_run_case+0x170/0x3f0
[   18.327462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.327775]  kthread+0x328/0x630
[   18.327934]  ret_from_fork+0x10/0x20
[   18.328023] 
[   18.328051] Allocated by task 266:
[   18.328104]  kasan_save_stack+0x3c/0x68
[   18.328480]  kasan_save_track+0x20/0x40
[   18.328775]  kasan_save_alloc_info+0x40/0x58
[   18.328996]  __kasan_kmalloc+0xd4/0xd8
[   18.329094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.329175]  kasan_atomics+0xb8/0x2e0
[   18.329403]  kunit_try_run_case+0x170/0x3f0
[   18.329609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.329695]  kthread+0x328/0x630
[   18.330107]  ret_from_fork+0x10/0x20
[   18.330271] 
[   18.330333] The buggy address belongs to the object at fff00000c63b4480
[   18.330333]  which belongs to the cache kmalloc-64 of size 64
[   18.330483] The buggy address is located 0 bytes to the right of
[   18.330483]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.330566] 
[   18.330588] The buggy address belongs to the physical page:
[   18.330802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.330921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.331541] page_type: f5(slab)
[   18.331629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.331702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.332044] page dumped because: kasan: bad access detected
[   18.332100] 
[   18.332502] Memory state around the buggy address:
[   18.332578]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.332627]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.332893] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.333025]                                      ^
[   18.333303]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.333528]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.333589] ==================================================================
[   18.251139] ==================================================================
[   18.251398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.251480] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.251550] 
[   18.251709] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.251804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.252020] Hardware name: linux,dummy-virt (DT)
[   18.252253] Call trace:
[   18.252296]  show_stack+0x20/0x38 (C)
[   18.252546]  dump_stack_lvl+0x8c/0xd0
[   18.252600]  print_report+0x118/0x5d0
[   18.252676]  kasan_report+0xdc/0x128
[   18.252773]  kasan_check_range+0x100/0x1a8
[   18.252851]  __kasan_check_write+0x20/0x30
[   18.252929]  kasan_atomics_helper+0x14e4/0x4858
[   18.252982]  kasan_atomics+0x198/0x2e0
[   18.253029]  kunit_try_run_case+0x170/0x3f0
[   18.253316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.253395]  kthread+0x328/0x630
[   18.253449]  ret_from_fork+0x10/0x20
[   18.253865] 
[   18.253968] Allocated by task 266:
[   18.254045]  kasan_save_stack+0x3c/0x68
[   18.254146]  kasan_save_track+0x20/0x40
[   18.254313]  kasan_save_alloc_info+0x40/0x58
[   18.254365]  __kasan_kmalloc+0xd4/0xd8
[   18.254581]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.254760]  kasan_atomics+0xb8/0x2e0
[   18.254839]  kunit_try_run_case+0x170/0x3f0
[   18.255179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.255288]  kthread+0x328/0x630
[   18.255386]  ret_from_fork+0x10/0x20
[   18.255502] 
[   18.255561] The buggy address belongs to the object at fff00000c63b4480
[   18.255561]  which belongs to the cache kmalloc-64 of size 64
[   18.255627] The buggy address is located 0 bytes to the right of
[   18.255627]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.256294] 
[   18.256446] The buggy address belongs to the physical page:
[   18.256484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.256764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.257141] page_type: f5(slab)
[   18.257193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.257365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.257761] page dumped because: kasan: bad access detected
[   18.258128] 
[   18.258183] Memory state around the buggy address:
[   18.258222]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.258271]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.258317] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.258359]                                      ^
[   18.258394]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.259083]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.259203] ==================================================================
[   17.984798] ==================================================================
[   17.984860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   17.984914] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   17.984968] 
[   17.985362] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.985466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.985496] Hardware name: linux,dummy-virt (DT)
[   17.985540] Call trace:
[   17.985565]  show_stack+0x20/0x38 (C)
[   17.985650]  dump_stack_lvl+0x8c/0xd0
[   17.985703]  print_report+0x118/0x5d0
[   17.986233]  kasan_report+0xdc/0x128
[   17.986302]  kasan_check_range+0x100/0x1a8
[   17.986525]  __kasan_check_write+0x20/0x30
[   17.986971]  kasan_atomics_helper+0xa6c/0x4858
[   17.987335]  kasan_atomics+0x198/0x2e0
[   17.987645]  kunit_try_run_case+0x170/0x3f0
[   17.987850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.987944]  kthread+0x328/0x630
[   17.988022]  ret_from_fork+0x10/0x20
[   17.988564] 
[   17.988590] Allocated by task 266:
[   17.988929]  kasan_save_stack+0x3c/0x68
[   17.989065]  kasan_save_track+0x20/0x40
[   17.989280]  kasan_save_alloc_info+0x40/0x58
[   17.989463]  __kasan_kmalloc+0xd4/0xd8
[   17.989905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.990104]  kasan_atomics+0xb8/0x2e0
[   17.990176]  kunit_try_run_case+0x170/0x3f0
[   17.990371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.990632]  kthread+0x328/0x630
[   17.990792]  ret_from_fork+0x10/0x20
[   17.991016] 
[   17.991183] The buggy address belongs to the object at fff00000c63b4480
[   17.991183]  which belongs to the cache kmalloc-64 of size 64
[   17.991360] The buggy address is located 0 bytes to the right of
[   17.991360]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   17.991545] 
[   17.991583] The buggy address belongs to the physical page:
[   17.991659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   17.991717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.991766] page_type: f5(slab)
[   17.991808] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.991861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.991903] page dumped because: kasan: bad access detected
[   17.991936] 
[   17.991977] Memory state around the buggy address:
[   17.992012]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.992056]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.992100] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.992140]                                      ^
[   17.992186]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.992232]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.992271] ==================================================================
[   18.195763] ==================================================================
[   18.195831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.195884] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.195938] 
[   18.195974] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.196056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.196508] Hardware name: linux,dummy-virt (DT)
[   18.196571] Call trace:
[   18.196600]  show_stack+0x20/0x38 (C)
[   18.196934]  dump_stack_lvl+0x8c/0xd0
[   18.197393]  print_report+0x118/0x5d0
[   18.197590]  kasan_report+0xdc/0x128
[   18.197666]  kasan_check_range+0x100/0x1a8
[   18.197728]  __kasan_check_write+0x20/0x30
[   18.197873]  kasan_atomics_helper+0x126c/0x4858
[   18.197989]  kasan_atomics+0x198/0x2e0
[   18.198097]  kunit_try_run_case+0x170/0x3f0
[   18.198148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.198209]  kthread+0x328/0x630
[   18.198511]  ret_from_fork+0x10/0x20
[   18.199139] 
[   18.199229] Allocated by task 266:
[   18.199317]  kasan_save_stack+0x3c/0x68
[   18.199460]  kasan_save_track+0x20/0x40
[   18.199512]  kasan_save_alloc_info+0x40/0x58
[   18.199722]  __kasan_kmalloc+0xd4/0xd8
[   18.199937]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.200009]  kasan_atomics+0xb8/0x2e0
[   18.200214]  kunit_try_run_case+0x170/0x3f0
[   18.200425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.200735]  kthread+0x328/0x630
[   18.200944]  ret_from_fork+0x10/0x20
[   18.201015] 
[   18.201166] The buggy address belongs to the object at fff00000c63b4480
[   18.201166]  which belongs to the cache kmalloc-64 of size 64
[   18.201593] The buggy address is located 0 bytes to the right of
[   18.201593]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.201917] 
[   18.202256] The buggy address belongs to the physical page:
[   18.202436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.202696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.202846] page_type: f5(slab)
[   18.202892] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.202977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.203041] page dumped because: kasan: bad access detected
[   18.203076] 
[   18.203097] Memory state around the buggy address:
[   18.203143]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.203199]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.203246] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.203305]                                      ^
[   18.203342]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203386]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203425] ==================================================================
[   18.080934] ==================================================================
[   18.081179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.081262] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.081324] 
[   18.081357] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.081738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.081843] Hardware name: linux,dummy-virt (DT)
[   18.082094] Call trace:
[   18.082224]  show_stack+0x20/0x38 (C)
[   18.082400]  dump_stack_lvl+0x8c/0xd0
[   18.082505]  print_report+0x118/0x5d0
[   18.082597]  kasan_report+0xdc/0x128
[   18.083022]  __asan_report_load8_noabort+0x20/0x30
[   18.083318]  kasan_atomics_helper+0x3f58/0x4858
[   18.083643]  kasan_atomics+0x198/0x2e0
[   18.083769]  kunit_try_run_case+0x170/0x3f0
[   18.083894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.083974]  kthread+0x328/0x630
[   18.084187]  ret_from_fork+0x10/0x20
[   18.084491] 
[   18.084545] Allocated by task 266:
[   18.084781]  kasan_save_stack+0x3c/0x68
[   18.084939]  kasan_save_track+0x20/0x40
[   18.085438]  kasan_save_alloc_info+0x40/0x58
[   18.085856]  __kasan_kmalloc+0xd4/0xd8
[   18.086056]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.086126]  kasan_atomics+0xb8/0x2e0
[   18.086205]  kunit_try_run_case+0x170/0x3f0
[   18.086615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.086952]  kthread+0x328/0x630
[   18.087114]  ret_from_fork+0x10/0x20
[   18.087188] 
[   18.087435] The buggy address belongs to the object at fff00000c63b4480
[   18.087435]  which belongs to the cache kmalloc-64 of size 64
[   18.087746] The buggy address is located 0 bytes to the right of
[   18.087746]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.087836] 
[   18.087859] The buggy address belongs to the physical page:
[   18.088090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.088315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.088639] page_type: f5(slab)
[   18.088696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.089045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.089263] page dumped because: kasan: bad access detected
[   18.089378] 
[   18.089686] Memory state around the buggy address:
[   18.089893]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.089958]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.090037] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.090078]                                      ^
[   18.090327]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.090831]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.090993] ==================================================================
[   18.278438] ==================================================================
[   18.278486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.278560] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.279299] 
[   18.279353] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.279448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.279484] Hardware name: linux,dummy-virt (DT)
[   18.279518] Call trace:
[   18.279563]  show_stack+0x20/0x38 (C)
[   18.279798]  dump_stack_lvl+0x8c/0xd0
[   18.279881]  print_report+0x118/0x5d0
[   18.279933]  kasan_report+0xdc/0x128
[   18.279986]  __asan_report_load8_noabort+0x20/0x30
[   18.280040]  kasan_atomics_helper+0x3db0/0x4858
[   18.280275]  kasan_atomics+0x198/0x2e0
[   18.280564]  kunit_try_run_case+0x170/0x3f0
[   18.280634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.280690]  kthread+0x328/0x630
[   18.281111]  ret_from_fork+0x10/0x20
[   18.281189] 
[   18.281376] Allocated by task 266:
[   18.281505]  kasan_save_stack+0x3c/0x68
[   18.281616]  kasan_save_track+0x20/0x40
[   18.281675]  kasan_save_alloc_info+0x40/0x58
[   18.281741]  __kasan_kmalloc+0xd4/0xd8
[   18.281963]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.282186]  kasan_atomics+0xb8/0x2e0
[   18.282268]  kunit_try_run_case+0x170/0x3f0
[   18.282646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.282822]  kthread+0x328/0x630
[   18.282940]  ret_from_fork+0x10/0x20
[   18.283079] 
[   18.283160] The buggy address belongs to the object at fff00000c63b4480
[   18.283160]  which belongs to the cache kmalloc-64 of size 64
[   18.283248] The buggy address is located 0 bytes to the right of
[   18.283248]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.283583] 
[   18.283809] The buggy address belongs to the physical page:
[   18.284068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.284170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.284333] page_type: f5(slab)
[   18.284992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.285124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.285191] page dumped because: kasan: bad access detected
[   18.285226] 
[   18.285246] Memory state around the buggy address:
[   18.285444]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.285499]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.285639] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.285709]                                      ^
[   18.286213]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.286384]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.286562] ==================================================================
[   17.947642] ==================================================================
[   17.947756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   17.947980] Read of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   17.948353] 
[   17.948417] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.948754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.948830] Hardware name: linux,dummy-virt (DT)
[   17.948868] Call trace:
[   17.949040]  show_stack+0x20/0x38 (C)
[   17.949108]  dump_stack_lvl+0x8c/0xd0
[   17.949568]  print_report+0x118/0x5d0
[   17.949828]  kasan_report+0xdc/0x128
[   17.950015]  __asan_report_load4_noabort+0x20/0x30
[   17.950175]  kasan_atomics_helper+0x42d8/0x4858
[   17.950229]  kasan_atomics+0x198/0x2e0
[   17.950277]  kunit_try_run_case+0x170/0x3f0
[   17.950517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.950788]  kthread+0x328/0x630
[   17.950942]  ret_from_fork+0x10/0x20
[   17.951078] 
[   17.951101] Allocated by task 266:
[   17.951275]  kasan_save_stack+0x3c/0x68
[   17.951578]  kasan_save_track+0x20/0x40
[   17.951651]  kasan_save_alloc_info+0x40/0x58
[   17.951857]  __kasan_kmalloc+0xd4/0xd8
[   17.952193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.952366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.952588] The buggy address is located 0 bytes to the right of
[   17.952588]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   17.952855] page_type: f5(slab)
[   17.953161]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.953351]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.957439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.957727] Hardware name: linux,dummy-virt (DT)
[   17.957784] Call trace:
[   17.957885]  show_stack+0x20/0x38 (C)
[   17.957957]  dump_stack_lvl+0x8c/0xd0
[   17.958013]  print_report+0x118/0x5d0
[   17.958062]  kasan_report+0xdc/0x128
[   17.958109]  kasan_check_range+0x100/0x1a8
[   17.958159]  __kasan_check_write+0x20/0x30
[   17.958421]  kasan_atomics_helper+0x934/0x4858
[   17.959222]  kasan_atomics+0x198/0x2e0
[   17.959467]  kunit_try_run_case+0x170/0x3f0
[   17.959679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.959944]  kthread+0x328/0x630
[   17.960024]  ret_from_fork+0x10/0x20
[   17.960177] 
[   17.960247] Allocated by task 266:
[   17.960484]  kasan_save_stack+0x3c/0x68
[   17.960578]  kasan_save_track+0x20/0x40
[   17.960758]  kasan_save_alloc_info+0x40/0x58
[   17.960829]  __kasan_kmalloc+0xd4/0xd8
[   17.960868]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.961082]  kasan_atomics+0xb8/0x2e0
[   17.961330]  kunit_try_run_case+0x170/0x3f0
[   17.961394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.961603]  kthread+0x328/0x630
[   17.961961]  ret_from_fork+0x10/0x20
[   17.962169] 
[   17.962246] The buggy address belongs to the object at fff00000c63b4480
[   17.962246]  which belongs to the cache kmalloc-64 of size 64
[   17.962487] The buggy address is located 0 bytes to the right of
[   17.962487]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   17.962572] 
[   17.962725] The buggy address belongs to the physical page:
[   17.963156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   17.963255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.963387] page_type: f5(slab)
[   17.963475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.963861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.963944] page dumped because: kasan: bad access detected
[   17.964101] 
[   17.964169] Memory state around the buggy address:
[   17.964315]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.964442]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.964731] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.964975]                                      ^
[   17.965100]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.965244]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.965310] ==================================================================
[   18.074832] ==================================================================
[   18.074939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.075136] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.075230] 
[   18.075275] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.075607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.075787] Hardware name: linux,dummy-virt (DT)
[   18.075848] Call trace:
[   18.075961]  show_stack+0x20/0x38 (C)
[   18.076091]  dump_stack_lvl+0x8c/0xd0
[   18.076186]  print_report+0x118/0x5d0
[   18.076253]  kasan_report+0xdc/0x128
[   18.076335]  kasan_check_range+0x100/0x1a8
[   18.076391]  __kasan_check_read+0x20/0x30
[   18.076437]  kasan_atomics_helper+0xdd4/0x4858
[   18.076489]  kasan_atomics+0x198/0x2e0
[   18.076555]  kunit_try_run_case+0x170/0x3f0
[   18.076603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.076659]  kthread+0x328/0x630
[   18.076704]  ret_from_fork+0x10/0x20
[   18.076755] 
[   18.076776] Allocated by task 266:
[   18.076806]  kasan_save_stack+0x3c/0x68
[   18.076852]  kasan_save_track+0x20/0x40
[   18.076892]  kasan_save_alloc_info+0x40/0x58
[   18.076934]  __kasan_kmalloc+0xd4/0xd8
[   18.076973]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.077016]  kasan_atomics+0xb8/0x2e0
[   18.077054]  kunit_try_run_case+0x170/0x3f0
[   18.077094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.077139]  kthread+0x328/0x630
[   18.077174]  ret_from_fork+0x10/0x20
[   18.077211] 
[   18.077233] The buggy address belongs to the object at fff00000c63b4480
[   18.077233]  which belongs to the cache kmalloc-64 of size 64
[   18.077293] The buggy address is located 0 bytes to the right of
[   18.077293]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.077358] 
[   18.077381] The buggy address belongs to the physical page:
[   18.077414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.077477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.077527] page_type: f5(slab)
[   18.077577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.078134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.078566] page dumped because: kasan: bad access detected
[   18.078677] 
[   18.078801] Memory state around the buggy address:
[   18.078888]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.079097]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.079171] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.079412]                                      ^
[   18.079522]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.079802]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.079848] ==================================================================
[   18.060277] ==================================================================
[   18.060474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.060570] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.060630] 
[   18.060696] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.060784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.060812] Hardware name: linux,dummy-virt (DT)
[   18.061007] Call trace:
[   18.061142]  show_stack+0x20/0x38 (C)
[   18.061220]  dump_stack_lvl+0x8c/0xd0
[   18.061311]  print_report+0x118/0x5d0
[   18.061362]  kasan_report+0xdc/0x128
[   18.061430]  kasan_check_range+0x100/0x1a8
[   18.061646]  __kasan_check_write+0x20/0x30
[   18.061737]  kasan_atomics_helper+0xd3c/0x4858
[   18.061848]  kasan_atomics+0x198/0x2e0
[   18.061943]  kunit_try_run_case+0x170/0x3f0
[   18.062115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.062286]  kthread+0x328/0x630
[   18.062355]  ret_from_fork+0x10/0x20
[   18.062628] 
[   18.062818] Allocated by task 266:
[   18.062939]  kasan_save_stack+0x3c/0x68
[   18.063028]  kasan_save_track+0x20/0x40
[   18.063438]  kasan_save_alloc_info+0x40/0x58
[   18.063489]  __kasan_kmalloc+0xd4/0xd8
[   18.063548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.063589]  kasan_atomics+0xb8/0x2e0
[   18.063627]  kunit_try_run_case+0x170/0x3f0
[   18.063668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.063714]  kthread+0x328/0x630
[   18.064098]  ret_from_fork+0x10/0x20
[   18.064165] 
[   18.064190] The buggy address belongs to the object at fff00000c63b4480
[   18.064190]  which belongs to the cache kmalloc-64 of size 64
[   18.064469] The buggy address is located 0 bytes to the right of
[   18.064469]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.064757] 
[   18.064818] The buggy address belongs to the physical page:
[   18.064994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.065107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.065158] page_type: f5(slab)
[   18.065198] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.065487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.065699] page dumped because: kasan: bad access detected
[   18.065902] 
[   18.065976] Memory state around the buggy address:
[   18.066118]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.066257]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.066396] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.066732]                                      ^
[   18.066843]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.066902]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.066942] ==================================================================
[   18.259991] ==================================================================
[   18.260111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.260163] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.260216] 
[   18.260249] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.260331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.260360] Hardware name: linux,dummy-virt (DT)
[   18.260393] Call trace:
[   18.260416]  show_stack+0x20/0x38 (C)
[   18.260596]  dump_stack_lvl+0x8c/0xd0
[   18.260659]  print_report+0x118/0x5d0
[   18.260712]  kasan_report+0xdc/0x128
[   18.260763]  kasan_check_range+0x100/0x1a8
[   18.260814]  __kasan_check_write+0x20/0x30
[   18.260859]  kasan_atomics_helper+0x154c/0x4858
[   18.260931]  kasan_atomics+0x198/0x2e0
[   18.260994]  kunit_try_run_case+0x170/0x3f0
[   18.261049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.261111]  kthread+0x328/0x630
[   18.261165]  ret_from_fork+0x10/0x20
[   18.261213] 
[   18.261234] Allocated by task 266:
[   18.261265]  kasan_save_stack+0x3c/0x68
[   18.261306]  kasan_save_track+0x20/0x40
[   18.261347]  kasan_save_alloc_info+0x40/0x58
[   18.261388]  __kasan_kmalloc+0xd4/0xd8
[   18.261427]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.261469]  kasan_atomics+0xb8/0x2e0
[   18.261506]  kunit_try_run_case+0x170/0x3f0
[   18.262334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.262397]  kthread+0x328/0x630
[   18.262445]  ret_from_fork+0x10/0x20
[   18.262483] 
[   18.262739] The buggy address belongs to the object at fff00000c63b4480
[   18.262739]  which belongs to the cache kmalloc-64 of size 64
[   18.263464] The buggy address is located 0 bytes to the right of
[   18.263464]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.263582] 
[   18.263904] The buggy address belongs to the physical page:
[   18.263992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.264072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.264742] page_type: f5(slab)
[   18.264816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.265319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.265374] page dumped because: kasan: bad access detected
[   18.265647] 
[   18.265940] Memory state around the buggy address:
[   18.266260]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.266658]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.266862] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.267154]                                      ^
[   18.267201]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.267615]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.267960] ==================================================================
[   18.091621] ==================================================================
[   18.091673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.091726] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.092053] 
[   18.092309] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.092406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.092859] Hardware name: linux,dummy-virt (DT)
[   18.092982] Call trace:
[   18.093016]  show_stack+0x20/0x38 (C)
[   18.093069]  dump_stack_lvl+0x8c/0xd0
[   18.093165]  print_report+0x118/0x5d0
[   18.093216]  kasan_report+0xdc/0x128
[   18.093265]  kasan_check_range+0x100/0x1a8
[   18.093378]  __kasan_check_write+0x20/0x30
[   18.093437]  kasan_atomics_helper+0xe44/0x4858
[   18.093486]  kasan_atomics+0x198/0x2e0
[   18.093554]  kunit_try_run_case+0x170/0x3f0
[   18.093604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.093665]  kthread+0x328/0x630
[   18.093987]  ret_from_fork+0x10/0x20
[   18.094588] 
[   18.094900] Allocated by task 266:
[   18.094970]  kasan_save_stack+0x3c/0x68
[   18.095291]  kasan_save_track+0x20/0x40
[   18.095575]  kasan_save_alloc_info+0x40/0x58
[   18.095790]  __kasan_kmalloc+0xd4/0xd8
[   18.096587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.096908]  kasan_atomics+0xb8/0x2e0
[   18.097065]  kunit_try_run_case+0x170/0x3f0
[   18.097271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.097558]  kthread+0x328/0x630
[   18.097837]  ret_from_fork+0x10/0x20
[   18.098025] 
[   18.098087] The buggy address belongs to the object at fff00000c63b4480
[   18.098087]  which belongs to the cache kmalloc-64 of size 64
[   18.098202] The buggy address is located 0 bytes to the right of
[   18.098202]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.098269] 
[   18.098755] The buggy address belongs to the physical page:
[   18.098836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.099135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.099526] page_type: f5(slab)
[   18.099607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.099816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.099891] page dumped because: kasan: bad access detected
[   18.099926] 
[   18.100068] Memory state around the buggy address:
[   18.100108]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.100156]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.100201] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.100241]                                      ^
[   18.100279]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.100344]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.100402] ==================================================================
[   18.120765] ==================================================================
[   18.121163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.121234] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.121288] 
[   18.121322] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.121404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.121829] Hardware name: linux,dummy-virt (DT)
[   18.121884] Call trace:
[   18.121939]  show_stack+0x20/0x38 (C)
[   18.122296]  dump_stack_lvl+0x8c/0xd0
[   18.122451]  print_report+0x118/0x5d0
[   18.122547]  kasan_report+0xdc/0x128
[   18.122874]  kasan_check_range+0x100/0x1a8
[   18.123025]  __kasan_check_write+0x20/0x30
[   18.123137]  kasan_atomics_helper+0xf20/0x4858
[   18.123215]  kasan_atomics+0x198/0x2e0
[   18.123347]  kunit_try_run_case+0x170/0x3f0
[   18.123398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.123828]  kthread+0x328/0x630
[   18.123904]  ret_from_fork+0x10/0x20
[   18.124383] 
[   18.124441] Allocated by task 266:
[   18.124504]  kasan_save_stack+0x3c/0x68
[   18.124612]  kasan_save_track+0x20/0x40
[   18.124653]  kasan_save_alloc_info+0x40/0x58
[   18.125012]  __kasan_kmalloc+0xd4/0xd8
[   18.125242]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.125366]  kasan_atomics+0xb8/0x2e0
[   18.125703]  kunit_try_run_case+0x170/0x3f0
[   18.126133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.126324]  kthread+0x328/0x630
[   18.126370]  ret_from_fork+0x10/0x20
[   18.126423] 
[   18.126447] The buggy address belongs to the object at fff00000c63b4480
[   18.126447]  which belongs to the cache kmalloc-64 of size 64
[   18.126728] The buggy address is located 0 bytes to the right of
[   18.126728]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.127328] 
[   18.127390] The buggy address belongs to the physical page:
[   18.127523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.127595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.127831] page_type: f5(slab)
[   18.127965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.128307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.128450] page dumped because: kasan: bad access detected
[   18.128769] 
[   18.129171] Memory state around the buggy address:
[   18.129248]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.129305]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.129478] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.129719]                                      ^
[   18.129912]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.130416]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.130488] ==================================================================
[   18.148202] ==================================================================
[   18.148443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.148661] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.148897] 
[   18.149180] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.149283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.149340] Hardware name: linux,dummy-virt (DT)
[   18.149668] Call trace:
[   18.149898]  show_stack+0x20/0x38 (C)
[   18.149967]  dump_stack_lvl+0x8c/0xd0
[   18.150015]  print_report+0x118/0x5d0
[   18.150271]  kasan_report+0xdc/0x128
[   18.150493]  kasan_check_range+0x100/0x1a8
[   18.150856]  __kasan_check_write+0x20/0x30
[   18.151082]  kasan_atomics_helper+0x1058/0x4858
[   18.151177]  kasan_atomics+0x198/0x2e0
[   18.151308]  kunit_try_run_case+0x170/0x3f0
[   18.151504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.151914]  kthread+0x328/0x630
[   18.152155]  ret_from_fork+0x10/0x20
[   18.152302] 
[   18.152378] Allocated by task 266:
[   18.152455]  kasan_save_stack+0x3c/0x68
[   18.152501]  kasan_save_track+0x20/0x40
[   18.152740]  kasan_save_alloc_info+0x40/0x58
[   18.153345]  __kasan_kmalloc+0xd4/0xd8
[   18.153543]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.153617]  kasan_atomics+0xb8/0x2e0
[   18.153759]  kunit_try_run_case+0x170/0x3f0
[   18.153802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.153848]  kthread+0x328/0x630
[   18.153912]  ret_from_fork+0x10/0x20
[   18.154254] 
[   18.154548] The buggy address belongs to the object at fff00000c63b4480
[   18.154548]  which belongs to the cache kmalloc-64 of size 64
[   18.154901] The buggy address is located 0 bytes to the right of
[   18.154901]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.155306] 
[   18.155397] The buggy address belongs to the physical page:
[   18.155516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.155907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.155992] page_type: f5(slab)
[   18.156053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.156338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.156979] page dumped because: kasan: bad access detected
[   18.157228] 
[   18.157387] Memory state around the buggy address:
[   18.157464]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.157747]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.157933] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.158159]                                      ^
[   18.158236]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.158283]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.158589] ==================================================================
[   18.185080] ==================================================================
[   18.185130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.185179] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.185230] 
[   18.185270] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.185353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.185382] Hardware name: linux,dummy-virt (DT)
[   18.185413] Call trace:
[   18.185438]  show_stack+0x20/0x38 (C)
[   18.185487]  dump_stack_lvl+0x8c/0xd0
[   18.185988]  print_report+0x118/0x5d0
[   18.186443]  kasan_report+0xdc/0x128
[   18.186554]  kasan_check_range+0x100/0x1a8
[   18.186643]  __kasan_check_write+0x20/0x30
[   18.186740]  kasan_atomics_helper+0x11f8/0x4858
[   18.186965]  kasan_atomics+0x198/0x2e0
[   18.187024]  kunit_try_run_case+0x170/0x3f0
[   18.187257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.187618]  kthread+0x328/0x630
[   18.187933]  ret_from_fork+0x10/0x20
[   18.188151] 
[   18.188347] Allocated by task 266:
[   18.188570]  kasan_save_stack+0x3c/0x68
[   18.188652]  kasan_save_track+0x20/0x40
[   18.189041]  kasan_save_alloc_info+0x40/0x58
[   18.189124]  __kasan_kmalloc+0xd4/0xd8
[   18.189212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.189354]  kasan_atomics+0xb8/0x2e0
[   18.189453]  kunit_try_run_case+0x170/0x3f0
[   18.189756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.190120]  kthread+0x328/0x630
[   18.190818]  ret_from_fork+0x10/0x20
[   18.191150] 
[   18.191209] The buggy address belongs to the object at fff00000c63b4480
[   18.191209]  which belongs to the cache kmalloc-64 of size 64
[   18.191346] The buggy address is located 0 bytes to the right of
[   18.191346]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.191604] 
[   18.192146] The buggy address belongs to the physical page:
[   18.192303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.192482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.192674] page_type: f5(slab)
[   18.193041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.193222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.193351] page dumped because: kasan: bad access detected
[   18.193390] 
[   18.193411] Memory state around the buggy address:
[   18.193682]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.194133]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.194290] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.194336]                                      ^
[   18.194374]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.194425]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.194598] ==================================================================
[   18.319186] ==================================================================
[   18.319415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.319476] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.319735] 
[   18.319879] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.319973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.320022] Hardware name: linux,dummy-virt (DT)
[   18.320064] Call trace:
[   18.320098]  show_stack+0x20/0x38 (C)
[   18.320152]  dump_stack_lvl+0x8c/0xd0
[   18.320209]  print_report+0x118/0x5d0
[   18.320267]  kasan_report+0xdc/0x128
[   18.320321]  kasan_check_range+0x100/0x1a8
[   18.320370]  __kasan_check_write+0x20/0x30
[   18.320416]  kasan_atomics_helper+0x175c/0x4858
[   18.320474]  kasan_atomics+0x198/0x2e0
[   18.320520]  kunit_try_run_case+0x170/0x3f0
[   18.320580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.320634]  kthread+0x328/0x630
[   18.320676]  ret_from_fork+0x10/0x20
[   18.320734] 
[   18.320755] Allocated by task 266:
[   18.320783]  kasan_save_stack+0x3c/0x68
[   18.320826]  kasan_save_track+0x20/0x40
[   18.320864]  kasan_save_alloc_info+0x40/0x58
[   18.320906]  __kasan_kmalloc+0xd4/0xd8
[   18.320944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.320985]  kasan_atomics+0xb8/0x2e0
[   18.321023]  kunit_try_run_case+0x170/0x3f0
[   18.321063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.321110]  kthread+0x328/0x630
[   18.321144]  ret_from_fork+0x10/0x20
[   18.321180] 
[   18.321201] The buggy address belongs to the object at fff00000c63b4480
[   18.321201]  which belongs to the cache kmalloc-64 of size 64
[   18.321266] The buggy address is located 0 bytes to the right of
[   18.321266]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.321334] 
[   18.321356] The buggy address belongs to the physical page:
[   18.321389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.321441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.321491] page_type: f5(slab)
[   18.321540] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.321615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.321660] page dumped because: kasan: bad access detected
[   18.321694] 
[   18.321714] Memory state around the buggy address:
[   18.322588]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.322660]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.322731] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.322804]                                      ^
[   18.322843]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.323863]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.323963] ==================================================================
[   18.269476] ==================================================================
[   18.269996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.270072] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266
[   18.270290] 
[   18.270350] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.270448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.270479] Hardware name: linux,dummy-virt (DT)
[   18.271129] Call trace:
[   18.271401]  show_stack+0x20/0x38 (C)
[   18.271578]  dump_stack_lvl+0x8c/0xd0
[   18.271654]  print_report+0x118/0x5d0
[   18.271824]  kasan_report+0xdc/0x128
[   18.271876]  kasan_check_range+0x100/0x1a8
[   18.271953]  __kasan_check_write+0x20/0x30
[   18.272185]  kasan_atomics_helper+0x15b4/0x4858
[   18.272508]  kasan_atomics+0x198/0x2e0
[   18.272925]  kunit_try_run_case+0x170/0x3f0
[   18.273023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.273449]  kthread+0x328/0x630
[   18.273739]  ret_from_fork+0x10/0x20
[   18.273997] 
[   18.274069] Allocated by task 266:
[   18.274247]  kasan_save_stack+0x3c/0x68
[   18.274302]  kasan_save_track+0x20/0x40
[   18.274344]  kasan_save_alloc_info+0x40/0x58
[   18.274407]  __kasan_kmalloc+0xd4/0xd8
[   18.274455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.274702]  kasan_atomics+0xb8/0x2e0
[   18.274996]  kunit_try_run_case+0x170/0x3f0
[   18.275202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.275599]  kthread+0x328/0x630
[   18.275717]  ret_from_fork+0x10/0x20
[   18.276164] 
[   18.276471] The buggy address belongs to the object at fff00000c63b4480
[   18.276471]  which belongs to the cache kmalloc-64 of size 64
[   18.276600] The buggy address is located 0 bytes to the right of
[   18.276600]  allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0)
[   18.276956] 
[   18.277159] The buggy address belongs to the physical page:
[   18.277519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4
[   18.277603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.277677] page_type: f5(slab)
[   18.277727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.277791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.277834] page dumped because: kasan: bad access detected
[   18.277878] 
[   18.277907] Memory state around the buggy address:
[   18.277953]  fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.278000]  fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.278055] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.278096]                                      ^
[   18.278140]  fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.278199]  fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.278238] ==================================================================

[   15.776304] ==================================================================
[   15.776654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.776956] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.777287] 
[   15.777402] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.777448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.777460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.777482] Call Trace:
[   15.777512]  <TASK>
[   15.777530]  dump_stack_lvl+0x73/0xb0
[   15.777558]  print_report+0xd1/0x610
[   15.777582]  ? __virt_addr_valid+0x1db/0x2d0
[   15.777605]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.777627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.777650]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.777672]  kasan_report+0x141/0x180
[   15.777695]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.777723]  kasan_check_range+0x10c/0x1c0
[   15.777747]  __kasan_check_write+0x18/0x20
[   15.777767]  kasan_atomics_helper+0x1f43/0x5450
[   15.777791]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.777814]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.777840]  ? kasan_atomics+0x152/0x310
[   15.777866]  kasan_atomics+0x1dc/0x310
[   15.777889]  ? __pfx_kasan_atomics+0x10/0x10
[   15.777912]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.777940]  ? __pfx_read_tsc+0x10/0x10
[   15.777961]  ? ktime_get_ts64+0x86/0x230
[   15.777988]  kunit_try_run_case+0x1a5/0x480
[   15.778013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.778036]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.778060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.778084]  ? __kthread_parkme+0x82/0x180
[   15.778106]  ? preempt_count_sub+0x50/0x80
[   15.778131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.778155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.778191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.778222]  kthread+0x337/0x6f0
[   15.778242]  ? trace_preempt_on+0x20/0xc0
[   15.778268]  ? __pfx_kthread+0x10/0x10
[   15.778289]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.778312]  ? calculate_sigpending+0x7b/0xa0
[   15.778337]  ? __pfx_kthread+0x10/0x10
[   15.778359]  ret_from_fork+0x116/0x1d0
[   15.778379]  ? __pfx_kthread+0x10/0x10
[   15.778399]  ret_from_fork_asm+0x1a/0x30
[   15.778430]  </TASK>
[   15.778441] 
[   15.786144] Allocated by task 283:
[   15.786290]  kasan_save_stack+0x45/0x70
[   15.786492]  kasan_save_track+0x18/0x40
[   15.786663]  kasan_save_alloc_info+0x3b/0x50
[   15.786855]  __kasan_kmalloc+0xb7/0xc0
[   15.787035]  __kmalloc_cache_noprof+0x189/0x420
[   15.787294]  kasan_atomics+0x95/0x310
[   15.787474]  kunit_try_run_case+0x1a5/0x480
[   15.787667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.787884]  kthread+0x337/0x6f0
[   15.788039]  ret_from_fork+0x116/0x1d0
[   15.788261]  ret_from_fork_asm+0x1a/0x30
[   15.788430] 
[   15.788535] The buggy address belongs to the object at ffff8881039f9d00
[   15.788535]  which belongs to the cache kmalloc-64 of size 64
[   15.788994] The buggy address is located 0 bytes to the right of
[   15.788994]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.789467] 
[   15.789557] The buggy address belongs to the physical page:
[   15.789734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.789990] flags: 0x200000000000000(node=0|zone=2)
[   15.790176] page_type: f5(slab)
[   15.790360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.790708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.791046] page dumped because: kasan: bad access detected
[   15.791440] 
[   15.791544] Memory state around the buggy address:
[   15.791771]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.792087]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.792644] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.792862]                                      ^
[   15.793020]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.793512]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.793835] ==================================================================
[   14.847039] ==================================================================
[   14.847813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.848596] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.849278] 
[   14.849526] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.849588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.849601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.849624] Call Trace:
[   14.849638]  <TASK>
[   14.849657]  dump_stack_lvl+0x73/0xb0
[   14.849688]  print_report+0xd1/0x610
[   14.849711]  ? __virt_addr_valid+0x1db/0x2d0
[   14.849735]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.849757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.849780]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.849803]  kasan_report+0x141/0x180
[   14.849826]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.849852]  kasan_check_range+0x10c/0x1c0
[   14.849877]  __kasan_check_write+0x18/0x20
[   14.849897]  kasan_atomics_helper+0xa2b/0x5450
[   14.849920]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.849943]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.849970]  ? kasan_atomics+0x152/0x310
[   14.849997]  kasan_atomics+0x1dc/0x310
[   14.850020]  ? __pfx_kasan_atomics+0x10/0x10
[   14.850043]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.850071]  ? __pfx_read_tsc+0x10/0x10
[   14.850093]  ? ktime_get_ts64+0x86/0x230
[   14.850119]  kunit_try_run_case+0x1a5/0x480
[   14.850145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.850181]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.850212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.850236]  ? __kthread_parkme+0x82/0x180
[   14.850258]  ? preempt_count_sub+0x50/0x80
[   14.850283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.850308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.850333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.850359]  kthread+0x337/0x6f0
[   14.850378]  ? trace_preempt_on+0x20/0xc0
[   14.850404]  ? __pfx_kthread+0x10/0x10
[   14.850425]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.850447]  ? calculate_sigpending+0x7b/0xa0
[   14.850474]  ? __pfx_kthread+0x10/0x10
[   14.850506]  ret_from_fork+0x116/0x1d0
[   14.850527]  ? __pfx_kthread+0x10/0x10
[   14.850549]  ret_from_fork_asm+0x1a/0x30
[   14.850580]  </TASK>
[   14.850592] 
[   14.861198] Allocated by task 283:
[   14.861327]  kasan_save_stack+0x45/0x70
[   14.861469]  kasan_save_track+0x18/0x40
[   14.861613]  kasan_save_alloc_info+0x3b/0x50
[   14.861820]  __kasan_kmalloc+0xb7/0xc0
[   14.862010]  __kmalloc_cache_noprof+0x189/0x420
[   14.862254]  kasan_atomics+0x95/0x310
[   14.862593]  kunit_try_run_case+0x1a5/0x480
[   14.862806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.863028]  kthread+0x337/0x6f0
[   14.863149]  ret_from_fork+0x116/0x1d0
[   14.863283]  ret_from_fork_asm+0x1a/0x30
[   14.863420] 
[   14.863491] The buggy address belongs to the object at ffff8881039f9d00
[   14.863491]  which belongs to the cache kmalloc-64 of size 64
[   14.863850] The buggy address is located 0 bytes to the right of
[   14.863850]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.864203] 
[   14.864276] The buggy address belongs to the physical page:
[   14.864446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.864749] flags: 0x200000000000000(node=0|zone=2)
[   14.864955] page_type: f5(slab)
[   14.865087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.865683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.865988] page dumped because: kasan: bad access detected
[   14.866269] 
[   14.866384] Memory state around the buggy address:
[   14.867286]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.867630]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.867892] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.868100]                                      ^
[   14.868251]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.868601]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.868942] ==================================================================
[   15.478811] ==================================================================
[   15.479373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.479706] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.480005] 
[   15.480116] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.480164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.480176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.480199] Call Trace:
[   15.480218]  <TASK>
[   15.480236]  dump_stack_lvl+0x73/0xb0
[   15.480264]  print_report+0xd1/0x610
[   15.480287]  ? __virt_addr_valid+0x1db/0x2d0
[   15.480312]  ? kasan_atomics_helper+0x1818/0x5450
[   15.480334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.480358]  ? kasan_atomics_helper+0x1818/0x5450
[   15.480381]  kasan_report+0x141/0x180
[   15.480403]  ? kasan_atomics_helper+0x1818/0x5450
[   15.480431]  kasan_check_range+0x10c/0x1c0
[   15.480455]  __kasan_check_write+0x18/0x20
[   15.480476]  kasan_atomics_helper+0x1818/0x5450
[   15.480508]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.480532]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.480558]  ? kasan_atomics+0x152/0x310
[   15.480585]  kasan_atomics+0x1dc/0x310
[   15.480608]  ? __pfx_kasan_atomics+0x10/0x10
[   15.480631]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.480659]  ? __pfx_read_tsc+0x10/0x10
[   15.480681]  ? ktime_get_ts64+0x86/0x230
[   15.480706]  kunit_try_run_case+0x1a5/0x480
[   15.480732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.480756]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.480782]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.480807]  ? __kthread_parkme+0x82/0x180
[   15.480828]  ? preempt_count_sub+0x50/0x80
[   15.480854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.480878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.480904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.480928]  kthread+0x337/0x6f0
[   15.480949]  ? trace_preempt_on+0x20/0xc0
[   15.480973]  ? __pfx_kthread+0x10/0x10
[   15.480994]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.481017]  ? calculate_sigpending+0x7b/0xa0
[   15.481042]  ? __pfx_kthread+0x10/0x10
[   15.481063]  ret_from_fork+0x116/0x1d0
[   15.481083]  ? __pfx_kthread+0x10/0x10
[   15.481104]  ret_from_fork_asm+0x1a/0x30
[   15.481135]  </TASK>
[   15.481146] 
[   15.488519] Allocated by task 283:
[   15.488699]  kasan_save_stack+0x45/0x70
[   15.488903]  kasan_save_track+0x18/0x40
[   15.489095]  kasan_save_alloc_info+0x3b/0x50
[   15.489296]  __kasan_kmalloc+0xb7/0xc0
[   15.489461]  __kmalloc_cache_noprof+0x189/0x420
[   15.489670]  kasan_atomics+0x95/0x310
[   15.489806]  kunit_try_run_case+0x1a5/0x480
[   15.489954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.490152]  kthread+0x337/0x6f0
[   15.490335]  ret_from_fork+0x116/0x1d0
[   15.490536]  ret_from_fork_asm+0x1a/0x30
[   15.490736] 
[   15.490832] The buggy address belongs to the object at ffff8881039f9d00
[   15.490832]  which belongs to the cache kmalloc-64 of size 64
[   15.491466] The buggy address is located 0 bytes to the right of
[   15.491466]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.491958] 
[   15.492032] The buggy address belongs to the physical page:
[   15.492345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.492694] flags: 0x200000000000000(node=0|zone=2)
[   15.492903] page_type: f5(slab)
[   15.493081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.493363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.493647] page dumped because: kasan: bad access detected
[   15.493897] 
[   15.493996] Memory state around the buggy address:
[   15.494273]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.494507]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.494817] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.495131]                                      ^
[   15.495360]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.495630]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.495897] ==================================================================
[   15.609695] ==================================================================
[   15.610228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.610779] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.611414] 
[   15.611559] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.611607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.611620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.611643] Call Trace:
[   15.611662]  <TASK>
[   15.611679]  dump_stack_lvl+0x73/0xb0
[   15.611711]  print_report+0xd1/0x610
[   15.611734]  ? __virt_addr_valid+0x1db/0x2d0
[   15.611758]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.611780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.611804]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.611826]  kasan_report+0x141/0x180
[   15.611849]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.611875]  kasan_check_range+0x10c/0x1c0
[   15.611900]  __kasan_check_write+0x18/0x20
[   15.611920]  kasan_atomics_helper+0x1b22/0x5450
[   15.611944]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.611966]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.611992]  ? kasan_atomics+0x152/0x310
[   15.612021]  kasan_atomics+0x1dc/0x310
[   15.612044]  ? __pfx_kasan_atomics+0x10/0x10
[   15.612067]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.612095]  ? __pfx_read_tsc+0x10/0x10
[   15.612116]  ? ktime_get_ts64+0x86/0x230
[   15.612142]  kunit_try_run_case+0x1a5/0x480
[   15.612338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.612366]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.612390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.612415]  ? __kthread_parkme+0x82/0x180
[   15.612437]  ? preempt_count_sub+0x50/0x80
[   15.612505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.612533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.612559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.612584]  kthread+0x337/0x6f0
[   15.612605]  ? trace_preempt_on+0x20/0xc0
[   15.612630]  ? __pfx_kthread+0x10/0x10
[   15.612651]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.612675]  ? calculate_sigpending+0x7b/0xa0
[   15.612700]  ? __pfx_kthread+0x10/0x10
[   15.612722]  ret_from_fork+0x116/0x1d0
[   15.612741]  ? __pfx_kthread+0x10/0x10
[   15.612762]  ret_from_fork_asm+0x1a/0x30
[   15.612794]  </TASK>
[   15.612806] 
[   15.624939] Allocated by task 283:
[   15.625130]  kasan_save_stack+0x45/0x70
[   15.625494]  kasan_save_track+0x18/0x40
[   15.625693]  kasan_save_alloc_info+0x3b/0x50
[   15.625876]  __kasan_kmalloc+0xb7/0xc0
[   15.626050]  __kmalloc_cache_noprof+0x189/0x420
[   15.626631]  kasan_atomics+0x95/0x310
[   15.626937]  kunit_try_run_case+0x1a5/0x480
[   15.627388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.627820]  kthread+0x337/0x6f0
[   15.628058]  ret_from_fork+0x116/0x1d0
[   15.628362]  ret_from_fork_asm+0x1a/0x30
[   15.628572] 
[   15.628666] The buggy address belongs to the object at ffff8881039f9d00
[   15.628666]  which belongs to the cache kmalloc-64 of size 64
[   15.629136] The buggy address is located 0 bytes to the right of
[   15.629136]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.630090] 
[   15.630223] The buggy address belongs to the physical page:
[   15.630679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.631273] flags: 0x200000000000000(node=0|zone=2)
[   15.631637] page_type: f5(slab)
[   15.631927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.632537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.632960] page dumped because: kasan: bad access detected
[   15.633469] 
[   15.633584] Memory state around the buggy address:
[   15.633802]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.634085]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.634787] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.635432]                                      ^
[   15.635908]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.636368]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.636650] ==================================================================
[   15.036307] ==================================================================
[   15.036622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.036969] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.037370] 
[   15.037520] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.037567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.037579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.037602] Call Trace:
[   15.037631]  <TASK>
[   15.037649]  dump_stack_lvl+0x73/0xb0
[   15.037678]  print_report+0xd1/0x610
[   15.037713]  ? __virt_addr_valid+0x1db/0x2d0
[   15.037737]  ? kasan_atomics_helper+0xf10/0x5450
[   15.037759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.037783]  ? kasan_atomics_helper+0xf10/0x5450
[   15.037806]  kasan_report+0x141/0x180
[   15.037828]  ? kasan_atomics_helper+0xf10/0x5450
[   15.037855]  kasan_check_range+0x10c/0x1c0
[   15.037879]  __kasan_check_write+0x18/0x20
[   15.037898]  kasan_atomics_helper+0xf10/0x5450
[   15.037922]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.037945]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.037971]  ? kasan_atomics+0x152/0x310
[   15.037998]  kasan_atomics+0x1dc/0x310
[   15.038021]  ? __pfx_kasan_atomics+0x10/0x10
[   15.038044]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.038071]  ? __pfx_read_tsc+0x10/0x10
[   15.038093]  ? ktime_get_ts64+0x86/0x230
[   15.038120]  kunit_try_run_case+0x1a5/0x480
[   15.038165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.038189]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.038217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.038241]  ? __kthread_parkme+0x82/0x180
[   15.038262]  ? preempt_count_sub+0x50/0x80
[   15.038295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.038320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.038344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.038383]  kthread+0x337/0x6f0
[   15.038403]  ? trace_preempt_on+0x20/0xc0
[   15.038427]  ? __pfx_kthread+0x10/0x10
[   15.038459]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.038481]  ? calculate_sigpending+0x7b/0xa0
[   15.038515]  ? __pfx_kthread+0x10/0x10
[   15.038537]  ret_from_fork+0x116/0x1d0
[   15.038557]  ? __pfx_kthread+0x10/0x10
[   15.038578]  ret_from_fork_asm+0x1a/0x30
[   15.038609]  </TASK>
[   15.038620] 
[   15.046389] Allocated by task 283:
[   15.046578]  kasan_save_stack+0x45/0x70
[   15.046796]  kasan_save_track+0x18/0x40
[   15.046971]  kasan_save_alloc_info+0x3b/0x50
[   15.047196]  __kasan_kmalloc+0xb7/0xc0
[   15.047390]  __kmalloc_cache_noprof+0x189/0x420
[   15.047614]  kasan_atomics+0x95/0x310
[   15.047823]  kunit_try_run_case+0x1a5/0x480
[   15.048009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.048299]  kthread+0x337/0x6f0
[   15.048444]  ret_from_fork+0x116/0x1d0
[   15.048671]  ret_from_fork_asm+0x1a/0x30
[   15.048873] 
[   15.048964] The buggy address belongs to the object at ffff8881039f9d00
[   15.048964]  which belongs to the cache kmalloc-64 of size 64
[   15.049463] The buggy address is located 0 bytes to the right of
[   15.049463]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.049989] 
[   15.050067] The buggy address belongs to the physical page:
[   15.050391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.050773] flags: 0x200000000000000(node=0|zone=2)
[   15.050996] page_type: f5(slab)
[   15.051211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.051821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.052524] page dumped because: kasan: bad access detected
[   15.052713] 
[   15.052787] Memory state around the buggy address:
[   15.052947]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.054057]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.054856] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.055493]                                      ^
[   15.055933]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.056584]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.057210] ==================================================================
[   15.524565] ==================================================================
[   15.525474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.526634] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.527426] 
[   15.527744] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.527798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.527812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.527835] Call Trace:
[   15.527856]  <TASK>
[   15.527876]  dump_stack_lvl+0x73/0xb0
[   15.527908]  print_report+0xd1/0x610
[   15.527931]  ? __virt_addr_valid+0x1db/0x2d0
[   15.527956]  ? kasan_atomics_helper+0x194a/0x5450
[   15.527978]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.528002]  ? kasan_atomics_helper+0x194a/0x5450
[   15.528024]  kasan_report+0x141/0x180
[   15.528047]  ? kasan_atomics_helper+0x194a/0x5450
[   15.528074]  kasan_check_range+0x10c/0x1c0
[   15.528099]  __kasan_check_write+0x18/0x20
[   15.528119]  kasan_atomics_helper+0x194a/0x5450
[   15.528143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.528276]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.528306]  ? kasan_atomics+0x152/0x310
[   15.528334]  kasan_atomics+0x1dc/0x310
[   15.528358]  ? __pfx_kasan_atomics+0x10/0x10
[   15.528381]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.528441]  ? __pfx_read_tsc+0x10/0x10
[   15.528465]  ? ktime_get_ts64+0x86/0x230
[   15.528491]  kunit_try_run_case+0x1a5/0x480
[   15.528525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.528548]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.528572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.528597]  ? __kthread_parkme+0x82/0x180
[   15.528619]  ? preempt_count_sub+0x50/0x80
[   15.528644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.528669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.528694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.528719]  kthread+0x337/0x6f0
[   15.528739]  ? trace_preempt_on+0x20/0xc0
[   15.528763]  ? __pfx_kthread+0x10/0x10
[   15.528785]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.528807]  ? calculate_sigpending+0x7b/0xa0
[   15.528833]  ? __pfx_kthread+0x10/0x10
[   15.528855]  ret_from_fork+0x116/0x1d0
[   15.528875]  ? __pfx_kthread+0x10/0x10
[   15.528896]  ret_from_fork_asm+0x1a/0x30
[   15.528928]  </TASK>
[   15.528939] 
[   15.541549] Allocated by task 283:
[   15.541853]  kasan_save_stack+0x45/0x70
[   15.542046]  kasan_save_track+0x18/0x40
[   15.542528]  kasan_save_alloc_info+0x3b/0x50
[   15.542792]  __kasan_kmalloc+0xb7/0xc0
[   15.543087]  __kmalloc_cache_noprof+0x189/0x420
[   15.543453]  kasan_atomics+0x95/0x310
[   15.543639]  kunit_try_run_case+0x1a5/0x480
[   15.543831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.544047]  kthread+0x337/0x6f0
[   15.544535]  ret_from_fork+0x116/0x1d0
[   15.544781]  ret_from_fork_asm+0x1a/0x30
[   15.545088] 
[   15.545339] The buggy address belongs to the object at ffff8881039f9d00
[   15.545339]  which belongs to the cache kmalloc-64 of size 64
[   15.546107] The buggy address is located 0 bytes to the right of
[   15.546107]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.546764] 
[   15.546863] The buggy address belongs to the physical page:
[   15.547093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.547857] flags: 0x200000000000000(node=0|zone=2)
[   15.548515] page_type: f5(slab)
[   15.548744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.549402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.549918] page dumped because: kasan: bad access detected
[   15.550427] 
[   15.550550] Memory state around the buggy address:
[   15.550773]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.551036]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.551611] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.552103]                                      ^
[   15.552469]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.552784]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.553063] ==================================================================
[   15.950641] ==================================================================
[   15.951078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.951304] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.951527] 
[   15.951611] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.951671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.951695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.951717] Call Trace:
[   15.951736]  <TASK>
[   15.951753]  dump_stack_lvl+0x73/0xb0
[   15.951797]  print_report+0xd1/0x610
[   15.951820]  ? __virt_addr_valid+0x1db/0x2d0
[   15.951843]  ? kasan_atomics_helper+0x224c/0x5450
[   15.951865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.951888]  ? kasan_atomics_helper+0x224c/0x5450
[   15.951911]  kasan_report+0x141/0x180
[   15.951933]  ? kasan_atomics_helper+0x224c/0x5450
[   15.951960]  kasan_check_range+0x10c/0x1c0
[   15.951984]  __kasan_check_write+0x18/0x20
[   15.952003]  kasan_atomics_helper+0x224c/0x5450
[   15.952027]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.952050]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.952075]  ? kasan_atomics+0x152/0x310
[   15.952102]  kasan_atomics+0x1dc/0x310
[   15.952125]  ? __pfx_kasan_atomics+0x10/0x10
[   15.952147]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.952174]  ? __pfx_read_tsc+0x10/0x10
[   15.952195]  ? ktime_get_ts64+0x86/0x230
[   15.952220]  kunit_try_run_case+0x1a5/0x480
[   15.952244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.952268]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.952291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.952315]  ? __kthread_parkme+0x82/0x180
[   15.952336]  ? preempt_count_sub+0x50/0x80
[   15.952362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.952387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.952411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.952436]  kthread+0x337/0x6f0
[   15.952456]  ? trace_preempt_on+0x20/0xc0
[   15.952480]  ? __pfx_kthread+0x10/0x10
[   15.952511]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.952534]  ? calculate_sigpending+0x7b/0xa0
[   15.952559]  ? __pfx_kthread+0x10/0x10
[   15.952580]  ret_from_fork+0x116/0x1d0
[   15.952599]  ? __pfx_kthread+0x10/0x10
[   15.952620]  ret_from_fork_asm+0x1a/0x30
[   15.952652]  </TASK>
[   15.952663] 
[   15.960581] Allocated by task 283:
[   15.960719]  kasan_save_stack+0x45/0x70
[   15.960938]  kasan_save_track+0x18/0x40
[   15.961134]  kasan_save_alloc_info+0x3b/0x50
[   15.961309]  __kasan_kmalloc+0xb7/0xc0
[   15.961458]  __kmalloc_cache_noprof+0x189/0x420
[   15.961697]  kasan_atomics+0x95/0x310
[   15.961879]  kunit_try_run_case+0x1a5/0x480
[   15.962089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.962350]  kthread+0x337/0x6f0
[   15.962527]  ret_from_fork+0x116/0x1d0
[   15.962715]  ret_from_fork_asm+0x1a/0x30
[   15.962894] 
[   15.962993] The buggy address belongs to the object at ffff8881039f9d00
[   15.962993]  which belongs to the cache kmalloc-64 of size 64
[   15.963538] The buggy address is located 0 bytes to the right of
[   15.963538]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.964034] 
[   15.964132] The buggy address belongs to the physical page:
[   15.964368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.964626] flags: 0x200000000000000(node=0|zone=2)
[   15.964796] page_type: f5(slab)
[   15.964920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.965155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.965897] page dumped because: kasan: bad access detected
[   15.966144] 
[   15.966276] Memory state around the buggy address:
[   15.966735]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.967316]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.967537] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.967750]                                      ^
[   15.967904]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.968118]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.968459] ==================================================================
[   15.887369] ==================================================================
[   15.887649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.887913] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.888672] 
[   15.888852] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.888911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.888924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.888946] Call Trace:
[   15.888978]  <TASK>
[   15.888997]  dump_stack_lvl+0x73/0xb0
[   15.889028]  print_report+0xd1/0x610
[   15.889060]  ? __virt_addr_valid+0x1db/0x2d0
[   15.889084]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.889105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.889139]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.889162]  kasan_report+0x141/0x180
[   15.889195]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.889222]  __asan_report_load8_noabort+0x18/0x20
[   15.889247]  kasan_atomics_helper+0x4fb2/0x5450
[   15.889270]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.889293]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.889318]  ? kasan_atomics+0x152/0x310
[   15.889346]  kasan_atomics+0x1dc/0x310
[   15.889368]  ? __pfx_kasan_atomics+0x10/0x10
[   15.889391]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.889418]  ? __pfx_read_tsc+0x10/0x10
[   15.889439]  ? ktime_get_ts64+0x86/0x230
[   15.889465]  kunit_try_run_case+0x1a5/0x480
[   15.889490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.889523]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.889555]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.889580]  ? __kthread_parkme+0x82/0x180
[   15.889600]  ? preempt_count_sub+0x50/0x80
[   15.889635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.889660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.889685]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.889711]  kthread+0x337/0x6f0
[   15.889732]  ? trace_preempt_on+0x20/0xc0
[   15.889759]  ? __pfx_kthread+0x10/0x10
[   15.889782]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.889804]  ? calculate_sigpending+0x7b/0xa0
[   15.889830]  ? __pfx_kthread+0x10/0x10
[   15.889851]  ret_from_fork+0x116/0x1d0
[   15.889871]  ? __pfx_kthread+0x10/0x10
[   15.889891]  ret_from_fork_asm+0x1a/0x30
[   15.889923]  </TASK>
[   15.889934] 
[   15.902977] Allocated by task 283:
[   15.903410]  kasan_save_stack+0x45/0x70
[   15.903818]  kasan_save_track+0x18/0x40
[   15.904216]  kasan_save_alloc_info+0x3b/0x50
[   15.904629]  __kasan_kmalloc+0xb7/0xc0
[   15.904985]  __kmalloc_cache_noprof+0x189/0x420
[   15.905388]  kasan_atomics+0x95/0x310
[   15.905560]  kunit_try_run_case+0x1a5/0x480
[   15.905709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.905884]  kthread+0x337/0x6f0
[   15.906005]  ret_from_fork+0x116/0x1d0
[   15.906139]  ret_from_fork_asm+0x1a/0x30
[   15.906597] 
[   15.906776] The buggy address belongs to the object at ffff8881039f9d00
[   15.906776]  which belongs to the cache kmalloc-64 of size 64
[   15.907860] The buggy address is located 0 bytes to the right of
[   15.907860]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.908973] 
[   15.909176] The buggy address belongs to the physical page:
[   15.909685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.910373] flags: 0x200000000000000(node=0|zone=2)
[   15.910559] page_type: f5(slab)
[   15.910685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.910917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.911146] page dumped because: kasan: bad access detected
[   15.911322] 
[   15.911391] Memory state around the buggy address:
[   15.911669]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.912024]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.912388] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.912617]                                      ^
[   15.912840]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.913185]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.913642] ==================================================================
[   14.999334] ==================================================================
[   14.999908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.000283] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.000634] 
[   15.000748] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.000796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.000819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.000842] Call Trace:
[   15.000862]  <TASK>
[   15.000880]  dump_stack_lvl+0x73/0xb0
[   15.000910]  print_report+0xd1/0x610
[   15.000943]  ? __virt_addr_valid+0x1db/0x2d0
[   15.000968]  ? kasan_atomics_helper+0xde0/0x5450
[   15.000990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.001027]  ? kasan_atomics_helper+0xde0/0x5450
[   15.001050]  kasan_report+0x141/0x180
[   15.001073]  ? kasan_atomics_helper+0xde0/0x5450
[   15.001106]  kasan_check_range+0x10c/0x1c0
[   15.001131]  __kasan_check_write+0x18/0x20
[   15.001175]  kasan_atomics_helper+0xde0/0x5450
[   15.001199]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.001223]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.001249]  ? kasan_atomics+0x152/0x310
[   15.001277]  kasan_atomics+0x1dc/0x310
[   15.001301]  ? __pfx_kasan_atomics+0x10/0x10
[   15.001323]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.001351]  ? __pfx_read_tsc+0x10/0x10
[   15.001373]  ? ktime_get_ts64+0x86/0x230
[   15.001399]  kunit_try_run_case+0x1a5/0x480
[   15.001424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.001448]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.001472]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.001504]  ? __kthread_parkme+0x82/0x180
[   15.001536]  ? preempt_count_sub+0x50/0x80
[   15.001561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.001586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.001621]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.001647]  kthread+0x337/0x6f0
[   15.001666]  ? trace_preempt_on+0x20/0xc0
[   15.001690]  ? __pfx_kthread+0x10/0x10
[   15.001711]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.001733]  ? calculate_sigpending+0x7b/0xa0
[   15.001759]  ? __pfx_kthread+0x10/0x10
[   15.001781]  ret_from_fork+0x116/0x1d0
[   15.001800]  ? __pfx_kthread+0x10/0x10
[   15.001821]  ret_from_fork_asm+0x1a/0x30
[   15.001853]  </TASK>
[   15.001865] 
[   15.009785] Allocated by task 283:
[   15.009971]  kasan_save_stack+0x45/0x70
[   15.010173]  kasan_save_track+0x18/0x40
[   15.010384]  kasan_save_alloc_info+0x3b/0x50
[   15.010581]  __kasan_kmalloc+0xb7/0xc0
[   15.010785]  __kmalloc_cache_noprof+0x189/0x420
[   15.010988]  kasan_atomics+0x95/0x310
[   15.011222]  kunit_try_run_case+0x1a5/0x480
[   15.011371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.011597]  kthread+0x337/0x6f0
[   15.011775]  ret_from_fork+0x116/0x1d0
[   15.011961]  ret_from_fork_asm+0x1a/0x30
[   15.012179] 
[   15.012276] The buggy address belongs to the object at ffff8881039f9d00
[   15.012276]  which belongs to the cache kmalloc-64 of size 64
[   15.012788] The buggy address is located 0 bytes to the right of
[   15.012788]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.013215] 
[   15.013289] The buggy address belongs to the physical page:
[   15.013464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.013827] flags: 0x200000000000000(node=0|zone=2)
[   15.014062] page_type: f5(slab)
[   15.014276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.014625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.014894] page dumped because: kasan: bad access detected
[   15.015071] 
[   15.015161] Memory state around the buggy address:
[   15.015423]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.015754]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.016095] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.016436]                                      ^
[   15.016660]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.016980]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.017313] ==================================================================
[   14.646841] ==================================================================
[   14.647370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.647808] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.648242] 
[   14.648349] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.648396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.648409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.648431] Call Trace:
[   14.648451]  <TASK>
[   14.648489]  dump_stack_lvl+0x73/0xb0
[   14.648535]  print_report+0xd1/0x610
[   14.648558]  ? __virt_addr_valid+0x1db/0x2d0
[   14.648583]  ? kasan_atomics_helper+0x565/0x5450
[   14.648604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.648628]  ? kasan_atomics_helper+0x565/0x5450
[   14.648669]  kasan_report+0x141/0x180
[   14.648691]  ? kasan_atomics_helper+0x565/0x5450
[   14.648718]  kasan_check_range+0x10c/0x1c0
[   14.648742]  __kasan_check_write+0x18/0x20
[   14.648763]  kasan_atomics_helper+0x565/0x5450
[   14.648787]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.648826]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.648853]  ? kasan_atomics+0x152/0x310
[   14.648880]  kasan_atomics+0x1dc/0x310
[   14.648903]  ? __pfx_kasan_atomics+0x10/0x10
[   14.648925]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.648953]  ? __pfx_read_tsc+0x10/0x10
[   14.648975]  ? ktime_get_ts64+0x86/0x230
[   14.649001]  kunit_try_run_case+0x1a5/0x480
[   14.649026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.649061]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.649085]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.649109]  ? __kthread_parkme+0x82/0x180
[   14.649131]  ? preempt_count_sub+0x50/0x80
[   14.649246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.649273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.649299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.649345]  kthread+0x337/0x6f0
[   14.649366]  ? trace_preempt_on+0x20/0xc0
[   14.649405]  ? __pfx_kthread+0x10/0x10
[   14.649439]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.649462]  ? calculate_sigpending+0x7b/0xa0
[   14.649511]  ? __pfx_kthread+0x10/0x10
[   14.649547]  ret_from_fork+0x116/0x1d0
[   14.649580]  ? __pfx_kthread+0x10/0x10
[   14.649602]  ret_from_fork_asm+0x1a/0x30
[   14.649661]  </TASK>
[   14.649672] 
[   14.659306] Allocated by task 283:
[   14.659520]  kasan_save_stack+0x45/0x70
[   14.659735]  kasan_save_track+0x18/0x40
[   14.659953]  kasan_save_alloc_info+0x3b/0x50
[   14.660238]  __kasan_kmalloc+0xb7/0xc0
[   14.660387]  __kmalloc_cache_noprof+0x189/0x420
[   14.660564]  kasan_atomics+0x95/0x310
[   14.660782]  kunit_try_run_case+0x1a5/0x480
[   14.661003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.661489]  kthread+0x337/0x6f0
[   14.661692]  ret_from_fork+0x116/0x1d0
[   14.661883]  ret_from_fork_asm+0x1a/0x30
[   14.662052] 
[   14.662150] The buggy address belongs to the object at ffff8881039f9d00
[   14.662150]  which belongs to the cache kmalloc-64 of size 64
[   14.662683] The buggy address is located 0 bytes to the right of
[   14.662683]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.663275] 
[   14.663370] The buggy address belongs to the physical page:
[   14.663935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.664348] flags: 0x200000000000000(node=0|zone=2)
[   14.664605] page_type: f5(slab)
[   14.664763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.665116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.665454] page dumped because: kasan: bad access detected
[   14.665786] 
[   14.665883] Memory state around the buggy address:
[   14.666634]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.666944]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.667827] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.668304]                                      ^
[   14.668758]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.669354]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.669766] ==================================================================
[   15.739143] ==================================================================
[   15.739715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.740375] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.740704] 
[   15.740851] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.740898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.740910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.740932] Call Trace:
[   15.740950]  <TASK>
[   15.740967]  dump_stack_lvl+0x73/0xb0
[   15.740995]  print_report+0xd1/0x610
[   15.741018]  ? __virt_addr_valid+0x1db/0x2d0
[   15.741042]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.741063]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.741087]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.741109]  kasan_report+0x141/0x180
[   15.741132]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.741159]  kasan_check_range+0x10c/0x1c0
[   15.741184]  __kasan_check_write+0x18/0x20
[   15.741204]  kasan_atomics_helper+0x1e12/0x5450
[   15.741227]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.741250]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.741276]  ? kasan_atomics+0x152/0x310
[   15.741303]  kasan_atomics+0x1dc/0x310
[   15.741326]  ? __pfx_kasan_atomics+0x10/0x10
[   15.741348]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.741375]  ? __pfx_read_tsc+0x10/0x10
[   15.741397]  ? ktime_get_ts64+0x86/0x230
[   15.741422]  kunit_try_run_case+0x1a5/0x480
[   15.741447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.741471]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.741494]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.741531]  ? __kthread_parkme+0x82/0x180
[   15.741552]  ? preempt_count_sub+0x50/0x80
[   15.741577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.741602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.741627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.741652]  kthread+0x337/0x6f0
[   15.741672]  ? trace_preempt_on+0x20/0xc0
[   15.741697]  ? __pfx_kthread+0x10/0x10
[   15.741717]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.741740]  ? calculate_sigpending+0x7b/0xa0
[   15.741765]  ? __pfx_kthread+0x10/0x10
[   15.741787]  ret_from_fork+0x116/0x1d0
[   15.741807]  ? __pfx_kthread+0x10/0x10
[   15.741827]  ret_from_fork_asm+0x1a/0x30
[   15.741858]  </TASK>
[   15.741869] 
[   15.749871] Allocated by task 283:
[   15.750069]  kasan_save_stack+0x45/0x70
[   15.750310]  kasan_save_track+0x18/0x40
[   15.750456]  kasan_save_alloc_info+0x3b/0x50
[   15.750619]  __kasan_kmalloc+0xb7/0xc0
[   15.750768]  __kmalloc_cache_noprof+0x189/0x420
[   15.750940]  kasan_atomics+0x95/0x310
[   15.751082]  kunit_try_run_case+0x1a5/0x480
[   15.751406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.751729]  kthread+0x337/0x6f0
[   15.752002]  ret_from_fork+0x116/0x1d0
[   15.752412]  ret_from_fork_asm+0x1a/0x30
[   15.752852] 
[   15.752950] The buggy address belongs to the object at ffff8881039f9d00
[   15.752950]  which belongs to the cache kmalloc-64 of size 64
[   15.753394] The buggy address is located 0 bytes to the right of
[   15.753394]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.753769] 
[   15.753842] The buggy address belongs to the physical page:
[   15.754016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.754270] flags: 0x200000000000000(node=0|zone=2)
[   15.754438] page_type: f5(slab)
[   15.754575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.754989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.755460] page dumped because: kasan: bad access detected
[   15.755896] 
[   15.755989] Memory state around the buggy address:
[   15.756210]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.756530]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.756789] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.757004]                                      ^
[   15.757158]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.757372]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.757593] ==================================================================
[   15.309919] ==================================================================
[   15.310275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.310779] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.311016] 
[   15.311131] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.311199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.311212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.311235] Call Trace:
[   15.311254]  <TASK>
[   15.311274]  dump_stack_lvl+0x73/0xb0
[   15.311303]  print_report+0xd1/0x610
[   15.311325]  ? __virt_addr_valid+0x1db/0x2d0
[   15.311349]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.311371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.311411]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.311434]  kasan_report+0x141/0x180
[   15.311456]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.311483]  __asan_report_load8_noabort+0x18/0x20
[   15.311518]  kasan_atomics_helper+0x4eae/0x5450
[   15.311567]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.311591]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.311618]  ? kasan_atomics+0x152/0x310
[   15.311645]  kasan_atomics+0x1dc/0x310
[   15.311668]  ? __pfx_kasan_atomics+0x10/0x10
[   15.311691]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.311719]  ? __pfx_read_tsc+0x10/0x10
[   15.311741]  ? ktime_get_ts64+0x86/0x230
[   15.311767]  kunit_try_run_case+0x1a5/0x480
[   15.311794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.311817]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.311840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.311865]  ? __kthread_parkme+0x82/0x180
[   15.311887]  ? preempt_count_sub+0x50/0x80
[   15.311913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.311937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.311964]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.311989]  kthread+0x337/0x6f0
[   15.312008]  ? trace_preempt_on+0x20/0xc0
[   15.312039]  ? __pfx_kthread+0x10/0x10
[   15.312059]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.312081]  ? calculate_sigpending+0x7b/0xa0
[   15.312106]  ? __pfx_kthread+0x10/0x10
[   15.312128]  ret_from_fork+0x116/0x1d0
[   15.312147]  ? __pfx_kthread+0x10/0x10
[   15.312168]  ret_from_fork_asm+0x1a/0x30
[   15.312200]  </TASK>
[   15.312211] 
[   15.319621] Allocated by task 283:
[   15.319750]  kasan_save_stack+0x45/0x70
[   15.319897]  kasan_save_track+0x18/0x40
[   15.320035]  kasan_save_alloc_info+0x3b/0x50
[   15.320226]  __kasan_kmalloc+0xb7/0xc0
[   15.320416]  __kmalloc_cache_noprof+0x189/0x420
[   15.320644]  kasan_atomics+0x95/0x310
[   15.320831]  kunit_try_run_case+0x1a5/0x480
[   15.321039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.321315]  kthread+0x337/0x6f0
[   15.321483]  ret_from_fork+0x116/0x1d0
[   15.321636]  ret_from_fork_asm+0x1a/0x30
[   15.321837] 
[   15.321934] The buggy address belongs to the object at ffff8881039f9d00
[   15.321934]  which belongs to the cache kmalloc-64 of size 64
[   15.322425] The buggy address is located 0 bytes to the right of
[   15.322425]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.322891] 
[   15.322965] The buggy address belongs to the physical page:
[   15.323141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.323477] flags: 0x200000000000000(node=0|zone=2)
[   15.323729] page_type: f5(slab)
[   15.323907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.324284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.324647] page dumped because: kasan: bad access detected
[   15.324874] 
[   15.324969] Memory state around the buggy address:
[   15.325131]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.325372]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.325601] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.325816]                                      ^
[   15.325972]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.326330]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.326655] ==================================================================
[   15.344915] ==================================================================
[   15.345310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.345605] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.345899] 
[   15.346053] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.346098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.346110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.346132] Call Trace:
[   15.346171]  <TASK>
[   15.346188]  dump_stack_lvl+0x73/0xb0
[   15.346222]  print_report+0xd1/0x610
[   15.346244]  ? __virt_addr_valid+0x1db/0x2d0
[   15.346268]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.346290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.346314]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.346336]  kasan_report+0x141/0x180
[   15.346358]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.346385]  __asan_report_store8_noabort+0x1b/0x30
[   15.346421]  kasan_atomics_helper+0x50d4/0x5450
[   15.346444]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.346467]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.346493]  ? kasan_atomics+0x152/0x310
[   15.346529]  kasan_atomics+0x1dc/0x310
[   15.346553]  ? __pfx_kasan_atomics+0x10/0x10
[   15.346575]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.346603]  ? __pfx_read_tsc+0x10/0x10
[   15.346624]  ? ktime_get_ts64+0x86/0x230
[   15.346649]  kunit_try_run_case+0x1a5/0x480
[   15.346675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.346698]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.346721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.346746]  ? __kthread_parkme+0x82/0x180
[   15.346767]  ? preempt_count_sub+0x50/0x80
[   15.346791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.346815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.346840]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.346864]  kthread+0x337/0x6f0
[   15.346884]  ? trace_preempt_on+0x20/0xc0
[   15.346908]  ? __pfx_kthread+0x10/0x10
[   15.346929]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.346950]  ? calculate_sigpending+0x7b/0xa0
[   15.346976]  ? __pfx_kthread+0x10/0x10
[   15.346998]  ret_from_fork+0x116/0x1d0
[   15.347018]  ? __pfx_kthread+0x10/0x10
[   15.347039]  ret_from_fork_asm+0x1a/0x30
[   15.347070]  </TASK>
[   15.347081] 
[   15.354454] Allocated by task 283:
[   15.354644]  kasan_save_stack+0x45/0x70
[   15.354823]  kasan_save_track+0x18/0x40
[   15.354984]  kasan_save_alloc_info+0x3b/0x50
[   15.355136]  __kasan_kmalloc+0xb7/0xc0
[   15.355289]  __kmalloc_cache_noprof+0x189/0x420
[   15.355447]  kasan_atomics+0x95/0x310
[   15.355593]  kunit_try_run_case+0x1a5/0x480
[   15.355743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.355920]  kthread+0x337/0x6f0
[   15.356040]  ret_from_fork+0x116/0x1d0
[   15.356193]  ret_from_fork_asm+0x1a/0x30
[   15.356336] 
[   15.356409] The buggy address belongs to the object at ffff8881039f9d00
[   15.356409]  which belongs to the cache kmalloc-64 of size 64
[   15.356929] The buggy address is located 0 bytes to the right of
[   15.356929]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.357508] 
[   15.357605] The buggy address belongs to the physical page:
[   15.357854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.358238] flags: 0x200000000000000(node=0|zone=2)
[   15.358474] page_type: f5(slab)
[   15.358650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.358913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.359162] page dumped because: kasan: bad access detected
[   15.359337] 
[   15.359407] Memory state around the buggy address:
[   15.359606]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.359926]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.360267] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.360590]                                      ^
[   15.360813]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361133]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361450] ==================================================================
[   15.664993] ==================================================================
[   15.665558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.665869] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.666459] 
[   15.666848] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.667010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.667029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.667052] Call Trace:
[   15.667074]  <TASK>
[   15.667094]  dump_stack_lvl+0x73/0xb0
[   15.667161]  print_report+0xd1/0x610
[   15.667186]  ? __virt_addr_valid+0x1db/0x2d0
[   15.667210]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.667232]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.667256]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.667279]  kasan_report+0x141/0x180
[   15.667301]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.667330]  __asan_report_load8_noabort+0x18/0x20
[   15.667356]  kasan_atomics_helper+0x4f30/0x5450
[   15.667381]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.667405]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.667434]  ? kasan_atomics+0x152/0x310
[   15.667461]  kasan_atomics+0x1dc/0x310
[   15.667485]  ? __pfx_kasan_atomics+0x10/0x10
[   15.667518]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.667546]  ? __pfx_read_tsc+0x10/0x10
[   15.667569]  ? ktime_get_ts64+0x86/0x230
[   15.667594]  kunit_try_run_case+0x1a5/0x480
[   15.667620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.667643]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.667667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.667691]  ? __kthread_parkme+0x82/0x180
[   15.667712]  ? preempt_count_sub+0x50/0x80
[   15.667737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.667762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.667787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.667811]  kthread+0x337/0x6f0
[   15.667831]  ? trace_preempt_on+0x20/0xc0
[   15.667855]  ? __pfx_kthread+0x10/0x10
[   15.667876]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.667898]  ? calculate_sigpending+0x7b/0xa0
[   15.667924]  ? __pfx_kthread+0x10/0x10
[   15.667946]  ret_from_fork+0x116/0x1d0
[   15.667966]  ? __pfx_kthread+0x10/0x10
[   15.667986]  ret_from_fork_asm+0x1a/0x30
[   15.668018]  </TASK>
[   15.668030] 
[   15.679345] Allocated by task 283:
[   15.679730]  kasan_save_stack+0x45/0x70
[   15.680050]  kasan_save_track+0x18/0x40
[   15.680489]  kasan_save_alloc_info+0x3b/0x50
[   15.680754]  __kasan_kmalloc+0xb7/0xc0
[   15.681042]  __kmalloc_cache_noprof+0x189/0x420
[   15.681550]  kasan_atomics+0x95/0x310
[   15.681780]  kunit_try_run_case+0x1a5/0x480
[   15.681974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.682440]  kthread+0x337/0x6f0
[   15.682688]  ret_from_fork+0x116/0x1d0
[   15.682987]  ret_from_fork_asm+0x1a/0x30
[   15.683308] 
[   15.683400] The buggy address belongs to the object at ffff8881039f9d00
[   15.683400]  which belongs to the cache kmalloc-64 of size 64
[   15.684066] The buggy address is located 0 bytes to the right of
[   15.684066]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.685225] 
[   15.685462] The buggy address belongs to the physical page:
[   15.685885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.686592] flags: 0x200000000000000(node=0|zone=2)
[   15.686899] page_type: f5(slab)
[   15.687339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.687689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.687989] page dumped because: kasan: bad access detected
[   15.688518] 
[   15.688603] Memory state around the buggy address:
[   15.689004]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.689532]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.690011] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.690485]                                      ^
[   15.690715]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.690985]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.691702] ==================================================================
[   15.362114] ==================================================================
[   15.362516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.362824] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.363163] 
[   15.363263] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.363308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.363321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.363343] Call Trace:
[   15.363361]  <TASK>
[   15.363378]  dump_stack_lvl+0x73/0xb0
[   15.363408]  print_report+0xd1/0x610
[   15.363431]  ? __virt_addr_valid+0x1db/0x2d0
[   15.363454]  ? kasan_atomics_helper+0x151d/0x5450
[   15.363476]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.363509]  ? kasan_atomics_helper+0x151d/0x5450
[   15.363533]  kasan_report+0x141/0x180
[   15.363555]  ? kasan_atomics_helper+0x151d/0x5450
[   15.363582]  kasan_check_range+0x10c/0x1c0
[   15.363606]  __kasan_check_write+0x18/0x20
[   15.363626]  kasan_atomics_helper+0x151d/0x5450
[   15.363649]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.363673]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.363699]  ? kasan_atomics+0x152/0x310
[   15.363726]  kasan_atomics+0x1dc/0x310
[   15.363749]  ? __pfx_kasan_atomics+0x10/0x10
[   15.363771]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.363799]  ? __pfx_read_tsc+0x10/0x10
[   15.363821]  ? ktime_get_ts64+0x86/0x230
[   15.363847]  kunit_try_run_case+0x1a5/0x480
[   15.363873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363895]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.363918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.363942]  ? __kthread_parkme+0x82/0x180
[   15.363963]  ? preempt_count_sub+0x50/0x80
[   15.363987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.364011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.364036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.364061]  kthread+0x337/0x6f0
[   15.364080]  ? trace_preempt_on+0x20/0xc0
[   15.364104]  ? __pfx_kthread+0x10/0x10
[   15.364125]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.364167]  ? calculate_sigpending+0x7b/0xa0
[   15.364193]  ? __pfx_kthread+0x10/0x10
[   15.364214]  ret_from_fork+0x116/0x1d0
[   15.364235]  ? __pfx_kthread+0x10/0x10
[   15.364256]  ret_from_fork_asm+0x1a/0x30
[   15.364287]  </TASK>
[   15.364297] 
[   15.371759] Allocated by task 283:
[   15.371916]  kasan_save_stack+0x45/0x70
[   15.372061]  kasan_save_track+0x18/0x40
[   15.372224]  kasan_save_alloc_info+0x3b/0x50
[   15.372377]  __kasan_kmalloc+0xb7/0xc0
[   15.373523]  __kmalloc_cache_noprof+0x189/0x420
[   15.373773]  kasan_atomics+0x95/0x310
[   15.373967]  kunit_try_run_case+0x1a5/0x480
[   15.374222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.374479]  kthread+0x337/0x6f0
[   15.374660]  ret_from_fork+0x116/0x1d0
[   15.374850]  ret_from_fork_asm+0x1a/0x30
[   15.375052] 
[   15.375151] The buggy address belongs to the object at ffff8881039f9d00
[   15.375151]  which belongs to the cache kmalloc-64 of size 64
[   15.375698] The buggy address is located 0 bytes to the right of
[   15.375698]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.376073] 
[   15.376143] The buggy address belongs to the physical page:
[   15.376311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.377991] flags: 0x200000000000000(node=0|zone=2)
[   15.378957] page_type: f5(slab)
[   15.379506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.380367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.381255] page dumped because: kasan: bad access detected
[   15.381786] 
[   15.382144] Memory state around the buggy address:
[   15.382811]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.383690]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.384379] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.384615]                                      ^
[   15.384774]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.384990]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.385703] ==================================================================
[   15.264730] ==================================================================
[   15.265096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.265446] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.265719] 
[   15.265827] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.265871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.265883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.265905] Call Trace:
[   15.265922]  <TASK>
[   15.265939]  dump_stack_lvl+0x73/0xb0
[   15.265967]  print_report+0xd1/0x610
[   15.265989]  ? __virt_addr_valid+0x1db/0x2d0
[   15.266011]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.266034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.266058]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.266080]  kasan_report+0x141/0x180
[   15.266103]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.266129]  __asan_report_load4_noabort+0x18/0x20
[   15.266175]  kasan_atomics_helper+0x49ce/0x5450
[   15.266204]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.266227]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.266252]  ? kasan_atomics+0x152/0x310
[   15.266278]  kasan_atomics+0x1dc/0x310
[   15.266301]  ? __pfx_kasan_atomics+0x10/0x10
[   15.266324]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.266351]  ? __pfx_read_tsc+0x10/0x10
[   15.266372]  ? ktime_get_ts64+0x86/0x230
[   15.266398]  kunit_try_run_case+0x1a5/0x480
[   15.266423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.266446]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.266469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.266494]  ? __kthread_parkme+0x82/0x180
[   15.266523]  ? preempt_count_sub+0x50/0x80
[   15.266548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.266572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.266597]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.266622]  kthread+0x337/0x6f0
[   15.266641]  ? trace_preempt_on+0x20/0xc0
[   15.266665]  ? __pfx_kthread+0x10/0x10
[   15.266686]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.266708]  ? calculate_sigpending+0x7b/0xa0
[   15.266734]  ? __pfx_kthread+0x10/0x10
[   15.266757]  ret_from_fork+0x116/0x1d0
[   15.266779]  ? __pfx_kthread+0x10/0x10
[   15.266802]  ret_from_fork_asm+0x1a/0x30
[   15.266835]  </TASK>
[   15.266846] 
[   15.274010] Allocated by task 283:
[   15.274220]  kasan_save_stack+0x45/0x70
[   15.274420]  kasan_save_track+0x18/0x40
[   15.274621]  kasan_save_alloc_info+0x3b/0x50
[   15.274818]  __kasan_kmalloc+0xb7/0xc0
[   15.274953]  __kmalloc_cache_noprof+0x189/0x420
[   15.275170]  kasan_atomics+0x95/0x310
[   15.275359]  kunit_try_run_case+0x1a5/0x480
[   15.275579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.275816]  kthread+0x337/0x6f0
[   15.275964]  ret_from_fork+0x116/0x1d0
[   15.276129]  ret_from_fork_asm+0x1a/0x30
[   15.276328] 
[   15.276402] The buggy address belongs to the object at ffff8881039f9d00
[   15.276402]  which belongs to the cache kmalloc-64 of size 64
[   15.276765] The buggy address is located 0 bytes to the right of
[   15.276765]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.277135] 
[   15.277229] The buggy address belongs to the physical page:
[   15.277405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.277749] flags: 0x200000000000000(node=0|zone=2)
[   15.277985] page_type: f5(slab)
[   15.278162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.278522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.278855] page dumped because: kasan: bad access detected
[   15.279101] 
[   15.279193] Memory state around the buggy address:
[   15.279412]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.280914]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.281286] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.281539]                                      ^
[   15.281698]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.281917]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.282587] ==================================================================
[   15.693030] ==================================================================
[   15.693441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.693896] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.694378] 
[   15.694738] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.694794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.694809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.694831] Call Trace:
[   15.694852]  <TASK>
[   15.694903]  dump_stack_lvl+0x73/0xb0
[   15.694937]  print_report+0xd1/0x610
[   15.694959]  ? __virt_addr_valid+0x1db/0x2d0
[   15.694985]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.695008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.695031]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.695054]  kasan_report+0x141/0x180
[   15.695077]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.695104]  kasan_check_range+0x10c/0x1c0
[   15.695127]  __kasan_check_write+0x18/0x20
[   15.695147]  kasan_atomics_helper+0x1ce1/0x5450
[   15.695182]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.695205]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.695232]  ? kasan_atomics+0x152/0x310
[   15.695260]  kasan_atomics+0x1dc/0x310
[   15.695283]  ? __pfx_kasan_atomics+0x10/0x10
[   15.695305]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.695333]  ? __pfx_read_tsc+0x10/0x10
[   15.695355]  ? ktime_get_ts64+0x86/0x230
[   15.695381]  kunit_try_run_case+0x1a5/0x480
[   15.695406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.695429]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.695453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.695478]  ? __kthread_parkme+0x82/0x180
[   15.695510]  ? preempt_count_sub+0x50/0x80
[   15.695535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.695559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.695583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.695608]  kthread+0x337/0x6f0
[   15.695628]  ? trace_preempt_on+0x20/0xc0
[   15.695653]  ? __pfx_kthread+0x10/0x10
[   15.695674]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.695696]  ? calculate_sigpending+0x7b/0xa0
[   15.695721]  ? __pfx_kthread+0x10/0x10
[   15.695743]  ret_from_fork+0x116/0x1d0
[   15.695763]  ? __pfx_kthread+0x10/0x10
[   15.695783]  ret_from_fork_asm+0x1a/0x30
[   15.695816]  </TASK>
[   15.695828] 
[   15.707408] Allocated by task 283:
[   15.707714]  kasan_save_stack+0x45/0x70
[   15.708101]  kasan_save_track+0x18/0x40
[   15.708299]  kasan_save_alloc_info+0x3b/0x50
[   15.708477]  __kasan_kmalloc+0xb7/0xc0
[   15.708657]  __kmalloc_cache_noprof+0x189/0x420
[   15.708842]  kasan_atomics+0x95/0x310
[   15.709011]  kunit_try_run_case+0x1a5/0x480
[   15.709627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.709940]  kthread+0x337/0x6f0
[   15.710324]  ret_from_fork+0x116/0x1d0
[   15.710654]  ret_from_fork_asm+0x1a/0x30
[   15.711078] 
[   15.711199] The buggy address belongs to the object at ffff8881039f9d00
[   15.711199]  which belongs to the cache kmalloc-64 of size 64
[   15.711826] The buggy address is located 0 bytes to the right of
[   15.711826]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.712733] 
[   15.712822] The buggy address belongs to the physical page:
[   15.713282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.713879] flags: 0x200000000000000(node=0|zone=2)
[   15.714244] page_type: f5(slab)
[   15.714623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.715077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.715734] page dumped because: kasan: bad access detected
[   15.716170] 
[   15.716439] Memory state around the buggy address:
[   15.716704]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.717006]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.717720] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.718158]                                      ^
[   15.718642]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.719083]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.719411] ==================================================================
[   15.914422] ==================================================================
[   15.914730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.915132] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.915490] 
[   15.915650] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.915721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.915733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.915756] Call Trace:
[   15.915785]  <TASK>
[   15.915803]  dump_stack_lvl+0x73/0xb0
[   15.915833]  print_report+0xd1/0x610
[   15.915855]  ? __virt_addr_valid+0x1db/0x2d0
[   15.915879]  ? kasan_atomics_helper+0x218a/0x5450
[   15.915901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.915924]  ? kasan_atomics_helper+0x218a/0x5450
[   15.915946]  kasan_report+0x141/0x180
[   15.915969]  ? kasan_atomics_helper+0x218a/0x5450
[   15.915996]  kasan_check_range+0x10c/0x1c0
[   15.916020]  __kasan_check_write+0x18/0x20
[   15.916040]  kasan_atomics_helper+0x218a/0x5450
[   15.916063]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.916086]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.916113]  ? kasan_atomics+0x152/0x310
[   15.916139]  kasan_atomics+0x1dc/0x310
[   15.916164]  ? __pfx_kasan_atomics+0x10/0x10
[   15.916190]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.916218]  ? __pfx_read_tsc+0x10/0x10
[   15.916240]  ? ktime_get_ts64+0x86/0x230
[   15.916265]  kunit_try_run_case+0x1a5/0x480
[   15.916292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.916330]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.916353]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.916377]  ? __kthread_parkme+0x82/0x180
[   15.916399]  ? preempt_count_sub+0x50/0x80
[   15.916425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.916450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.916475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.916510]  kthread+0x337/0x6f0
[   15.916530]  ? trace_preempt_on+0x20/0xc0
[   15.916554]  ? __pfx_kthread+0x10/0x10
[   15.916576]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.916599]  ? calculate_sigpending+0x7b/0xa0
[   15.916625]  ? __pfx_kthread+0x10/0x10
[   15.916647]  ret_from_fork+0x116/0x1d0
[   15.916667]  ? __pfx_kthread+0x10/0x10
[   15.916689]  ret_from_fork_asm+0x1a/0x30
[   15.916720]  </TASK>
[   15.916732] 
[   15.924560] Allocated by task 283:
[   15.924733]  kasan_save_stack+0x45/0x70
[   15.924934]  kasan_save_track+0x18/0x40
[   15.925119]  kasan_save_alloc_info+0x3b/0x50
[   15.925365]  __kasan_kmalloc+0xb7/0xc0
[   15.925560]  __kmalloc_cache_noprof+0x189/0x420
[   15.925756]  kasan_atomics+0x95/0x310
[   15.925962]  kunit_try_run_case+0x1a5/0x480
[   15.926146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.926408]  kthread+0x337/0x6f0
[   15.926589]  ret_from_fork+0x116/0x1d0
[   15.926736]  ret_from_fork_asm+0x1a/0x30
[   15.926922] 
[   15.927029] The buggy address belongs to the object at ffff8881039f9d00
[   15.927029]  which belongs to the cache kmalloc-64 of size 64
[   15.927494] The buggy address is located 0 bytes to the right of
[   15.927494]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.928162] 
[   15.928303] The buggy address belongs to the physical page:
[   15.928560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.928907] flags: 0x200000000000000(node=0|zone=2)
[   15.929153] page_type: f5(slab)
[   15.929311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.929646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.929941] page dumped because: kasan: bad access detected
[   15.930205] 
[   15.930312] Memory state around the buggy address:
[   15.930534]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.930806]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.931049] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.931252]                                      ^
[   15.931402]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.931618]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.931821] ==================================================================
[   15.087536] ==================================================================
[   15.088748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.089449] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.090090] 
[   15.090276] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.090325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.090358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.090382] Call Trace:
[   15.090402]  <TASK>
[   15.090431]  dump_stack_lvl+0x73/0xb0
[   15.090462]  print_report+0xd1/0x610
[   15.090485]  ? __virt_addr_valid+0x1db/0x2d0
[   15.090517]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.090539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.090563]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.090585]  kasan_report+0x141/0x180
[   15.090608]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.090635]  __asan_report_load4_noabort+0x18/0x20
[   15.090660]  kasan_atomics_helper+0x4a36/0x5450
[   15.090684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.090707]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.090733]  ? kasan_atomics+0x152/0x310
[   15.090760]  kasan_atomics+0x1dc/0x310
[   15.090784]  ? __pfx_kasan_atomics+0x10/0x10
[   15.090806]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.090834]  ? __pfx_read_tsc+0x10/0x10
[   15.090856]  ? ktime_get_ts64+0x86/0x230
[   15.090882]  kunit_try_run_case+0x1a5/0x480
[   15.090908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090931]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.090955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.090979]  ? __kthread_parkme+0x82/0x180
[   15.091000]  ? preempt_count_sub+0x50/0x80
[   15.091026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.091051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.091075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.091101]  kthread+0x337/0x6f0
[   15.091121]  ? trace_preempt_on+0x20/0xc0
[   15.091165]  ? __pfx_kthread+0x10/0x10
[   15.091187]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.091210]  ? calculate_sigpending+0x7b/0xa0
[   15.091235]  ? __pfx_kthread+0x10/0x10
[   15.091257]  ret_from_fork+0x116/0x1d0
[   15.091277]  ? __pfx_kthread+0x10/0x10
[   15.091297]  ret_from_fork_asm+0x1a/0x30
[   15.091330]  </TASK>
[   15.091341] 
[   15.102980] Allocated by task 283:
[   15.103343]  kasan_save_stack+0x45/0x70
[   15.103736]  kasan_save_track+0x18/0x40
[   15.104099]  kasan_save_alloc_info+0x3b/0x50
[   15.104526]  __kasan_kmalloc+0xb7/0xc0
[   15.104884]  __kmalloc_cache_noprof+0x189/0x420
[   15.105322]  kasan_atomics+0x95/0x310
[   15.105679]  kunit_try_run_case+0x1a5/0x480
[   15.106067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.106581]  kthread+0x337/0x6f0
[   15.106903]  ret_from_fork+0x116/0x1d0
[   15.107278]  ret_from_fork_asm+0x1a/0x30
[   15.107616] 
[   15.107690] The buggy address belongs to the object at ffff8881039f9d00
[   15.107690]  which belongs to the cache kmalloc-64 of size 64
[   15.108050] The buggy address is located 0 bytes to the right of
[   15.108050]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.109052] 
[   15.109251] The buggy address belongs to the physical page:
[   15.109755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.110472] flags: 0x200000000000000(node=0|zone=2)
[   15.110927] page_type: f5(slab)
[   15.111264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.111606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.111838] page dumped because: kasan: bad access detected
[   15.112013] 
[   15.112083] Memory state around the buggy address:
[   15.112444]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.113072]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.113713] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.114351]                                      ^
[   15.114784]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.115423]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.116015] ==================================================================
[   14.473148] ==================================================================
[   14.473418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.473754] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.474031] 
[   14.474457] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.474522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.474533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.474555] Call Trace:
[   14.474572]  <TASK>
[   14.474589]  dump_stack_lvl+0x73/0xb0
[   14.474618]  print_report+0xd1/0x610
[   14.474639]  ? __virt_addr_valid+0x1db/0x2d0
[   14.474662]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.474683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.474705]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.474728]  kasan_report+0x141/0x180
[   14.474749]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.474775]  __asan_report_store4_noabort+0x1b/0x30
[   14.474799]  kasan_atomics_helper+0x4ba2/0x5450
[   14.474822]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.474843]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.474868]  ? kasan_atomics+0x152/0x310
[   14.474894]  kasan_atomics+0x1dc/0x310
[   14.474916]  ? __pfx_kasan_atomics+0x10/0x10
[   14.474937]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.474963]  ? __pfx_read_tsc+0x10/0x10
[   14.474983]  ? ktime_get_ts64+0x86/0x230
[   14.475008]  kunit_try_run_case+0x1a5/0x480
[   14.475032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475054]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.475077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.475100]  ? __kthread_parkme+0x82/0x180
[   14.475121]  ? preempt_count_sub+0x50/0x80
[   14.475144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.475192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.475215]  kthread+0x337/0x6f0
[   14.475234]  ? trace_preempt_on+0x20/0xc0
[   14.475257]  ? __pfx_kthread+0x10/0x10
[   14.475276]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.475297]  ? calculate_sigpending+0x7b/0xa0
[   14.475321]  ? __pfx_kthread+0x10/0x10
[   14.475342]  ret_from_fork+0x116/0x1d0
[   14.475361]  ? __pfx_kthread+0x10/0x10
[   14.475380]  ret_from_fork_asm+0x1a/0x30
[   14.475411]  </TASK>
[   14.475421] 
[   14.484851] Allocated by task 283:
[   14.485042]  kasan_save_stack+0x45/0x70
[   14.485391]  kasan_save_track+0x18/0x40
[   14.485549]  kasan_save_alloc_info+0x3b/0x50
[   14.485701]  __kasan_kmalloc+0xb7/0xc0
[   14.485880]  __kmalloc_cache_noprof+0x189/0x420
[   14.486174]  kasan_atomics+0x95/0x310
[   14.486423]  kunit_try_run_case+0x1a5/0x480
[   14.486702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.487187]  kthread+0x337/0x6f0
[   14.487405]  ret_from_fork+0x116/0x1d0
[   14.487629]  ret_from_fork_asm+0x1a/0x30
[   14.487796] 
[   14.487912] The buggy address belongs to the object at ffff8881039f9d00
[   14.487912]  which belongs to the cache kmalloc-64 of size 64
[   14.488517] The buggy address is located 0 bytes to the right of
[   14.488517]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.488908] 
[   14.488980] The buggy address belongs to the physical page:
[   14.489154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.489679] flags: 0x200000000000000(node=0|zone=2)
[   14.489918] page_type: f5(slab)
[   14.490091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.490762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.490999] page dumped because: kasan: bad access detected
[   14.491253] 
[   14.491346] Memory state around the buggy address:
[   14.491587]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.492100]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.492722] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.492952]                                      ^
[   14.493110]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.494012]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.494331] ==================================================================
[   14.597940] ==================================================================
[   14.598536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.599090] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.599320] 
[   14.599425] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.599526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.599542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.599565] Call Trace:
[   14.599657]  <TASK>
[   14.599677]  dump_stack_lvl+0x73/0xb0
[   14.599710]  print_report+0xd1/0x610
[   14.599753]  ? __virt_addr_valid+0x1db/0x2d0
[   14.599777]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.599812]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.599850]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.599886]  kasan_report+0x141/0x180
[   14.599908]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.599935]  kasan_check_range+0x10c/0x1c0
[   14.599960]  __kasan_check_write+0x18/0x20
[   14.599979]  kasan_atomics_helper+0x4a0/0x5450
[   14.600004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.600027]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.600096]  ? kasan_atomics+0x152/0x310
[   14.600123]  kasan_atomics+0x1dc/0x310
[   14.600147]  ? __pfx_kasan_atomics+0x10/0x10
[   14.600178]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.600206]  ? __pfx_read_tsc+0x10/0x10
[   14.600228]  ? ktime_get_ts64+0x86/0x230
[   14.600254]  kunit_try_run_case+0x1a5/0x480
[   14.600278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.600302]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.600325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.600350]  ? __kthread_parkme+0x82/0x180
[   14.600371]  ? preempt_count_sub+0x50/0x80
[   14.600396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.600421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.600446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.600471]  kthread+0x337/0x6f0
[   14.600527]  ? trace_preempt_on+0x20/0xc0
[   14.600551]  ? __pfx_kthread+0x10/0x10
[   14.600573]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.600595]  ? calculate_sigpending+0x7b/0xa0
[   14.600638]  ? __pfx_kthread+0x10/0x10
[   14.600660]  ret_from_fork+0x116/0x1d0
[   14.600680]  ? __pfx_kthread+0x10/0x10
[   14.600719]  ret_from_fork_asm+0x1a/0x30
[   14.600752]  </TASK>
[   14.600762] 
[   14.610665] Allocated by task 283:
[   14.610867]  kasan_save_stack+0x45/0x70
[   14.611147]  kasan_save_track+0x18/0x40
[   14.611341]  kasan_save_alloc_info+0x3b/0x50
[   14.611565]  __kasan_kmalloc+0xb7/0xc0
[   14.611757]  __kmalloc_cache_noprof+0x189/0x420
[   14.611918]  kasan_atomics+0x95/0x310
[   14.612130]  kunit_try_run_case+0x1a5/0x480
[   14.612582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.612825]  kthread+0x337/0x6f0
[   14.612945]  ret_from_fork+0x116/0x1d0
[   14.613240]  ret_from_fork_asm+0x1a/0x30
[   14.613535] 
[   14.613672] The buggy address belongs to the object at ffff8881039f9d00
[   14.613672]  which belongs to the cache kmalloc-64 of size 64
[   14.614358] The buggy address is located 0 bytes to the right of
[   14.614358]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.614909] 
[   14.614991] The buggy address belongs to the physical page:
[   14.615174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.615428] flags: 0x200000000000000(node=0|zone=2)
[   14.615650] page_type: f5(slab)
[   14.615994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.616849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.617367] page dumped because: kasan: bad access detected
[   14.617792] 
[   14.617897] Memory state around the buggy address:
[   14.618690]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.619003]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.619311] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.620337]                                      ^
[   14.620565]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.620841]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.621487] ==================================================================
[   15.932321] ==================================================================
[   15.932671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.932997] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.933310] 
[   15.933415] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.933458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.933471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.933493] Call Trace:
[   15.933520]  <TASK>
[   15.933538]  dump_stack_lvl+0x73/0xb0
[   15.933566]  print_report+0xd1/0x610
[   15.933588]  ? __virt_addr_valid+0x1db/0x2d0
[   15.933610]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.933631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.933654]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.933676]  kasan_report+0x141/0x180
[   15.933698]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.933724]  __asan_report_load8_noabort+0x18/0x20
[   15.933748]  kasan_atomics_helper+0x4fa5/0x5450
[   15.933770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.933793]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.933817]  ? kasan_atomics+0x152/0x310
[   15.933843]  kasan_atomics+0x1dc/0x310
[   15.933865]  ? __pfx_kasan_atomics+0x10/0x10
[   15.933886]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.933913]  ? __pfx_read_tsc+0x10/0x10
[   15.933934]  ? ktime_get_ts64+0x86/0x230
[   15.933959]  kunit_try_run_case+0x1a5/0x480
[   15.933983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.934027]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.934051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.934075]  ? __kthread_parkme+0x82/0x180
[   15.934096]  ? preempt_count_sub+0x50/0x80
[   15.934121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.934146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.934171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.934214]  kthread+0x337/0x6f0
[   15.934234]  ? trace_preempt_on+0x20/0xc0
[   15.934258]  ? __pfx_kthread+0x10/0x10
[   15.934279]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.934302]  ? calculate_sigpending+0x7b/0xa0
[   15.934327]  ? __pfx_kthread+0x10/0x10
[   15.934349]  ret_from_fork+0x116/0x1d0
[   15.934368]  ? __pfx_kthread+0x10/0x10
[   15.934389]  ret_from_fork_asm+0x1a/0x30
[   15.934421]  </TASK>
[   15.934431] 
[   15.942129] Allocated by task 283:
[   15.942329]  kasan_save_stack+0x45/0x70
[   15.942494]  kasan_save_track+0x18/0x40
[   15.942668]  kasan_save_alloc_info+0x3b/0x50
[   15.942886]  __kasan_kmalloc+0xb7/0xc0
[   15.943061]  __kmalloc_cache_noprof+0x189/0x420
[   15.943271]  kasan_atomics+0x95/0x310
[   15.943449]  kunit_try_run_case+0x1a5/0x480
[   15.943672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.943893]  kthread+0x337/0x6f0
[   15.944075]  ret_from_fork+0x116/0x1d0
[   15.944315]  ret_from_fork_asm+0x1a/0x30
[   15.944496] 
[   15.944617] The buggy address belongs to the object at ffff8881039f9d00
[   15.944617]  which belongs to the cache kmalloc-64 of size 64
[   15.945085] The buggy address is located 0 bytes to the right of
[   15.945085]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.945759] 
[   15.945860] The buggy address belongs to the physical page:
[   15.946103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.946535] flags: 0x200000000000000(node=0|zone=2)
[   15.946726] page_type: f5(slab)
[   15.946912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.947138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.947358] page dumped because: kasan: bad access detected
[   15.947547] 
[   15.947638] Memory state around the buggy address:
[   15.948024]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.948482]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.948797] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.949131]                                      ^
[   15.949549]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.949844]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.950051] ==================================================================
[   14.451459] ==================================================================
[   14.452187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.452554] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.452839] 
[   14.452952] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.453001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.453012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.453035] Call Trace:
[   14.453126]  <TASK>
[   14.453150]  dump_stack_lvl+0x73/0xb0
[   14.453185]  print_report+0xd1/0x610
[   14.453209]  ? __virt_addr_valid+0x1db/0x2d0
[   14.453233]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.453254]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.453276]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.453297]  kasan_report+0x141/0x180
[   14.453319]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.453345]  __asan_report_load4_noabort+0x18/0x20
[   14.453369]  kasan_atomics_helper+0x4bbc/0x5450
[   14.453391]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.453414]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.453438]  ? kasan_atomics+0x152/0x310
[   14.453464]  kasan_atomics+0x1dc/0x310
[   14.453486]  ? __pfx_kasan_atomics+0x10/0x10
[   14.453520]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.453547]  ? __pfx_read_tsc+0x10/0x10
[   14.453568]  ? ktime_get_ts64+0x86/0x230
[   14.453594]  kunit_try_run_case+0x1a5/0x480
[   14.453621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.453644]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.453667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.453690]  ? __kthread_parkme+0x82/0x180
[   14.453711]  ? preempt_count_sub+0x50/0x80
[   14.453736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.453759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.453782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.453806]  kthread+0x337/0x6f0
[   14.453825]  ? trace_preempt_on+0x20/0xc0
[   14.453849]  ? __pfx_kthread+0x10/0x10
[   14.453869]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.453889]  ? calculate_sigpending+0x7b/0xa0
[   14.453915]  ? __pfx_kthread+0x10/0x10
[   14.453936]  ret_from_fork+0x116/0x1d0
[   14.453954]  ? __pfx_kthread+0x10/0x10
[   14.453974]  ret_from_fork_asm+0x1a/0x30
[   14.454006]  </TASK>
[   14.454016] 
[   14.463941] Allocated by task 283:
[   14.464290]  kasan_save_stack+0x45/0x70
[   14.464596]  kasan_save_track+0x18/0x40
[   14.464774]  kasan_save_alloc_info+0x3b/0x50
[   14.464924]  __kasan_kmalloc+0xb7/0xc0
[   14.465056]  __kmalloc_cache_noprof+0x189/0x420
[   14.465211]  kasan_atomics+0x95/0x310
[   14.465398]  kunit_try_run_case+0x1a5/0x480
[   14.465740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.465966]  kthread+0x337/0x6f0
[   14.466086]  ret_from_fork+0x116/0x1d0
[   14.466224]  ret_from_fork_asm+0x1a/0x30
[   14.466370] 
[   14.466467] The buggy address belongs to the object at ffff8881039f9d00
[   14.466467]  which belongs to the cache kmalloc-64 of size 64
[   14.467016] The buggy address is located 0 bytes to the right of
[   14.467016]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.467711] 
[   14.467792] The buggy address belongs to the physical page:
[   14.468003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.468306] flags: 0x200000000000000(node=0|zone=2)
[   14.468581] page_type: f5(slab)
[   14.468751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.469011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.469635] page dumped because: kasan: bad access detected
[   14.469920] 
[   14.470018] Memory state around the buggy address:
[   14.470355]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.470719]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.470996] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.471630]                                      ^
[   14.471973]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.472405]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.472636] ==================================================================
[   14.624723] ==================================================================
[   14.625476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.625858] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.626308] 
[   14.626431] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.626479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.626557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.626581] Call Trace:
[   14.626602]  <TASK>
[   14.626622]  dump_stack_lvl+0x73/0xb0
[   14.626653]  print_report+0xd1/0x610
[   14.626676]  ? __virt_addr_valid+0x1db/0x2d0
[   14.626701]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.626724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.626747]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.626770]  kasan_report+0x141/0x180
[   14.626815]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.626843]  __asan_report_store4_noabort+0x1b/0x30
[   14.626870]  kasan_atomics_helper+0x4b3a/0x5450
[   14.626894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.626917]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.626944]  ? kasan_atomics+0x152/0x310
[   14.626971]  kasan_atomics+0x1dc/0x310
[   14.627011]  ? __pfx_kasan_atomics+0x10/0x10
[   14.627034]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.627139]  ? __pfx_read_tsc+0x10/0x10
[   14.627172]  ? ktime_get_ts64+0x86/0x230
[   14.627198]  kunit_try_run_case+0x1a5/0x480
[   14.627225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.627247]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.627294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.627319]  ? __kthread_parkme+0x82/0x180
[   14.627340]  ? preempt_count_sub+0x50/0x80
[   14.627381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.627407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.627431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.627457]  kthread+0x337/0x6f0
[   14.627477]  ? trace_preempt_on+0x20/0xc0
[   14.627514]  ? __pfx_kthread+0x10/0x10
[   14.627534]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.627557]  ? calculate_sigpending+0x7b/0xa0
[   14.627584]  ? __pfx_kthread+0x10/0x10
[   14.627606]  ret_from_fork+0x116/0x1d0
[   14.627625]  ? __pfx_kthread+0x10/0x10
[   14.627646]  ret_from_fork_asm+0x1a/0x30
[   14.627679]  </TASK>
[   14.627690] 
[   14.637246] Allocated by task 283:
[   14.637476]  kasan_save_stack+0x45/0x70
[   14.637708]  kasan_save_track+0x18/0x40
[   14.637929]  kasan_save_alloc_info+0x3b/0x50
[   14.638249]  __kasan_kmalloc+0xb7/0xc0
[   14.638402]  __kmalloc_cache_noprof+0x189/0x420
[   14.638573]  kasan_atomics+0x95/0x310
[   14.638765]  kunit_try_run_case+0x1a5/0x480
[   14.638963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.639323]  kthread+0x337/0x6f0
[   14.639509]  ret_from_fork+0x116/0x1d0
[   14.639704]  ret_from_fork_asm+0x1a/0x30
[   14.639864] 
[   14.639961] The buggy address belongs to the object at ffff8881039f9d00
[   14.639961]  which belongs to the cache kmalloc-64 of size 64
[   14.640900] The buggy address is located 0 bytes to the right of
[   14.640900]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.641547] 
[   14.641674] The buggy address belongs to the physical page:
[   14.641920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.642345] flags: 0x200000000000000(node=0|zone=2)
[   14.642635] page_type: f5(slab)
[   14.642803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.643134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.643521] page dumped because: kasan: bad access detected
[   14.643778] 
[   14.643892] Memory state around the buggy address:
[   14.644130]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.644444]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.644781] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.645091]                                      ^
[   14.645243]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.645452]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.645895] ==================================================================
[   15.167299] ==================================================================
[   15.167665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.167925] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.168332] 
[   15.168484] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.168541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.168554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.168576] Call Trace:
[   15.168596]  <TASK>
[   15.168614]  dump_stack_lvl+0x73/0xb0
[   15.168645]  print_report+0xd1/0x610
[   15.168668]  ? __virt_addr_valid+0x1db/0x2d0
[   15.168692]  ? kasan_atomics_helper+0x1148/0x5450
[   15.168715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.168738]  ? kasan_atomics_helper+0x1148/0x5450
[   15.168761]  kasan_report+0x141/0x180
[   15.168784]  ? kasan_atomics_helper+0x1148/0x5450
[   15.168815]  kasan_check_range+0x10c/0x1c0
[   15.168840]  __kasan_check_write+0x18/0x20
[   15.168860]  kasan_atomics_helper+0x1148/0x5450
[   15.168883]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.168907]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.168933]  ? kasan_atomics+0x152/0x310
[   15.168961]  kasan_atomics+0x1dc/0x310
[   15.168984]  ? __pfx_kasan_atomics+0x10/0x10
[   15.169007]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.169035]  ? __pfx_read_tsc+0x10/0x10
[   15.169057]  ? ktime_get_ts64+0x86/0x230
[   15.169083]  kunit_try_run_case+0x1a5/0x480
[   15.169109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.169132]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.169156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.169180]  ? __kthread_parkme+0x82/0x180
[   15.169212]  ? preempt_count_sub+0x50/0x80
[   15.169238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.169263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.169288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.169313]  kthread+0x337/0x6f0
[   15.169333]  ? trace_preempt_on+0x20/0xc0
[   15.169356]  ? __pfx_kthread+0x10/0x10
[   15.169377]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.169399]  ? calculate_sigpending+0x7b/0xa0
[   15.169425]  ? __pfx_kthread+0x10/0x10
[   15.169446]  ret_from_fork+0x116/0x1d0
[   15.169466]  ? __pfx_kthread+0x10/0x10
[   15.169486]  ret_from_fork_asm+0x1a/0x30
[   15.169528]  </TASK>
[   15.169539] 
[   15.177145] Allocated by task 283:
[   15.177320]  kasan_save_stack+0x45/0x70
[   15.177529]  kasan_save_track+0x18/0x40
[   15.177669]  kasan_save_alloc_info+0x3b/0x50
[   15.177819]  __kasan_kmalloc+0xb7/0xc0
[   15.177953]  __kmalloc_cache_noprof+0x189/0x420
[   15.178163]  kasan_atomics+0x95/0x310
[   15.178357]  kunit_try_run_case+0x1a5/0x480
[   15.178577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.178835]  kthread+0x337/0x6f0
[   15.179001]  ret_from_fork+0x116/0x1d0
[   15.179188]  ret_from_fork_asm+0x1a/0x30
[   15.179358] 
[   15.179452] The buggy address belongs to the object at ffff8881039f9d00
[   15.179452]  which belongs to the cache kmalloc-64 of size 64
[   15.179921] The buggy address is located 0 bytes to the right of
[   15.179921]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.180468] 
[   15.180569] The buggy address belongs to the physical page:
[   15.180805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.181115] flags: 0x200000000000000(node=0|zone=2)
[   15.181317] page_type: f5(slab)
[   15.181441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.181685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.181916] page dumped because: kasan: bad access detected
[   15.182090] 
[   15.182160] Memory state around the buggy address:
[   15.182380]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.182853]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.183193] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.183514]                                      ^
[   15.183732]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.184048]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.184370] ==================================================================
[   15.223746] ==================================================================
[   15.224223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.224700] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.225302] 
[   15.225617] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.225671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.225683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.225706] Call Trace:
[   15.225725]  <TASK>
[   15.225774]  dump_stack_lvl+0x73/0xb0
[   15.225806]  print_report+0xd1/0x610
[   15.225829]  ? __virt_addr_valid+0x1db/0x2d0
[   15.225853]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.225874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.225898]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.225921]  kasan_report+0x141/0x180
[   15.225944]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.225971]  __asan_report_load4_noabort+0x18/0x20
[   15.225996]  kasan_atomics_helper+0x49e8/0x5450
[   15.226019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.226042]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.226067]  ? kasan_atomics+0x152/0x310
[   15.226094]  kasan_atomics+0x1dc/0x310
[   15.226118]  ? __pfx_kasan_atomics+0x10/0x10
[   15.226140]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.226191]  ? __pfx_read_tsc+0x10/0x10
[   15.226219]  ? ktime_get_ts64+0x86/0x230
[   15.226244]  kunit_try_run_case+0x1a5/0x480
[   15.226269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.226292]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.226316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.226340]  ? __kthread_parkme+0x82/0x180
[   15.226362]  ? preempt_count_sub+0x50/0x80
[   15.226388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.226412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.226437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.226462]  kthread+0x337/0x6f0
[   15.226482]  ? trace_preempt_on+0x20/0xc0
[   15.226515]  ? __pfx_kthread+0x10/0x10
[   15.226536]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.226558]  ? calculate_sigpending+0x7b/0xa0
[   15.226583]  ? __pfx_kthread+0x10/0x10
[   15.226605]  ret_from_fork+0x116/0x1d0
[   15.226625]  ? __pfx_kthread+0x10/0x10
[   15.226645]  ret_from_fork_asm+0x1a/0x30
[   15.226676]  </TASK>
[   15.226688] 
[   15.237836] Allocated by task 283:
[   15.238283]  kasan_save_stack+0x45/0x70
[   15.238569]  kasan_save_track+0x18/0x40
[   15.238868]  kasan_save_alloc_info+0x3b/0x50
[   15.239286]  __kasan_kmalloc+0xb7/0xc0
[   15.239476]  __kmalloc_cache_noprof+0x189/0x420
[   15.239694]  kasan_atomics+0x95/0x310
[   15.239869]  kunit_try_run_case+0x1a5/0x480
[   15.240059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.240688]  kthread+0x337/0x6f0
[   15.240986]  ret_from_fork+0x116/0x1d0
[   15.241307]  ret_from_fork_asm+0x1a/0x30
[   15.241700] 
[   15.241968] The buggy address belongs to the object at ffff8881039f9d00
[   15.241968]  which belongs to the cache kmalloc-64 of size 64
[   15.242475] The buggy address is located 0 bytes to the right of
[   15.242475]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.242939] 
[   15.243040] The buggy address belongs to the physical page:
[   15.243284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.243639] flags: 0x200000000000000(node=0|zone=2)
[   15.243835] page_type: f5(slab)
[   15.244007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.244363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.244688] page dumped because: kasan: bad access detected
[   15.244901] 
[   15.244995] Memory state around the buggy address:
[   15.245224]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.245535]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.245802] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.246082]                                      ^
[   15.246303]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246529]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246837] ==================================================================
[   15.283936] ==================================================================
[   15.284446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.284799] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.285075] 
[   15.285392] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.285445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.285458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.285743] Call Trace:
[   15.285765]  <TASK>
[   15.285783]  dump_stack_lvl+0x73/0xb0
[   15.285815]  print_report+0xd1/0x610
[   15.285839]  ? __virt_addr_valid+0x1db/0x2d0
[   15.285902]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.285925]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.285950]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.285974]  kasan_report+0x141/0x180
[   15.285996]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.286023]  kasan_check_range+0x10c/0x1c0
[   15.286049]  __kasan_check_read+0x15/0x20
[   15.286068]  kasan_atomics_helper+0x13b5/0x5450
[   15.286093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.286116]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.286169]  ? kasan_atomics+0x152/0x310
[   15.286205]  kasan_atomics+0x1dc/0x310
[   15.286229]  ? __pfx_kasan_atomics+0x10/0x10
[   15.286252]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.286280]  ? __pfx_read_tsc+0x10/0x10
[   15.286301]  ? ktime_get_ts64+0x86/0x230
[   15.286327]  kunit_try_run_case+0x1a5/0x480
[   15.286352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.286375]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.286399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.286424]  ? __kthread_parkme+0x82/0x180
[   15.286446]  ? preempt_count_sub+0x50/0x80
[   15.286471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.286505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.286530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.286555]  kthread+0x337/0x6f0
[   15.286575]  ? trace_preempt_on+0x20/0xc0
[   15.286600]  ? __pfx_kthread+0x10/0x10
[   15.286621]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.286643]  ? calculate_sigpending+0x7b/0xa0
[   15.286668]  ? __pfx_kthread+0x10/0x10
[   15.286690]  ret_from_fork+0x116/0x1d0
[   15.286711]  ? __pfx_kthread+0x10/0x10
[   15.286732]  ret_from_fork_asm+0x1a/0x30
[   15.286764]  </TASK>
[   15.286775] 
[   15.298312] Allocated by task 283:
[   15.298689]  kasan_save_stack+0x45/0x70
[   15.298887]  kasan_save_track+0x18/0x40
[   15.299064]  kasan_save_alloc_info+0x3b/0x50
[   15.299471]  __kasan_kmalloc+0xb7/0xc0
[   15.299839]  __kmalloc_cache_noprof+0x189/0x420
[   15.300196]  kasan_atomics+0x95/0x310
[   15.300388]  kunit_try_run_case+0x1a5/0x480
[   15.300777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.301272]  kthread+0x337/0x6f0
[   15.301449]  ret_from_fork+0x116/0x1d0
[   15.301635]  ret_from_fork_asm+0x1a/0x30
[   15.301808] 
[   15.301901] The buggy address belongs to the object at ffff8881039f9d00
[   15.301901]  which belongs to the cache kmalloc-64 of size 64
[   15.302890] The buggy address is located 0 bytes to the right of
[   15.302890]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.303654] 
[   15.303762] The buggy address belongs to the physical page:
[   15.303992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.304591] flags: 0x200000000000000(node=0|zone=2)
[   15.304942] page_type: f5(slab)
[   15.305269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.305728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.306252] page dumped because: kasan: bad access detected
[   15.306627] 
[   15.306729] Memory state around the buggy address:
[   15.306941]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.307486]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.308131] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.308446]                                      ^
[   15.308662]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.308949]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.309245] ==================================================================
[   14.909700] ==================================================================
[   14.909997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.910598] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.910953] 
[   14.912006] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.912073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.912087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.912110] Call Trace:
[   14.912132]  <TASK>
[   14.912677]  dump_stack_lvl+0x73/0xb0
[   14.912726]  print_report+0xd1/0x610
[   14.912752]  ? __virt_addr_valid+0x1db/0x2d0
[   14.912776]  ? kasan_atomics_helper+0xc70/0x5450
[   14.912815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.912841]  ? kasan_atomics_helper+0xc70/0x5450
[   14.912863]  kasan_report+0x141/0x180
[   14.912887]  ? kasan_atomics_helper+0xc70/0x5450
[   14.912913]  kasan_check_range+0x10c/0x1c0
[   14.912938]  __kasan_check_write+0x18/0x20
[   14.912957]  kasan_atomics_helper+0xc70/0x5450
[   14.912981]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.913004]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.913030]  ? kasan_atomics+0x152/0x310
[   14.913057]  kasan_atomics+0x1dc/0x310
[   14.913080]  ? __pfx_kasan_atomics+0x10/0x10
[   14.913102]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.913130]  ? __pfx_read_tsc+0x10/0x10
[   14.914067]  ? ktime_get_ts64+0x86/0x230
[   14.914100]  kunit_try_run_case+0x1a5/0x480
[   14.914129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.914162]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.914186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.914219]  ? __kthread_parkme+0x82/0x180
[   14.914241]  ? preempt_count_sub+0x50/0x80
[   14.914266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.914291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.914316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.914341]  kthread+0x337/0x6f0
[   14.914361]  ? trace_preempt_on+0x20/0xc0
[   14.914386]  ? __pfx_kthread+0x10/0x10
[   14.914406]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.914428]  ? calculate_sigpending+0x7b/0xa0
[   14.914454]  ? __pfx_kthread+0x10/0x10
[   14.914476]  ret_from_fork+0x116/0x1d0
[   14.914504]  ? __pfx_kthread+0x10/0x10
[   14.914525]  ret_from_fork_asm+0x1a/0x30
[   14.914558]  </TASK>
[   14.914570] 
[   14.928346] Allocated by task 283:
[   14.928729]  kasan_save_stack+0x45/0x70
[   14.928888]  kasan_save_track+0x18/0x40
[   14.929022]  kasan_save_alloc_info+0x3b/0x50
[   14.929192]  __kasan_kmalloc+0xb7/0xc0
[   14.929793]  __kmalloc_cache_noprof+0x189/0x420
[   14.930334]  kasan_atomics+0x95/0x310
[   14.930786]  kunit_try_run_case+0x1a5/0x480
[   14.931311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.931901]  kthread+0x337/0x6f0
[   14.932051]  ret_from_fork+0x116/0x1d0
[   14.932671]  ret_from_fork_asm+0x1a/0x30
[   14.932996] 
[   14.933076] The buggy address belongs to the object at ffff8881039f9d00
[   14.933076]  which belongs to the cache kmalloc-64 of size 64
[   14.933953] The buggy address is located 0 bytes to the right of
[   14.933953]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.935378] 
[   14.935535] The buggy address belongs to the physical page:
[   14.936057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.936572] flags: 0x200000000000000(node=0|zone=2)
[   14.936750] page_type: f5(slab)
[   14.936877] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.937107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.937944] page dumped because: kasan: bad access detected
[   14.938492] 
[   14.938663] Memory state around the buggy address:
[   14.939325]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.940064]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.940908] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.941385]                                      ^
[   14.941914]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.942133]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.942911] ==================================================================
[   15.758035] ==================================================================
[   15.758608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.758954] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.759430] 
[   15.759549] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.759595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.759607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.759630] Call Trace:
[   15.759648]  <TASK>
[   15.759665]  dump_stack_lvl+0x73/0xb0
[   15.759693]  print_report+0xd1/0x610
[   15.759717]  ? __virt_addr_valid+0x1db/0x2d0
[   15.759740]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.759761]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.759785]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.759808]  kasan_report+0x141/0x180
[   15.759831]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.759858]  kasan_check_range+0x10c/0x1c0
[   15.759882]  __kasan_check_write+0x18/0x20
[   15.759901]  kasan_atomics_helper+0x1eaa/0x5450
[   15.759925]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.759948]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.759973]  ? kasan_atomics+0x152/0x310
[   15.760001]  kasan_atomics+0x1dc/0x310
[   15.760023]  ? __pfx_kasan_atomics+0x10/0x10
[   15.760045]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.760073]  ? __pfx_read_tsc+0x10/0x10
[   15.760095]  ? ktime_get_ts64+0x86/0x230
[   15.760120]  kunit_try_run_case+0x1a5/0x480
[   15.760145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.760179]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.760203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.760227]  ? __kthread_parkme+0x82/0x180
[   15.760249]  ? preempt_count_sub+0x50/0x80
[   15.760274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.760299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.760324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.760348]  kthread+0x337/0x6f0
[   15.760368]  ? trace_preempt_on+0x20/0xc0
[   15.760393]  ? __pfx_kthread+0x10/0x10
[   15.760414]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.760436]  ? calculate_sigpending+0x7b/0xa0
[   15.760461]  ? __pfx_kthread+0x10/0x10
[   15.760482]  ret_from_fork+0x116/0x1d0
[   15.760512]  ? __pfx_kthread+0x10/0x10
[   15.760533]  ret_from_fork_asm+0x1a/0x30
[   15.760565]  </TASK>
[   15.760576] 
[   15.768139] Allocated by task 283:
[   15.768330]  kasan_save_stack+0x45/0x70
[   15.768539]  kasan_save_track+0x18/0x40
[   15.768728]  kasan_save_alloc_info+0x3b/0x50
[   15.768942]  __kasan_kmalloc+0xb7/0xc0
[   15.769127]  __kmalloc_cache_noprof+0x189/0x420
[   15.769355]  kasan_atomics+0x95/0x310
[   15.769554]  kunit_try_run_case+0x1a5/0x480
[   15.769764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.769961]  kthread+0x337/0x6f0
[   15.770085]  ret_from_fork+0x116/0x1d0
[   15.770390]  ret_from_fork_asm+0x1a/0x30
[   15.770602] 
[   15.770706] The buggy address belongs to the object at ffff8881039f9d00
[   15.770706]  which belongs to the cache kmalloc-64 of size 64
[   15.771193] The buggy address is located 0 bytes to the right of
[   15.771193]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.771620] 
[   15.771703] The buggy address belongs to the physical page:
[   15.771961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.772390] flags: 0x200000000000000(node=0|zone=2)
[   15.772615] page_type: f5(slab)
[   15.772764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.773071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.773442] page dumped because: kasan: bad access detected
[   15.773673] 
[   15.773761] Memory state around the buggy address:
[   15.773964]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.774314]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.774587] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.774878]                                      ^
[   15.775077]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.775396]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.775700] ==================================================================
[   15.581946] ==================================================================
[   15.582653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.582973] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.583634] 
[   15.583746] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.584020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.584036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.584059] Call Trace:
[   15.584078]  <TASK>
[   15.584098]  dump_stack_lvl+0x73/0xb0
[   15.584181]  print_report+0xd1/0x610
[   15.584205]  ? __virt_addr_valid+0x1db/0x2d0
[   15.584229]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.584251]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.584274]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.584297]  kasan_report+0x141/0x180
[   15.584320]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.584347]  kasan_check_range+0x10c/0x1c0
[   15.584372]  __kasan_check_write+0x18/0x20
[   15.584391]  kasan_atomics_helper+0x1a7f/0x5450
[   15.584414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.584438]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.584464]  ? kasan_atomics+0x152/0x310
[   15.584491]  kasan_atomics+0x1dc/0x310
[   15.584525]  ? __pfx_kasan_atomics+0x10/0x10
[   15.584547]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.584575]  ? __pfx_read_tsc+0x10/0x10
[   15.584597]  ? ktime_get_ts64+0x86/0x230
[   15.584622]  kunit_try_run_case+0x1a5/0x480
[   15.584647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.584671]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.584695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.584720]  ? __kthread_parkme+0x82/0x180
[   15.584741]  ? preempt_count_sub+0x50/0x80
[   15.584766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.584791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.584816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.584841]  kthread+0x337/0x6f0
[   15.584861]  ? trace_preempt_on+0x20/0xc0
[   15.584885]  ? __pfx_kthread+0x10/0x10
[   15.584906]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.584929]  ? calculate_sigpending+0x7b/0xa0
[   15.584955]  ? __pfx_kthread+0x10/0x10
[   15.584976]  ret_from_fork+0x116/0x1d0
[   15.584996]  ? __pfx_kthread+0x10/0x10
[   15.585016]  ret_from_fork_asm+0x1a/0x30
[   15.585048]  </TASK>
[   15.585059] 
[   15.596753] Allocated by task 283:
[   15.597038]  kasan_save_stack+0x45/0x70
[   15.597488]  kasan_save_track+0x18/0x40
[   15.597718]  kasan_save_alloc_info+0x3b/0x50
[   15.598051]  __kasan_kmalloc+0xb7/0xc0
[   15.598366]  __kmalloc_cache_noprof+0x189/0x420
[   15.598598]  kasan_atomics+0x95/0x310
[   15.598771]  kunit_try_run_case+0x1a5/0x480
[   15.598951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.599474]  kthread+0x337/0x6f0
[   15.599684]  ret_from_fork+0x116/0x1d0
[   15.599988]  ret_from_fork_asm+0x1a/0x30
[   15.600435] 
[   15.600564] The buggy address belongs to the object at ffff8881039f9d00
[   15.600564]  which belongs to the cache kmalloc-64 of size 64
[   15.601338] The buggy address is located 0 bytes to the right of
[   15.601338]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.602036] 
[   15.602137] The buggy address belongs to the physical page:
[   15.602551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.602890] flags: 0x200000000000000(node=0|zone=2)
[   15.603114] page_type: f5(slab)
[   15.603634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.604072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.604631] page dumped because: kasan: bad access detected
[   15.605012] 
[   15.605105] Memory state around the buggy address:
[   15.605775]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.606227]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.606734] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.607295]                                      ^
[   15.607520]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.607808]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.608091] ==================================================================
[   14.750009] ==================================================================
[   14.750355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.750713] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.751223] 
[   14.751620] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.751672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.751685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.751708] Call Trace:
[   14.751727]  <TASK>
[   14.751746]  dump_stack_lvl+0x73/0xb0
[   14.751776]  print_report+0xd1/0x610
[   14.751799]  ? __virt_addr_valid+0x1db/0x2d0
[   14.751823]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.751845]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.751868]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.751891]  kasan_report+0x141/0x180
[   14.751913]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.751967]  kasan_check_range+0x10c/0x1c0
[   14.751991]  __kasan_check_write+0x18/0x20
[   14.752011]  kasan_atomics_helper+0x7c7/0x5450
[   14.752034]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.752102]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.752130]  ? kasan_atomics+0x152/0x310
[   14.752209]  kasan_atomics+0x1dc/0x310
[   14.752235]  ? __pfx_kasan_atomics+0x10/0x10
[   14.752257]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.752285]  ? __pfx_read_tsc+0x10/0x10
[   14.752308]  ? ktime_get_ts64+0x86/0x230
[   14.752334]  kunit_try_run_case+0x1a5/0x480
[   14.752377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752400]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.752424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.752448]  ? __kthread_parkme+0x82/0x180
[   14.752470]  ? preempt_count_sub+0x50/0x80
[   14.752506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.752555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.752580]  kthread+0x337/0x6f0
[   14.752601]  ? trace_preempt_on+0x20/0xc0
[   14.752625]  ? __pfx_kthread+0x10/0x10
[   14.752646]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.752668]  ? calculate_sigpending+0x7b/0xa0
[   14.752712]  ? __pfx_kthread+0x10/0x10
[   14.752734]  ret_from_fork+0x116/0x1d0
[   14.752754]  ? __pfx_kthread+0x10/0x10
[   14.752774]  ret_from_fork_asm+0x1a/0x30
[   14.752806]  </TASK>
[   14.752817] 
[   14.762355] Allocated by task 283:
[   14.762555]  kasan_save_stack+0x45/0x70
[   14.762752]  kasan_save_track+0x18/0x40
[   14.762943]  kasan_save_alloc_info+0x3b/0x50
[   14.763274]  __kasan_kmalloc+0xb7/0xc0
[   14.763616]  __kmalloc_cache_noprof+0x189/0x420
[   14.763840]  kasan_atomics+0x95/0x310
[   14.764048]  kunit_try_run_case+0x1a5/0x480
[   14.764316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.764595]  kthread+0x337/0x6f0
[   14.764743]  ret_from_fork+0x116/0x1d0
[   14.764930]  ret_from_fork_asm+0x1a/0x30
[   14.765239] 
[   14.765367] The buggy address belongs to the object at ffff8881039f9d00
[   14.765367]  which belongs to the cache kmalloc-64 of size 64
[   14.765873] The buggy address is located 0 bytes to the right of
[   14.765873]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.766380] 
[   14.766552] The buggy address belongs to the physical page:
[   14.766833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.767208] flags: 0x200000000000000(node=0|zone=2)
[   14.767549] page_type: f5(slab)
[   14.767840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.768284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.768640] page dumped because: kasan: bad access detected
[   14.768867] 
[   14.768937] Memory state around the buggy address:
[   14.769156]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.769485]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.769805] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.770097]                                      ^
[   14.770254]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.770587]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.770936] ==================================================================
[   15.184807] ==================================================================
[   15.185277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.185642] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.186031] 
[   15.186145] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.186207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.186220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.186242] Call Trace:
[   15.186261]  <TASK>
[   15.186277]  dump_stack_lvl+0x73/0xb0
[   15.186306]  print_report+0xd1/0x610
[   15.186329]  ? __virt_addr_valid+0x1db/0x2d0
[   15.186351]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.186374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.186397]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.186419]  kasan_report+0x141/0x180
[   15.186442]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.186469]  __asan_report_load4_noabort+0x18/0x20
[   15.186494]  kasan_atomics_helper+0x4a02/0x5450
[   15.186530]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.186553]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.186579]  ? kasan_atomics+0x152/0x310
[   15.186606]  kasan_atomics+0x1dc/0x310
[   15.186629]  ? __pfx_kasan_atomics+0x10/0x10
[   15.186652]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.186679]  ? __pfx_read_tsc+0x10/0x10
[   15.186700]  ? ktime_get_ts64+0x86/0x230
[   15.186726]  kunit_try_run_case+0x1a5/0x480
[   15.186751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.186774]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.186798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.186822]  ? __kthread_parkme+0x82/0x180
[   15.186843]  ? preempt_count_sub+0x50/0x80
[   15.186868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.186893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.186918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.186943]  kthread+0x337/0x6f0
[   15.186962]  ? trace_preempt_on+0x20/0xc0
[   15.186987]  ? __pfx_kthread+0x10/0x10
[   15.187008]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.187031]  ? calculate_sigpending+0x7b/0xa0
[   15.187056]  ? __pfx_kthread+0x10/0x10
[   15.187078]  ret_from_fork+0x116/0x1d0
[   15.187098]  ? __pfx_kthread+0x10/0x10
[   15.187120]  ret_from_fork_asm+0x1a/0x30
[   15.187151]  </TASK>
[   15.187161] 
[   15.194706] Allocated by task 283:
[   15.194875]  kasan_save_stack+0x45/0x70
[   15.195019]  kasan_save_track+0x18/0x40
[   15.195155]  kasan_save_alloc_info+0x3b/0x50
[   15.195306]  __kasan_kmalloc+0xb7/0xc0
[   15.195440]  __kmalloc_cache_noprof+0x189/0x420
[   15.195657]  kasan_atomics+0x95/0x310
[   15.195843]  kunit_try_run_case+0x1a5/0x480
[   15.196068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.196447]  kthread+0x337/0x6f0
[   15.196580]  ret_from_fork+0x116/0x1d0
[   15.196714]  ret_from_fork_asm+0x1a/0x30
[   15.196886] 
[   15.196981] The buggy address belongs to the object at ffff8881039f9d00
[   15.196981]  which belongs to the cache kmalloc-64 of size 64
[   15.197611] The buggy address is located 0 bytes to the right of
[   15.197611]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.198105] 
[   15.198224] The buggy address belongs to the physical page:
[   15.198400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.198760] flags: 0x200000000000000(node=0|zone=2)
[   15.198999] page_type: f5(slab)
[   15.199174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.199474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.199728] page dumped because: kasan: bad access detected
[   15.199903] 
[   15.199973] Memory state around the buggy address:
[   15.200129]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.200444]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.200766] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.201089]                                      ^
[   15.201458]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.201793]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.202071] ==================================================================
[   14.889872] ==================================================================
[   14.890563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.890937] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.891348] 
[   14.891438] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.891484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.891509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.891532] Call Trace:
[   14.891546]  <TASK>
[   14.891563]  dump_stack_lvl+0x73/0xb0
[   14.891613]  print_report+0xd1/0x610
[   14.891635]  ? __virt_addr_valid+0x1db/0x2d0
[   14.891673]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.891707]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.891732]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.891767]  kasan_report+0x141/0x180
[   14.891802]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.891830]  kasan_check_range+0x10c/0x1c0
[   14.891853]  __kasan_check_write+0x18/0x20
[   14.891872]  kasan_atomics_helper+0xb6a/0x5450
[   14.891896]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.891919]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.891945]  ? kasan_atomics+0x152/0x310
[   14.891972]  kasan_atomics+0x1dc/0x310
[   14.891996]  ? __pfx_kasan_atomics+0x10/0x10
[   14.892018]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.892046]  ? __pfx_read_tsc+0x10/0x10
[   14.892069]  ? ktime_get_ts64+0x86/0x230
[   14.892094]  kunit_try_run_case+0x1a5/0x480
[   14.892120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892143]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.892175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.892199]  ? __kthread_parkme+0x82/0x180
[   14.892220]  ? preempt_count_sub+0x50/0x80
[   14.892245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.892337]  kthread+0x337/0x6f0
[   14.892357]  ? trace_preempt_on+0x20/0xc0
[   14.892396]  ? __pfx_kthread+0x10/0x10
[   14.892417]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.892452]  ? calculate_sigpending+0x7b/0xa0
[   14.892491]  ? __pfx_kthread+0x10/0x10
[   14.892524]  ret_from_fork+0x116/0x1d0
[   14.892544]  ? __pfx_kthread+0x10/0x10
[   14.892565]  ret_from_fork_asm+0x1a/0x30
[   14.892610]  </TASK>
[   14.892622] 
[   14.900581] Allocated by task 283:
[   14.900770]  kasan_save_stack+0x45/0x70
[   14.901009]  kasan_save_track+0x18/0x40
[   14.901235]  kasan_save_alloc_info+0x3b/0x50
[   14.901456]  __kasan_kmalloc+0xb7/0xc0
[   14.901666]  __kmalloc_cache_noprof+0x189/0x420
[   14.901884]  kasan_atomics+0x95/0x310
[   14.902072]  kunit_try_run_case+0x1a5/0x480
[   14.902270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.902607]  kthread+0x337/0x6f0
[   14.902797]  ret_from_fork+0x116/0x1d0
[   14.902984]  ret_from_fork_asm+0x1a/0x30
[   14.903201] 
[   14.903288] The buggy address belongs to the object at ffff8881039f9d00
[   14.903288]  which belongs to the cache kmalloc-64 of size 64
[   14.903741] The buggy address is located 0 bytes to the right of
[   14.903741]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.904312] 
[   14.904394] The buggy address belongs to the physical page:
[   14.904662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.904999] flags: 0x200000000000000(node=0|zone=2)
[   14.905255] page_type: f5(slab)
[   14.905442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.905905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.906268] page dumped because: kasan: bad access detected
[   14.906487] 
[   14.906596] Memory state around the buggy address:
[   14.906838]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.907175]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.907560] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.907869]                                      ^
[   14.908084]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.908392]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.908730] ==================================================================
[   15.412297] ==================================================================
[   15.412980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.413707] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.414101] 
[   15.414255] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.414305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.414319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.414343] Call Trace:
[   15.414364]  <TASK>
[   15.414381]  dump_stack_lvl+0x73/0xb0
[   15.414413]  print_report+0xd1/0x610
[   15.414437]  ? __virt_addr_valid+0x1db/0x2d0
[   15.414487]  ? kasan_atomics_helper+0x164f/0x5450
[   15.414520]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.414544]  ? kasan_atomics_helper+0x164f/0x5450
[   15.414567]  kasan_report+0x141/0x180
[   15.414591]  ? kasan_atomics_helper+0x164f/0x5450
[   15.414619]  kasan_check_range+0x10c/0x1c0
[   15.414643]  __kasan_check_write+0x18/0x20
[   15.414663]  kasan_atomics_helper+0x164f/0x5450
[   15.414686]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.414730]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.414756]  ? kasan_atomics+0x152/0x310
[   15.414784]  kasan_atomics+0x1dc/0x310
[   15.414807]  ? __pfx_kasan_atomics+0x10/0x10
[   15.414830]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.414858]  ? __pfx_read_tsc+0x10/0x10
[   15.414879]  ? ktime_get_ts64+0x86/0x230
[   15.414924]  kunit_try_run_case+0x1a5/0x480
[   15.414950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.414972]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.414996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.415021]  ? __kthread_parkme+0x82/0x180
[   15.415048]  ? preempt_count_sub+0x50/0x80
[   15.415074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.415102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.415130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.415156]  kthread+0x337/0x6f0
[   15.415179]  ? trace_preempt_on+0x20/0xc0
[   15.415204]  ? __pfx_kthread+0x10/0x10
[   15.415225]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.415281]  ? calculate_sigpending+0x7b/0xa0
[   15.415309]  ? __pfx_kthread+0x10/0x10
[   15.415332]  ret_from_fork+0x116/0x1d0
[   15.415355]  ? __pfx_kthread+0x10/0x10
[   15.415376]  ret_from_fork_asm+0x1a/0x30
[   15.415407]  </TASK>
[   15.415418] 
[   15.430079] Allocated by task 283:
[   15.430567]  kasan_save_stack+0x45/0x70
[   15.431015]  kasan_save_track+0x18/0x40
[   15.431192]  kasan_save_alloc_info+0x3b/0x50
[   15.431718]  __kasan_kmalloc+0xb7/0xc0
[   15.432178]  __kmalloc_cache_noprof+0x189/0x420
[   15.432397]  kasan_atomics+0x95/0x310
[   15.432889]  kunit_try_run_case+0x1a5/0x480
[   15.433128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.433341]  kthread+0x337/0x6f0
[   15.433626]  ret_from_fork+0x116/0x1d0
[   15.433979]  ret_from_fork_asm+0x1a/0x30
[   15.434215] 
[   15.434382] The buggy address belongs to the object at ffff8881039f9d00
[   15.434382]  which belongs to the cache kmalloc-64 of size 64
[   15.435058] The buggy address is located 0 bytes to the right of
[   15.435058]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.435763] 
[   15.435947] The buggy address belongs to the physical page:
[   15.436302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.436568] flags: 0x200000000000000(node=0|zone=2)
[   15.436741] page_type: f5(slab)
[   15.436869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.437104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.437400] page dumped because: kasan: bad access detected
[   15.438034] 
[   15.438131] Memory state around the buggy address:
[   15.438379]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.438881]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.439095] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.439687]                                      ^
[   15.440134]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.440952]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.441550] ==================================================================
[   15.442272] ==================================================================
[   15.442733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.443279] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.443761] 
[   15.443876] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.443924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.443937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.443960] Call Trace:
[   15.443980]  <TASK>
[   15.443999]  dump_stack_lvl+0x73/0xb0
[   15.444029]  print_report+0xd1/0x610
[   15.444053]  ? __virt_addr_valid+0x1db/0x2d0
[   15.444077]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.444099]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.444123]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.444146]  kasan_report+0x141/0x180
[   15.444169]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.444195]  kasan_check_range+0x10c/0x1c0
[   15.444220]  __kasan_check_write+0x18/0x20
[   15.444240]  kasan_atomics_helper+0x16e7/0x5450
[   15.444264]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.444287]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.444314]  ? kasan_atomics+0x152/0x310
[   15.444342]  kasan_atomics+0x1dc/0x310
[   15.444365]  ? __pfx_kasan_atomics+0x10/0x10
[   15.444387]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.444415]  ? __pfx_read_tsc+0x10/0x10
[   15.444437]  ? ktime_get_ts64+0x86/0x230
[   15.444462]  kunit_try_run_case+0x1a5/0x480
[   15.444488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.444522]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.444546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.444571]  ? __kthread_parkme+0x82/0x180
[   15.444592]  ? preempt_count_sub+0x50/0x80
[   15.444617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.444641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.444665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.444691]  kthread+0x337/0x6f0
[   15.444711]  ? trace_preempt_on+0x20/0xc0
[   15.444735]  ? __pfx_kthread+0x10/0x10
[   15.444756]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.444778]  ? calculate_sigpending+0x7b/0xa0
[   15.444803]  ? __pfx_kthread+0x10/0x10
[   15.444825]  ret_from_fork+0x116/0x1d0
[   15.444844]  ? __pfx_kthread+0x10/0x10
[   15.444865]  ret_from_fork_asm+0x1a/0x30
[   15.444896]  </TASK>
[   15.444908] 
[   15.452566] Allocated by task 283:
[   15.452700]  kasan_save_stack+0x45/0x70
[   15.453003]  kasan_save_track+0x18/0x40
[   15.453220]  kasan_save_alloc_info+0x3b/0x50
[   15.453439]  __kasan_kmalloc+0xb7/0xc0
[   15.453647]  __kmalloc_cache_noprof+0x189/0x420
[   15.453878]  kasan_atomics+0x95/0x310
[   15.454052]  kunit_try_run_case+0x1a5/0x480
[   15.454208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.454386]  kthread+0x337/0x6f0
[   15.454519]  ret_from_fork+0x116/0x1d0
[   15.454654]  ret_from_fork_asm+0x1a/0x30
[   15.454846] 
[   15.454941] The buggy address belongs to the object at ffff8881039f9d00
[   15.454941]  which belongs to the cache kmalloc-64 of size 64
[   15.455550] The buggy address is located 0 bytes to the right of
[   15.455550]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.455970] 
[   15.456047] The buggy address belongs to the physical page:
[   15.456377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.456748] flags: 0x200000000000000(node=0|zone=2)
[   15.456997] page_type: f5(slab)
[   15.457169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.457519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.457835] page dumped because: kasan: bad access detected
[   15.458039] 
[   15.458134] Memory state around the buggy address:
[   15.458409]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.458679]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.458970] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.459299]                                      ^
[   15.459495]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.459789]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.460073] ==================================================================
[   14.816267] ==================================================================
[   14.817023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.817740] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.818386] 
[   14.818552] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.818621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.818634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.818657] Call Trace:
[   14.818672]  <TASK>
[   14.818689]  dump_stack_lvl+0x73/0xb0
[   14.818739]  print_report+0xd1/0x610
[   14.818761]  ? __virt_addr_valid+0x1db/0x2d0
[   14.818785]  ? kasan_atomics_helper+0x992/0x5450
[   14.818806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.818830]  ? kasan_atomics_helper+0x992/0x5450
[   14.818853]  kasan_report+0x141/0x180
[   14.818876]  ? kasan_atomics_helper+0x992/0x5450
[   14.818903]  kasan_check_range+0x10c/0x1c0
[   14.818927]  __kasan_check_write+0x18/0x20
[   14.818947]  kasan_atomics_helper+0x992/0x5450
[   14.818971]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.818994]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.819021]  ? kasan_atomics+0x152/0x310
[   14.819061]  kasan_atomics+0x1dc/0x310
[   14.819085]  ? __pfx_kasan_atomics+0x10/0x10
[   14.819107]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.819135]  ? __pfx_read_tsc+0x10/0x10
[   14.819157]  ? ktime_get_ts64+0x86/0x230
[   14.819209]  kunit_try_run_case+0x1a5/0x480
[   14.819235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.819259]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.819283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.819308]  ? __kthread_parkme+0x82/0x180
[   14.819330]  ? preempt_count_sub+0x50/0x80
[   14.819371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.819396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.819434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.819459]  kthread+0x337/0x6f0
[   14.819493]  ? trace_preempt_on+0x20/0xc0
[   14.819529]  ? __pfx_kthread+0x10/0x10
[   14.819550]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.819587]  ? calculate_sigpending+0x7b/0xa0
[   14.819613]  ? __pfx_kthread+0x10/0x10
[   14.819648]  ret_from_fork+0x116/0x1d0
[   14.819668]  ? __pfx_kthread+0x10/0x10
[   14.819689]  ret_from_fork_asm+0x1a/0x30
[   14.819721]  </TASK>
[   14.819733] 
[   14.833309] Allocated by task 283:
[   14.833631]  kasan_save_stack+0x45/0x70
[   14.834025]  kasan_save_track+0x18/0x40
[   14.834431]  kasan_save_alloc_info+0x3b/0x50
[   14.834853]  __kasan_kmalloc+0xb7/0xc0
[   14.835033]  __kmalloc_cache_noprof+0x189/0x420
[   14.835214]  kasan_atomics+0x95/0x310
[   14.835618]  kunit_try_run_case+0x1a5/0x480
[   14.836010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.836617]  kthread+0x337/0x6f0
[   14.836932]  ret_from_fork+0x116/0x1d0
[   14.837308]  ret_from_fork_asm+0x1a/0x30
[   14.837454] 
[   14.837538] The buggy address belongs to the object at ffff8881039f9d00
[   14.837538]  which belongs to the cache kmalloc-64 of size 64
[   14.837900] The buggy address is located 0 bytes to the right of
[   14.837900]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.838552] 
[   14.838767] The buggy address belongs to the physical page:
[   14.839249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.840160] flags: 0x200000000000000(node=0|zone=2)
[   14.840745] page_type: f5(slab)
[   14.841058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.841730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.842425] page dumped because: kasan: bad access detected
[   14.842927] 
[   14.843083] Memory state around the buggy address:
[   14.843551]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.844177]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.844529] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.844748]                                      ^
[   14.844905]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.845125]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.845794] ==================================================================
[   15.143245] ==================================================================
[   15.143969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.144859] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.145423] 
[   15.145676] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.145728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.145848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.145872] Call Trace:
[   15.145894]  <TASK>
[   15.145914]  dump_stack_lvl+0x73/0xb0
[   15.145947]  print_report+0xd1/0x610
[   15.145971]  ? __virt_addr_valid+0x1db/0x2d0
[   15.146038]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.146061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.146085]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.146107]  kasan_report+0x141/0x180
[   15.146130]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.146158]  __asan_report_load4_noabort+0x18/0x20
[   15.146184]  kasan_atomics_helper+0x4a1c/0x5450
[   15.146215]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.146238]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.146265]  ? kasan_atomics+0x152/0x310
[   15.146291]  kasan_atomics+0x1dc/0x310
[   15.146314]  ? __pfx_kasan_atomics+0x10/0x10
[   15.146337]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.146365]  ? __pfx_read_tsc+0x10/0x10
[   15.146386]  ? ktime_get_ts64+0x86/0x230
[   15.146412]  kunit_try_run_case+0x1a5/0x480
[   15.146438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146461]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.146484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.146520]  ? __kthread_parkme+0x82/0x180
[   15.146542]  ? preempt_count_sub+0x50/0x80
[   15.146567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.146616]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.146640]  kthread+0x337/0x6f0
[   15.146661]  ? trace_preempt_on+0x20/0xc0
[   15.146685]  ? __pfx_kthread+0x10/0x10
[   15.146706]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.146729]  ? calculate_sigpending+0x7b/0xa0
[   15.146754]  ? __pfx_kthread+0x10/0x10
[   15.146775]  ret_from_fork+0x116/0x1d0
[   15.146795]  ? __pfx_kthread+0x10/0x10
[   15.146815]  ret_from_fork_asm+0x1a/0x30
[   15.146847]  </TASK>
[   15.146859] 
[   15.158460] Allocated by task 283:
[   15.158781]  kasan_save_stack+0x45/0x70
[   15.158979]  kasan_save_track+0x18/0x40
[   15.159364]  kasan_save_alloc_info+0x3b/0x50
[   15.159634]  __kasan_kmalloc+0xb7/0xc0
[   15.159930]  __kmalloc_cache_noprof+0x189/0x420
[   15.160160]  kasan_atomics+0x95/0x310
[   15.160337]  kunit_try_run_case+0x1a5/0x480
[   15.160535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.160767]  kthread+0x337/0x6f0
[   15.160919]  ret_from_fork+0x116/0x1d0
[   15.161086]  ret_from_fork_asm+0x1a/0x30
[   15.161402] 
[   15.161511] The buggy address belongs to the object at ffff8881039f9d00
[   15.161511]  which belongs to the cache kmalloc-64 of size 64
[   15.161877] The buggy address is located 0 bytes to the right of
[   15.161877]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.162379] 
[   15.162557] The buggy address belongs to the physical page:
[   15.162771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.163097] flags: 0x200000000000000(node=0|zone=2)
[   15.163269] page_type: f5(slab)
[   15.163398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.163949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.164271] page dumped because: kasan: bad access detected
[   15.164448] 
[   15.164526] Memory state around the buggy address:
[   15.164822]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.165136]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.165552] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.165766]                                      ^
[   15.165989]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.166386]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.166665] ==================================================================
[   14.670478] ==================================================================
[   14.670818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.671584] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.672438] 
[   14.672573] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.672624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.672637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.672660] Call Trace:
[   14.672682]  <TASK>
[   14.672702]  dump_stack_lvl+0x73/0xb0
[   14.672735]  print_report+0xd1/0x610
[   14.672759]  ? __virt_addr_valid+0x1db/0x2d0
[   14.672783]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.672804]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.672828]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.672850]  kasan_report+0x141/0x180
[   14.672873]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.672901]  kasan_check_range+0x10c/0x1c0
[   14.672925]  __kasan_check_write+0x18/0x20
[   14.672945]  kasan_atomics_helper+0x5fe/0x5450
[   14.672968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.672991]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.673018]  ? kasan_atomics+0x152/0x310
[   14.673105]  kasan_atomics+0x1dc/0x310
[   14.673130]  ? __pfx_kasan_atomics+0x10/0x10
[   14.673154]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.673205]  ? __pfx_read_tsc+0x10/0x10
[   14.673229]  ? ktime_get_ts64+0x86/0x230
[   14.673256]  kunit_try_run_case+0x1a5/0x480
[   14.673296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.673319]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.673356]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.673380]  ? __kthread_parkme+0x82/0x180
[   14.673416]  ? preempt_count_sub+0x50/0x80
[   14.673441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.673479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.673575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.673601]  kthread+0x337/0x6f0
[   14.673622]  ? trace_preempt_on+0x20/0xc0
[   14.673647]  ? __pfx_kthread+0x10/0x10
[   14.673667]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.673689]  ? calculate_sigpending+0x7b/0xa0
[   14.673714]  ? __pfx_kthread+0x10/0x10
[   14.673736]  ret_from_fork+0x116/0x1d0
[   14.673755]  ? __pfx_kthread+0x10/0x10
[   14.673777]  ret_from_fork_asm+0x1a/0x30
[   14.673809]  </TASK>
[   14.673821] 
[   14.683292] Allocated by task 283:
[   14.683669]  kasan_save_stack+0x45/0x70
[   14.684082]  kasan_save_track+0x18/0x40
[   14.684359]  kasan_save_alloc_info+0x3b/0x50
[   14.684600]  __kasan_kmalloc+0xb7/0xc0
[   14.684791]  __kmalloc_cache_noprof+0x189/0x420
[   14.684950]  kasan_atomics+0x95/0x310
[   14.685110]  kunit_try_run_case+0x1a5/0x480
[   14.685355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.685805]  kthread+0x337/0x6f0
[   14.685985]  ret_from_fork+0x116/0x1d0
[   14.686382]  ret_from_fork_asm+0x1a/0x30
[   14.686633] 
[   14.686711] The buggy address belongs to the object at ffff8881039f9d00
[   14.686711]  which belongs to the cache kmalloc-64 of size 64
[   14.687086] The buggy address is located 0 bytes to the right of
[   14.687086]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.687745] 
[   14.687997] The buggy address belongs to the physical page:
[   14.688414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.688738] flags: 0x200000000000000(node=0|zone=2)
[   14.688978] page_type: f5(slab)
[   14.689155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.689389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.689738] page dumped because: kasan: bad access detected
[   14.690006] 
[   14.690081] Memory state around the buggy address:
[   14.690252]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.690901]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.691425] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.691764]                                      ^
[   14.691995]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.692224]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.692443] ==================================================================
[   15.720039] ==================================================================
[   15.721002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.721691] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.722111] 
[   15.722656] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.722710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.722723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.722746] Call Trace:
[   15.722776]  <TASK>
[   15.722795]  dump_stack_lvl+0x73/0xb0
[   15.722827]  print_report+0xd1/0x610
[   15.722851]  ? __virt_addr_valid+0x1db/0x2d0
[   15.722876]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.722898]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.722922]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.722944]  kasan_report+0x141/0x180
[   15.722966]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.722994]  kasan_check_range+0x10c/0x1c0
[   15.723018]  __kasan_check_write+0x18/0x20
[   15.723038]  kasan_atomics_helper+0x1d7a/0x5450
[   15.723062]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.723085]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.723110]  ? kasan_atomics+0x152/0x310
[   15.723137]  kasan_atomics+0x1dc/0x310
[   15.723160]  ? __pfx_kasan_atomics+0x10/0x10
[   15.723183]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.723211]  ? __pfx_read_tsc+0x10/0x10
[   15.723233]  ? ktime_get_ts64+0x86/0x230
[   15.723259]  kunit_try_run_case+0x1a5/0x480
[   15.723285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.723308]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.723331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.723356]  ? __kthread_parkme+0x82/0x180
[   15.723377]  ? preempt_count_sub+0x50/0x80
[   15.723402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.723426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.723452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.723477]  kthread+0x337/0x6f0
[   15.723506]  ? trace_preempt_on+0x20/0xc0
[   15.723531]  ? __pfx_kthread+0x10/0x10
[   15.723552]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.723575]  ? calculate_sigpending+0x7b/0xa0
[   15.723601]  ? __pfx_kthread+0x10/0x10
[   15.723622]  ret_from_fork+0x116/0x1d0
[   15.723643]  ? __pfx_kthread+0x10/0x10
[   15.723664]  ret_from_fork_asm+0x1a/0x30
[   15.723697]  </TASK>
[   15.723708] 
[   15.731370] Allocated by task 283:
[   15.731562]  kasan_save_stack+0x45/0x70
[   15.731725]  kasan_save_track+0x18/0x40
[   15.731917]  kasan_save_alloc_info+0x3b/0x50
[   15.732109]  __kasan_kmalloc+0xb7/0xc0
[   15.732384]  __kmalloc_cache_noprof+0x189/0x420
[   15.732595]  kasan_atomics+0x95/0x310
[   15.732781]  kunit_try_run_case+0x1a5/0x480
[   15.732973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.733152]  kthread+0x337/0x6f0
[   15.733389]  ret_from_fork+0x116/0x1d0
[   15.733562]  ret_from_fork_asm+0x1a/0x30
[   15.733728] 
[   15.733828] The buggy address belongs to the object at ffff8881039f9d00
[   15.733828]  which belongs to the cache kmalloc-64 of size 64
[   15.734314] The buggy address is located 0 bytes to the right of
[   15.734314]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.734814] 
[   15.734911] The buggy address belongs to the physical page:
[   15.735145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.735407] flags: 0x200000000000000(node=0|zone=2)
[   15.735587] page_type: f5(slab)
[   15.735715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.735951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.736191] page dumped because: kasan: bad access detected
[   15.736439] 
[   15.736596] Memory state around the buggy address:
[   15.736817]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.737131]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.737443] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.737762]                                      ^
[   15.738086]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.738306]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.738527] ==================================================================
[   15.460685] ==================================================================
[   15.461219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.461579] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.461895] 
[   15.461981] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.462027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.462040] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.462063] Call Trace:
[   15.462082]  <TASK>
[   15.462099]  dump_stack_lvl+0x73/0xb0
[   15.462129]  print_report+0xd1/0x610
[   15.462151]  ? __virt_addr_valid+0x1db/0x2d0
[   15.462184]  ? kasan_atomics_helper+0x177f/0x5450
[   15.462212]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.462236]  ? kasan_atomics_helper+0x177f/0x5450
[   15.462260]  kasan_report+0x141/0x180
[   15.462283]  ? kasan_atomics_helper+0x177f/0x5450
[   15.462310]  kasan_check_range+0x10c/0x1c0
[   15.462335]  __kasan_check_write+0x18/0x20
[   15.462355]  kasan_atomics_helper+0x177f/0x5450
[   15.462379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.462402]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.462428]  ? kasan_atomics+0x152/0x310
[   15.462456]  kasan_atomics+0x1dc/0x310
[   15.462479]  ? __pfx_kasan_atomics+0x10/0x10
[   15.462512]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.462540]  ? __pfx_read_tsc+0x10/0x10
[   15.462562]  ? ktime_get_ts64+0x86/0x230
[   15.462587]  kunit_try_run_case+0x1a5/0x480
[   15.462613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.462636]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.462660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.462684]  ? __kthread_parkme+0x82/0x180
[   15.462707]  ? preempt_count_sub+0x50/0x80
[   15.462732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.462757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.462781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.462807]  kthread+0x337/0x6f0
[   15.462827]  ? trace_preempt_on+0x20/0xc0
[   15.462852]  ? __pfx_kthread+0x10/0x10
[   15.462872]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.462894]  ? calculate_sigpending+0x7b/0xa0
[   15.462919]  ? __pfx_kthread+0x10/0x10
[   15.462941]  ret_from_fork+0x116/0x1d0
[   15.462961]  ? __pfx_kthread+0x10/0x10
[   15.462982]  ret_from_fork_asm+0x1a/0x30
[   15.463014]  </TASK>
[   15.463025] 
[   15.470980] Allocated by task 283:
[   15.471141]  kasan_save_stack+0x45/0x70
[   15.471315]  kasan_save_track+0x18/0x40
[   15.471523]  kasan_save_alloc_info+0x3b/0x50
[   15.471710]  __kasan_kmalloc+0xb7/0xc0
[   15.471896]  __kmalloc_cache_noprof+0x189/0x420
[   15.472086]  kasan_atomics+0x95/0x310
[   15.472256]  kunit_try_run_case+0x1a5/0x480
[   15.472446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.472656]  kthread+0x337/0x6f0
[   15.472811]  ret_from_fork+0x116/0x1d0
[   15.472999]  ret_from_fork_asm+0x1a/0x30
[   15.473191] 
[   15.473282] The buggy address belongs to the object at ffff8881039f9d00
[   15.473282]  which belongs to the cache kmalloc-64 of size 64
[   15.473660] The buggy address is located 0 bytes to the right of
[   15.473660]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.474030] 
[   15.474103] The buggy address belongs to the physical page:
[   15.474288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.474544] flags: 0x200000000000000(node=0|zone=2)
[   15.474715] page_type: f5(slab)
[   15.474839] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.475140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.475801] page dumped because: kasan: bad access detected
[   15.476053] 
[   15.476146] Memory state around the buggy address:
[   15.476628]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.476911]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.477132] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.477454]                                      ^
[   15.477683]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.477952]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.478181] ==================================================================
[   15.859430] ==================================================================
[   15.859779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.860122] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.860414] 
[   15.860525] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.860571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.860583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.860606] Call Trace:
[   15.860624]  <TASK>
[   15.860642]  dump_stack_lvl+0x73/0xb0
[   15.860671]  print_report+0xd1/0x610
[   15.860693]  ? __virt_addr_valid+0x1db/0x2d0
[   15.860717]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.860740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.860763]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.860786]  kasan_report+0x141/0x180
[   15.860808]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.861551]  kasan_check_range+0x10c/0x1c0
[   15.861588]  __kasan_check_write+0x18/0x20
[   15.861608]  kasan_atomics_helper+0x20c8/0x5450
[   15.861632]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.861655]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.861680]  ? kasan_atomics+0x152/0x310
[   15.861708]  kasan_atomics+0x1dc/0x310
[   15.861730]  ? __pfx_kasan_atomics+0x10/0x10
[   15.861753]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.861781]  ? __pfx_read_tsc+0x10/0x10
[   15.861803]  ? ktime_get_ts64+0x86/0x230
[   15.861828]  kunit_try_run_case+0x1a5/0x480
[   15.861854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.861878]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.861902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.861927]  ? __kthread_parkme+0x82/0x180
[   15.861948]  ? preempt_count_sub+0x50/0x80
[   15.861974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.861998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.862023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.862048]  kthread+0x337/0x6f0
[   15.862067]  ? trace_preempt_on+0x20/0xc0
[   15.862091]  ? __pfx_kthread+0x10/0x10
[   15.862112]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.862134]  ? calculate_sigpending+0x7b/0xa0
[   15.862160]  ? __pfx_kthread+0x10/0x10
[   15.862255]  ret_from_fork+0x116/0x1d0
[   15.862278]  ? __pfx_kthread+0x10/0x10
[   15.862299]  ret_from_fork_asm+0x1a/0x30
[   15.862331]  </TASK>
[   15.862343] 
[   15.875969] Allocated by task 283:
[   15.876209]  kasan_save_stack+0x45/0x70
[   15.876598]  kasan_save_track+0x18/0x40
[   15.876904]  kasan_save_alloc_info+0x3b/0x50
[   15.877209]  __kasan_kmalloc+0xb7/0xc0
[   15.877347]  __kmalloc_cache_noprof+0x189/0x420
[   15.877519]  kasan_atomics+0x95/0x310
[   15.877656]  kunit_try_run_case+0x1a5/0x480
[   15.877805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.877980]  kthread+0x337/0x6f0
[   15.878101]  ret_from_fork+0x116/0x1d0
[   15.878257]  ret_from_fork_asm+0x1a/0x30
[   15.878397] 
[   15.878470] The buggy address belongs to the object at ffff8881039f9d00
[   15.878470]  which belongs to the cache kmalloc-64 of size 64
[   15.878946] The buggy address is located 0 bytes to the right of
[   15.878946]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.879975] 
[   15.880134] The buggy address belongs to the physical page:
[   15.880762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.881608] flags: 0x200000000000000(node=0|zone=2)
[   15.882173] page_type: f5(slab)
[   15.882489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.882948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.883192] page dumped because: kasan: bad access detected
[   15.883576] 
[   15.883740] Memory state around the buggy address:
[   15.884121]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.884394]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.885009] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.885244]                                      ^
[   15.885685]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.886165]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.886425] ==================================================================
[   14.771713] ==================================================================
[   14.772360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.772703] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.773115] 
[   14.773234] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.773305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.773318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.773355] Call Trace:
[   14.773375]  <TASK>
[   14.773405]  dump_stack_lvl+0x73/0xb0
[   14.773449]  print_report+0xd1/0x610
[   14.773485]  ? __virt_addr_valid+0x1db/0x2d0
[   14.773535]  ? kasan_atomics_helper+0x860/0x5450
[   14.773557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.773594]  ? kasan_atomics_helper+0x860/0x5450
[   14.773630]  kasan_report+0x141/0x180
[   14.773666]  ? kasan_atomics_helper+0x860/0x5450
[   14.773706]  kasan_check_range+0x10c/0x1c0
[   14.773731]  __kasan_check_write+0x18/0x20
[   14.773751]  kasan_atomics_helper+0x860/0x5450
[   14.773775]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.773798]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.773824]  ? kasan_atomics+0x152/0x310
[   14.773852]  kasan_atomics+0x1dc/0x310
[   14.773874]  ? __pfx_kasan_atomics+0x10/0x10
[   14.773897]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.773925]  ? __pfx_read_tsc+0x10/0x10
[   14.773947]  ? ktime_get_ts64+0x86/0x230
[   14.773972]  kunit_try_run_case+0x1a5/0x480
[   14.773997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.774020]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.774044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.774067]  ? __kthread_parkme+0x82/0x180
[   14.774089]  ? preempt_count_sub+0x50/0x80
[   14.774114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.774138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.774163]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.774188]  kthread+0x337/0x6f0
[   14.774212]  ? trace_preempt_on+0x20/0xc0
[   14.774236]  ? __pfx_kthread+0x10/0x10
[   14.774257]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.774278]  ? calculate_sigpending+0x7b/0xa0
[   14.774304]  ? __pfx_kthread+0x10/0x10
[   14.774325]  ret_from_fork+0x116/0x1d0
[   14.774365]  ? __pfx_kthread+0x10/0x10
[   14.774385]  ret_from_fork_asm+0x1a/0x30
[   14.774418]  </TASK>
[   14.774429] 
[   14.783614] Allocated by task 283:
[   14.783805]  kasan_save_stack+0x45/0x70
[   14.784012]  kasan_save_track+0x18/0x40
[   14.784201]  kasan_save_alloc_info+0x3b/0x50
[   14.784593]  __kasan_kmalloc+0xb7/0xc0
[   14.784747]  __kmalloc_cache_noprof+0x189/0x420
[   14.784906]  kasan_atomics+0x95/0x310
[   14.785100]  kunit_try_run_case+0x1a5/0x480
[   14.785677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.785948]  kthread+0x337/0x6f0
[   14.786339]  ret_from_fork+0x116/0x1d0
[   14.786564]  ret_from_fork_asm+0x1a/0x30
[   14.786749] 
[   14.786850] The buggy address belongs to the object at ffff8881039f9d00
[   14.786850]  which belongs to the cache kmalloc-64 of size 64
[   14.787465] The buggy address is located 0 bytes to the right of
[   14.787465]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.787987] 
[   14.788102] The buggy address belongs to the physical page:
[   14.788451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.788829] flags: 0x200000000000000(node=0|zone=2)
[   14.789057] page_type: f5(slab)
[   14.789434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.789795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.790158] page dumped because: kasan: bad access detected
[   14.790394] 
[   14.790490] Memory state around the buggy address:
[   14.790689]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.790907]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.791125] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.791748]                                      ^
[   14.792004]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.792483]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.792738] ==================================================================
[   14.978265] ==================================================================
[   14.978553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.979187] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.979540] 
[   14.980277] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.980331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.980345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.980369] Call Trace:
[   14.980391]  <TASK>
[   14.980445]  dump_stack_lvl+0x73/0xb0
[   14.980479]  print_report+0xd1/0x610
[   14.980522]  ? __virt_addr_valid+0x1db/0x2d0
[   14.980549]  ? kasan_atomics_helper+0xd47/0x5450
[   14.980572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.980624]  ? kasan_atomics_helper+0xd47/0x5450
[   14.980647]  kasan_report+0x141/0x180
[   14.980681]  ? kasan_atomics_helper+0xd47/0x5450
[   14.980708]  kasan_check_range+0x10c/0x1c0
[   14.980733]  __kasan_check_write+0x18/0x20
[   14.980784]  kasan_atomics_helper+0xd47/0x5450
[   14.980808]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.980831]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.980868]  ? kasan_atomics+0x152/0x310
[   14.980896]  kasan_atomics+0x1dc/0x310
[   14.980918]  ? __pfx_kasan_atomics+0x10/0x10
[   14.980941]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.980968]  ? __pfx_read_tsc+0x10/0x10
[   14.980990]  ? ktime_get_ts64+0x86/0x230
[   14.981016]  kunit_try_run_case+0x1a5/0x480
[   14.981042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.981065]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.981089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.981112]  ? __kthread_parkme+0x82/0x180
[   14.981134]  ? preempt_count_sub+0x50/0x80
[   14.981180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.981205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.981241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.981266]  kthread+0x337/0x6f0
[   14.981286]  ? trace_preempt_on+0x20/0xc0
[   14.981322]  ? __pfx_kthread+0x10/0x10
[   14.981343]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.981365]  ? calculate_sigpending+0x7b/0xa0
[   14.981402]  ? __pfx_kthread+0x10/0x10
[   14.981423]  ret_from_fork+0x116/0x1d0
[   14.981443]  ? __pfx_kthread+0x10/0x10
[   14.981473]  ret_from_fork_asm+0x1a/0x30
[   14.981522]  </TASK>
[   14.981534] 
[   14.990163] Allocated by task 283:
[   14.990356]  kasan_save_stack+0x45/0x70
[   14.990594]  kasan_save_track+0x18/0x40
[   14.990827]  kasan_save_alloc_info+0x3b/0x50
[   14.991024]  __kasan_kmalloc+0xb7/0xc0
[   14.991252]  __kmalloc_cache_noprof+0x189/0x420
[   14.991516]  kasan_atomics+0x95/0x310
[   14.991743]  kunit_try_run_case+0x1a5/0x480
[   14.991947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992250]  kthread+0x337/0x6f0
[   14.992447]  ret_from_fork+0x116/0x1d0
[   14.992673]  ret_from_fork_asm+0x1a/0x30
[   14.992908] 
[   14.992984] The buggy address belongs to the object at ffff8881039f9d00
[   14.992984]  which belongs to the cache kmalloc-64 of size 64
[   14.993576] The buggy address is located 0 bytes to the right of
[   14.993576]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.993956] 
[   14.994037] The buggy address belongs to the physical page:
[   14.994329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.994763] flags: 0x200000000000000(node=0|zone=2)
[   14.995009] page_type: f5(slab)
[   14.995251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.995646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.996011] page dumped because: kasan: bad access detected
[   14.996351] 
[   14.996427] Memory state around the buggy address:
[   14.996598]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.996820]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.997039] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.997439]                                      ^
[   14.997756]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998212]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998617] ==================================================================
[   15.058419] ==================================================================
[   15.058960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.059491] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.060173] 
[   15.060303] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.060363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.060376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.060400] Call Trace:
[   15.060430]  <TASK>
[   15.060449]  dump_stack_lvl+0x73/0xb0
[   15.060479]  print_report+0xd1/0x610
[   15.060510]  ? __virt_addr_valid+0x1db/0x2d0
[   15.060543]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.060565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.060589]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.060622]  kasan_report+0x141/0x180
[   15.060645]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.060672]  kasan_check_range+0x10c/0x1c0
[   15.060696]  __kasan_check_write+0x18/0x20
[   15.060716]  kasan_atomics_helper+0xfa9/0x5450
[   15.060740]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.060763]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.060790]  ? kasan_atomics+0x152/0x310
[   15.060818]  kasan_atomics+0x1dc/0x310
[   15.060841]  ? __pfx_kasan_atomics+0x10/0x10
[   15.060864]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.060891]  ? __pfx_read_tsc+0x10/0x10
[   15.060913]  ? ktime_get_ts64+0x86/0x230
[   15.060938]  kunit_try_run_case+0x1a5/0x480
[   15.060964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.060987]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.061011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.061036]  ? __kthread_parkme+0x82/0x180
[   15.061057]  ? preempt_count_sub+0x50/0x80
[   15.061083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.061107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.061132]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.061176]  kthread+0x337/0x6f0
[   15.061197]  ? trace_preempt_on+0x20/0xc0
[   15.061220]  ? __pfx_kthread+0x10/0x10
[   15.061241]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.061264]  ? calculate_sigpending+0x7b/0xa0
[   15.061289]  ? __pfx_kthread+0x10/0x10
[   15.061312]  ret_from_fork+0x116/0x1d0
[   15.061333]  ? __pfx_kthread+0x10/0x10
[   15.061355]  ret_from_fork_asm+0x1a/0x30
[   15.061387]  </TASK>
[   15.061398] 
[   15.074626] Allocated by task 283:
[   15.074900]  kasan_save_stack+0x45/0x70
[   15.075312]  kasan_save_track+0x18/0x40
[   15.075466]  kasan_save_alloc_info+0x3b/0x50
[   15.075965]  __kasan_kmalloc+0xb7/0xc0
[   15.076173]  __kmalloc_cache_noprof+0x189/0x420
[   15.076620]  kasan_atomics+0x95/0x310
[   15.076762]  kunit_try_run_case+0x1a5/0x480
[   15.076999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.077536]  kthread+0x337/0x6f0
[   15.077858]  ret_from_fork+0x116/0x1d0
[   15.078169]  ret_from_fork_asm+0x1a/0x30
[   15.078504] 
[   15.078672] The buggy address belongs to the object at ffff8881039f9d00
[   15.078672]  which belongs to the cache kmalloc-64 of size 64
[   15.079457] The buggy address is located 0 bytes to the right of
[   15.079457]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.080110] 
[   15.080305] The buggy address belongs to the physical page:
[   15.080806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.081529] flags: 0x200000000000000(node=0|zone=2)
[   15.081873] page_type: f5(slab)
[   15.082067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.082754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.082987] page dumped because: kasan: bad access detected
[   15.083191] 
[   15.083366] Memory state around the buggy address:
[   15.083818]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.084450]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.085081] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.085650]                                      ^
[   15.085810]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.086027]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.086472] ==================================================================
[   15.969186] ==================================================================
[   15.969961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.970337] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.970572] 
[   15.970660] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.970705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.970718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.970740] Call Trace:
[   15.970759]  <TASK>
[   15.970777]  dump_stack_lvl+0x73/0xb0
[   15.970806]  print_report+0xd1/0x610
[   15.970827]  ? __virt_addr_valid+0x1db/0x2d0
[   15.970851]  ? kasan_atomics_helper+0x5115/0x5450
[   15.970873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.970897]  ? kasan_atomics_helper+0x5115/0x5450
[   15.970919]  kasan_report+0x141/0x180
[   15.970942]  ? kasan_atomics_helper+0x5115/0x5450
[   15.970969]  __asan_report_load8_noabort+0x18/0x20
[   15.970993]  kasan_atomics_helper+0x5115/0x5450
[   15.971037]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.971061]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.971086]  ? kasan_atomics+0x152/0x310
[   15.971113]  kasan_atomics+0x1dc/0x310
[   15.971137]  ? __pfx_kasan_atomics+0x10/0x10
[   15.971160]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.971187]  ? __pfx_read_tsc+0x10/0x10
[   15.971209]  ? ktime_get_ts64+0x86/0x230
[   15.971234]  kunit_try_run_case+0x1a5/0x480
[   15.971258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.971282]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.971305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.971329]  ? __kthread_parkme+0x82/0x180
[   15.971351]  ? preempt_count_sub+0x50/0x80
[   15.971388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.971423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.971459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.971484]  kthread+0x337/0x6f0
[   15.971513]  ? trace_preempt_on+0x20/0xc0
[   15.971537]  ? __pfx_kthread+0x10/0x10
[   15.971558]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.971581]  ? calculate_sigpending+0x7b/0xa0
[   15.971606]  ? __pfx_kthread+0x10/0x10
[   15.971636]  ret_from_fork+0x116/0x1d0
[   15.971666]  ? __pfx_kthread+0x10/0x10
[   15.971687]  ret_from_fork_asm+0x1a/0x30
[   15.971729]  </TASK>
[   15.971740] 
[   15.979179] Allocated by task 283:
[   15.979329]  kasan_save_stack+0x45/0x70
[   15.979531]  kasan_save_track+0x18/0x40
[   15.979709]  kasan_save_alloc_info+0x3b/0x50
[   15.979906]  __kasan_kmalloc+0xb7/0xc0
[   15.980081]  __kmalloc_cache_noprof+0x189/0x420
[   15.980364]  kasan_atomics+0x95/0x310
[   15.980564]  kunit_try_run_case+0x1a5/0x480
[   15.980738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.980991]  kthread+0x337/0x6f0
[   15.981157]  ret_from_fork+0x116/0x1d0
[   15.981382]  ret_from_fork_asm+0x1a/0x30
[   15.981601] 
[   15.981711] The buggy address belongs to the object at ffff8881039f9d00
[   15.981711]  which belongs to the cache kmalloc-64 of size 64
[   15.982226] The buggy address is located 0 bytes to the right of
[   15.982226]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.982790] 
[   15.982883] The buggy address belongs to the physical page:
[   15.983120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.983490] flags: 0x200000000000000(node=0|zone=2)
[   15.983760] page_type: f5(slab)
[   15.983887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.984125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.984876] page dumped because: kasan: bad access detected
[   15.985118] 
[   15.985236] Memory state around the buggy address:
[   15.985435]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.985663]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.986002] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.986416]                                      ^
[   15.986665]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.987422]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.987722] ==================================================================
[   15.202773] ==================================================================
[   15.203124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.203461] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.203962] 
[   15.204052] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.204097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.204109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.204132] Call Trace:
[   15.204149]  <TASK>
[   15.204165]  dump_stack_lvl+0x73/0xb0
[   15.204193]  print_report+0xd1/0x610
[   15.204215]  ? __virt_addr_valid+0x1db/0x2d0
[   15.204239]  ? kasan_atomics_helper+0x1217/0x5450
[   15.204260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.204282]  ? kasan_atomics_helper+0x1217/0x5450
[   15.204304]  kasan_report+0x141/0x180
[   15.204326]  ? kasan_atomics_helper+0x1217/0x5450
[   15.204352]  kasan_check_range+0x10c/0x1c0
[   15.204375]  __kasan_check_write+0x18/0x20
[   15.204395]  kasan_atomics_helper+0x1217/0x5450
[   15.204418]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.204441]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.204465]  ? kasan_atomics+0x152/0x310
[   15.204492]  kasan_atomics+0x1dc/0x310
[   15.204525]  ? __pfx_kasan_atomics+0x10/0x10
[   15.204547]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.204587]  ? __pfx_read_tsc+0x10/0x10
[   15.204609]  ? ktime_get_ts64+0x86/0x230
[   15.204634]  kunit_try_run_case+0x1a5/0x480
[   15.204660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.204683]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.204706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.204730]  ? __kthread_parkme+0x82/0x180
[   15.204751]  ? preempt_count_sub+0x50/0x80
[   15.204775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.204800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.204825]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.204850]  kthread+0x337/0x6f0
[   15.204870]  ? trace_preempt_on+0x20/0xc0
[   15.204894]  ? __pfx_kthread+0x10/0x10
[   15.204915]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.204937]  ? calculate_sigpending+0x7b/0xa0
[   15.204962]  ? __pfx_kthread+0x10/0x10
[   15.204984]  ret_from_fork+0x116/0x1d0
[   15.205003]  ? __pfx_kthread+0x10/0x10
[   15.205024]  ret_from_fork_asm+0x1a/0x30
[   15.205056]  </TASK>
[   15.205068] 
[   15.213064] Allocated by task 283:
[   15.213306]  kasan_save_stack+0x45/0x70
[   15.213485]  kasan_save_track+0x18/0x40
[   15.213663]  kasan_save_alloc_info+0x3b/0x50
[   15.213813]  __kasan_kmalloc+0xb7/0xc0
[   15.213947]  __kmalloc_cache_noprof+0x189/0x420
[   15.214106]  kasan_atomics+0x95/0x310
[   15.214247]  kunit_try_run_case+0x1a5/0x480
[   15.214396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.214582]  kthread+0x337/0x6f0
[   15.214705]  ret_from_fork+0x116/0x1d0
[   15.214839]  ret_from_fork_asm+0x1a/0x30
[   15.214980] 
[   15.215053] The buggy address belongs to the object at ffff8881039f9d00
[   15.215053]  which belongs to the cache kmalloc-64 of size 64
[   15.215410] The buggy address is located 0 bytes to the right of
[   15.215410]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.215968] 
[   15.216065] The buggy address belongs to the physical page:
[   15.216318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.216694] flags: 0x200000000000000(node=0|zone=2)
[   15.216929] page_type: f5(slab)
[   15.217099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.217434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.219033] page dumped because: kasan: bad access detected
[   15.219333] 
[   15.219430] Memory state around the buggy address:
[   15.219662]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.219977]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.220663] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.220988]                                      ^
[   15.221439]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.222127]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.222493] ==================================================================
[   15.637364] ==================================================================
[   15.638120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.638612] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.639332] 
[   15.639619] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.639674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.639688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.639710] Call Trace:
[   15.639730]  <TASK>
[   15.639749]  dump_stack_lvl+0x73/0xb0
[   15.639822]  print_report+0xd1/0x610
[   15.639845]  ? __virt_addr_valid+0x1db/0x2d0
[   15.639869]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.639891]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.639915]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.639938]  kasan_report+0x141/0x180
[   15.639961]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.639987]  kasan_check_range+0x10c/0x1c0
[   15.640012]  __kasan_check_write+0x18/0x20
[   15.640032]  kasan_atomics_helper+0x1c18/0x5450
[   15.640056]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.640079]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.640106]  ? kasan_atomics+0x152/0x310
[   15.640132]  kasan_atomics+0x1dc/0x310
[   15.640155]  ? __pfx_kasan_atomics+0x10/0x10
[   15.640187]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.640214]  ? __pfx_read_tsc+0x10/0x10
[   15.640236]  ? ktime_get_ts64+0x86/0x230
[   15.640261]  kunit_try_run_case+0x1a5/0x480
[   15.640286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.640309]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.640333]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.640357]  ? __kthread_parkme+0x82/0x180
[   15.640378]  ? preempt_count_sub+0x50/0x80
[   15.640404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.640428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.640452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.640477]  kthread+0x337/0x6f0
[   15.640509]  ? trace_preempt_on+0x20/0xc0
[   15.640533]  ? __pfx_kthread+0x10/0x10
[   15.640555]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.640577]  ? calculate_sigpending+0x7b/0xa0
[   15.640602]  ? __pfx_kthread+0x10/0x10
[   15.640623]  ret_from_fork+0x116/0x1d0
[   15.640643]  ? __pfx_kthread+0x10/0x10
[   15.640664]  ret_from_fork_asm+0x1a/0x30
[   15.640696]  </TASK>
[   15.640706] 
[   15.652234] Allocated by task 283:
[   15.652535]  kasan_save_stack+0x45/0x70
[   15.652933]  kasan_save_track+0x18/0x40
[   15.653127]  kasan_save_alloc_info+0x3b/0x50
[   15.653491]  __kasan_kmalloc+0xb7/0xc0
[   15.653682]  __kmalloc_cache_noprof+0x189/0x420
[   15.653885]  kasan_atomics+0x95/0x310
[   15.654054]  kunit_try_run_case+0x1a5/0x480
[   15.654647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.654924]  kthread+0x337/0x6f0
[   15.655209]  ret_from_fork+0x116/0x1d0
[   15.655600]  ret_from_fork_asm+0x1a/0x30
[   15.655914] 
[   15.656143] The buggy address belongs to the object at ffff8881039f9d00
[   15.656143]  which belongs to the cache kmalloc-64 of size 64
[   15.656650] The buggy address is located 0 bytes to the right of
[   15.656650]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.657127] 
[   15.657618] The buggy address belongs to the physical page:
[   15.657922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.658520] flags: 0x200000000000000(node=0|zone=2)
[   15.658888] page_type: f5(slab)
[   15.659355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.659805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.660097] page dumped because: kasan: bad access detected
[   15.660735] 
[   15.660822] Memory state around the buggy address:
[   15.661267]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.661695]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.662135] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.662587]                                      ^
[   15.662790]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.663059]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.663638] ==================================================================
[   14.870139] ==================================================================
[   14.870508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.870750] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.870969] 
[   14.871059] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.871106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.871118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.871141] Call Trace:
[   14.871160]  <TASK>
[   14.871179]  dump_stack_lvl+0x73/0xb0
[   14.871207]  print_report+0xd1/0x610
[   14.871230]  ? __virt_addr_valid+0x1db/0x2d0
[   14.871253]  ? kasan_atomics_helper+0xac7/0x5450
[   14.871273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.871295]  ? kasan_atomics_helper+0xac7/0x5450
[   14.871316]  kasan_report+0x141/0x180
[   14.871338]  ? kasan_atomics_helper+0xac7/0x5450
[   14.871363]  kasan_check_range+0x10c/0x1c0
[   14.871386]  __kasan_check_write+0x18/0x20
[   14.871405]  kasan_atomics_helper+0xac7/0x5450
[   14.871427]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.871450]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.871475]  ? kasan_atomics+0x152/0x310
[   14.871872]  kasan_atomics+0x1dc/0x310
[   14.871927]  ? __pfx_kasan_atomics+0x10/0x10
[   14.871951]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.871980]  ? __pfx_read_tsc+0x10/0x10
[   14.872002]  ? ktime_get_ts64+0x86/0x230
[   14.872027]  kunit_try_run_case+0x1a5/0x480
[   14.872053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.872076]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.872099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.872124]  ? __kthread_parkme+0x82/0x180
[   14.872145]  ? preempt_count_sub+0x50/0x80
[   14.872179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.872204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.872270]  kthread+0x337/0x6f0
[   14.872289]  ? trace_preempt_on+0x20/0xc0
[   14.872327]  ? __pfx_kthread+0x10/0x10
[   14.872348]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.872370]  ? calculate_sigpending+0x7b/0xa0
[   14.872396]  ? __pfx_kthread+0x10/0x10
[   14.872418]  ret_from_fork+0x116/0x1d0
[   14.872437]  ? __pfx_kthread+0x10/0x10
[   14.872458]  ret_from_fork_asm+0x1a/0x30
[   14.872489]  </TASK>
[   14.872513] 
[   14.880940] Allocated by task 283:
[   14.881123]  kasan_save_stack+0x45/0x70
[   14.881348]  kasan_save_track+0x18/0x40
[   14.881730]  kasan_save_alloc_info+0x3b/0x50
[   14.881952]  __kasan_kmalloc+0xb7/0xc0
[   14.882111]  __kmalloc_cache_noprof+0x189/0x420
[   14.882410]  kasan_atomics+0x95/0x310
[   14.882575]  kunit_try_run_case+0x1a5/0x480
[   14.882719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.882890]  kthread+0x337/0x6f0
[   14.883009]  ret_from_fork+0x116/0x1d0
[   14.883142]  ret_from_fork_asm+0x1a/0x30
[   14.883346] 
[   14.883466] The buggy address belongs to the object at ffff8881039f9d00
[   14.883466]  which belongs to the cache kmalloc-64 of size 64
[   14.884006] The buggy address is located 0 bytes to the right of
[   14.884006]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.884612] 
[   14.884727] The buggy address belongs to the physical page:
[   14.884991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.885388] flags: 0x200000000000000(node=0|zone=2)
[   14.885680] page_type: f5(slab)
[   14.885861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.886220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.886558] page dumped because: kasan: bad access detected
[   14.886803] 
[   14.886894] Memory state around the buggy address:
[   14.887111]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.887806]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.888099] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.888409]                                      ^
[   14.888571]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888782]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888990] ==================================================================
[   15.387871] ==================================================================
[   15.388635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.389361] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.390110] 
[   15.390373] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.390425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.390438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.390462] Call Trace:
[   15.390483]  <TASK>
[   15.390512]  dump_stack_lvl+0x73/0xb0
[   15.390545]  print_report+0xd1/0x610
[   15.390570]  ? __virt_addr_valid+0x1db/0x2d0
[   15.390595]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.390617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.390641]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.390664]  kasan_report+0x141/0x180
[   15.390686]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.390715]  kasan_check_range+0x10c/0x1c0
[   15.390740]  __kasan_check_write+0x18/0x20
[   15.390761]  kasan_atomics_helper+0x15b6/0x5450
[   15.390785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.390808]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.390833]  ? kasan_atomics+0x152/0x310
[   15.390861]  kasan_atomics+0x1dc/0x310
[   15.390884]  ? __pfx_kasan_atomics+0x10/0x10
[   15.390906]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.390933]  ? __pfx_read_tsc+0x10/0x10
[   15.390955]  ? ktime_get_ts64+0x86/0x230
[   15.390981]  kunit_try_run_case+0x1a5/0x480
[   15.391006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.391029]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.391052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.391077]  ? __kthread_parkme+0x82/0x180
[   15.391098]  ? preempt_count_sub+0x50/0x80
[   15.391124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.391149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.391207]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.391231]  kthread+0x337/0x6f0
[   15.391251]  ? trace_preempt_on+0x20/0xc0
[   15.391285]  ? __pfx_kthread+0x10/0x10
[   15.391307]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.391330]  ? calculate_sigpending+0x7b/0xa0
[   15.391355]  ? __pfx_kthread+0x10/0x10
[   15.391377]  ret_from_fork+0x116/0x1d0
[   15.391397]  ? __pfx_kthread+0x10/0x10
[   15.391418]  ret_from_fork_asm+0x1a/0x30
[   15.391450]  </TASK>
[   15.391462] 
[   15.401281] Allocated by task 283:
[   15.401450]  kasan_save_stack+0x45/0x70
[   15.401695]  kasan_save_track+0x18/0x40
[   15.401898]  kasan_save_alloc_info+0x3b/0x50
[   15.402102]  __kasan_kmalloc+0xb7/0xc0
[   15.402475]  __kmalloc_cache_noprof+0x189/0x420
[   15.402663]  kasan_atomics+0x95/0x310
[   15.402893]  kunit_try_run_case+0x1a5/0x480
[   15.403106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.403487]  kthread+0x337/0x6f0
[   15.403709]  ret_from_fork+0x116/0x1d0
[   15.403892]  ret_from_fork_asm+0x1a/0x30
[   15.404117] 
[   15.404245] The buggy address belongs to the object at ffff8881039f9d00
[   15.404245]  which belongs to the cache kmalloc-64 of size 64
[   15.404795] The buggy address is located 0 bytes to the right of
[   15.404795]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.405352] 
[   15.405507] The buggy address belongs to the physical page:
[   15.405738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.406156] flags: 0x200000000000000(node=0|zone=2)
[   15.406403] page_type: f5(slab)
[   15.406583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.406855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.407235] page dumped because: kasan: bad access detected
[   15.407440] 
[   15.407519] Memory state around the buggy address:
[   15.407677]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.407891]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.408107] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.408583]                                      ^
[   15.408809]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.409131]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.410964] ==================================================================
[   15.496492] ==================================================================
[   15.496794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.497172] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.497453] 
[   15.497551] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.497596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.497608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.497630] Call Trace:
[   15.497647]  <TASK>
[   15.497662]  dump_stack_lvl+0x73/0xb0
[   15.497691]  print_report+0xd1/0x610
[   15.497714]  ? __virt_addr_valid+0x1db/0x2d0
[   15.497737]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.497761]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.497784]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.497807]  kasan_report+0x141/0x180
[   15.497830]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.497857]  kasan_check_range+0x10c/0x1c0
[   15.497881]  __kasan_check_write+0x18/0x20
[   15.497901]  kasan_atomics_helper+0x18b1/0x5450
[   15.497925]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.497948]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.497974]  ? kasan_atomics+0x152/0x310
[   15.498001]  kasan_atomics+0x1dc/0x310
[   15.498025]  ? __pfx_kasan_atomics+0x10/0x10
[   15.498047]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.498075]  ? __pfx_read_tsc+0x10/0x10
[   15.498096]  ? ktime_get_ts64+0x86/0x230
[   15.498122]  kunit_try_run_case+0x1a5/0x480
[   15.498147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.498182]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.498212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.498237]  ? __kthread_parkme+0x82/0x180
[   15.498258]  ? preempt_count_sub+0x50/0x80
[   15.498283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.498308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.498333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.498358]  kthread+0x337/0x6f0
[   15.498378]  ? trace_preempt_on+0x20/0xc0
[   15.498401]  ? __pfx_kthread+0x10/0x10
[   15.498422]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.498445]  ? calculate_sigpending+0x7b/0xa0
[   15.498470]  ? __pfx_kthread+0x10/0x10
[   15.498493]  ret_from_fork+0x116/0x1d0
[   15.498521]  ? __pfx_kthread+0x10/0x10
[   15.498542]  ret_from_fork_asm+0x1a/0x30
[   15.498573]  </TASK>
[   15.498583] 
[   15.510717] Allocated by task 283:
[   15.511103]  kasan_save_stack+0x45/0x70
[   15.511406]  kasan_save_track+0x18/0x40
[   15.511558]  kasan_save_alloc_info+0x3b/0x50
[   15.511705]  __kasan_kmalloc+0xb7/0xc0
[   15.511835]  __kmalloc_cache_noprof+0x189/0x420
[   15.511989]  kasan_atomics+0x95/0x310
[   15.512120]  kunit_try_run_case+0x1a5/0x480
[   15.512702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.513238]  kthread+0x337/0x6f0
[   15.513593]  ret_from_fork+0x116/0x1d0
[   15.513989]  ret_from_fork_asm+0x1a/0x30
[   15.514423] 
[   15.514652] The buggy address belongs to the object at ffff8881039f9d00
[   15.514652]  which belongs to the cache kmalloc-64 of size 64
[   15.515776] The buggy address is located 0 bytes to the right of
[   15.515776]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.516729] 
[   15.516807] The buggy address belongs to the physical page:
[   15.516976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.517462] flags: 0x200000000000000(node=0|zone=2)
[   15.517953] page_type: f5(slab)
[   15.518324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.519038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.519755] page dumped because: kasan: bad access detected
[   15.520031] 
[   15.520105] Memory state around the buggy address:
[   15.520596]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.521256]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.521643] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.522136]                                      ^
[   15.522640]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.522865]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.523073] ==================================================================
[   14.693307] ==================================================================
[   14.693615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.693945] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.694378] 
[   14.694468] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.694523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.694536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.694560] Call Trace:
[   14.694578]  <TASK>
[   14.694733]  dump_stack_lvl+0x73/0xb0
[   14.694775]  print_report+0xd1/0x610
[   14.694800]  ? __virt_addr_valid+0x1db/0x2d0
[   14.694824]  ? kasan_atomics_helper+0x697/0x5450
[   14.694846]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.694869]  ? kasan_atomics_helper+0x697/0x5450
[   14.694891]  kasan_report+0x141/0x180
[   14.694914]  ? kasan_atomics_helper+0x697/0x5450
[   14.694941]  kasan_check_range+0x10c/0x1c0
[   14.694965]  __kasan_check_write+0x18/0x20
[   14.694985]  kasan_atomics_helper+0x697/0x5450
[   14.695008]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.695032]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.695138]  ? kasan_atomics+0x152/0x310
[   14.695166]  kasan_atomics+0x1dc/0x310
[   14.695189]  ? __pfx_kasan_atomics+0x10/0x10
[   14.695212]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.695240]  ? __pfx_read_tsc+0x10/0x10
[   14.695261]  ? ktime_get_ts64+0x86/0x230
[   14.695287]  kunit_try_run_case+0x1a5/0x480
[   14.695312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.695551]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.695585]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.695610]  ? __kthread_parkme+0x82/0x180
[   14.695633]  ? preempt_count_sub+0x50/0x80
[   14.695658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.695727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.695752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.695777]  kthread+0x337/0x6f0
[   14.695797]  ? trace_preempt_on+0x20/0xc0
[   14.695822]  ? __pfx_kthread+0x10/0x10
[   14.695843]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.695865]  ? calculate_sigpending+0x7b/0xa0
[   14.695891]  ? __pfx_kthread+0x10/0x10
[   14.695912]  ret_from_fork+0x116/0x1d0
[   14.695933]  ? __pfx_kthread+0x10/0x10
[   14.695954]  ret_from_fork_asm+0x1a/0x30
[   14.695985]  </TASK>
[   14.695996] 
[   14.708701] Allocated by task 283:
[   14.708883]  kasan_save_stack+0x45/0x70
[   14.709614]  kasan_save_track+0x18/0x40
[   14.709809]  kasan_save_alloc_info+0x3b/0x50
[   14.709993]  __kasan_kmalloc+0xb7/0xc0
[   14.710432]  __kmalloc_cache_noprof+0x189/0x420
[   14.710669]  kasan_atomics+0x95/0x310
[   14.710844]  kunit_try_run_case+0x1a5/0x480
[   14.711036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.712040]  kthread+0x337/0x6f0
[   14.712619]  ret_from_fork+0x116/0x1d0
[   14.712829]  ret_from_fork_asm+0x1a/0x30
[   14.713019] 
[   14.713115] The buggy address belongs to the object at ffff8881039f9d00
[   14.713115]  which belongs to the cache kmalloc-64 of size 64
[   14.713639] The buggy address is located 0 bytes to the right of
[   14.713639]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.714143] 
[   14.714892] The buggy address belongs to the physical page:
[   14.715742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.716652] flags: 0x200000000000000(node=0|zone=2)
[   14.716905] page_type: f5(slab)
[   14.717382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.717725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.718028] page dumped because: kasan: bad access detected
[   14.718664] 
[   14.718771] Memory state around the buggy address:
[   14.718977]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.719604]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.719908] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.720660]                                      ^
[   14.720847]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.721178]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.721910] ==================================================================
[   15.817999] ==================================================================
[   15.818572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.818953] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.819559] 
[   15.819744] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.819796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.819916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.819942] Call Trace:
[   15.820016]  <TASK>
[   15.820037]  dump_stack_lvl+0x73/0xb0
[   15.820069]  print_report+0xd1/0x610
[   15.820092]  ? __virt_addr_valid+0x1db/0x2d0
[   15.820117]  ? kasan_atomics_helper+0x2006/0x5450
[   15.820139]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.820171]  ? kasan_atomics_helper+0x2006/0x5450
[   15.820194]  kasan_report+0x141/0x180
[   15.820216]  ? kasan_atomics_helper+0x2006/0x5450
[   15.820244]  kasan_check_range+0x10c/0x1c0
[   15.820268]  __kasan_check_write+0x18/0x20
[   15.820288]  kasan_atomics_helper+0x2006/0x5450
[   15.820311]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.820333]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.820359]  ? kasan_atomics+0x152/0x310
[   15.820388]  kasan_atomics+0x1dc/0x310
[   15.820411]  ? __pfx_kasan_atomics+0x10/0x10
[   15.820433]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.820461]  ? __pfx_read_tsc+0x10/0x10
[   15.820482]  ? ktime_get_ts64+0x86/0x230
[   15.820521]  kunit_try_run_case+0x1a5/0x480
[   15.820548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.820570]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.820595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.820620]  ? __kthread_parkme+0x82/0x180
[   15.820641]  ? preempt_count_sub+0x50/0x80
[   15.820666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.820691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.820716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.820741]  kthread+0x337/0x6f0
[   15.820761]  ? trace_preempt_on+0x20/0xc0
[   15.820785]  ? __pfx_kthread+0x10/0x10
[   15.820806]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.820829]  ? calculate_sigpending+0x7b/0xa0
[   15.820854]  ? __pfx_kthread+0x10/0x10
[   15.820876]  ret_from_fork+0x116/0x1d0
[   15.820896]  ? __pfx_kthread+0x10/0x10
[   15.820917]  ret_from_fork_asm+0x1a/0x30
[   15.820949]  </TASK>
[   15.820960] 
[   15.830820] Allocated by task 283:
[   15.831079]  kasan_save_stack+0x45/0x70
[   15.831519]  kasan_save_track+0x18/0x40
[   15.831807]  kasan_save_alloc_info+0x3b/0x50
[   15.832066]  __kasan_kmalloc+0xb7/0xc0
[   15.832299]  __kmalloc_cache_noprof+0x189/0x420
[   15.832608]  kasan_atomics+0x95/0x310
[   15.832792]  kunit_try_run_case+0x1a5/0x480
[   15.832989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.833414]  kthread+0x337/0x6f0
[   15.833600]  ret_from_fork+0x116/0x1d0
[   15.833916]  ret_from_fork_asm+0x1a/0x30
[   15.834086] 
[   15.834282] The buggy address belongs to the object at ffff8881039f9d00
[   15.834282]  which belongs to the cache kmalloc-64 of size 64
[   15.834887] The buggy address is located 0 bytes to the right of
[   15.834887]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.835583] 
[   15.835689] The buggy address belongs to the physical page:
[   15.835922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.836297] flags: 0x200000000000000(node=0|zone=2)
[   15.836817] page_type: f5(slab)
[   15.836966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.837407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.837847] page dumped because: kasan: bad access detected
[   15.838152] 
[   15.838235] Memory state around the buggy address:
[   15.838455]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.838953]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.839310] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.839686]                                      ^
[   15.840005]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.840433]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.840708] ==================================================================
[   14.520800] ==================================================================
[   14.521379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.521723] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.522028] 
[   14.522140] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.522190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.522207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.522231] Call Trace:
[   14.522245]  <TASK>
[   14.522263]  dump_stack_lvl+0x73/0xb0
[   14.522292]  print_report+0xd1/0x610
[   14.522317]  ? __virt_addr_valid+0x1db/0x2d0
[   14.522342]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.522365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.522389]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.522411]  kasan_report+0x141/0x180
[   14.522434]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.522462]  __asan_report_store4_noabort+0x1b/0x30
[   14.522488]  kasan_atomics_helper+0x4b6e/0x5450
[   14.522522]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.522546]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.522573]  ? kasan_atomics+0x152/0x310
[   14.522600]  kasan_atomics+0x1dc/0x310
[   14.522623]  ? __pfx_kasan_atomics+0x10/0x10
[   14.522646]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.522673]  ? __pfx_read_tsc+0x10/0x10
[   14.522695]  ? ktime_get_ts64+0x86/0x230
[   14.522720]  kunit_try_run_case+0x1a5/0x480
[   14.522746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.522770]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.522793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.522818]  ? __kthread_parkme+0x82/0x180
[   14.522839]  ? preempt_count_sub+0x50/0x80
[   14.522971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.523003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.523028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.523054]  kthread+0x337/0x6f0
[   14.523075]  ? trace_preempt_on+0x20/0xc0
[   14.523099]  ? __pfx_kthread+0x10/0x10
[   14.523120]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.523143]  ? calculate_sigpending+0x7b/0xa0
[   14.523168]  ? __pfx_kthread+0x10/0x10
[   14.523191]  ret_from_fork+0x116/0x1d0
[   14.523211]  ? __pfx_kthread+0x10/0x10
[   14.523232]  ret_from_fork_asm+0x1a/0x30
[   14.523318]  </TASK>
[   14.523331] 
[   14.533453] Allocated by task 283:
[   14.533787]  kasan_save_stack+0x45/0x70
[   14.533978]  kasan_save_track+0x18/0x40
[   14.534559]  kasan_save_alloc_info+0x3b/0x50
[   14.534772]  __kasan_kmalloc+0xb7/0xc0
[   14.535071]  __kmalloc_cache_noprof+0x189/0x420
[   14.535631]  kasan_atomics+0x95/0x310
[   14.535834]  kunit_try_run_case+0x1a5/0x480
[   14.536041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.536729]  kthread+0x337/0x6f0
[   14.536904]  ret_from_fork+0x116/0x1d0
[   14.537057]  ret_from_fork_asm+0x1a/0x30
[   14.537545] 
[   14.537827] The buggy address belongs to the object at ffff8881039f9d00
[   14.537827]  which belongs to the cache kmalloc-64 of size 64
[   14.538631] The buggy address is located 0 bytes to the right of
[   14.538631]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.539309] 
[   14.539537] The buggy address belongs to the physical page:
[   14.539878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.540442] flags: 0x200000000000000(node=0|zone=2)
[   14.540957] page_type: f5(slab)
[   14.541312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.541772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.542343] page dumped because: kasan: bad access detected
[   14.542610] 
[   14.542685] Memory state around the buggy address:
[   14.543268]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.543611]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.544016] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.544596]                                      ^
[   14.544934]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.545391]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.545833] ==================================================================
[   14.722921] ==================================================================
[   14.723710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.723959] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.724718] 
[   14.724930] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.724979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.724992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.725014] Call Trace:
[   14.725034]  <TASK>
[   14.725052]  dump_stack_lvl+0x73/0xb0
[   14.725083]  print_report+0xd1/0x610
[   14.725106]  ? __virt_addr_valid+0x1db/0x2d0
[   14.725129]  ? kasan_atomics_helper+0x72f/0x5450
[   14.725151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.725244]  ? kasan_atomics_helper+0x72f/0x5450
[   14.725268]  kasan_report+0x141/0x180
[   14.725291]  ? kasan_atomics_helper+0x72f/0x5450
[   14.725318]  kasan_check_range+0x10c/0x1c0
[   14.725342]  __kasan_check_write+0x18/0x20
[   14.725362]  kasan_atomics_helper+0x72f/0x5450
[   14.725385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.725408]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.725434]  ? kasan_atomics+0x152/0x310
[   14.725461]  kasan_atomics+0x1dc/0x310
[   14.725483]  ? __pfx_kasan_atomics+0x10/0x10
[   14.725520]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.725547]  ? __pfx_read_tsc+0x10/0x10
[   14.725569]  ? ktime_get_ts64+0x86/0x230
[   14.725594]  kunit_try_run_case+0x1a5/0x480
[   14.725620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.725642]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.725666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.725690]  ? __kthread_parkme+0x82/0x180
[   14.725711]  ? preempt_count_sub+0x50/0x80
[   14.725736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.725761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.725785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.725812]  kthread+0x337/0x6f0
[   14.725832]  ? trace_preempt_on+0x20/0xc0
[   14.725856]  ? __pfx_kthread+0x10/0x10
[   14.725876]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.725898]  ? calculate_sigpending+0x7b/0xa0
[   14.725923]  ? __pfx_kthread+0x10/0x10
[   14.725945]  ret_from_fork+0x116/0x1d0
[   14.725964]  ? __pfx_kthread+0x10/0x10
[   14.725985]  ret_from_fork_asm+0x1a/0x30
[   14.726016]  </TASK>
[   14.726027] 
[   14.739381] Allocated by task 283:
[   14.739593]  kasan_save_stack+0x45/0x70
[   14.739795]  kasan_save_track+0x18/0x40
[   14.739974]  kasan_save_alloc_info+0x3b/0x50
[   14.740434]  __kasan_kmalloc+0xb7/0xc0
[   14.740624]  __kmalloc_cache_noprof+0x189/0x420
[   14.740865]  kasan_atomics+0x95/0x310
[   14.741043]  kunit_try_run_case+0x1a5/0x480
[   14.741554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.741828]  kthread+0x337/0x6f0
[   14.742001]  ret_from_fork+0x116/0x1d0
[   14.742324]  ret_from_fork_asm+0x1a/0x30
[   14.742553] 
[   14.742655] The buggy address belongs to the object at ffff8881039f9d00
[   14.742655]  which belongs to the cache kmalloc-64 of size 64
[   14.743301] The buggy address is located 0 bytes to the right of
[   14.743301]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.744124] 
[   14.744262] The buggy address belongs to the physical page:
[   14.744742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.745103] flags: 0x200000000000000(node=0|zone=2)
[   14.745609] page_type: f5(slab)
[   14.745805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.746094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.746494] page dumped because: kasan: bad access detected
[   14.746898] 
[   14.746998] Memory state around the buggy address:
[   14.747439]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.747773]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.748057] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.748411]                                      ^
[   14.748650]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.748884]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749161] ==================================================================
[   15.841540] ==================================================================
[   15.841894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.842548] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.842888] 
[   15.843006] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.843054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.843067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.843090] Call Trace:
[   15.843110]  <TASK>
[   15.843128]  dump_stack_lvl+0x73/0xb0
[   15.843158]  print_report+0xd1/0x610
[   15.843195]  ? __virt_addr_valid+0x1db/0x2d0
[   15.843220]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.843242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.843266]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.843288]  kasan_report+0x141/0x180
[   15.843310]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.843337]  __asan_report_load8_noabort+0x18/0x20
[   15.843362]  kasan_atomics_helper+0x4f98/0x5450
[   15.843385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.843408]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.843434]  ? kasan_atomics+0x152/0x310
[   15.843462]  kasan_atomics+0x1dc/0x310
[   15.843485]  ? __pfx_kasan_atomics+0x10/0x10
[   15.843517]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.843545]  ? __pfx_read_tsc+0x10/0x10
[   15.843567]  ? ktime_get_ts64+0x86/0x230
[   15.843594]  kunit_try_run_case+0x1a5/0x480
[   15.843622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.843645]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.843668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.843692]  ? __kthread_parkme+0x82/0x180
[   15.843714]  ? preempt_count_sub+0x50/0x80
[   15.843739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.843764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.843788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.843813]  kthread+0x337/0x6f0
[   15.843832]  ? trace_preempt_on+0x20/0xc0
[   15.843856]  ? __pfx_kthread+0x10/0x10
[   15.843877]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.843899]  ? calculate_sigpending+0x7b/0xa0
[   15.843924]  ? __pfx_kthread+0x10/0x10
[   15.843946]  ret_from_fork+0x116/0x1d0
[   15.843966]  ? __pfx_kthread+0x10/0x10
[   15.843986]  ret_from_fork_asm+0x1a/0x30
[   15.844018]  </TASK>
[   15.844029] 
[   15.851168] Allocated by task 283:
[   15.851297]  kasan_save_stack+0x45/0x70
[   15.851439]  kasan_save_track+0x18/0x40
[   15.851611]  kasan_save_alloc_info+0x3b/0x50
[   15.851814]  __kasan_kmalloc+0xb7/0xc0
[   15.851996]  __kmalloc_cache_noprof+0x189/0x420
[   15.852212]  kasan_atomics+0x95/0x310
[   15.852392]  kunit_try_run_case+0x1a5/0x480
[   15.852602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.852832]  kthread+0x337/0x6f0
[   15.852951]  ret_from_fork+0x116/0x1d0
[   15.853080]  ret_from_fork_asm+0x1a/0x30
[   15.853381] 
[   15.853478] The buggy address belongs to the object at ffff8881039f9d00
[   15.853478]  which belongs to the cache kmalloc-64 of size 64
[   15.853998] The buggy address is located 0 bytes to the right of
[   15.853998]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.854426] 
[   15.854507] The buggy address belongs to the physical page:
[   15.854682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.854926] flags: 0x200000000000000(node=0|zone=2)
[   15.855110] page_type: f5(slab)
[   15.855335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.855678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.856002] page dumped because: kasan: bad access detected
[   15.856358] 
[   15.856515] Memory state around the buggy address:
[   15.856779]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.857115]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.857566] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.857774]                                      ^
[   15.857949]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.858381]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.858702] ==================================================================
[   14.944102] ==================================================================
[   14.944374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.944965] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.946056] 
[   14.946297] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.946350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.946362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.946561] Call Trace:
[   14.946587]  <TASK>
[   14.946607]  dump_stack_lvl+0x73/0xb0
[   14.946641]  print_report+0xd1/0x610
[   14.946665]  ? __virt_addr_valid+0x1db/0x2d0
[   14.946689]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.946710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.946733]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.946756]  kasan_report+0x141/0x180
[   14.946778]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.946806]  __asan_report_load4_noabort+0x18/0x20
[   14.946831]  kasan_atomics_helper+0x4a84/0x5450
[   14.946854]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.946877]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.946903]  ? kasan_atomics+0x152/0x310
[   14.946930]  kasan_atomics+0x1dc/0x310
[   14.946954]  ? __pfx_kasan_atomics+0x10/0x10
[   14.946976]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.947004]  ? __pfx_read_tsc+0x10/0x10
[   14.947026]  ? ktime_get_ts64+0x86/0x230
[   14.947051]  kunit_try_run_case+0x1a5/0x480
[   14.947077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.947100]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.947124]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.947148]  ? __kthread_parkme+0x82/0x180
[   14.947187]  ? preempt_count_sub+0x50/0x80
[   14.947212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.947237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.947262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.947287]  kthread+0x337/0x6f0
[   14.947307]  ? trace_preempt_on+0x20/0xc0
[   14.947331]  ? __pfx_kthread+0x10/0x10
[   14.947352]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.947375]  ? calculate_sigpending+0x7b/0xa0
[   14.947400]  ? __pfx_kthread+0x10/0x10
[   14.947422]  ret_from_fork+0x116/0x1d0
[   14.947442]  ? __pfx_kthread+0x10/0x10
[   14.947463]  ret_from_fork_asm+0x1a/0x30
[   14.947494]  </TASK>
[   14.947517] 
[   14.960261] Allocated by task 283:
[   14.960456]  kasan_save_stack+0x45/0x70
[   14.960676]  kasan_save_track+0x18/0x40
[   14.960845]  kasan_save_alloc_info+0x3b/0x50
[   14.961031]  __kasan_kmalloc+0xb7/0xc0
[   14.961196]  __kmalloc_cache_noprof+0x189/0x420
[   14.961386]  kasan_atomics+0x95/0x310
[   14.962267]  kunit_try_run_case+0x1a5/0x480
[   14.962925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.963686]  kthread+0x337/0x6f0
[   14.964194]  ret_from_fork+0x116/0x1d0
[   14.964743]  ret_from_fork_asm+0x1a/0x30
[   14.965316] 
[   14.965675] The buggy address belongs to the object at ffff8881039f9d00
[   14.965675]  which belongs to the cache kmalloc-64 of size 64
[   14.966536] The buggy address is located 0 bytes to the right of
[   14.966536]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.966918] 
[   14.966998] The buggy address belongs to the physical page:
[   14.967671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.968857] flags: 0x200000000000000(node=0|zone=2)
[   14.969490] page_type: f5(slab)
[   14.970226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.971097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.971804] page dumped because: kasan: bad access detected
[   14.971990] 
[   14.972064] Memory state around the buggy address:
[   14.972789]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.973786]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.974680] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.974917]                                      ^
[   14.975079]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.976203]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.977061] ==================================================================
[   15.794387] ==================================================================
[   15.794767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.795073] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.795418] 
[   15.795528] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.795574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.795587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.795609] Call Trace:
[   15.795629]  <TASK>
[   15.795646]  dump_stack_lvl+0x73/0xb0
[   15.795675]  print_report+0xd1/0x610
[   15.795697]  ? __virt_addr_valid+0x1db/0x2d0
[   15.795721]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.795743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.795767]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.795789]  kasan_report+0x141/0x180
[   15.795812]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.795839]  __asan_report_load8_noabort+0x18/0x20
[   15.795863]  kasan_atomics_helper+0x4f71/0x5450
[   15.795888]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.795911]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.795937]  ? kasan_atomics+0x152/0x310
[   15.795964]  kasan_atomics+0x1dc/0x310
[   15.795987]  ? __pfx_kasan_atomics+0x10/0x10
[   15.796010]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.796037]  ? __pfx_read_tsc+0x10/0x10
[   15.796059]  ? ktime_get_ts64+0x86/0x230
[   15.796085]  kunit_try_run_case+0x1a5/0x480
[   15.796110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.796133]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.796157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.796193]  ? __kthread_parkme+0x82/0x180
[   15.796215]  ? preempt_count_sub+0x50/0x80
[   15.796240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.796264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.796291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.796316]  kthread+0x337/0x6f0
[   15.796336]  ? trace_preempt_on+0x20/0xc0
[   15.796360]  ? __pfx_kthread+0x10/0x10
[   15.796381]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.796404]  ? calculate_sigpending+0x7b/0xa0
[   15.796430]  ? __pfx_kthread+0x10/0x10
[   15.796451]  ret_from_fork+0x116/0x1d0
[   15.796471]  ? __pfx_kthread+0x10/0x10
[   15.796492]  ret_from_fork_asm+0x1a/0x30
[   15.796533]  </TASK>
[   15.796543] 
[   15.804116] Allocated by task 283:
[   15.804437]  kasan_save_stack+0x45/0x70
[   15.804652]  kasan_save_track+0x18/0x40
[   15.804969]  kasan_save_alloc_info+0x3b/0x50
[   15.805195]  __kasan_kmalloc+0xb7/0xc0
[   15.805339]  __kmalloc_cache_noprof+0x189/0x420
[   15.805506]  kasan_atomics+0x95/0x310
[   15.805642]  kunit_try_run_case+0x1a5/0x480
[   15.805849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.806115]  kthread+0x337/0x6f0
[   15.806395]  ret_from_fork+0x116/0x1d0
[   15.806716]  ret_from_fork_asm+0x1a/0x30
[   15.807083] 
[   15.807160] The buggy address belongs to the object at ffff8881039f9d00
[   15.807160]  which belongs to the cache kmalloc-64 of size 64
[   15.808807] The buggy address is located 0 bytes to the right of
[   15.808807]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.809469] 
[   15.809592] The buggy address belongs to the physical page:
[   15.809820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.810075] flags: 0x200000000000000(node=0|zone=2)
[   15.810256] page_type: f5(slab)
[   15.810405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.810756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.811100] page dumped because: kasan: bad access detected
[   15.811367] 
[   15.812548] Memory state around the buggy address:
[   15.813924]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.815078]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.815415] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.815718]                                      ^
[   15.815917]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.816586]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.817347] ==================================================================
[   14.575648] ==================================================================
[   14.575908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.577099] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.577450] 
[   14.577587] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.577806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.577822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.577844] Call Trace:
[   14.577866]  <TASK>
[   14.577885]  dump_stack_lvl+0x73/0xb0
[   14.577917]  print_report+0xd1/0x610
[   14.577940]  ? __virt_addr_valid+0x1db/0x2d0
[   14.577964]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.577986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.578010]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.578032]  kasan_report+0x141/0x180
[   14.578158]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.578187]  __asan_report_load4_noabort+0x18/0x20
[   14.578218]  kasan_atomics_helper+0x4b54/0x5450
[   14.578242]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.578265]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.578292]  ? kasan_atomics+0x152/0x310
[   14.578320]  kasan_atomics+0x1dc/0x310
[   14.578344]  ? __pfx_kasan_atomics+0x10/0x10
[   14.578367]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.578395]  ? __pfx_read_tsc+0x10/0x10
[   14.578418]  ? ktime_get_ts64+0x86/0x230
[   14.578444]  kunit_try_run_case+0x1a5/0x480
[   14.578470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.578494]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.578532]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.578557]  ? __kthread_parkme+0x82/0x180
[   14.578579]  ? preempt_count_sub+0x50/0x80
[   14.578605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.578630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.578655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.578680]  kthread+0x337/0x6f0
[   14.578700]  ? trace_preempt_on+0x20/0xc0
[   14.578725]  ? __pfx_kthread+0x10/0x10
[   14.578746]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.578769]  ? calculate_sigpending+0x7b/0xa0
[   14.578795]  ? __pfx_kthread+0x10/0x10
[   14.578817]  ret_from_fork+0x116/0x1d0
[   14.578837]  ? __pfx_kthread+0x10/0x10
[   14.578858]  ret_from_fork_asm+0x1a/0x30
[   14.578890]  </TASK>
[   14.578901] 
[   14.588390] Allocated by task 283:
[   14.588612]  kasan_save_stack+0x45/0x70
[   14.588911]  kasan_save_track+0x18/0x40
[   14.589196]  kasan_save_alloc_info+0x3b/0x50
[   14.589409]  __kasan_kmalloc+0xb7/0xc0
[   14.589608]  __kmalloc_cache_noprof+0x189/0x420
[   14.589832]  kasan_atomics+0x95/0x310
[   14.590023]  kunit_try_run_case+0x1a5/0x480
[   14.590449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.590728]  kthread+0x337/0x6f0
[   14.590859]  ret_from_fork+0x116/0x1d0
[   14.590995]  ret_from_fork_asm+0x1a/0x30
[   14.591465] 
[   14.591584] The buggy address belongs to the object at ffff8881039f9d00
[   14.591584]  which belongs to the cache kmalloc-64 of size 64
[   14.592204] The buggy address is located 0 bytes to the right of
[   14.592204]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.592686] 
[   14.592807] The buggy address belongs to the physical page:
[   14.593133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.593448] flags: 0x200000000000000(node=0|zone=2)
[   14.593697] page_type: f5(slab)
[   14.593893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.594311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.594804] page dumped because: kasan: bad access detected
[   14.595143] 
[   14.595251] Memory state around the buggy address:
[   14.595481]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.595849]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.596132] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.596434]                                      ^
[   14.596706]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.597053]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.597412] ==================================================================
[   15.327249] ==================================================================
[   15.327744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.328291] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.328606] 
[   15.328700] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.328745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.328757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.328779] Call Trace:
[   15.328796]  <TASK>
[   15.328811]  dump_stack_lvl+0x73/0xb0
[   15.328839]  print_report+0xd1/0x610
[   15.328863]  ? __virt_addr_valid+0x1db/0x2d0
[   15.328887]  ? kasan_atomics_helper+0x1467/0x5450
[   15.328909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.328934]  ? kasan_atomics_helper+0x1467/0x5450
[   15.328959]  kasan_report+0x141/0x180
[   15.328985]  ? kasan_atomics_helper+0x1467/0x5450
[   15.329015]  kasan_check_range+0x10c/0x1c0
[   15.329039]  __kasan_check_write+0x18/0x20
[   15.329059]  kasan_atomics_helper+0x1467/0x5450
[   15.329082]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.329105]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.329132]  ? kasan_atomics+0x152/0x310
[   15.329181]  kasan_atomics+0x1dc/0x310
[   15.329205]  ? __pfx_kasan_atomics+0x10/0x10
[   15.329227]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.329255]  ? __pfx_read_tsc+0x10/0x10
[   15.329276]  ? ktime_get_ts64+0x86/0x230
[   15.329302]  kunit_try_run_case+0x1a5/0x480
[   15.329328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.329351]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.329375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.329401]  ? __kthread_parkme+0x82/0x180
[   15.329423]  ? preempt_count_sub+0x50/0x80
[   15.329447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.329474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.329507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.329534]  kthread+0x337/0x6f0
[   15.329554]  ? trace_preempt_on+0x20/0xc0
[   15.329578]  ? __pfx_kthread+0x10/0x10
[   15.329599]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.329622]  ? calculate_sigpending+0x7b/0xa0
[   15.329647]  ? __pfx_kthread+0x10/0x10
[   15.329668]  ret_from_fork+0x116/0x1d0
[   15.329688]  ? __pfx_kthread+0x10/0x10
[   15.329709]  ret_from_fork_asm+0x1a/0x30
[   15.329740]  </TASK>
[   15.329752] 
[   15.337246] Allocated by task 283:
[   15.337443]  kasan_save_stack+0x45/0x70
[   15.337636]  kasan_save_track+0x18/0x40
[   15.337773]  kasan_save_alloc_info+0x3b/0x50
[   15.337983]  __kasan_kmalloc+0xb7/0xc0
[   15.338205]  __kmalloc_cache_noprof+0x189/0x420
[   15.338403]  kasan_atomics+0x95/0x310
[   15.338548]  kunit_try_run_case+0x1a5/0x480
[   15.338697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.338874]  kthread+0x337/0x6f0
[   15.338997]  ret_from_fork+0x116/0x1d0
[   15.339131]  ret_from_fork_asm+0x1a/0x30
[   15.339291] 
[   15.339364] The buggy address belongs to the object at ffff8881039f9d00
[   15.339364]  which belongs to the cache kmalloc-64 of size 64
[   15.339846] The buggy address is located 0 bytes to the right of
[   15.339846]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.340408] 
[   15.340513] The buggy address belongs to the physical page:
[   15.340766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.341123] flags: 0x200000000000000(node=0|zone=2)
[   15.341377] page_type: f5(slab)
[   15.341558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.341866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.342097] page dumped because: kasan: bad access detected
[   15.342299] 
[   15.342370] Memory state around the buggy address:
[   15.342571]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.342884]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.343229] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.343548]                                      ^
[   15.343772]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.344085]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.344385] ==================================================================
[   14.495294] ==================================================================
[   14.495580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.495926] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.496488] 
[   14.496597] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.496644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.496654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.496676] Call Trace:
[   14.496688]  <TASK>
[   14.496706]  dump_stack_lvl+0x73/0xb0
[   14.496738]  print_report+0xd1/0x610
[   14.496759]  ? __virt_addr_valid+0x1db/0x2d0
[   14.496782]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.496803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.496826]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.496847]  kasan_report+0x141/0x180
[   14.496869]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.496895]  __asan_report_load4_noabort+0x18/0x20
[   14.496959]  kasan_atomics_helper+0x4b88/0x5450
[   14.496982]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.497004]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.497030]  ? kasan_atomics+0x152/0x310
[   14.497056]  kasan_atomics+0x1dc/0x310
[   14.497327]  ? __pfx_kasan_atomics+0x10/0x10
[   14.497353]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.497400]  ? __pfx_read_tsc+0x10/0x10
[   14.497423]  ? ktime_get_ts64+0x86/0x230
[   14.497448]  kunit_try_run_case+0x1a5/0x480
[   14.497474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.497512]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.497536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.497561]  ? __kthread_parkme+0x82/0x180
[   14.497582]  ? preempt_count_sub+0x50/0x80
[   14.497608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.497657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.497682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.497708]  kthread+0x337/0x6f0
[   14.497730]  ? trace_preempt_on+0x20/0xc0
[   14.497754]  ? __pfx_kthread+0x10/0x10
[   14.497776]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.497816]  ? calculate_sigpending+0x7b/0xa0
[   14.497842]  ? __pfx_kthread+0x10/0x10
[   14.497864]  ret_from_fork+0x116/0x1d0
[   14.497885]  ? __pfx_kthread+0x10/0x10
[   14.497907]  ret_from_fork_asm+0x1a/0x30
[   14.497939]  </TASK>
[   14.497951] 
[   14.507101] Allocated by task 283:
[   14.507348]  kasan_save_stack+0x45/0x70
[   14.507509]  kasan_save_track+0x18/0x40
[   14.507647]  kasan_save_alloc_info+0x3b/0x50
[   14.507796]  __kasan_kmalloc+0xb7/0xc0
[   14.508155]  __kmalloc_cache_noprof+0x189/0x420
[   14.508536]  kasan_atomics+0x95/0x310
[   14.508945]  kunit_try_run_case+0x1a5/0x480
[   14.509466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.509799]  kthread+0x337/0x6f0
[   14.509975]  ret_from_fork+0x116/0x1d0
[   14.510147]  ret_from_fork_asm+0x1a/0x30
[   14.510487] 
[   14.510592] The buggy address belongs to the object at ffff8881039f9d00
[   14.510592]  which belongs to the cache kmalloc-64 of size 64
[   14.510952] The buggy address is located 0 bytes to the right of
[   14.510952]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.512230] 
[   14.512329] The buggy address belongs to the physical page:
[   14.512563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.512878] flags: 0x200000000000000(node=0|zone=2)
[   14.513812] page_type: f5(slab)
[   14.513995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.514728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.515033] page dumped because: kasan: bad access detected
[   14.515657] 
[   14.515911] Memory state around the buggy address:
[   14.516578]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.516897]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.517356] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.517662]                                      ^
[   14.517871]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.518717]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.519444] ==================================================================
[   15.017936] ==================================================================
[   15.018519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.018890] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.019205] 
[   15.019293] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.019339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.019351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.019373] Call Trace:
[   15.019392]  <TASK>
[   15.019409]  dump_stack_lvl+0x73/0xb0
[   15.019447]  print_report+0xd1/0x610
[   15.019469]  ? __virt_addr_valid+0x1db/0x2d0
[   15.019492]  ? kasan_atomics_helper+0xe78/0x5450
[   15.019531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.019555]  ? kasan_atomics_helper+0xe78/0x5450
[   15.019577]  kasan_report+0x141/0x180
[   15.019600]  ? kasan_atomics_helper+0xe78/0x5450
[   15.019626]  kasan_check_range+0x10c/0x1c0
[   15.019650]  __kasan_check_write+0x18/0x20
[   15.019670]  kasan_atomics_helper+0xe78/0x5450
[   15.019694]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.019717]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.019744]  ? kasan_atomics+0x152/0x310
[   15.019771]  kasan_atomics+0x1dc/0x310
[   15.019795]  ? __pfx_kasan_atomics+0x10/0x10
[   15.019817]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.019844]  ? __pfx_read_tsc+0x10/0x10
[   15.019866]  ? ktime_get_ts64+0x86/0x230
[   15.019891]  kunit_try_run_case+0x1a5/0x480
[   15.019916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.019939]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.019963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.019987]  ? __kthread_parkme+0x82/0x180
[   15.020008]  ? preempt_count_sub+0x50/0x80
[   15.020033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.020058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.020082]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.020106]  kthread+0x337/0x6f0
[   15.020126]  ? trace_preempt_on+0x20/0xc0
[   15.020168]  ? __pfx_kthread+0x10/0x10
[   15.020190]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.020212]  ? calculate_sigpending+0x7b/0xa0
[   15.020237]  ? __pfx_kthread+0x10/0x10
[   15.020259]  ret_from_fork+0x116/0x1d0
[   15.020280]  ? __pfx_kthread+0x10/0x10
[   15.020301]  ret_from_fork_asm+0x1a/0x30
[   15.020332]  </TASK>
[   15.020343] 
[   15.027849] Allocated by task 283:
[   15.027979]  kasan_save_stack+0x45/0x70
[   15.028213]  kasan_save_track+0x18/0x40
[   15.028431]  kasan_save_alloc_info+0x3b/0x50
[   15.028655]  __kasan_kmalloc+0xb7/0xc0
[   15.028847]  __kmalloc_cache_noprof+0x189/0x420
[   15.029089]  kasan_atomics+0x95/0x310
[   15.029309]  kunit_try_run_case+0x1a5/0x480
[   15.029550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.029807]  kthread+0x337/0x6f0
[   15.029996]  ret_from_fork+0x116/0x1d0
[   15.030215]  ret_from_fork_asm+0x1a/0x30
[   15.030446] 
[   15.030551] The buggy address belongs to the object at ffff8881039f9d00
[   15.030551]  which belongs to the cache kmalloc-64 of size 64
[   15.031014] The buggy address is located 0 bytes to the right of
[   15.031014]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.031546] 
[   15.031644] The buggy address belongs to the physical page:
[   15.031886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.032276] flags: 0x200000000000000(node=0|zone=2)
[   15.032458] page_type: f5(slab)
[   15.032594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.032828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.033056] page dumped because: kasan: bad access detected
[   15.033255] 
[   15.033325] Memory state around the buggy address:
[   15.033579]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.033903]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.034251] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.034587]                                      ^
[   15.034809]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035132]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035457] ==================================================================
[   15.554602] ==================================================================
[   15.554987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.555665] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.555982] 
[   15.556084] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.556130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.556143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.556165] Call Trace:
[   15.556184]  <TASK>
[   15.556202]  dump_stack_lvl+0x73/0xb0
[   15.556232]  print_report+0xd1/0x610
[   15.556254]  ? __virt_addr_valid+0x1db/0x2d0
[   15.556277]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.556300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.556323]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.556346]  kasan_report+0x141/0x180
[   15.556369]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.556397]  kasan_check_range+0x10c/0x1c0
[   15.556421]  __kasan_check_write+0x18/0x20
[   15.556441]  kasan_atomics_helper+0x19e3/0x5450
[   15.556465]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.556488]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.556524]  ? kasan_atomics+0x152/0x310
[   15.556551]  kasan_atomics+0x1dc/0x310
[   15.556575]  ? __pfx_kasan_atomics+0x10/0x10
[   15.556597]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.556624]  ? __pfx_read_tsc+0x10/0x10
[   15.556645]  ? ktime_get_ts64+0x86/0x230
[   15.556670]  kunit_try_run_case+0x1a5/0x480
[   15.556695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.556719]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.556744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.556769]  ? __kthread_parkme+0x82/0x180
[   15.556790]  ? preempt_count_sub+0x50/0x80
[   15.556815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.556841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.556865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.556891]  kthread+0x337/0x6f0
[   15.556911]  ? trace_preempt_on+0x20/0xc0
[   15.556936]  ? __pfx_kthread+0x10/0x10
[   15.556957]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.556979]  ? calculate_sigpending+0x7b/0xa0
[   15.557004]  ? __pfx_kthread+0x10/0x10
[   15.557026]  ret_from_fork+0x116/0x1d0
[   15.557045]  ? __pfx_kthread+0x10/0x10
[   15.557066]  ret_from_fork_asm+0x1a/0x30
[   15.557098]  </TASK>
[   15.557110] 
[   15.568894] Allocated by task 283:
[   15.569072]  kasan_save_stack+0x45/0x70
[   15.569778]  kasan_save_track+0x18/0x40
[   15.570026]  kasan_save_alloc_info+0x3b/0x50
[   15.570368]  __kasan_kmalloc+0xb7/0xc0
[   15.570749]  __kmalloc_cache_noprof+0x189/0x420
[   15.571087]  kasan_atomics+0x95/0x310
[   15.571410]  kunit_try_run_case+0x1a5/0x480
[   15.571623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.571844]  kthread+0x337/0x6f0
[   15.571997]  ret_from_fork+0x116/0x1d0
[   15.572167]  ret_from_fork_asm+0x1a/0x30
[   15.572345] 
[   15.572434] The buggy address belongs to the object at ffff8881039f9d00
[   15.572434]  which belongs to the cache kmalloc-64 of size 64
[   15.573440] The buggy address is located 0 bytes to the right of
[   15.573440]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.574186] 
[   15.574430] The buggy address belongs to the physical page:
[   15.574902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.575465] flags: 0x200000000000000(node=0|zone=2)
[   15.575828] page_type: f5(slab)
[   15.576008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.576716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.577140] page dumped because: kasan: bad access detected
[   15.577484] 
[   15.577725] Memory state around the buggy address:
[   15.578078]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.578725]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.579246] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.579695]                                      ^
[   15.579905]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.580461]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.580917] ==================================================================
[   14.793132] ==================================================================
[   14.793636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.794005] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.794680] 
[   14.795040] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.795091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.795104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.795127] Call Trace:
[   14.795237]  <TASK>
[   14.795259]  dump_stack_lvl+0x73/0xb0
[   14.795292]  print_report+0xd1/0x610
[   14.795315]  ? __virt_addr_valid+0x1db/0x2d0
[   14.795359]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.795382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.795419]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.795455]  kasan_report+0x141/0x180
[   14.795491]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.795545]  kasan_check_range+0x10c/0x1c0
[   14.795584]  __kasan_check_write+0x18/0x20
[   14.795604]  kasan_atomics_helper+0x8f9/0x5450
[   14.795641]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.795678]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.795718]  ? kasan_atomics+0x152/0x310
[   14.795758]  kasan_atomics+0x1dc/0x310
[   14.795782]  ? __pfx_kasan_atomics+0x10/0x10
[   14.795804]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.795831]  ? __pfx_read_tsc+0x10/0x10
[   14.795852]  ? ktime_get_ts64+0x86/0x230
[   14.795877]  kunit_try_run_case+0x1a5/0x480
[   14.795903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.795926]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.795950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.795976]  ? __kthread_parkme+0x82/0x180
[   14.795998]  ? preempt_count_sub+0x50/0x80
[   14.796023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.796047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.796072]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.796097]  kthread+0x337/0x6f0
[   14.796117]  ? trace_preempt_on+0x20/0xc0
[   14.796141]  ? __pfx_kthread+0x10/0x10
[   14.796162]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.796184]  ? calculate_sigpending+0x7b/0xa0
[   14.796209]  ? __pfx_kthread+0x10/0x10
[   14.796230]  ret_from_fork+0x116/0x1d0
[   14.796250]  ? __pfx_kthread+0x10/0x10
[   14.796271]  ret_from_fork_asm+0x1a/0x30
[   14.796303]  </TASK>
[   14.796314] 
[   14.805661] Allocated by task 283:
[   14.805859]  kasan_save_stack+0x45/0x70
[   14.806090]  kasan_save_track+0x18/0x40
[   14.806392]  kasan_save_alloc_info+0x3b/0x50
[   14.806646]  __kasan_kmalloc+0xb7/0xc0
[   14.806858]  __kmalloc_cache_noprof+0x189/0x420
[   14.807262]  kasan_atomics+0x95/0x310
[   14.807635]  kunit_try_run_case+0x1a5/0x480
[   14.807783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.808040]  kthread+0x337/0x6f0
[   14.808353]  ret_from_fork+0x116/0x1d0
[   14.808539]  ret_from_fork_asm+0x1a/0x30
[   14.808742] 
[   14.808841] The buggy address belongs to the object at ffff8881039f9d00
[   14.808841]  which belongs to the cache kmalloc-64 of size 64
[   14.809445] The buggy address is located 0 bytes to the right of
[   14.809445]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.809990] 
[   14.810220] The buggy address belongs to the physical page:
[   14.810446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.810828] flags: 0x200000000000000(node=0|zone=2)
[   14.811213] page_type: f5(slab)
[   14.811409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.811748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.812083] page dumped because: kasan: bad access detected
[   14.812353] 
[   14.812464] Memory state around the buggy address:
[   14.812694]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.813192]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.813521] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.813828]                                      ^
[   14.814045]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.814464]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.814690] ==================================================================
[   15.116797] ==================================================================
[   15.117526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.118161] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.118562] 
[   15.118762] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.118810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.118823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.118846] Call Trace:
[   15.118866]  <TASK>
[   15.118885]  dump_stack_lvl+0x73/0xb0
[   15.118914]  print_report+0xd1/0x610
[   15.118938]  ? __virt_addr_valid+0x1db/0x2d0
[   15.118963]  ? kasan_atomics_helper+0x1079/0x5450
[   15.118985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.119009]  ? kasan_atomics_helper+0x1079/0x5450
[   15.119031]  kasan_report+0x141/0x180
[   15.119054]  ? kasan_atomics_helper+0x1079/0x5450
[   15.119081]  kasan_check_range+0x10c/0x1c0
[   15.119105]  __kasan_check_write+0x18/0x20
[   15.119126]  kasan_atomics_helper+0x1079/0x5450
[   15.119156]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.119179]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.119205]  ? kasan_atomics+0x152/0x310
[   15.119233]  kasan_atomics+0x1dc/0x310
[   15.119256]  ? __pfx_kasan_atomics+0x10/0x10
[   15.119278]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.119306]  ? __pfx_read_tsc+0x10/0x10
[   15.119328]  ? ktime_get_ts64+0x86/0x230
[   15.119353]  kunit_try_run_case+0x1a5/0x480
[   15.119379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.119402]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.119426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.119451]  ? __kthread_parkme+0x82/0x180
[   15.119472]  ? preempt_count_sub+0x50/0x80
[   15.119506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.119530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.119570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.119595]  kthread+0x337/0x6f0
[   15.119615]  ? trace_preempt_on+0x20/0xc0
[   15.119639]  ? __pfx_kthread+0x10/0x10
[   15.119660]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.119682]  ? calculate_sigpending+0x7b/0xa0
[   15.119708]  ? __pfx_kthread+0x10/0x10
[   15.119730]  ret_from_fork+0x116/0x1d0
[   15.119750]  ? __pfx_kthread+0x10/0x10
[   15.119771]  ret_from_fork_asm+0x1a/0x30
[   15.119803]  </TASK>
[   15.119814] 
[   15.130940] Allocated by task 283:
[   15.131374]  kasan_save_stack+0x45/0x70
[   15.131592]  kasan_save_track+0x18/0x40
[   15.131764]  kasan_save_alloc_info+0x3b/0x50
[   15.131948]  __kasan_kmalloc+0xb7/0xc0
[   15.132118]  __kmalloc_cache_noprof+0x189/0x420
[   15.132818]  kasan_atomics+0x95/0x310
[   15.133062]  kunit_try_run_case+0x1a5/0x480
[   15.133542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.133854]  kthread+0x337/0x6f0
[   15.134259]  ret_from_fork+0x116/0x1d0
[   15.134493]  ret_from_fork_asm+0x1a/0x30
[   15.134820] 
[   15.134930] The buggy address belongs to the object at ffff8881039f9d00
[   15.134930]  which belongs to the cache kmalloc-64 of size 64
[   15.135656] The buggy address is located 0 bytes to the right of
[   15.135656]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.136155] 
[   15.136250] The buggy address belongs to the physical page:
[   15.136477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.136806] flags: 0x200000000000000(node=0|zone=2)
[   15.137016] page_type: f5(slab)
[   15.137166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.137447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.138403] page dumped because: kasan: bad access detected
[   15.138911] 
[   15.139147] Memory state around the buggy address:
[   15.139646]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.140080]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.140587] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.141078]                                      ^
[   15.141418]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.141872]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.142142] ==================================================================
[   14.546662] ==================================================================
[   14.546988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.548010] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   14.548516] 
[   14.548864] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.548917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.548929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.548952] Call Trace:
[   14.548972]  <TASK>
[   14.548990]  dump_stack_lvl+0x73/0xb0
[   14.549022]  print_report+0xd1/0x610
[   14.549045]  ? __virt_addr_valid+0x1db/0x2d0
[   14.549251]  ? kasan_atomics_helper+0x3df/0x5450
[   14.549273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.549298]  ? kasan_atomics_helper+0x3df/0x5450
[   14.549321]  kasan_report+0x141/0x180
[   14.549343]  ? kasan_atomics_helper+0x3df/0x5450
[   14.549371]  kasan_check_range+0x10c/0x1c0
[   14.549396]  __kasan_check_read+0x15/0x20
[   14.549416]  kasan_atomics_helper+0x3df/0x5450
[   14.549439]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.549462]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.549488]  ? kasan_atomics+0x152/0x310
[   14.549530]  kasan_atomics+0x1dc/0x310
[   14.549554]  ? __pfx_kasan_atomics+0x10/0x10
[   14.549577]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.549604]  ? __pfx_read_tsc+0x10/0x10
[   14.549626]  ? ktime_get_ts64+0x86/0x230
[   14.549651]  kunit_try_run_case+0x1a5/0x480
[   14.549676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.549700]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.549724]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.549748]  ? __kthread_parkme+0x82/0x180
[   14.549770]  ? preempt_count_sub+0x50/0x80
[   14.549795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.549820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.549844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.549869]  kthread+0x337/0x6f0
[   14.549889]  ? trace_preempt_on+0x20/0xc0
[   14.549913]  ? __pfx_kthread+0x10/0x10
[   14.549934]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.549956]  ? calculate_sigpending+0x7b/0xa0
[   14.549983]  ? __pfx_kthread+0x10/0x10
[   14.550005]  ret_from_fork+0x116/0x1d0
[   14.550025]  ? __pfx_kthread+0x10/0x10
[   14.550115]  ret_from_fork_asm+0x1a/0x30
[   14.550151]  </TASK>
[   14.550163] 
[   14.562848] Allocated by task 283:
[   14.563051]  kasan_save_stack+0x45/0x70
[   14.563600]  kasan_save_track+0x18/0x40
[   14.563895]  kasan_save_alloc_info+0x3b/0x50
[   14.564277]  __kasan_kmalloc+0xb7/0xc0
[   14.564755]  __kmalloc_cache_noprof+0x189/0x420
[   14.564965]  kasan_atomics+0x95/0x310
[   14.565122]  kunit_try_run_case+0x1a5/0x480
[   14.565645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.565897]  kthread+0x337/0x6f0
[   14.566266]  ret_from_fork+0x116/0x1d0
[   14.566558]  ret_from_fork_asm+0x1a/0x30
[   14.566758] 
[   14.566850] The buggy address belongs to the object at ffff8881039f9d00
[   14.566850]  which belongs to the cache kmalloc-64 of size 64
[   14.567752] The buggy address is located 0 bytes to the right of
[   14.567752]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   14.568626] 
[   14.568918] The buggy address belongs to the physical page:
[   14.569394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   14.569889] flags: 0x200000000000000(node=0|zone=2)
[   14.570332] page_type: f5(slab)
[   14.570519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.570951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.571404] page dumped because: kasan: bad access detected
[   14.571729] 
[   14.571831] Memory state around the buggy address:
[   14.572421]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.572765]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.573313] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.573808]                                      ^
[   14.574139]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.574672]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.575168] ==================================================================
[   15.247596] ==================================================================
[   15.247914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.248286] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283
[   15.248601] 
[   15.248718] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.248764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.248776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.248798] Call Trace:
[   15.248818]  <TASK>
[   15.248836]  dump_stack_lvl+0x73/0xb0
[   15.248864]  print_report+0xd1/0x610
[   15.248887]  ? __virt_addr_valid+0x1db/0x2d0
[   15.248911]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.248933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.248956]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.248978]  kasan_report+0x141/0x180
[   15.249001]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.249029]  kasan_check_range+0x10c/0x1c0
[   15.249053]  __kasan_check_write+0x18/0x20
[   15.249072]  kasan_atomics_helper+0x12e6/0x5450
[   15.249095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.249118]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.249165]  ? kasan_atomics+0x152/0x310
[   15.249193]  kasan_atomics+0x1dc/0x310
[   15.249216]  ? __pfx_kasan_atomics+0x10/0x10
[   15.249239]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.249266]  ? __pfx_read_tsc+0x10/0x10
[   15.249288]  ? ktime_get_ts64+0x86/0x230
[   15.249313]  kunit_try_run_case+0x1a5/0x480
[   15.249339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249362]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.249386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.249411]  ? __kthread_parkme+0x82/0x180
[   15.249432]  ? preempt_count_sub+0x50/0x80
[   15.249457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.249515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.249539]  kthread+0x337/0x6f0
[   15.249559]  ? trace_preempt_on+0x20/0xc0
[   15.249584]  ? __pfx_kthread+0x10/0x10
[   15.249606]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.249628]  ? calculate_sigpending+0x7b/0xa0
[   15.249653]  ? __pfx_kthread+0x10/0x10
[   15.249675]  ret_from_fork+0x116/0x1d0
[   15.249695]  ? __pfx_kthread+0x10/0x10
[   15.249716]  ret_from_fork_asm+0x1a/0x30
[   15.249747]  </TASK>
[   15.249758] 
[   15.256955] Allocated by task 283:
[   15.257133]  kasan_save_stack+0x45/0x70
[   15.257350]  kasan_save_track+0x18/0x40
[   15.257551]  kasan_save_alloc_info+0x3b/0x50
[   15.257764]  __kasan_kmalloc+0xb7/0xc0
[   15.257948]  __kmalloc_cache_noprof+0x189/0x420
[   15.258190]  kasan_atomics+0x95/0x310
[   15.258383]  kunit_try_run_case+0x1a5/0x480
[   15.258596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.258811]  kthread+0x337/0x6f0
[   15.258932]  ret_from_fork+0x116/0x1d0
[   15.259104]  ret_from_fork_asm+0x1a/0x30
[   15.259321] 
[   15.259418] The buggy address belongs to the object at ffff8881039f9d00
[   15.259418]  which belongs to the cache kmalloc-64 of size 64
[   15.259928] The buggy address is located 0 bytes to the right of
[   15.259928]  allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30)
[   15.260411] 
[   15.260514] The buggy address belongs to the physical page:
[   15.260698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9
[   15.260948] flags: 0x200000000000000(node=0|zone=2)
[   15.261116] page_type: f5(slab)
[   15.261265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.261534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.261867] page dumped because: kasan: bad access detected
[   15.262115] 
[   15.262240] Memory state around the buggy address:
[   15.262460]  ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.262781]  ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.263094] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.263426]                                      ^
[   15.263589]  ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.263807]  ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.264120] ==================================================================