Hay
Date
July 19, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.877550] ==================================================================
[   17.877613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   17.877711] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.877766] 
[   17.877797] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.878049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.878092] Hardware name: linux,dummy-virt (DT)
[   17.878198] Call trace:
[   17.878247]  show_stack+0x20/0x38 (C)
[   17.878299]  dump_stack_lvl+0x8c/0xd0
[   17.878348]  print_report+0x118/0x5d0
[   17.878395]  kasan_report+0xdc/0x128
[   17.878449]  kasan_check_range+0x100/0x1a8
[   17.878499]  __kasan_check_read+0x20/0x30
[   17.878544]  kasan_atomics_helper+0xdd4/0x4858
[   17.878595]  kasan_atomics+0x198/0x2e0
[   17.878649]  kunit_try_run_case+0x170/0x3f0
[   17.878708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.878761]  kthread+0x328/0x630
[   17.878805]  ret_from_fork+0x10/0x20
[   17.878861] 
[   17.878891] Allocated by task 265:
[   17.878922]  kasan_save_stack+0x3c/0x68
[   17.878964]  kasan_save_track+0x20/0x40
[   17.879019]  kasan_save_alloc_info+0x40/0x58
[   17.879069]  __kasan_kmalloc+0xd4/0xd8
[   17.879123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.879165]  kasan_atomics+0xb8/0x2e0
[   17.879203]  kunit_try_run_case+0x170/0x3f0
[   17.879243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.879288]  kthread+0x328/0x630
[   17.879323]  ret_from_fork+0x10/0x20
[   17.879361] 
[   17.879381] The buggy address belongs to the object at fff00000c7915500
[   17.879381]  which belongs to the cache kmalloc-64 of size 64
[   17.879442] The buggy address is located 0 bytes to the right of
[   17.879442]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.879507] 
[   17.879537] The buggy address belongs to the physical page:
[   17.879580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.879641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.879702] page_type: f5(slab)
[   17.879740] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.879792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.879841] page dumped because: kasan: bad access detected
[   17.879916] 
[   17.879939] Memory state around the buggy address:
[   17.879970]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.880014]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.880057] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.880397]                                      ^
[   17.880455]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.880503]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.880545] ==================================================================
[   17.901761] ==================================================================
[   17.901810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   17.901860] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.902229] 
[   17.902269] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.902406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.902440] Hardware name: linux,dummy-virt (DT)
[   17.902751] Call trace:
[   17.902788]  show_stack+0x20/0x38 (C)
[   17.902882]  dump_stack_lvl+0x8c/0xd0
[   17.902969]  print_report+0x118/0x5d0
[   17.903132]  kasan_report+0xdc/0x128
[   17.903237]  kasan_check_range+0x100/0x1a8
[   17.903288]  __kasan_check_write+0x20/0x30
[   17.903353]  kasan_atomics_helper+0xf20/0x4858
[   17.903404]  kasan_atomics+0x198/0x2e0
[   17.903449]  kunit_try_run_case+0x170/0x3f0
[   17.903498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.903552]  kthread+0x328/0x630
[   17.903595]  ret_from_fork+0x10/0x20
[   17.903642] 
[   17.903664] Allocated by task 265:
[   17.903705]  kasan_save_stack+0x3c/0x68
[   17.903747]  kasan_save_track+0x20/0x40
[   17.903786]  kasan_save_alloc_info+0x40/0x58
[   17.903828]  __kasan_kmalloc+0xd4/0xd8
[   17.903896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.903936]  kasan_atomics+0xb8/0x2e0
[   17.903973]  kunit_try_run_case+0x170/0x3f0
[   17.904013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.904059]  kthread+0x328/0x630
[   17.904368]  ret_from_fork+0x10/0x20
[   17.904470] 
[   17.904492] The buggy address belongs to the object at fff00000c7915500
[   17.904492]  which belongs to the cache kmalloc-64 of size 64
[   17.904552] The buggy address is located 0 bytes to the right of
[   17.904552]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.904672] 
[   17.904836] The buggy address belongs to the physical page:
[   17.904906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.905091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.905203] page_type: f5(slab)
[   17.905243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.905296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.905394] page dumped because: kasan: bad access detected
[   17.905451] 
[   17.905471] Memory state around the buggy address:
[   17.905505]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.905552]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.905597] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.905683]                                      ^
[   17.905730]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.905872]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.905915] ==================================================================
[   17.948286] ==================================================================
[   17.948464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   17.948614] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.948797] 
[   17.948839] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.948926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.948963] Hardware name: linux,dummy-virt (DT)
[   17.948996] Call trace:
[   17.949195]  show_stack+0x20/0x38 (C)
[   17.949255]  dump_stack_lvl+0x8c/0xd0
[   17.949302]  print_report+0x118/0x5d0
[   17.949351]  kasan_report+0xdc/0x128
[   17.949524]  kasan_check_range+0x100/0x1a8
[   17.949641]  __kasan_check_write+0x20/0x30
[   17.950036]  kasan_atomics_helper+0x126c/0x4858
[   17.950136]  kasan_atomics+0x198/0x2e0
[   17.950226]  kunit_try_run_case+0x170/0x3f0
[   17.950278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.950372]  kthread+0x328/0x630
[   17.950475]  ret_from_fork+0x10/0x20
[   17.950804] 
[   17.950836] Allocated by task 265:
[   17.951123]  kasan_save_stack+0x3c/0x68
[   17.951239]  kasan_save_track+0x20/0x40
[   17.951284]  kasan_save_alloc_info+0x40/0x58
[   17.951332]  __kasan_kmalloc+0xd4/0xd8
[   17.951459]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.951505]  kasan_atomics+0xb8/0x2e0
[   17.951561]  kunit_try_run_case+0x170/0x3f0
[   17.951684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.951754]  kthread+0x328/0x630
[   17.951789]  ret_from_fork+0x10/0x20
[   17.951834] 
[   17.952189] The buggy address belongs to the object at fff00000c7915500
[   17.952189]  which belongs to the cache kmalloc-64 of size 64
[   17.952485] The buggy address is located 0 bytes to the right of
[   17.952485]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.952676] 
[   17.952714] The buggy address belongs to the physical page:
[   17.952748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.952810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.953557] page_type: f5(slab)
[   17.953857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.954095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.954511] page dumped because: kasan: bad access detected
[   17.954681] 
[   17.954891] Memory state around the buggy address:
[   17.955109]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.955266]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.955411] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.955474]                                      ^
[   17.955808]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.955917]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.956156] ==================================================================
[   17.991382] ==================================================================
[   17.991592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   17.991653] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.991792] 
[   17.991826] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.992132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.992209] Hardware name: linux,dummy-virt (DT)
[   17.992267] Call trace:
[   17.992317]  show_stack+0x20/0x38 (C)
[   17.992427]  dump_stack_lvl+0x8c/0xd0
[   17.992514]  print_report+0x118/0x5d0
[   17.992661]  kasan_report+0xdc/0x128
[   17.992746]  kasan_check_range+0x100/0x1a8
[   17.992802]  __kasan_check_write+0x20/0x30
[   17.993175]  kasan_atomics_helper+0x15b4/0x4858
[   17.993294]  kasan_atomics+0x198/0x2e0
[   17.993568]  kunit_try_run_case+0x170/0x3f0
[   17.993752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.993877]  kthread+0x328/0x630
[   17.993983]  ret_from_fork+0x10/0x20
[   17.994067] 
[   17.994107] Allocated by task 265:
[   17.994139]  kasan_save_stack+0x3c/0x68
[   17.994185]  kasan_save_track+0x20/0x40
[   17.994223]  kasan_save_alloc_info+0x40/0x58
[   17.994265]  __kasan_kmalloc+0xd4/0xd8
[   17.994314]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.994355]  kasan_atomics+0xb8/0x2e0
[   17.994393]  kunit_try_run_case+0x170/0x3f0
[   17.994433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.994476]  kthread+0x328/0x630
[   17.994526]  ret_from_fork+0x10/0x20
[   17.994564] 
[   17.994595] The buggy address belongs to the object at fff00000c7915500
[   17.994595]  which belongs to the cache kmalloc-64 of size 64
[   17.994655] The buggy address is located 0 bytes to the right of
[   17.994655]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.994890] 
[   17.994916] The buggy address belongs to the physical page:
[   17.995187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.995352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.995445] page_type: f5(slab)
[   17.995659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.995867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.996008] page dumped because: kasan: bad access detected
[   17.996084] 
[   17.996105] Memory state around the buggy address:
[   17.996146]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.996192]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.996238] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.996459]                                      ^
[   17.996504]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.996703]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.996775] ==================================================================
[   17.931419] ==================================================================
[   17.931470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   17.931518] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.931568] 
[   17.931637] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.931824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.931938] Hardware name: linux,dummy-virt (DT)
[   17.932131] Call trace:
[   17.932214]  show_stack+0x20/0x38 (C)
[   17.932573]  dump_stack_lvl+0x8c/0xd0
[   17.932631]  print_report+0x118/0x5d0
[   17.932678]  kasan_report+0xdc/0x128
[   17.932816]  kasan_check_range+0x100/0x1a8
[   17.933031]  __kasan_check_write+0x20/0x30
[   17.933100]  kasan_atomics_helper+0x1190/0x4858
[   17.933150]  kasan_atomics+0x198/0x2e0
[   17.933219]  kunit_try_run_case+0x170/0x3f0
[   17.933268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.933640]  kthread+0x328/0x630
[   17.933773]  ret_from_fork+0x10/0x20
[   17.934005] 
[   17.934054] Allocated by task 265:
[   17.934142]  kasan_save_stack+0x3c/0x68
[   17.934218]  kasan_save_track+0x20/0x40
[   17.934603]  kasan_save_alloc_info+0x40/0x58
[   17.934774]  __kasan_kmalloc+0xd4/0xd8
[   17.934976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.935094]  kasan_atomics+0xb8/0x2e0
[   17.935196]  kunit_try_run_case+0x170/0x3f0
[   17.935236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.935577]  kthread+0x328/0x630
[   17.935737]  ret_from_fork+0x10/0x20
[   17.936155] 
[   17.936240] The buggy address belongs to the object at fff00000c7915500
[   17.936240]  which belongs to the cache kmalloc-64 of size 64
[   17.936332] The buggy address is located 0 bytes to the right of
[   17.936332]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.936398] 
[   17.936437] The buggy address belongs to the physical page:
[   17.936470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.936922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.937133] page_type: f5(slab)
[   17.937238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.937336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.937726] page dumped because: kasan: bad access detected
[   17.937825] 
[   17.937894] Memory state around the buggy address:
[   17.938090]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.938136]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.938192] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.938289]                                      ^
[   17.938364]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.938833]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.938939] ==================================================================
[   17.985038] ==================================================================
[   17.985466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   17.985658] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.985742] 
[   17.985850] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.985943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.986024] Hardware name: linux,dummy-virt (DT)
[   17.986059] Call trace:
[   17.986086]  show_stack+0x20/0x38 (C)
[   17.986136]  dump_stack_lvl+0x8c/0xd0
[   17.986191]  print_report+0x118/0x5d0
[   17.986508]  kasan_report+0xdc/0x128
[   17.986679]  kasan_check_range+0x100/0x1a8
[   17.986746]  __kasan_check_write+0x20/0x30
[   17.986800]  kasan_atomics_helper+0x154c/0x4858
[   17.987023]  kasan_atomics+0x198/0x2e0
[   17.987164]  kunit_try_run_case+0x170/0x3f0
[   17.987268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.987440]  kthread+0x328/0x630
[   17.987535]  ret_from_fork+0x10/0x20
[   17.987618] 
[   17.987649] Allocated by task 265:
[   17.987751]  kasan_save_stack+0x3c/0x68
[   17.987817]  kasan_save_track+0x20/0x40
[   17.988030]  kasan_save_alloc_info+0x40/0x58
[   17.988217]  __kasan_kmalloc+0xd4/0xd8
[   17.988297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.988560]  kasan_atomics+0xb8/0x2e0
[   17.988634]  kunit_try_run_case+0x170/0x3f0
[   17.988715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.988833]  kthread+0x328/0x630
[   17.988980]  ret_from_fork+0x10/0x20
[   17.989099] 
[   17.989234] The buggy address belongs to the object at fff00000c7915500
[   17.989234]  which belongs to the cache kmalloc-64 of size 64
[   17.989334] The buggy address is located 0 bytes to the right of
[   17.989334]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.989400] 
[   17.989421] The buggy address belongs to the physical page:
[   17.989454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.989832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.989929] page_type: f5(slab)
[   17.990206] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.990296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.990419] page dumped because: kasan: bad access detected
[   17.990482] 
[   17.990503] Memory state around the buggy address:
[   17.990679]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.990750]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.990851] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.990899]                                      ^
[   17.990949]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.991007]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.991054] ==================================================================
[   17.927483] ==================================================================
[   17.927532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   17.927580] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.927660] 
[   17.927705] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.927787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.927863] Hardware name: linux,dummy-virt (DT)
[   17.927899] Call trace:
[   17.927924]  show_stack+0x20/0x38 (C)
[   17.927972]  dump_stack_lvl+0x8c/0xd0
[   17.928020]  print_report+0x118/0x5d0
[   17.928231]  kasan_report+0xdc/0x128
[   17.928282]  kasan_check_range+0x100/0x1a8
[   17.928356]  __kasan_check_write+0x20/0x30
[   17.928618]  kasan_atomics_helper+0x1128/0x4858
[   17.928772]  kasan_atomics+0x198/0x2e0
[   17.928933]  kunit_try_run_case+0x170/0x3f0
[   17.929226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.929430]  kthread+0x328/0x630
[   17.929488]  ret_from_fork+0x10/0x20
[   17.929555] 
[   17.929586] Allocated by task 265:
[   17.929624]  kasan_save_stack+0x3c/0x68
[   17.929667]  kasan_save_track+0x20/0x40
[   17.929727]  kasan_save_alloc_info+0x40/0x58
[   17.929779]  __kasan_kmalloc+0xd4/0xd8
[   17.929817]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.929867]  kasan_atomics+0xb8/0x2e0
[   17.929904]  kunit_try_run_case+0x170/0x3f0
[   17.929958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.930024]  kthread+0x328/0x630
[   17.930069]  ret_from_fork+0x10/0x20
[   17.930105] 
[   17.930141] The buggy address belongs to the object at fff00000c7915500
[   17.930141]  which belongs to the cache kmalloc-64 of size 64
[   17.930215] The buggy address is located 0 bytes to the right of
[   17.930215]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.930281] 
[   17.930303] The buggy address belongs to the physical page:
[   17.930336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.930388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.930445] page_type: f5(slab)
[   17.930494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.930546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.930589] page dumped because: kasan: bad access detected
[   17.930635] 
[   17.930664] Memory state around the buggy address:
[   17.930709]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.930753]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.930798] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.930839]                                      ^
[   17.930874]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930919]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930959] ==================================================================
[   17.865932] ==================================================================
[   17.865990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   17.866145] Write of size 4 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.866198] 
[   17.866278] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.866363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.866486] Hardware name: linux,dummy-virt (DT)
[   17.866535] Call trace:
[   17.866560]  show_stack+0x20/0x38 (C)
[   17.866673]  dump_stack_lvl+0x8c/0xd0
[   17.866733]  print_report+0x118/0x5d0
[   17.866781]  kasan_report+0xdc/0x128
[   17.866849]  kasan_check_range+0x100/0x1a8
[   17.866900]  __kasan_check_write+0x20/0x30
[   17.866945]  kasan_atomics_helper+0xd3c/0x4858
[   17.867033]  kasan_atomics+0x198/0x2e0
[   17.867080]  kunit_try_run_case+0x170/0x3f0
[   17.867129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.867182]  kthread+0x328/0x630
[   17.867333]  ret_from_fork+0x10/0x20
[   17.867448] 
[   17.867470] Allocated by task 265:
[   17.867530]  kasan_save_stack+0x3c/0x68
[   17.867572]  kasan_save_track+0x20/0x40
[   17.867659]  kasan_save_alloc_info+0x40/0x58
[   17.867723]  __kasan_kmalloc+0xd4/0xd8
[   17.867799]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.867904]  kasan_atomics+0xb8/0x2e0
[   17.867944]  kunit_try_run_case+0x170/0x3f0
[   17.867998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.868044]  kthread+0x328/0x630
[   17.868510]  ret_from_fork+0x10/0x20
[   17.868718] 
[   17.868799] The buggy address belongs to the object at fff00000c7915500
[   17.868799]  which belongs to the cache kmalloc-64 of size 64
[   17.868920] The buggy address is located 0 bytes to the right of
[   17.868920]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.869238] 
[   17.869302] The buggy address belongs to the physical page:
[   17.869380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.869567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.869667] page_type: f5(slab)
[   17.869734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.869787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.869831] page dumped because: kasan: bad access detected
[   17.870090] 
[   17.870357] Memory state around the buggy address:
[   17.870425]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.870524]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.870610] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.870897]                                      ^
[   17.870970]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.871068]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.871300] ==================================================================
[   17.939811] ==================================================================
[   17.940036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   17.940246] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.940364] 
[   17.940449] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.940917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.941030] Hardware name: linux,dummy-virt (DT)
[   17.941119] Call trace:
[   17.941297]  show_stack+0x20/0x38 (C)
[   17.941353]  dump_stack_lvl+0x8c/0xd0
[   17.941423]  print_report+0x118/0x5d0
[   17.941473]  kasan_report+0xdc/0x128
[   17.941843]  kasan_check_range+0x100/0x1a8
[   17.942105]  __kasan_check_write+0x20/0x30
[   17.942173]  kasan_atomics_helper+0x11f8/0x4858
[   17.942498]  kasan_atomics+0x198/0x2e0
[   17.942723]  kunit_try_run_case+0x170/0x3f0
[   17.942838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.943063]  kthread+0x328/0x630
[   17.943164]  ret_from_fork+0x10/0x20
[   17.943288] 
[   17.943310] Allocated by task 265:
[   17.943341]  kasan_save_stack+0x3c/0x68
[   17.943394]  kasan_save_track+0x20/0x40
[   17.943434]  kasan_save_alloc_info+0x40/0x58
[   17.943476]  __kasan_kmalloc+0xd4/0xd8
[   17.943513]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.943564]  kasan_atomics+0xb8/0x2e0
[   17.943600]  kunit_try_run_case+0x170/0x3f0
[   17.943643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.943889]  kthread+0x328/0x630
[   17.943949]  ret_from_fork+0x10/0x20
[   17.943999] 
[   17.944021] The buggy address belongs to the object at fff00000c7915500
[   17.944021]  which belongs to the cache kmalloc-64 of size 64
[   17.944385] The buggy address is located 0 bytes to the right of
[   17.944385]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.944734] 
[   17.944974] The buggy address belongs to the physical page:
[   17.945046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.945104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.945839] page_type: f5(slab)
[   17.946242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.946302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.946381] page dumped because: kasan: bad access detected
[   17.946427] 
[   17.946448] Memory state around the buggy address:
[   17.946484]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.946530]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.946594] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.946653]                                      ^
[   17.946845]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.946951]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.947003] ==================================================================
[   17.956573] ==================================================================
[   17.956625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   17.956673] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.956740] 
[   17.956770] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.956853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.956881] Hardware name: linux,dummy-virt (DT)
[   17.956913] Call trace:
[   17.956937]  show_stack+0x20/0x38 (C)
[   17.956987]  dump_stack_lvl+0x8c/0xd0
[   17.957033]  print_report+0x118/0x5d0
[   17.957081]  kasan_report+0xdc/0x128
[   17.957127]  kasan_check_range+0x100/0x1a8
[   17.957177]  __kasan_check_write+0x20/0x30
[   17.957223]  kasan_atomics_helper+0x12d8/0x4858
[   17.957271]  kasan_atomics+0x198/0x2e0
[   17.957318]  kunit_try_run_case+0x170/0x3f0
[   17.957366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.957419]  kthread+0x328/0x630
[   17.957462]  ret_from_fork+0x10/0x20
[   17.957510] 
[   17.957530] Allocated by task 265:
[   17.957560]  kasan_save_stack+0x3c/0x68
[   17.957601]  kasan_save_track+0x20/0x40
[   17.957645]  kasan_save_alloc_info+0x40/0x58
[   17.957695]  __kasan_kmalloc+0xd4/0xd8
[   17.957733]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.957774]  kasan_atomics+0xb8/0x2e0
[   17.957810]  kunit_try_run_case+0x170/0x3f0
[   17.957852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.957896]  kthread+0x328/0x630
[   17.957930]  ret_from_fork+0x10/0x20
[   17.957968] 
[   17.957989] The buggy address belongs to the object at fff00000c7915500
[   17.957989]  which belongs to the cache kmalloc-64 of size 64
[   17.958048] The buggy address is located 0 bytes to the right of
[   17.958048]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.958113] 
[   17.958134] The buggy address belongs to the physical page:
[   17.958166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.958218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.958268] page_type: f5(slab)
[   17.958306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.958363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.958408] page dumped because: kasan: bad access detected
[   17.958443] 
[   17.958464] Memory state around the buggy address:
[   17.958499]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.958544]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.958590] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.958630]                                      ^
[   17.958666]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.958749]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.958819] ==================================================================
[   17.803596] ==================================================================
[   17.803806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   17.803980] Write of size 4 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.804281] 
[   17.804403] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.804586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.804628] Hardware name: linux,dummy-virt (DT)
[   17.804663] Call trace:
[   17.804698]  show_stack+0x20/0x38 (C)
[   17.804775]  dump_stack_lvl+0x8c/0xd0
[   17.804823]  print_report+0x118/0x5d0
[   17.804871]  kasan_report+0xdc/0x128
[   17.804918]  kasan_check_range+0x100/0x1a8
[   17.805195]  __kasan_check_write+0x20/0x30
[   17.805303]  kasan_atomics_helper+0x99c/0x4858
[   17.805364]  kasan_atomics+0x198/0x2e0
[   17.805417]  kunit_try_run_case+0x170/0x3f0
[   17.805474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.805529]  kthread+0x328/0x630
[   17.805572]  ret_from_fork+0x10/0x20
[   17.805625] 
[   17.805646] Allocated by task 265:
[   17.805678]  kasan_save_stack+0x3c/0x68
[   17.805732]  kasan_save_track+0x20/0x40
[   17.805786]  kasan_save_alloc_info+0x40/0x58
[   17.805828]  __kasan_kmalloc+0xd4/0xd8
[   17.805876]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.805915]  kasan_atomics+0xb8/0x2e0
[   17.805954]  kunit_try_run_case+0x170/0x3f0
[   17.806007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.806053]  kthread+0x328/0x630
[   17.806086]  ret_from_fork+0x10/0x20
[   17.806124] 
[   17.806153] The buggy address belongs to the object at fff00000c7915500
[   17.806153]  which belongs to the cache kmalloc-64 of size 64
[   17.806220] The buggy address is located 0 bytes to the right of
[   17.806220]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.806284] 
[   17.806310] The buggy address belongs to the physical page:
[   17.806348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.806401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.806460] page_type: f5(slab)
[   17.806509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.806576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.806627] page dumped because: kasan: bad access detected
[   17.806661] 
[   17.806708] Memory state around the buggy address:
[   17.806741]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.807915] ==================================================================
[   17.917231] ==================================================================
[   17.917281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   17.917330] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.917381] 
[   17.917449] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.917534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.917563] Hardware name: linux,dummy-virt (DT)
[   17.917597] Call trace:
[   17.917624]  show_stack+0x20/0x38 (C)
[   17.917674]  dump_stack_lvl+0x8c/0xd0
[   17.917733]  print_report+0x118/0x5d0
[   17.917870]  kasan_report+0xdc/0x128
[   17.917945]  kasan_check_range+0x100/0x1a8
[   17.918007]  __kasan_check_write+0x20/0x30
[   17.918053]  kasan_atomics_helper+0x1058/0x4858
[   17.918104]  kasan_atomics+0x198/0x2e0
[   17.918151]  kunit_try_run_case+0x170/0x3f0
[   17.918214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.918269]  kthread+0x328/0x630
[   17.918313]  ret_from_fork+0x10/0x20
[   17.918361] 
[   17.918389] Allocated by task 265:
[   17.918428]  kasan_save_stack+0x3c/0x68
[   17.918470]  kasan_save_track+0x20/0x40
[   17.918510]  kasan_save_alloc_info+0x40/0x58
[   17.918551]  __kasan_kmalloc+0xd4/0xd8
[   17.918598]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.918643]  kasan_atomics+0xb8/0x2e0
[   17.918684]  kunit_try_run_case+0x170/0x3f0
[   17.918734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.918777]  kthread+0x328/0x630
[   17.918813]  ret_from_fork+0x10/0x20
[   17.918850] 
[   17.918871] The buggy address belongs to the object at fff00000c7915500
[   17.918871]  which belongs to the cache kmalloc-64 of size 64
[   17.919424] The buggy address is located 0 bytes to the right of
[   17.919424]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.919649] 
[   17.919728] The buggy address belongs to the physical page:
[   17.919762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.919816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.919922] page_type: f5(slab)
[   17.920009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.920074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.920117] page dumped because: kasan: bad access detected
[   17.920215] 
[   17.920264] Memory state around the buggy address:
[   17.920346]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.920476]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.920575] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.920647]                                      ^
[   17.920682]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.920750]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.920789] ==================================================================
[   17.793572] ==================================================================
[   17.793625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   17.793683] Read of size 4 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.793746] 
[   17.793785] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.793867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.793897] Hardware name: linux,dummy-virt (DT)
[   17.794267]  kasan_atomics+0x198/0x2e0
[   17.794608]  kasan_save_track+0x20/0x40
[   17.794777]  kasan_atomics+0xb8/0x2e0
[   17.795045] The buggy address is located 0 bytes to the right of
[   17.795045]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.796349]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.798031] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.798121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.798168] Hardware name: linux,dummy-virt (DT)
[   17.798253] Call trace:
[   17.798278]  show_stack+0x20/0x38 (C)
[   17.798325]  dump_stack_lvl+0x8c/0xd0
[   17.798373]  print_report+0x118/0x5d0
[   17.798421]  kasan_report+0xdc/0x128
[   17.798469]  kasan_check_range+0x100/0x1a8
[   17.798519]  __kasan_check_write+0x20/0x30
[   17.798907]  kasan_atomics_helper+0x934/0x4858
[   17.798985]  kasan_atomics+0x198/0x2e0
[   17.799034]  kunit_try_run_case+0x170/0x3f0
[   17.799102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.799174]  kthread+0x328/0x630
[   17.799314]  ret_from_fork+0x10/0x20
[   17.799437] 
[   17.799463] Allocated by task 265:
[   17.799556]  kasan_save_stack+0x3c/0x68
[   17.799621]  kasan_save_track+0x20/0x40
[   17.799662]  kasan_save_alloc_info+0x40/0x58
[   17.799714]  __kasan_kmalloc+0xd4/0xd8
[   17.799782]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.799824]  kasan_atomics+0xb8/0x2e0
[   17.799867]  kunit_try_run_case+0x170/0x3f0
[   17.799925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.800010]  kthread+0x328/0x630
[   17.800108]  ret_from_fork+0x10/0x20
[   17.800262] 
[   17.800346] The buggy address belongs to the object at fff00000c7915500
[   17.800346]  which belongs to the cache kmalloc-64 of size 64
[   17.800404] The buggy address is located 0 bytes to the right of
[   17.800404]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.800483] 
[   17.800506] The buggy address belongs to the physical page:
[   17.800707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.800925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.801054] page_type: f5(slab)
[   17.801135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.801410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.801525] page dumped because: kasan: bad access detected
[   17.801620] 
[   17.801720] Memory state around the buggy address:
[   17.801796]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.801915]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.802000] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.802103]                                      ^
[   17.802139]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.802186]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.802429] ==================================================================
[   17.890783] ==================================================================
[   17.890878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   17.891011] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.891062] 
[   17.891142] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.891251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.891561] Hardware name: linux,dummy-virt (DT)
[   17.891605] Call trace:
[   17.891630]  show_stack+0x20/0x38 (C)
[   17.891681]  dump_stack_lvl+0x8c/0xd0
[   17.891745]  print_report+0x118/0x5d0
[   17.892059]  kasan_report+0xdc/0x128
[   17.892155]  __asan_report_store8_noabort+0x20/0x30
[   17.892323]  kasan_atomics_helper+0x3e5c/0x4858
[   17.892695]  kasan_atomics+0x198/0x2e0
[   17.892797]  kunit_try_run_case+0x170/0x3f0
[   17.892973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.893099]  kthread+0x328/0x630
[   17.893195]  ret_from_fork+0x10/0x20
[   17.893412] 
[   17.893481] Allocated by task 265:
[   17.893574]  kasan_save_stack+0x3c/0x68
[   17.893624]  kasan_save_track+0x20/0x40
[   17.893665]  kasan_save_alloc_info+0x40/0x58
[   17.893742]  __kasan_kmalloc+0xd4/0xd8
[   17.893779]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.893820]  kasan_atomics+0xb8/0x2e0
[   17.893858]  kunit_try_run_case+0x170/0x3f0
[   17.893897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.893942]  kthread+0x328/0x630
[   17.893977]  ret_from_fork+0x10/0x20
[   17.894195] 
[   17.894265] The buggy address belongs to the object at fff00000c7915500
[   17.894265]  which belongs to the cache kmalloc-64 of size 64
[   17.894443] The buggy address is located 0 bytes to the right of
[   17.894443]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.894994] 
[   17.895036] The buggy address belongs to the physical page:
[   17.895120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.895177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.895252] page_type: f5(slab)
[   17.895338] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.895397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.895440] page dumped because: kasan: bad access detected
[   17.895475] 
[   17.895504] Memory state around the buggy address:
[   17.895537]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.895583]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.895629] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.895669]                                      ^
[   17.895715]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.895761]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.895811] ==================================================================
[   18.042449] ==================================================================
[   18.042626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.042705] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   18.042921] 
[   18.042965] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.043087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.043119] Hardware name: linux,dummy-virt (DT)
[   18.043150] Call trace:
[   18.043176]  show_stack+0x20/0x38 (C)
[   18.043226]  dump_stack_lvl+0x8c/0xd0
[   18.043307]  print_report+0x118/0x5d0
[   18.043374]  kasan_report+0xdc/0x128
[   18.043424]  kasan_check_range+0x100/0x1a8
[   18.043494]  __kasan_check_write+0x20/0x30
[   18.043541]  kasan_atomics_helper+0x17ec/0x4858
[   18.043591]  kasan_atomics+0x198/0x2e0
[   18.043637]  kunit_try_run_case+0x170/0x3f0
[   18.043697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.043751]  kthread+0x328/0x630
[   18.043793]  ret_from_fork+0x10/0x20
[   18.043981] 
[   18.044009] Allocated by task 265:
[   18.044262]  kasan_save_stack+0x3c/0x68
[   18.044404]  kasan_save_track+0x20/0x40
[   18.044493]  kasan_save_alloc_info+0x40/0x58
[   18.044700]  __kasan_kmalloc+0xd4/0xd8
[   18.044891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.044987]  kasan_atomics+0xb8/0x2e0
[   18.045130]  kunit_try_run_case+0x170/0x3f0
[   18.045226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.045488]  kthread+0x328/0x630
[   18.045647]  ret_from_fork+0x10/0x20
[   18.045810] 
[   18.045865] The buggy address belongs to the object at fff00000c7915500
[   18.045865]  which belongs to the cache kmalloc-64 of size 64
[   18.045962] The buggy address is located 0 bytes to the right of
[   18.045962]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   18.046031] 
[   18.046053] The buggy address belongs to the physical page:
[   18.046104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   18.046172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.046232] page_type: f5(slab)
[   18.046279] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.046340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.046393] page dumped because: kasan: bad access detected
[   18.046444] 
[   18.046464] Memory state around the buggy address:
[   18.046499]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.046553]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.046598] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.046640]                                      ^
[   18.046677]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047148]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047363] ==================================================================
[   17.815054] ==================================================================
[   17.815116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   17.815168] Write of size 4 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.815476] 
[   17.815518] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.815630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.815729] Hardware name: linux,dummy-virt (DT)
[   17.815763] Call trace:
[   17.815789]  show_stack+0x20/0x38 (C)
[   17.815867]  dump_stack_lvl+0x8c/0xd0
[   17.815919]  print_report+0x118/0x5d0
[   17.815967]  kasan_report+0xdc/0x128
[   17.816199]  kasan_check_range+0x100/0x1a8
[   17.816351]  __kasan_check_write+0x20/0x30
[   17.816427]  kasan_atomics_helper+0xa6c/0x4858
[   17.816477]  kasan_atomics+0x198/0x2e0
[   17.816536]  kunit_try_run_case+0x170/0x3f0
[   17.816586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.817127]  kthread+0x328/0x630
[   17.817223]  ret_from_fork+0x10/0x20
[   17.817560] 
[   17.817613] Allocated by task 265:
[   17.817751]  kasan_save_stack+0x3c/0x68
[   17.817849]  kasan_save_track+0x20/0x40
[   17.817929]  kasan_save_alloc_info+0x40/0x58
[   17.817973]  __kasan_kmalloc+0xd4/0xd8
[   17.818161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.818374]  kasan_atomics+0xb8/0x2e0
[   17.818432]  kunit_try_run_case+0x170/0x3f0
[   17.818475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.818520]  kthread+0x328/0x630
[   17.818554]  ret_from_fork+0x10/0x20
[   17.818607] 
[   17.818630] The buggy address belongs to the object at fff00000c7915500
[   17.818630]  which belongs to the cache kmalloc-64 of size 64
[   17.818700] The buggy address is located 0 bytes to the right of
[   17.818700]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.818764] 
[   17.818795] The buggy address belongs to the physical page:
[   17.818838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.818890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.818949] page_type: f5(slab)
[   17.819003] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.819057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.819108] page dumped because: kasan: bad access detected
[   17.819153] 
[   17.819184] Memory state around the buggy address:
[   17.819228]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.819282]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.819327] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.819375]                                      ^
[   17.819411]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.819471]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.819889] 
[   17.820955]  __kasan_check_write+0x20/0x30
[   17.821852] 
[   17.821873] Allocated by task 265:
[   17.821903]  kasan_save_stack+0x3c/0x68
[   17.821946]  kasan_save_track+0x20/0x40
[   17.821986]  kasan_save_alloc_info+0x40/0x58
[   17.822028]  __kasan_kmalloc+0xd4/0xd8
[   17.822279]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.822380]  kasan_atomics+0xb8/0x2e0
[   17.822420]  kunit_try_run_case+0x170/0x3f0
[   17.822503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.822590]  kthread+0x328/0x630
[   17.822625]  ret_from_fork+0x10/0x20
[   17.822665] 
[   17.822697] The buggy address belongs to the object at fff00000c7915500
[   17.822697]  which belongs to the cache kmalloc-64 of size 64
[   17.822955] The buggy address is located 0 bytes to the right of
[   17.822955]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.823163] 
[   17.823213] The buggy address belongs to the physical page:
[   17.823248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.823303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.823352] page_type: f5(slab)
[   17.823503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.823932] page dumped because: kasan: bad access detected
[   17.824459]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.825698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.826117]  kasan_atomics_helper+0x3dcc/0x4858
[   17.827186]  kasan_save_stack+0x3c/0x68
[   17.827341]  kasan_save_track+0x20/0x40
[   17.827435]  kasan_save_alloc_info+0x40/0x58
[   17.827572]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.828912] 
[   17.829137] page_type: f5(slab)
[   17.829761]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.831806] ==================================================================
[   17.860869] ==================================================================
[   17.860920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   17.860971] Read of size 4 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.861022] 
[   17.861064] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.861156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.861187] Hardware name: linux,dummy-virt (DT)
[   17.861221] Call trace:
[   17.861244]  show_stack+0x20/0x38 (C)
[   17.861294]  dump_stack_lvl+0x8c/0xd0
[   17.861341]  print_report+0x118/0x5d0
[   17.861389]  kasan_report+0xdc/0x128
[   17.861436]  __asan_report_load4_noabort+0x20/0x30
[   17.861489]  kasan_atomics_helper+0x3dd8/0x4858
[   17.861539]  kasan_atomics+0x198/0x2e0
[   17.861593]  kunit_try_run_case+0x170/0x3f0
[   17.861651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.861717]  kthread+0x328/0x630
[   17.861763]  ret_from_fork+0x10/0x20
[   17.861812] 
[   17.861832] Allocated by task 265:
[   17.861861]  kasan_save_stack+0x3c/0x68
[   17.861949]  kasan_save_track+0x20/0x40
[   17.861989]  kasan_save_alloc_info+0x40/0x58
[   17.862030]  __kasan_kmalloc+0xd4/0xd8
[   17.862069]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.862400]  kasan_atomics+0xb8/0x2e0
[   17.862618]  kunit_try_run_case+0x170/0x3f0
[   17.862743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.862847]  kthread+0x328/0x630
[   17.862882]  ret_from_fork+0x10/0x20
[   17.862950] 
[   17.862988] The buggy address belongs to the object at fff00000c7915500
[   17.862988]  which belongs to the cache kmalloc-64 of size 64
[   17.863076] The buggy address is located 0 bytes to the right of
[   17.863076]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.863171] 
[   17.863319] The buggy address belongs to the physical page:
[   17.863355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.863409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.863524] page_type: f5(slab)
[   17.863592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.863646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.863700] page dumped because: kasan: bad access detected
[   17.863732] 
[   17.863752] Memory state around the buggy address:
[   17.863970]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.864155]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.864389] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.864872]                                      ^
[   17.864958]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.865075]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.865175] ==================================================================
[   18.008293] ==================================================================
[   18.008605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.008982] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   18.009072] 
[   18.009118] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.009354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.009396] Hardware name: linux,dummy-virt (DT)
[   18.009431] Call trace:
[   18.009454]  show_stack+0x20/0x38 (C)
[   18.009508]  dump_stack_lvl+0x8c/0xd0
[   18.009555]  print_report+0x118/0x5d0
[   18.009678]  kasan_report+0xdc/0x128
[   18.009764]  __asan_report_load8_noabort+0x20/0x30
[   18.010008]  kasan_atomics_helper+0x3df4/0x4858
[   18.010106]  kasan_atomics+0x198/0x2e0
[   18.010397]  kunit_try_run_case+0x170/0x3f0
[   18.010459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.010522]  kthread+0x328/0x630
[   18.010565]  ret_from_fork+0x10/0x20
[   18.010830] 
[   18.010867] Allocated by task 265:
[   18.010904]  kasan_save_stack+0x3c/0x68
[   18.011023]  kasan_save_track+0x20/0x40
[   18.011081]  kasan_save_alloc_info+0x40/0x58
[   18.011125]  __kasan_kmalloc+0xd4/0xd8
[   18.011202]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.011369]  kasan_atomics+0xb8/0x2e0
[   18.011518]  kunit_try_run_case+0x170/0x3f0
[   18.011581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.011636]  kthread+0x328/0x630
[   18.011945]  ret_from_fork+0x10/0x20
[   18.012110] 
[   18.012185] The buggy address belongs to the object at fff00000c7915500
[   18.012185]  which belongs to the cache kmalloc-64 of size 64
[   18.012364] The buggy address is located 0 bytes to the right of
[   18.012364]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   18.012544] 
[   18.012634] The buggy address belongs to the physical page:
[   18.012704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   18.013057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.013243] page_type: f5(slab)
[   18.013307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.013722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.013820] page dumped because: kasan: bad access detected
[   18.013882] 
[   18.013903] Memory state around the buggy address:
[   18.014146]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.014316]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.014414] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.014813]                                      ^
[   18.014886]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.014997]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.015040] ==================================================================
[   17.886024] ==================================================================
[   17.886126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   17.886177] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.886245] 
[   17.886276] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.886378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.886773] Hardware name: linux,dummy-virt (DT)
[   17.886848] Call trace:
[   17.886875]  show_stack+0x20/0x38 (C)
[   17.886985]  dump_stack_lvl+0x8c/0xd0
[   17.887063]  print_report+0x118/0x5d0
[   17.887130]  kasan_report+0xdc/0x128
[   17.887177]  kasan_check_range+0x100/0x1a8
[   17.887253]  __kasan_check_write+0x20/0x30
[   17.887318]  kasan_atomics_helper+0xe44/0x4858
[   17.887369]  kasan_atomics+0x198/0x2e0
[   17.887414]  kunit_try_run_case+0x170/0x3f0
[   17.887463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.887517]  kthread+0x328/0x630
[   17.887559]  ret_from_fork+0x10/0x20
[   17.887606] 
[   17.887628] Allocated by task 265:
[   17.887657]  kasan_save_stack+0x3c/0x68
[   17.888122]  kasan_save_track+0x20/0x40
[   17.888213]  kasan_save_alloc_info+0x40/0x58
[   17.888306]  __kasan_kmalloc+0xd4/0xd8
[   17.888738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.888835]  kasan_atomics+0xb8/0x2e0
[   17.889020]  kunit_try_run_case+0x170/0x3f0
[   17.889127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.889232]  kthread+0x328/0x630
[   17.889392]  ret_from_fork+0x10/0x20
[   17.889468] 
[   17.889493] The buggy address belongs to the object at fff00000c7915500
[   17.889493]  which belongs to the cache kmalloc-64 of size 64
[   17.889553] The buggy address is located 0 bytes to the right of
[   17.889553]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.889621] 
[   17.889643] The buggy address belongs to the physical page:
[   17.890006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.890067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.890118] page_type: f5(slab)
[   17.890156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.890208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.890252] page dumped because: kasan: bad access detected
[   17.890286] 
[   17.890307] Memory state around the buggy address:
[   17.890341]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.890386]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.890430] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.890468]                                      ^
[   17.890504]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.890549]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.890589] ==================================================================
[   17.921585] ==================================================================
[   17.921645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   17.921979] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.922108] 
[   17.922142] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.922224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.922378] Hardware name: linux,dummy-virt (DT)
[   17.922457] Call trace:
[   17.922483]  show_stack+0x20/0x38 (C)
[   17.922535]  dump_stack_lvl+0x8c/0xd0
[   17.922630]  print_report+0x118/0x5d0
[   17.922797]  kasan_report+0xdc/0x128
[   17.922853]  kasan_check_range+0x100/0x1a8
[   17.922903]  __kasan_check_write+0x20/0x30
[   17.922948]  kasan_atomics_helper+0x10c0/0x4858
[   17.923054]  kasan_atomics+0x198/0x2e0
[   17.923377]  kunit_try_run_case+0x170/0x3f0
[   17.923577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.923638]  kthread+0x328/0x630
[   17.923693]  ret_from_fork+0x10/0x20
[   17.923896] 
[   17.924010] Allocated by task 265:
[   17.924390]  kasan_save_stack+0x3c/0x68
[   17.924437]  kasan_save_track+0x20/0x40
[   17.924477]  kasan_save_alloc_info+0x40/0x58
[   17.924536]  __kasan_kmalloc+0xd4/0xd8
[   17.924643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.925069]  kasan_atomics+0xb8/0x2e0
[   17.925165]  kunit_try_run_case+0x170/0x3f0
[   17.925274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.925758]  kthread+0x328/0x630
[   17.925965]  ret_from_fork+0x10/0x20
[   17.926084] 
[   17.926130] The buggy address belongs to the object at fff00000c7915500
[   17.926130]  which belongs to the cache kmalloc-64 of size 64
[   17.926194] The buggy address is located 0 bytes to the right of
[   17.926194]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.926271] 
[   17.926341] The buggy address belongs to the physical page:
[   17.926411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.926464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.926536] page_type: f5(slab)
[   17.926577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.926629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.926673] page dumped because: kasan: bad access detected
[   17.926717] 
[   17.926737] Memory state around the buggy address:
[   17.926772]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.926817]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.926864] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.927020]                                      ^
[   17.927065]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927140]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927218] ==================================================================
[   17.964164] ==================================================================
[   17.964214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   17.964265] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.964317] 
[   17.964380] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.964492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.964539] Hardware name: linux,dummy-virt (DT)
[   17.964590] Call trace:
[   17.964617]  show_stack+0x20/0x38 (C)
[   17.964683]  dump_stack_lvl+0x8c/0xd0
[   17.964806]  print_report+0x118/0x5d0
[   17.964896]  kasan_report+0xdc/0x128
[   17.965018]  __asan_report_load8_noabort+0x20/0x30
[   17.965080]  kasan_atomics_helper+0x3f04/0x4858
[   17.965294]  kasan_atomics+0x198/0x2e0
[   17.965356]  kunit_try_run_case+0x170/0x3f0
[   17.965443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.965527]  kthread+0x328/0x630
[   17.965622]  ret_from_fork+0x10/0x20
[   17.965677] 
[   17.965756] Allocated by task 265:
[   17.965788]  kasan_save_stack+0x3c/0x68
[   17.965845]  kasan_save_track+0x20/0x40
[   17.965887]  kasan_save_alloc_info+0x40/0x58
[   17.965929]  __kasan_kmalloc+0xd4/0xd8
[   17.965966]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.966024]  kasan_atomics+0xb8/0x2e0
[   17.966166]  kunit_try_run_case+0x170/0x3f0
[   17.966325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.966380]  kthread+0x328/0x630
[   17.966414]  ret_from_fork+0x10/0x20
[   17.966508] 
[   17.966530] The buggy address belongs to the object at fff00000c7915500
[   17.966530]  which belongs to the cache kmalloc-64 of size 64
[   17.966590] The buggy address is located 0 bytes to the right of
[   17.966590]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.966656] 
[   17.966677] The buggy address belongs to the physical page:
[   17.966722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.966895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.966958] page_type: f5(slab)
[   17.967086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.967175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.967219] page dumped because: kasan: bad access detected
[   17.967254] 
[   17.967274] Memory state around the buggy address:
[   17.967308]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.967354]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.967400] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.967458]                                      ^
[   17.967514]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.967567]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.967608] ==================================================================
[   17.997242] ==================================================================
[   17.997293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   17.997342] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.997638] 
[   17.997750] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.997860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.997909] Hardware name: linux,dummy-virt (DT)
[   17.998056] Call trace:
[   17.998163]  show_stack+0x20/0x38 (C)
[   17.998242]  dump_stack_lvl+0x8c/0xd0
[   17.998304]  print_report+0x118/0x5d0
[   17.998387]  kasan_report+0xdc/0x128
[   17.998440]  __asan_report_load8_noabort+0x20/0x30
[   17.998494]  kasan_atomics_helper+0x3db0/0x4858
[   17.998678]  kasan_atomics+0x198/0x2e0
[   17.998890]  kunit_try_run_case+0x170/0x3f0
[   17.998953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.999015]  kthread+0x328/0x630
[   17.999060]  ret_from_fork+0x10/0x20
[   17.999265] 
[   17.999302] Allocated by task 265:
[   17.999336]  kasan_save_stack+0x3c/0x68
[   17.999468]  kasan_save_track+0x20/0x40
[   17.999534]  kasan_save_alloc_info+0x40/0x58
[   17.999577]  __kasan_kmalloc+0xd4/0xd8
[   17.999623]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.999664]  kasan_atomics+0xb8/0x2e0
[   17.999711]  kunit_try_run_case+0x170/0x3f0
[   17.999752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.999796]  kthread+0x328/0x630
[   18.000074]  ret_from_fork+0x10/0x20
[   18.000294] 
[   18.000396] The buggy address belongs to the object at fff00000c7915500
[   18.000396]  which belongs to the cache kmalloc-64 of size 64
[   18.000468] The buggy address is located 0 bytes to the right of
[   18.000468]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   18.000553] 
[   18.000858] The buggy address belongs to the physical page:
[   18.001043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   18.001126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.001357] page_type: f5(slab)
[   18.001406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.001497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.001543] page dumped because: kasan: bad access detected
[   18.001577] 
[   18.001597] Memory state around the buggy address:
[   18.001824]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.001924]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.002035] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.002086]                                      ^
[   18.002134]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.002193]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.002241] ==================================================================
[   17.896056] ==================================================================
[   17.896340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   17.896422] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.896669] 
[   17.896715] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.896800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.896829] Hardware name: linux,dummy-virt (DT)
[   17.896860] Call trace:
[   17.896885]  show_stack+0x20/0x38 (C)
[   17.896933]  dump_stack_lvl+0x8c/0xd0
[   17.897063]  print_report+0x118/0x5d0
[   17.897296]  kasan_report+0xdc/0x128
[   17.897362]  kasan_check_range+0x100/0x1a8
[   17.897414]  __kasan_check_write+0x20/0x30
[   17.897463]  kasan_atomics_helper+0xeb8/0x4858
[   17.897533]  kasan_atomics+0x198/0x2e0
[   17.897598]  kunit_try_run_case+0x170/0x3f0
[   17.897921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.898133]  kthread+0x328/0x630
[   17.898178]  ret_from_fork+0x10/0x20
[   17.898250] 
[   17.898308] Allocated by task 265:
[   17.898409]  kasan_save_stack+0x3c/0x68
[   17.898452]  kasan_save_track+0x20/0x40
[   17.898530]  kasan_save_alloc_info+0x40/0x58
[   17.898593]  __kasan_kmalloc+0xd4/0xd8
[   17.898649]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.898794]  kasan_atomics+0xb8/0x2e0
[   17.898839]  kunit_try_run_case+0x170/0x3f0
[   17.898880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.898925]  kthread+0x328/0x630
[   17.898971]  ret_from_fork+0x10/0x20
[   17.899028] 
[   17.899318] The buggy address belongs to the object at fff00000c7915500
[   17.899318]  which belongs to the cache kmalloc-64 of size 64
[   17.899388] The buggy address is located 0 bytes to the right of
[   17.899388]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.899505] 
[   17.899575] The buggy address belongs to the physical page:
[   17.899609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.899994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.900110] page_type: f5(slab)
[   17.900180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.900233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.900294] page dumped because: kasan: bad access detected
[   17.900329] 
[   17.900350] Memory state around the buggy address:
[   17.900800]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.900882]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.900965] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.901259]                                      ^
[   17.901391]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.901440]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.901501] ==================================================================
[   18.034405] ==================================================================
[   18.034455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.034506] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   18.034746] 
[   18.034793] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.034888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.035077] Hardware name: linux,dummy-virt (DT)
[   18.035224] Call trace:
[   18.035252]  show_stack+0x20/0x38 (C)
[   18.035341]  dump_stack_lvl+0x8c/0xd0
[   18.035428]  print_report+0x118/0x5d0
[   18.035495]  kasan_report+0xdc/0x128
[   18.035606]  __asan_report_load8_noabort+0x20/0x30
[   18.035664]  kasan_atomics_helper+0x3e20/0x4858
[   18.036017]  kasan_atomics+0x198/0x2e0
[   18.036111]  kunit_try_run_case+0x170/0x3f0
[   18.036478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.036644]  kthread+0x328/0x630
[   18.036721]  ret_from_fork+0x10/0x20
[   18.036877] 
[   18.036984] Allocated by task 265:
[   18.037063]  kasan_save_stack+0x3c/0x68
[   18.037114]  kasan_save_track+0x20/0x40
[   18.037419]  kasan_save_alloc_info+0x40/0x58
[   18.037569]  __kasan_kmalloc+0xd4/0xd8
[   18.037677]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.037994]  kasan_atomics+0xb8/0x2e0
[   18.038108]  kunit_try_run_case+0x170/0x3f0
[   18.038207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.038363]  kthread+0x328/0x630
[   18.038432]  ret_from_fork+0x10/0x20
[   18.038555] 
[   18.038627] The buggy address belongs to the object at fff00000c7915500
[   18.038627]  which belongs to the cache kmalloc-64 of size 64
[   18.039242] The buggy address is located 0 bytes to the right of
[   18.039242]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   18.039482] 
[   18.039697] The buggy address belongs to the physical page:
[   18.039790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   18.039875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.040103] page_type: f5(slab)
[   18.040156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.040319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.040649] page dumped because: kasan: bad access detected
[   18.040736] 
[   18.040758] Memory state around the buggy address:
[   18.040805]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.040859]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.041175] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.041335]                                      ^
[   18.041426]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.041636]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.041787] ==================================================================
[   18.028584] ==================================================================
[   18.028644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.028744] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   18.028798] 
[   18.028847] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.028996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.029055] Hardware name: linux,dummy-virt (DT)
[   18.029090] Call trace:
[   18.029131]  show_stack+0x20/0x38 (C)
[   18.029218]  dump_stack_lvl+0x8c/0xd0
[   18.029264]  print_report+0x118/0x5d0
[   18.029340]  kasan_report+0xdc/0x128
[   18.029387]  kasan_check_range+0x100/0x1a8
[   18.029673]  __kasan_check_write+0x20/0x30
[   18.029757]  kasan_atomics_helper+0x175c/0x4858
[   18.030032]  kasan_atomics+0x198/0x2e0
[   18.030100]  kunit_try_run_case+0x170/0x3f0
[   18.030188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.030286]  kthread+0x328/0x630
[   18.030397]  ret_from_fork+0x10/0x20
[   18.030450] 
[   18.030490] Allocated by task 265:
[   18.030525]  kasan_save_stack+0x3c/0x68
[   18.030574]  kasan_save_track+0x20/0x40
[   18.030716]  kasan_save_alloc_info+0x40/0x58
[   18.030765]  __kasan_kmalloc+0xd4/0xd8
[   18.030803]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.030869]  kasan_atomics+0xb8/0x2e0
[   18.030907]  kunit_try_run_case+0x170/0x3f0
[   18.031137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.031200]  kthread+0x328/0x630
[   18.031238]  ret_from_fork+0x10/0x20
[   18.031282] 
[   18.031543] The buggy address belongs to the object at fff00000c7915500
[   18.031543]  which belongs to the cache kmalloc-64 of size 64
[   18.031636] The buggy address is located 0 bytes to the right of
[   18.031636]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   18.031715] 
[   18.031841] The buggy address belongs to the physical page:
[   18.031918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   18.032188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.032241] page_type: f5(slab)
[   18.032282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.032334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.032664] page dumped because: kasan: bad access detected
[   18.032791] 
[   18.032918] Memory state around the buggy address:
[   18.033047]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.033309]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.033422] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.033473]                                      ^
[   18.033708]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.033880]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.033966] ==================================================================
[   17.967750] ==================================================================
[   17.967975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   17.968030] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.968081] 
[   17.968129] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.968429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.968505] Hardware name: linux,dummy-virt (DT)
[   17.968547] Call trace:
[   17.968621]  show_stack+0x20/0x38 (C)
[   17.968760]  dump_stack_lvl+0x8c/0xd0
[   17.968822]  print_report+0x118/0x5d0
[   17.968880]  kasan_report+0xdc/0x128
[   17.968963]  kasan_check_range+0x100/0x1a8
[   17.969028]  __kasan_check_write+0x20/0x30
[   17.969075]  kasan_atomics_helper+0x1414/0x4858
[   17.969124]  kasan_atomics+0x198/0x2e0
[   17.969203]  kunit_try_run_case+0x170/0x3f0
[   17.969279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.969334]  kthread+0x328/0x630
[   17.969378]  ret_from_fork+0x10/0x20
[   17.969549] 
[   17.969655] Allocated by task 265:
[   17.969741]  kasan_save_stack+0x3c/0x68
[   17.969807]  kasan_save_track+0x20/0x40
[   17.969893]  kasan_save_alloc_info+0x40/0x58
[   17.970167]  __kasan_kmalloc+0xd4/0xd8
[   17.970252]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.970313]  kasan_atomics+0xb8/0x2e0
[   17.970402]  kunit_try_run_case+0x170/0x3f0
[   17.970524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.970580]  kthread+0x328/0x630
[   17.970614]  ret_from_fork+0x10/0x20
[   17.970652] 
[   17.970734] The buggy address belongs to the object at fff00000c7915500
[   17.970734]  which belongs to the cache kmalloc-64 of size 64
[   17.970880] The buggy address is located 0 bytes to the right of
[   17.970880]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.970965] 
[   17.970987] The buggy address belongs to the physical page:
[   17.971019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.971071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.971295] page_type: f5(slab)
[   17.971400] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.971453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.971506] page dumped because: kasan: bad access detected
[   17.971550] 
[   17.971579] Memory state around the buggy address:
[   17.971613]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.971659]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.971724] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.971767]                                      ^
[   17.971800]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.971876]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.971915] ==================================================================
[   17.880889] ==================================================================
[   17.880989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   17.881041] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.881106] 
[   17.881137] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.881238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.881275] Hardware name: linux,dummy-virt (DT)
[   17.881334] Call trace:
[   17.881451]  show_stack+0x20/0x38 (C)
[   17.881502]  dump_stack_lvl+0x8c/0xd0
[   17.881578]  print_report+0x118/0x5d0
[   17.881964]  kasan_report+0xdc/0x128
[   17.882035]  __asan_report_load8_noabort+0x20/0x30
[   17.882139]  kasan_atomics_helper+0x3f58/0x4858
[   17.882235]  kasan_atomics+0x198/0x2e0
[   17.882290]  kunit_try_run_case+0x170/0x3f0
[   17.882356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.882418]  kthread+0x328/0x630
[   17.882462]  ret_from_fork+0x10/0x20
[   17.882598] 
[   17.882638] Allocated by task 265:
[   17.882724]  kasan_save_stack+0x3c/0x68
[   17.882770]  kasan_save_track+0x20/0x40
[   17.882808]  kasan_save_alloc_info+0x40/0x58
[   17.882849]  __kasan_kmalloc+0xd4/0xd8
[   17.883048]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.883175]  kasan_atomics+0xb8/0x2e0
[   17.883291]  kunit_try_run_case+0x170/0x3f0
[   17.883348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.883445]  kthread+0x328/0x630
[   17.883479]  ret_from_fork+0x10/0x20
[   17.883535] 
[   17.883575] The buggy address belongs to the object at fff00000c7915500
[   17.883575]  which belongs to the cache kmalloc-64 of size 64
[   17.883635] The buggy address is located 0 bytes to the right of
[   17.883635]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.883890] 
[   17.883919] The buggy address belongs to the physical page:
[   17.884046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.884227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.884280] page_type: f5(slab)
[   17.884343] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.884397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.884440] page dumped because: kasan: bad access detected
[   17.884507] 
[   17.884528] Memory state around the buggy address:
[   17.884562]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.884607]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.884864] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.884964]                                      ^
[   17.885035]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.885102]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.885424] ==================================================================
[   18.022615] ==================================================================
[   18.022664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.022952] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   18.023221] 
[   18.023277] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.023508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.023552] Hardware name: linux,dummy-virt (DT)
[   18.023585] Call trace:
[   18.023673]  show_stack+0x20/0x38 (C)
[   18.023744]  dump_stack_lvl+0x8c/0xd0
[   18.024050]  print_report+0x118/0x5d0
[   18.024134]  kasan_report+0xdc/0x128
[   18.024263]  __asan_report_load8_noabort+0x20/0x30
[   18.024459]  kasan_atomics_helper+0x3e10/0x4858
[   18.024563]  kasan_atomics+0x198/0x2e0
[   18.024679]  kunit_try_run_case+0x170/0x3f0
[   18.024914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.024981]  kthread+0x328/0x630
[   18.025180]  ret_from_fork+0x10/0x20
[   18.025279] 
[   18.025325] Allocated by task 265:
[   18.025366]  kasan_save_stack+0x3c/0x68
[   18.025416]  kasan_save_track+0x20/0x40
[   18.025457]  kasan_save_alloc_info+0x40/0x58
[   18.025499]  __kasan_kmalloc+0xd4/0xd8
[   18.025536]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.025578]  kasan_atomics+0xb8/0x2e0
[   18.025621]  kunit_try_run_case+0x170/0x3f0
[   18.025670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.025731]  kthread+0x328/0x630
[   18.025767]  ret_from_fork+0x10/0x20
[   18.025804] 
[   18.025825] The buggy address belongs to the object at fff00000c7915500
[   18.025825]  which belongs to the cache kmalloc-64 of size 64
[   18.025893] The buggy address is located 0 bytes to the right of
[   18.025893]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   18.025968] 
[   18.025999] The buggy address belongs to the physical page:
[   18.026033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   18.026096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.026145] page_type: f5(slab)
[   18.026193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.026254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.026299] page dumped because: kasan: bad access detected
[   18.026333] 
[   18.026361] Memory state around the buggy address:
[   18.026405]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.026458]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.026526] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.026573]                                      ^
[   18.026609]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.026654]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.027171] ==================================================================
[   17.906190] ==================================================================
[   17.906268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   17.906355] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.906407] 
[   17.906526] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.906628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.906682] Hardware name: linux,dummy-virt (DT)
[   17.906747] Call trace:
[   17.906777]  show_stack+0x20/0x38 (C)
[   17.907125]  dump_stack_lvl+0x8c/0xd0
[   17.907269]  print_report+0x118/0x5d0
[   17.907324]  kasan_report+0xdc/0x128
[   17.907489]  kasan_check_range+0x100/0x1a8
[   17.907546]  __kasan_check_write+0x20/0x30
[   17.907599]  kasan_atomics_helper+0xf88/0x4858
[   17.907650]  kasan_atomics+0x198/0x2e0
[   17.907956]  kunit_try_run_case+0x170/0x3f0
[   17.908012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.908238]  kthread+0x328/0x630
[   17.908324]  ret_from_fork+0x10/0x20
[   17.908391] 
[   17.908412] Allocated by task 265:
[   17.908443]  kasan_save_stack+0x3c/0x68
[   17.908484]  kasan_save_track+0x20/0x40
[   17.908665]  kasan_save_alloc_info+0x40/0x58
[   17.908735]  __kasan_kmalloc+0xd4/0xd8
[   17.908790]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.908841]  kasan_atomics+0xb8/0x2e0
[   17.908878]  kunit_try_run_case+0x170/0x3f0
[   17.908917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.908964]  kthread+0x328/0x630
[   17.908999]  ret_from_fork+0x10/0x20
[   17.909038] 
[   17.909081] The buggy address belongs to the object at fff00000c7915500
[   17.909081]  which belongs to the cache kmalloc-64 of size 64
[   17.909143] The buggy address is located 0 bytes to the right of
[   17.909143]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.909207] 
[   17.909230] The buggy address belongs to the physical page:
[   17.909304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.909356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.909554] page_type: f5(slab)
[   17.909627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.909847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.909955] page dumped because: kasan: bad access detected
[   17.910059] 
[   17.910107] Memory state around the buggy address:
[   17.910498]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.910571]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.910617] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.910877]                                      ^
[   17.911099]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.911191]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.911530] ==================================================================
[   17.977333] ==================================================================
[   17.977419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   17.977547] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.977619] 
[   17.977706] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.977847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.977906] Hardware name: linux,dummy-virt (DT)
[   17.978037] Call trace:
[   17.978067]  show_stack+0x20/0x38 (C)
[   17.978116]  dump_stack_lvl+0x8c/0xd0
[   17.978415]  print_report+0x118/0x5d0
[   17.978491]  kasan_report+0xdc/0x128
[   17.978542]  kasan_check_range+0x100/0x1a8
[   17.978773]  __kasan_check_write+0x20/0x30
[   17.978841]  kasan_atomics_helper+0x14e4/0x4858
[   17.978993]  kasan_atomics+0x198/0x2e0
[   17.979046]  kunit_try_run_case+0x170/0x3f0
[   17.979112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.979197]  kthread+0x328/0x630
[   17.979242]  ret_from_fork+0x10/0x20
[   17.979413] 
[   17.979441] Allocated by task 265:
[   17.979471]  kasan_save_stack+0x3c/0x68
[   17.979515]  kasan_save_track+0x20/0x40
[   17.979868]  kasan_save_alloc_info+0x40/0x58
[   17.980204]  __kasan_kmalloc+0xd4/0xd8
[   17.980281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.980434]  kasan_atomics+0xb8/0x2e0
[   17.980869]  kunit_try_run_case+0x170/0x3f0
[   17.980955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.981176]  kthread+0x328/0x630
[   17.981225]  ret_from_fork+0x10/0x20
[   17.981273] 
[   17.981295] The buggy address belongs to the object at fff00000c7915500
[   17.981295]  which belongs to the cache kmalloc-64 of size 64
[   17.981442] The buggy address is located 0 bytes to the right of
[   17.981442]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.981579] 
[   17.981680] The buggy address belongs to the physical page:
[   17.981976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.982050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.982111] page_type: f5(slab)
[   17.982369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.982574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.982900] page dumped because: kasan: bad access detected
[   17.983053] 
[   17.983076] Memory state around the buggy address:
[   17.983112]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.983388]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.983459] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.983577]                                      ^
[   17.983776]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.984042]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.984087] ==================================================================
[   17.912296] ==================================================================
[   17.912372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   17.912442] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.912519] 
[   17.912957] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.913190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.913228] Hardware name: linux,dummy-virt (DT)
[   17.913307] Call trace:
[   17.913444]  show_stack+0x20/0x38 (C)
[   17.913495]  dump_stack_lvl+0x8c/0xd0
[   17.913544]  print_report+0x118/0x5d0
[   17.913591]  kasan_report+0xdc/0x128
[   17.913647]  kasan_check_range+0x100/0x1a8
[   17.913707]  __kasan_check_write+0x20/0x30
[   17.913755]  kasan_atomics_helper+0xff0/0x4858
[   17.913827]  kasan_atomics+0x198/0x2e0
[   17.913875]  kunit_try_run_case+0x170/0x3f0
[   17.913923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.913977]  kthread+0x328/0x630
[   17.914060]  ret_from_fork+0x10/0x20
[   17.914112] 
[   17.914132] Allocated by task 265:
[   17.914239]  kasan_save_stack+0x3c/0x68
[   17.914374]  kasan_save_track+0x20/0x40
[   17.914415]  kasan_save_alloc_info+0x40/0x58
[   17.914520]  __kasan_kmalloc+0xd4/0xd8
[   17.914587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.914631]  kasan_atomics+0xb8/0x2e0
[   17.914844]  kunit_try_run_case+0x170/0x3f0
[   17.915094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.915159]  kthread+0x328/0x630
[   17.915195]  ret_from_fork+0x10/0x20
[   17.915347] 
[   17.915396] The buggy address belongs to the object at fff00000c7915500
[   17.915396]  which belongs to the cache kmalloc-64 of size 64
[   17.915458] The buggy address is located 0 bytes to the right of
[   17.915458]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.915599] 
[   17.915660] The buggy address belongs to the physical page:
[   17.915705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.915758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.915807] page_type: f5(slab)
[   17.915873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.915928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.915971] page dumped because: kasan: bad access detected
[   17.916004] 
[   17.916047] Memory state around the buggy address:
[   17.916203]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.916253]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.916332] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.916528]                                      ^
[   17.916592]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.916669]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.916722] ==================================================================
[   18.002814] ==================================================================
[   18.002897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.003012] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   18.003154] 
[   18.003213] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.003369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.003418] Hardware name: linux,dummy-virt (DT)
[   18.003453] Call trace:
[   18.003477]  show_stack+0x20/0x38 (C)
[   18.003660]  dump_stack_lvl+0x8c/0xd0
[   18.003849]  print_report+0x118/0x5d0
[   18.003911]  kasan_report+0xdc/0x128
[   18.003966]  kasan_check_range+0x100/0x1a8
[   18.004215]  __kasan_check_write+0x20/0x30
[   18.004338]  kasan_atomics_helper+0x1644/0x4858
[   18.004423]  kasan_atomics+0x198/0x2e0
[   18.004578]  kunit_try_run_case+0x170/0x3f0
[   18.004801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.004897]  kthread+0x328/0x630
[   18.005215]  ret_from_fork+0x10/0x20
[   18.005299] 
[   18.005347] Allocated by task 265:
[   18.005445]  kasan_save_stack+0x3c/0x68
[   18.005625]  kasan_save_track+0x20/0x40
[   18.005701]  kasan_save_alloc_info+0x40/0x58
[   18.005745]  __kasan_kmalloc+0xd4/0xd8
[   18.006096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.006205]  kasan_atomics+0xb8/0x2e0
[   18.006408]  kunit_try_run_case+0x170/0x3f0
[   18.006594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.006714]  kthread+0x328/0x630
[   18.006761]  ret_from_fork+0x10/0x20
[   18.006809] 
[   18.006831] The buggy address belongs to the object at fff00000c7915500
[   18.006831]  which belongs to the cache kmalloc-64 of size 64
[   18.006893] The buggy address is located 0 bytes to the right of
[   18.006893]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   18.006968] 
[   18.006999] The buggy address belongs to the physical page:
[   18.007032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   18.007099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.007165] page_type: f5(slab)
[   18.007212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.007267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.007320] page dumped because: kasan: bad access detected
[   18.007355] 
[   18.007375] Memory state around the buggy address:
[   18.007410]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.007469]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.007514] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.007555]                                      ^
[   18.007600]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.007652]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.007711] ==================================================================
[   17.972153] ==================================================================
[   17.972220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   17.972270] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.972322] 
[   17.972351] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.972459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.972507] Hardware name: linux,dummy-virt (DT)
[   17.972585] Call trace:
[   17.972652]  show_stack+0x20/0x38 (C)
[   17.972741]  dump_stack_lvl+0x8c/0xd0
[   17.972826]  print_report+0x118/0x5d0
[   17.973154]  kasan_report+0xdc/0x128
[   17.973219]  kasan_check_range+0x100/0x1a8
[   17.973268]  __kasan_check_write+0x20/0x30
[   17.973315]  kasan_atomics_helper+0x147c/0x4858
[   17.973365]  kasan_atomics+0x198/0x2e0
[   17.973410]  kunit_try_run_case+0x170/0x3f0
[   17.973459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.973512]  kthread+0x328/0x630
[   17.973554]  ret_from_fork+0x10/0x20
[   17.973603] 
[   17.973762] Allocated by task 265:
[   17.973891]  kasan_save_stack+0x3c/0x68
[   17.973957]  kasan_save_track+0x20/0x40
[   17.974036]  kasan_save_alloc_info+0x40/0x58
[   17.974345]  __kasan_kmalloc+0xd4/0xd8
[   17.974426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.974477]  kasan_atomics+0xb8/0x2e0
[   17.974641]  kunit_try_run_case+0x170/0x3f0
[   17.974725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.974863]  kthread+0x328/0x630
[   17.974919]  ret_from_fork+0x10/0x20
[   17.974975] 
[   17.974998] The buggy address belongs to the object at fff00000c7915500
[   17.974998]  which belongs to the cache kmalloc-64 of size 64
[   17.975059] The buggy address is located 0 bytes to the right of
[   17.975059]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.975125] 
[   17.975401] The buggy address belongs to the physical page:
[   17.975468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.975734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.975872] page_type: f5(slab)
[   17.975940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.975994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.976088] page dumped because: kasan: bad access detected
[   17.976136] 
[   17.976176] Memory state around the buggy address:
[   17.976220]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.976268]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.976329] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.976371]                                      ^
[   17.976415]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.976465]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.976514] ==================================================================
[   17.959207] ==================================================================
[   17.959286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   17.959351] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.959431] 
[   17.959478] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.959584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.959657] Hardware name: linux,dummy-virt (DT)
[   17.959722] Call trace:
[   17.959747]  show_stack+0x20/0x38 (C)
[   17.959797]  dump_stack_lvl+0x8c/0xd0
[   17.959871]  print_report+0x118/0x5d0
[   17.959921]  kasan_report+0xdc/0x128
[   17.959967]  kasan_check_range+0x100/0x1a8
[   17.960017]  __kasan_check_write+0x20/0x30
[   17.960064]  kasan_atomics_helper+0x1384/0x4858
[   17.960295]  kasan_atomics+0x198/0x2e0
[   17.960408]  kunit_try_run_case+0x170/0x3f0
[   17.960894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.960999]  kthread+0x328/0x630
[   17.961086]  ret_from_fork+0x10/0x20
[   17.961224] 
[   17.961351] Allocated by task 265:
[   17.961430]  kasan_save_stack+0x3c/0x68
[   17.961501]  kasan_save_track+0x20/0x40
[   17.961550]  kasan_save_alloc_info+0x40/0x58
[   17.961593]  __kasan_kmalloc+0xd4/0xd8
[   17.961636]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.961712]  kasan_atomics+0xb8/0x2e0
[   17.961749]  kunit_try_run_case+0x170/0x3f0
[   17.961902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.961954]  kthread+0x328/0x630
[   17.961988]  ret_from_fork+0x10/0x20
[   17.962151] 
[   17.962227] The buggy address belongs to the object at fff00000c7915500
[   17.962227]  which belongs to the cache kmalloc-64 of size 64
[   17.962327] The buggy address is located 0 bytes to the right of
[   17.962327]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.962622] 
[   17.962741] The buggy address belongs to the physical page:
[   17.962858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.962967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.963082] page_type: f5(slab)
[   17.963123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.963188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.963388] page dumped because: kasan: bad access detected
[   17.963543] 
[   17.963570] Memory state around the buggy address:
[   17.963628]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.963674]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.963740] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.963801]                                      ^
[   17.963881]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.963926]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.963965] ==================================================================
[   17.872288] ==================================================================
[   17.872341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   17.872423] Read of size 4 at addr fff00000c7915530 by task kunit_try_catch/265
[   17.872475] 
[   17.872564] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.872646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.872674] Hardware name: linux,dummy-virt (DT)
[   17.872722] Call trace:
[   17.872748]  show_stack+0x20/0x38 (C)
[   17.872796]  dump_stack_lvl+0x8c/0xd0
[   17.873001]  print_report+0x118/0x5d0
[   17.873224]  kasan_report+0xdc/0x128
[   17.873400]  __asan_report_load4_noabort+0x20/0x30
[   17.873472]  kasan_atomics_helper+0x3e04/0x4858
[   17.873525]  kasan_atomics+0x198/0x2e0
[   17.873589]  kunit_try_run_case+0x170/0x3f0
[   17.874059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.874165]  kthread+0x328/0x630
[   17.874210]  ret_from_fork+0x10/0x20
[   17.874268] 
[   17.874317] Allocated by task 265:
[   17.874385]  kasan_save_stack+0x3c/0x68
[   17.874430]  kasan_save_track+0x20/0x40
[   17.874474]  kasan_save_alloc_info+0x40/0x58
[   17.874516]  __kasan_kmalloc+0xd4/0xd8
[   17.874582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.874722]  kasan_atomics+0xb8/0x2e0
[   17.874781]  kunit_try_run_case+0x170/0x3f0
[   17.874823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.874867]  kthread+0x328/0x630
[   17.874902]  ret_from_fork+0x10/0x20
[   17.875091] 
[   17.875199] The buggy address belongs to the object at fff00000c7915500
[   17.875199]  which belongs to the cache kmalloc-64 of size 64
[   17.875265] The buggy address is located 0 bytes to the right of
[   17.875265]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   17.875395] 
[   17.875486] The buggy address belongs to the physical page:
[   17.875520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   17.875583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.875654] page_type: f5(slab)
[   17.875739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.875896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.876253] page dumped because: kasan: bad access detected
[   17.876298] 
[   17.876319] Memory state around the buggy address:
[   17.876354]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.876400]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.876479] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.876623]                                      ^
[   17.876664]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.876722]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.876793] ==================================================================
[   18.016393] ==================================================================
[   18.016446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.016569] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265
[   18.016650] 
[   18.016680] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.016940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.017080] Hardware name: linux,dummy-virt (DT)
[   18.017317] Call trace:
[   18.017541]  show_stack+0x20/0x38 (C)
[   18.017700]  dump_stack_lvl+0x8c/0xd0
[   18.017757]  print_report+0x118/0x5d0
[   18.017821]  kasan_report+0xdc/0x128
[   18.017875]  kasan_check_range+0x100/0x1a8
[   18.017928]  __kasan_check_write+0x20/0x30
[   18.018203]  kasan_atomics_helper+0x16d0/0x4858
[   18.018397]  kasan_atomics+0x198/0x2e0
[   18.018452]  kunit_try_run_case+0x170/0x3f0
[   18.018517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.018643]  kthread+0x328/0x630
[   18.018823]  ret_from_fork+0x10/0x20
[   18.018897] 
[   18.018936] Allocated by task 265:
[   18.019195]  kasan_save_stack+0x3c/0x68
[   18.019272]  kasan_save_track+0x20/0x40
[   18.019343]  kasan_save_alloc_info+0x40/0x58
[   18.019431]  __kasan_kmalloc+0xd4/0xd8
[   18.019626]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.019681]  kasan_atomics+0xb8/0x2e0
[   18.019733]  kunit_try_run_case+0x170/0x3f0
[   18.019869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.019936]  kthread+0x328/0x630
[   18.019979]  ret_from_fork+0x10/0x20
[   18.020069] 
[   18.020148] The buggy address belongs to the object at fff00000c7915500
[   18.020148]  which belongs to the cache kmalloc-64 of size 64
[   18.020365] The buggy address is located 0 bytes to the right of
[   18.020365]  allocated 48-byte region [fff00000c7915500, fff00000c7915530)
[   18.020592] 
[   18.020828] The buggy address belongs to the physical page:
[   18.021152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915
[   18.021214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.021266] page_type: f5(slab)
[   18.021349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.021437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.021536] page dumped because: kasan: bad access detected
[   18.021660] 
[   18.021713] Memory state around the buggy address:
[   18.021749]  fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.022025]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.022132] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.022189]                                      ^
[   18.022227]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.022273]  fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.022320] ==================================================================

[   14.949720] ==================================================================
[   14.950102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.950826] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.951533] 
[   14.951788] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.951838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.951967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.951994] Call Trace:
[   14.952021]  <TASK>
[   14.952037]  dump_stack_lvl+0x73/0xb0
[   14.952068]  print_report+0xd1/0x610
[   14.952090]  ? __virt_addr_valid+0x1db/0x2d0
[   14.952147]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.952168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.952190]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.952212]  kasan_report+0x141/0x180
[   14.952234]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.952261]  __asan_report_load4_noabort+0x18/0x20
[   14.952285]  kasan_atomics_helper+0x4a36/0x5450
[   14.952308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.952331]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.952392]  ? kasan_atomics+0x152/0x310
[   14.952432]  kasan_atomics+0x1dc/0x310
[   14.952455]  ? __pfx_kasan_atomics+0x10/0x10
[   14.952479]  ? __pfx_read_tsc+0x10/0x10
[   14.952501]  ? ktime_get_ts64+0x86/0x230
[   14.952525]  kunit_try_run_case+0x1a5/0x480
[   14.952549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.952571]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.952594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.952617]  ? __kthread_parkme+0x82/0x180
[   14.952638]  ? preempt_count_sub+0x50/0x80
[   14.952661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.952685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.952708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.952732]  kthread+0x337/0x6f0
[   14.952751]  ? trace_preempt_on+0x20/0xc0
[   14.952774]  ? __pfx_kthread+0x10/0x10
[   14.952795]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.952816]  ? calculate_sigpending+0x7b/0xa0
[   14.952841]  ? __pfx_kthread+0x10/0x10
[   14.952863]  ret_from_fork+0x116/0x1d0
[   14.952881]  ? __pfx_kthread+0x10/0x10
[   14.952902]  ret_from_fork_asm+0x1a/0x30
[   14.952933]  </TASK>
[   14.952945] 
[   14.961262] Allocated by task 283:
[   14.961499]  kasan_save_stack+0x45/0x70
[   14.961724]  kasan_save_track+0x18/0x40
[   14.961883]  kasan_save_alloc_info+0x3b/0x50
[   14.962123]  __kasan_kmalloc+0xb7/0xc0
[   14.962312]  __kmalloc_cache_noprof+0x189/0x420
[   14.962590]  kasan_atomics+0x95/0x310
[   14.962767]  kunit_try_run_case+0x1a5/0x480
[   14.962983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.963279]  kthread+0x337/0x6f0
[   14.963472]  ret_from_fork+0x116/0x1d0
[   14.963693]  ret_from_fork_asm+0x1a/0x30
[   14.963898] 
[   14.963972] The buggy address belongs to the object at ffff8881039b8880
[   14.963972]  which belongs to the cache kmalloc-64 of size 64
[   14.964651] The buggy address is located 0 bytes to the right of
[   14.964651]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.965153] 
[   14.965226] The buggy address belongs to the physical page:
[   14.965405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.965671] flags: 0x200000000000000(node=0|zone=2)
[   14.965905] page_type: f5(slab)
[   14.966082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.966421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.966758] page dumped because: kasan: bad access detected
[   14.966973] 
[   14.967071] Memory state around the buggy address:
[   14.967248]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.967636]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.967962] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.968247]                                      ^
[   14.968477]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.968801]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.969125] ==================================================================
[   15.469265] ==================================================================
[   15.469816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.470738] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.471069] 
[   15.471154] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.471196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.471209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.471232] Call Trace:
[   15.471246]  <TASK>
[   15.471261]  dump_stack_lvl+0x73/0xb0
[   15.471288]  print_report+0xd1/0x610
[   15.471310]  ? __virt_addr_valid+0x1db/0x2d0
[   15.471332]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.471353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.471532]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.471559]  kasan_report+0x141/0x180
[   15.471581]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.471608]  kasan_check_range+0x10c/0x1c0
[   15.471634]  __kasan_check_write+0x18/0x20
[   15.471653]  kasan_atomics_helper+0x19e3/0x5450
[   15.471676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.471697]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.471722]  ? kasan_atomics+0x152/0x310
[   15.471748]  kasan_atomics+0x1dc/0x310
[   15.471770]  ? __pfx_kasan_atomics+0x10/0x10
[   15.471795]  ? __pfx_read_tsc+0x10/0x10
[   15.471815]  ? ktime_get_ts64+0x86/0x230
[   15.471839]  kunit_try_run_case+0x1a5/0x480
[   15.471863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.471885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.471909]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.471933]  ? __kthread_parkme+0x82/0x180
[   15.471953]  ? preempt_count_sub+0x50/0x80
[   15.471976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.472000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.472036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.472060]  kthread+0x337/0x6f0
[   15.472079]  ? trace_preempt_on+0x20/0xc0
[   15.472101]  ? __pfx_kthread+0x10/0x10
[   15.472122]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.472143]  ? calculate_sigpending+0x7b/0xa0
[   15.472167]  ? __pfx_kthread+0x10/0x10
[   15.472188]  ret_from_fork+0x116/0x1d0
[   15.472206]  ? __pfx_kthread+0x10/0x10
[   15.472227]  ret_from_fork_asm+0x1a/0x30
[   15.472257]  </TASK>
[   15.472268] 
[   15.485849] Allocated by task 283:
[   15.486051]  kasan_save_stack+0x45/0x70
[   15.486265]  kasan_save_track+0x18/0x40
[   15.486840]  kasan_save_alloc_info+0x3b/0x50
[   15.487047]  __kasan_kmalloc+0xb7/0xc0
[   15.487575]  __kmalloc_cache_noprof+0x189/0x420
[   15.487809]  kasan_atomics+0x95/0x310
[   15.488127]  kunit_try_run_case+0x1a5/0x480
[   15.488310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.488985]  kthread+0x337/0x6f0
[   15.489281]  ret_from_fork+0x116/0x1d0
[   15.489815]  ret_from_fork_asm+0x1a/0x30
[   15.490040] 
[   15.490132] The buggy address belongs to the object at ffff8881039b8880
[   15.490132]  which belongs to the cache kmalloc-64 of size 64
[   15.491188] The buggy address is located 0 bytes to the right of
[   15.491188]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.492158] 
[   15.492260] The buggy address belongs to the physical page:
[   15.492663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.493247] flags: 0x200000000000000(node=0|zone=2)
[   15.493784] page_type: f5(slab)
[   15.493938] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.494634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.494955] page dumped because: kasan: bad access detected
[   15.495331] 
[   15.495635] Memory state around the buggy address:
[   15.495847]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.496188]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.496798] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.497197]                                      ^
[   15.497462]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.498129]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.498639] ==================================================================
[   14.393639] ==================================================================
[   14.394244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.394590] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.394906] 
[   14.395000] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.395542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.395554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.395677] Call Trace:
[   14.395706]  <TASK>
[   14.395722]  dump_stack_lvl+0x73/0xb0
[   14.395752]  print_report+0xd1/0x610
[   14.395773]  ? __virt_addr_valid+0x1db/0x2d0
[   14.395794]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.395814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.395836]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.395856]  kasan_report+0x141/0x180
[   14.395877]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.395902]  __asan_report_load4_noabort+0x18/0x20
[   14.395926]  kasan_atomics_helper+0x4bbc/0x5450
[   14.395947]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.395969]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.395993]  ? kasan_atomics+0x152/0x310
[   14.396029]  kasan_atomics+0x1dc/0x310
[   14.396050]  ? __pfx_kasan_atomics+0x10/0x10
[   14.396073]  ? __pfx_read_tsc+0x10/0x10
[   14.396092]  ? ktime_get_ts64+0x86/0x230
[   14.396115]  kunit_try_run_case+0x1a5/0x480
[   14.396139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.396161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.396183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.396205]  ? __kthread_parkme+0x82/0x180
[   14.396223]  ? preempt_count_sub+0x50/0x80
[   14.396245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.396269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.396290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.396313]  kthread+0x337/0x6f0
[   14.396330]  ? trace_preempt_on+0x20/0xc0
[   14.396390]  ? __pfx_kthread+0x10/0x10
[   14.396427]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.396447]  ? calculate_sigpending+0x7b/0xa0
[   14.396471]  ? __pfx_kthread+0x10/0x10
[   14.396491]  ret_from_fork+0x116/0x1d0
[   14.396509]  ? __pfx_kthread+0x10/0x10
[   14.396528]  ret_from_fork_asm+0x1a/0x30
[   14.396558]  </TASK>
[   14.396568] 
[   14.410779] Allocated by task 283:
[   14.410954]  kasan_save_stack+0x45/0x70
[   14.411113]  kasan_save_track+0x18/0x40
[   14.411250]  kasan_save_alloc_info+0x3b/0x50
[   14.411405]  __kasan_kmalloc+0xb7/0xc0
[   14.411536]  __kmalloc_cache_noprof+0x189/0x420
[   14.411689]  kasan_atomics+0x95/0x310
[   14.411819]  kunit_try_run_case+0x1a5/0x480
[   14.411963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.413203]  kthread+0x337/0x6f0
[   14.413711]  ret_from_fork+0x116/0x1d0
[   14.414217]  ret_from_fork_asm+0x1a/0x30
[   14.414800] 
[   14.415091] The buggy address belongs to the object at ffff8881039b8880
[   14.415091]  which belongs to the cache kmalloc-64 of size 64
[   14.416474] The buggy address is located 0 bytes to the right of
[   14.416474]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.418107] 
[   14.418417] The buggy address belongs to the physical page:
[   14.418960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.419629] flags: 0x200000000000000(node=0|zone=2)
[   14.419813] page_type: f5(slab)
[   14.419935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.420180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.420406] page dumped because: kasan: bad access detected
[   14.420577] 
[   14.420646] Memory state around the buggy address:
[   14.420800]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.421076]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.422424] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.423153]                                      ^
[   14.423778]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.424527]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.425296] ==================================================================
[   14.426320] ==================================================================
[   14.427129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.427879] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.428758] 
[   14.428989] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.429044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.429056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.429076] Call Trace:
[   14.429091]  <TASK>
[   14.429139]  dump_stack_lvl+0x73/0xb0
[   14.429167]  print_report+0xd1/0x610
[   14.429187]  ? __virt_addr_valid+0x1db/0x2d0
[   14.429209]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.429230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.429253]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.429275]  kasan_report+0x141/0x180
[   14.429295]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.429320]  __asan_report_store4_noabort+0x1b/0x30
[   14.429344]  kasan_atomics_helper+0x4ba2/0x5450
[   14.429365]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.429407]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.429431]  ? kasan_atomics+0x152/0x310
[   14.429456]  kasan_atomics+0x1dc/0x310
[   14.429477]  ? __pfx_kasan_atomics+0x10/0x10
[   14.429500]  ? __pfx_read_tsc+0x10/0x10
[   14.429521]  ? ktime_get_ts64+0x86/0x230
[   14.429544]  kunit_try_run_case+0x1a5/0x480
[   14.429568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429589]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.429612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.429634]  ? __kthread_parkme+0x82/0x180
[   14.429653]  ? preempt_count_sub+0x50/0x80
[   14.429676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.429721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.429744]  kthread+0x337/0x6f0
[   14.429762]  ? trace_preempt_on+0x20/0xc0
[   14.429784]  ? __pfx_kthread+0x10/0x10
[   14.429804]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.429824]  ? calculate_sigpending+0x7b/0xa0
[   14.429863]  ? __pfx_kthread+0x10/0x10
[   14.429884]  ret_from_fork+0x116/0x1d0
[   14.429919]  ? __pfx_kthread+0x10/0x10
[   14.429939]  ret_from_fork_asm+0x1a/0x30
[   14.429969]  </TASK>
[   14.429978] 
[   14.437476] Allocated by task 283:
[   14.437604]  kasan_save_stack+0x45/0x70
[   14.437860]  kasan_save_track+0x18/0x40
[   14.438066]  kasan_save_alloc_info+0x3b/0x50
[   14.438288]  __kasan_kmalloc+0xb7/0xc0
[   14.438524]  __kmalloc_cache_noprof+0x189/0x420
[   14.438792]  kasan_atomics+0x95/0x310
[   14.438985]  kunit_try_run_case+0x1a5/0x480
[   14.439207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.439459]  kthread+0x337/0x6f0
[   14.439672]  ret_from_fork+0x116/0x1d0
[   14.439875]  ret_from_fork_asm+0x1a/0x30
[   14.440110] 
[   14.440187] The buggy address belongs to the object at ffff8881039b8880
[   14.440187]  which belongs to the cache kmalloc-64 of size 64
[   14.440923] The buggy address is located 0 bytes to the right of
[   14.440923]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.441466] 
[   14.441594] The buggy address belongs to the physical page:
[   14.441889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.442265] flags: 0x200000000000000(node=0|zone=2)
[   14.442589] page_type: f5(slab)
[   14.442777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.443123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.443499] page dumped because: kasan: bad access detected
[   14.443798] 
[   14.443902] Memory state around the buggy address:
[   14.444084]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.444293]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.444509] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.444713]                                      ^
[   14.444859]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445169]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445470] ==================================================================
[   15.042263] ==================================================================
[   15.042652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.043365] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.043676] 
[   15.043759] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.043801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.043813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.043837] Call Trace:
[   15.043850]  <TASK>
[   15.043865]  dump_stack_lvl+0x73/0xb0
[   15.043892]  print_report+0xd1/0x610
[   15.043915]  ? __virt_addr_valid+0x1db/0x2d0
[   15.043937]  ? kasan_atomics_helper+0x1217/0x5450
[   15.043958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.043980]  ? kasan_atomics_helper+0x1217/0x5450
[   15.044002]  kasan_report+0x141/0x180
[   15.044038]  ? kasan_atomics_helper+0x1217/0x5450
[   15.044093]  kasan_check_range+0x10c/0x1c0
[   15.044132]  __kasan_check_write+0x18/0x20
[   15.044152]  kasan_atomics_helper+0x1217/0x5450
[   15.044174]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.044198]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.044222]  ? kasan_atomics+0x152/0x310
[   15.044248]  kasan_atomics+0x1dc/0x310
[   15.044271]  ? __pfx_kasan_atomics+0x10/0x10
[   15.044294]  ? __pfx_read_tsc+0x10/0x10
[   15.044315]  ? ktime_get_ts64+0x86/0x230
[   15.044338]  kunit_try_run_case+0x1a5/0x480
[   15.044396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.044419]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.044441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.044466]  ? __kthread_parkme+0x82/0x180
[   15.044508]  ? preempt_count_sub+0x50/0x80
[   15.044531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.044556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.044579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.044602]  kthread+0x337/0x6f0
[   15.044622]  ? trace_preempt_on+0x20/0xc0
[   15.044644]  ? __pfx_kthread+0x10/0x10
[   15.044665]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.044687]  ? calculate_sigpending+0x7b/0xa0
[   15.044710]  ? __pfx_kthread+0x10/0x10
[   15.044731]  ret_from_fork+0x116/0x1d0
[   15.044749]  ? __pfx_kthread+0x10/0x10
[   15.044770]  ret_from_fork_asm+0x1a/0x30
[   15.044801]  </TASK>
[   15.044812] 
[   15.052132] Allocated by task 283:
[   15.052261]  kasan_save_stack+0x45/0x70
[   15.052475]  kasan_save_track+0x18/0x40
[   15.052733]  kasan_save_alloc_info+0x3b/0x50
[   15.052938]  __kasan_kmalloc+0xb7/0xc0
[   15.053145]  __kmalloc_cache_noprof+0x189/0x420
[   15.053446]  kasan_atomics+0x95/0x310
[   15.053683]  kunit_try_run_case+0x1a5/0x480
[   15.053862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.054242]  kthread+0x337/0x6f0
[   15.054374]  ret_from_fork+0x116/0x1d0
[   15.054506]  ret_from_fork_asm+0x1a/0x30
[   15.054845] 
[   15.054940] The buggy address belongs to the object at ffff8881039b8880
[   15.054940]  which belongs to the cache kmalloc-64 of size 64
[   15.055467] The buggy address is located 0 bytes to the right of
[   15.055467]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.055947] 
[   15.056090] The buggy address belongs to the physical page:
[   15.056337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.056642] flags: 0x200000000000000(node=0|zone=2)
[   15.056805] page_type: f5(slab)
[   15.056927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.057178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.057453] page dumped because: kasan: bad access detected
[   15.057627] 
[   15.057696] Memory state around the buggy address:
[   15.057849]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.058102]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.058445] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.058986]                                      ^
[   15.059482]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059823]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060147] ==================================================================
[   14.803681] ==================================================================
[   14.804059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.804510] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.804851] 
[   14.804958] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.805016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.805029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.805051] Call Trace:
[   14.805065]  <TASK>
[   14.805081]  dump_stack_lvl+0x73/0xb0
[   14.805108]  print_report+0xd1/0x610
[   14.805131]  ? __virt_addr_valid+0x1db/0x2d0
[   14.805154]  ? kasan_atomics_helper+0xc70/0x5450
[   14.805175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.805198]  ? kasan_atomics_helper+0xc70/0x5450
[   14.805219]  kasan_report+0x141/0x180
[   14.805241]  ? kasan_atomics_helper+0xc70/0x5450
[   14.805267]  kasan_check_range+0x10c/0x1c0
[   14.805290]  __kasan_check_write+0x18/0x20
[   14.805309]  kasan_atomics_helper+0xc70/0x5450
[   14.805332]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.805567]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.805600]  ? kasan_atomics+0x152/0x310
[   14.805626]  kasan_atomics+0x1dc/0x310
[   14.805649]  ? __pfx_kasan_atomics+0x10/0x10
[   14.805674]  ? __pfx_read_tsc+0x10/0x10
[   14.805694]  ? ktime_get_ts64+0x86/0x230
[   14.805719]  kunit_try_run_case+0x1a5/0x480
[   14.805743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.805765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.805789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.805813]  ? __kthread_parkme+0x82/0x180
[   14.805833]  ? preempt_count_sub+0x50/0x80
[   14.805856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.805881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.805904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.805928]  kthread+0x337/0x6f0
[   14.805947]  ? trace_preempt_on+0x20/0xc0
[   14.805970]  ? __pfx_kthread+0x10/0x10
[   14.805990]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.806025]  ? calculate_sigpending+0x7b/0xa0
[   14.806050]  ? __pfx_kthread+0x10/0x10
[   14.806071]  ret_from_fork+0x116/0x1d0
[   14.806089]  ? __pfx_kthread+0x10/0x10
[   14.806110]  ret_from_fork_asm+0x1a/0x30
[   14.806140]  </TASK>
[   14.806151] 
[   14.817140] Allocated by task 283:
[   14.817272]  kasan_save_stack+0x45/0x70
[   14.817419]  kasan_save_track+0x18/0x40
[   14.817555]  kasan_save_alloc_info+0x3b/0x50
[   14.817704]  __kasan_kmalloc+0xb7/0xc0
[   14.817837]  __kmalloc_cache_noprof+0x189/0x420
[   14.817993]  kasan_atomics+0x95/0x310
[   14.818210]  kunit_try_run_case+0x1a5/0x480
[   14.818633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.818888]  kthread+0x337/0x6f0
[   14.819312]  ret_from_fork+0x116/0x1d0
[   14.819761]  ret_from_fork_asm+0x1a/0x30
[   14.819964] 
[   14.820055] The buggy address belongs to the object at ffff8881039b8880
[   14.820055]  which belongs to the cache kmalloc-64 of size 64
[   14.820411] The buggy address is located 0 bytes to the right of
[   14.820411]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.820829] 
[   14.820927] The buggy address belongs to the physical page:
[   14.821204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.821829] flags: 0x200000000000000(node=0|zone=2)
[   14.822088] page_type: f5(slab)
[   14.822264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.823051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.823367] page dumped because: kasan: bad access detected
[   14.823604] 
[   14.823677] Memory state around the buggy address:
[   14.823899]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.824239]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.824557] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.824859]                                      ^
[   14.825200]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825560]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825936] ==================================================================
[   15.838641] ==================================================================
[   15.838963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.839487] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.839740] 
[   15.839844] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.839886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.839897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.839918] Call Trace:
[   15.839931]  <TASK>
[   15.839945]  dump_stack_lvl+0x73/0xb0
[   15.839972]  print_report+0xd1/0x610
[   15.839995]  ? __virt_addr_valid+0x1db/0x2d0
[   15.840027]  ? kasan_atomics_helper+0x224c/0x5450
[   15.840048]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.840070]  ? kasan_atomics_helper+0x224c/0x5450
[   15.840091]  kasan_report+0x141/0x180
[   15.840113]  ? kasan_atomics_helper+0x224c/0x5450
[   15.840140]  kasan_check_range+0x10c/0x1c0
[   15.840163]  __kasan_check_write+0x18/0x20
[   15.840182]  kasan_atomics_helper+0x224c/0x5450
[   15.840205]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.840227]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.840251]  ? kasan_atomics+0x152/0x310
[   15.840277]  kasan_atomics+0x1dc/0x310
[   15.840300]  ? __pfx_kasan_atomics+0x10/0x10
[   15.840324]  ? __pfx_read_tsc+0x10/0x10
[   15.840344]  ? ktime_get_ts64+0x86/0x230
[   15.840368]  kunit_try_run_case+0x1a5/0x480
[   15.840412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.840435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.840459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.840482]  ? __kthread_parkme+0x82/0x180
[   15.840502]  ? preempt_count_sub+0x50/0x80
[   15.840525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.840549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.840572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.840596]  kthread+0x337/0x6f0
[   15.840615]  ? trace_preempt_on+0x20/0xc0
[   15.840658]  ? __pfx_kthread+0x10/0x10
[   15.840679]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.840700]  ? calculate_sigpending+0x7b/0xa0
[   15.840723]  ? __pfx_kthread+0x10/0x10
[   15.840744]  ret_from_fork+0x116/0x1d0
[   15.840763]  ? __pfx_kthread+0x10/0x10
[   15.840783]  ret_from_fork_asm+0x1a/0x30
[   15.840814]  </TASK>
[   15.840824] 
[   15.850123] Allocated by task 283:
[   15.850295]  kasan_save_stack+0x45/0x70
[   15.851142]  kasan_save_track+0x18/0x40
[   15.851595]  kasan_save_alloc_info+0x3b/0x50
[   15.851824]  __kasan_kmalloc+0xb7/0xc0
[   15.852015]  __kmalloc_cache_noprof+0x189/0x420
[   15.852226]  kasan_atomics+0x95/0x310
[   15.852726]  kunit_try_run_case+0x1a5/0x480
[   15.853027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.853270]  kthread+0x337/0x6f0
[   15.853724]  ret_from_fork+0x116/0x1d0
[   15.853987]  ret_from_fork_asm+0x1a/0x30
[   15.854351] 
[   15.854458] The buggy address belongs to the object at ffff8881039b8880
[   15.854458]  which belongs to the cache kmalloc-64 of size 64
[   15.854935] The buggy address is located 0 bytes to the right of
[   15.854935]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.855846] 
[   15.855941] The buggy address belongs to the physical page:
[   15.856364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.856699] flags: 0x200000000000000(node=0|zone=2)
[   15.856922] page_type: f5(slab)
[   15.857103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.857754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.858271] page dumped because: kasan: bad access detected
[   15.858858] 
[   15.858964] Memory state around the buggy address:
[   15.859216]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.859457]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.859680] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.859895]                                      ^
[   15.860543]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.861176]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.861835] ==================================================================
[   15.233962] ==================================================================
[   15.234260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.235158] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.235635] 
[   15.235735] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.235777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.235790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.235811] Call Trace:
[   15.235825]  <TASK>
[   15.235840]  dump_stack_lvl+0x73/0xb0
[   15.235868]  print_report+0xd1/0x610
[   15.235892]  ? __virt_addr_valid+0x1db/0x2d0
[   15.235915]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.235936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.235959]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.235980]  kasan_report+0x141/0x180
[   15.236003]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.236202]  __asan_report_store8_noabort+0x1b/0x30
[   15.236228]  kasan_atomics_helper+0x50d4/0x5450
[   15.236251]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.236273]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.236298]  ? kasan_atomics+0x152/0x310
[   15.236324]  kasan_atomics+0x1dc/0x310
[   15.236347]  ? __pfx_kasan_atomics+0x10/0x10
[   15.236373]  ? __pfx_read_tsc+0x10/0x10
[   15.236394]  ? ktime_get_ts64+0x86/0x230
[   15.236434]  kunit_try_run_case+0x1a5/0x480
[   15.236458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.236481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.236505]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.236528]  ? __kthread_parkme+0x82/0x180
[   15.236548]  ? preempt_count_sub+0x50/0x80
[   15.236571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.236595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.236618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.236642]  kthread+0x337/0x6f0
[   15.236661]  ? trace_preempt_on+0x20/0xc0
[   15.236684]  ? __pfx_kthread+0x10/0x10
[   15.236706]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.236727]  ? calculate_sigpending+0x7b/0xa0
[   15.236752]  ? __pfx_kthread+0x10/0x10
[   15.236773]  ret_from_fork+0x116/0x1d0
[   15.236791]  ? __pfx_kthread+0x10/0x10
[   15.236812]  ret_from_fork_asm+0x1a/0x30
[   15.236842]  </TASK>
[   15.236853] 
[   15.248462] Allocated by task 283:
[   15.248887]  kasan_save_stack+0x45/0x70
[   15.249098]  kasan_save_track+0x18/0x40
[   15.249554]  kasan_save_alloc_info+0x3b/0x50
[   15.249912]  __kasan_kmalloc+0xb7/0xc0
[   15.250157]  __kmalloc_cache_noprof+0x189/0x420
[   15.250365]  kasan_atomics+0x95/0x310
[   15.250788]  kunit_try_run_case+0x1a5/0x480
[   15.251096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.251467]  kthread+0x337/0x6f0
[   15.251845]  ret_from_fork+0x116/0x1d0
[   15.252143]  ret_from_fork_asm+0x1a/0x30
[   15.252298] 
[   15.252394] The buggy address belongs to the object at ffff8881039b8880
[   15.252394]  which belongs to the cache kmalloc-64 of size 64
[   15.253354] The buggy address is located 0 bytes to the right of
[   15.253354]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.254173] 
[   15.254320] The buggy address belongs to the physical page:
[   15.254646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.255476] flags: 0x200000000000000(node=0|zone=2)
[   15.255929] page_type: f5(slab)
[   15.256137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.256876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.257313] page dumped because: kasan: bad access detected
[   15.257768] 
[   15.258017] Memory state around the buggy address:
[   15.258734]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.259058]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.259566] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.259885]                                      ^
[   15.260183]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.260672]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.261161] ==================================================================
[   15.005762] ==================================================================
[   15.006121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.006488] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.006758] 
[   15.006840] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.006880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.006891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.006912] Call Trace:
[   15.006925]  <TASK>
[   15.006939]  dump_stack_lvl+0x73/0xb0
[   15.006964]  print_report+0xd1/0x610
[   15.006986]  ? __virt_addr_valid+0x1db/0x2d0
[   15.007021]  ? kasan_atomics_helper+0x1148/0x5450
[   15.007043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.007066]  ? kasan_atomics_helper+0x1148/0x5450
[   15.007087]  kasan_report+0x141/0x180
[   15.007110]  ? kasan_atomics_helper+0x1148/0x5450
[   15.007136]  kasan_check_range+0x10c/0x1c0
[   15.007160]  __kasan_check_write+0x18/0x20
[   15.007180]  kasan_atomics_helper+0x1148/0x5450
[   15.007203]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.007225]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.007249]  ? kasan_atomics+0x152/0x310
[   15.007275]  kasan_atomics+0x1dc/0x310
[   15.007298]  ? __pfx_kasan_atomics+0x10/0x10
[   15.007321]  ? __pfx_read_tsc+0x10/0x10
[   15.007342]  ? ktime_get_ts64+0x86/0x230
[   15.007366]  kunit_try_run_case+0x1a5/0x480
[   15.007412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.007435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.007458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.007481]  ? __kthread_parkme+0x82/0x180
[   15.007501]  ? preempt_count_sub+0x50/0x80
[   15.007525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.007549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.007572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.007594]  kthread+0x337/0x6f0
[   15.007614]  ? trace_preempt_on+0x20/0xc0
[   15.007637]  ? __pfx_kthread+0x10/0x10
[   15.007657]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.007679]  ? calculate_sigpending+0x7b/0xa0
[   15.007702]  ? __pfx_kthread+0x10/0x10
[   15.007723]  ret_from_fork+0x116/0x1d0
[   15.007742]  ? __pfx_kthread+0x10/0x10
[   15.007763]  ret_from_fork_asm+0x1a/0x30
[   15.007794]  </TASK>
[   15.007804] 
[   15.015844] Allocated by task 283:
[   15.015974]  kasan_save_stack+0x45/0x70
[   15.016216]  kasan_save_track+0x18/0x40
[   15.016552]  kasan_save_alloc_info+0x3b/0x50
[   15.016762]  __kasan_kmalloc+0xb7/0xc0
[   15.016936]  __kmalloc_cache_noprof+0x189/0x420
[   15.017131]  kasan_atomics+0x95/0x310
[   15.017267]  kunit_try_run_case+0x1a5/0x480
[   15.017460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.017745]  kthread+0x337/0x6f0
[   15.017915]  ret_from_fork+0x116/0x1d0
[   15.018118]  ret_from_fork_asm+0x1a/0x30
[   15.018321] 
[   15.018424] The buggy address belongs to the object at ffff8881039b8880
[   15.018424]  which belongs to the cache kmalloc-64 of size 64
[   15.018914] The buggy address is located 0 bytes to the right of
[   15.018914]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.019434] 
[   15.019523] The buggy address belongs to the physical page:
[   15.019738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.019977] flags: 0x200000000000000(node=0|zone=2)
[   15.020219] page_type: f5(slab)
[   15.020409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.020761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.021194] page dumped because: kasan: bad access detected
[   15.021430] 
[   15.021566] Memory state around the buggy address:
[   15.021814]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.022059]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.022352] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.022675]                                      ^
[   15.022879]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.023108]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.023532] ==================================================================
[   14.910139] ==================================================================
[   14.910501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.910731] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.910955] 
[   14.911054] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.911094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.911106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.911128] Call Trace:
[   14.911141]  <TASK>
[   14.911155]  dump_stack_lvl+0x73/0xb0
[   14.911180]  print_report+0xd1/0x610
[   14.911201]  ? __virt_addr_valid+0x1db/0x2d0
[   14.911224]  ? kasan_atomics_helper+0xf10/0x5450
[   14.911245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.911267]  ? kasan_atomics_helper+0xf10/0x5450
[   14.911288]  kasan_report+0x141/0x180
[   14.911311]  ? kasan_atomics_helper+0xf10/0x5450
[   14.911337]  kasan_check_range+0x10c/0x1c0
[   14.911441]  __kasan_check_write+0x18/0x20
[   14.911461]  kasan_atomics_helper+0xf10/0x5450
[   14.911484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.911506]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.911531]  ? kasan_atomics+0x152/0x310
[   14.911557]  kasan_atomics+0x1dc/0x310
[   14.911580]  ? __pfx_kasan_atomics+0x10/0x10
[   14.911604]  ? __pfx_read_tsc+0x10/0x10
[   14.911625]  ? ktime_get_ts64+0x86/0x230
[   14.911650]  kunit_try_run_case+0x1a5/0x480
[   14.911674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.911697]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.911720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.911744]  ? __kthread_parkme+0x82/0x180
[   14.911764]  ? preempt_count_sub+0x50/0x80
[   14.911788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.911812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.911835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.911859]  kthread+0x337/0x6f0
[   14.911879]  ? trace_preempt_on+0x20/0xc0
[   14.911901]  ? __pfx_kthread+0x10/0x10
[   14.911922]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.911943]  ? calculate_sigpending+0x7b/0xa0
[   14.911967]  ? __pfx_kthread+0x10/0x10
[   14.911988]  ret_from_fork+0x116/0x1d0
[   14.912018]  ? __pfx_kthread+0x10/0x10
[   14.912039]  ret_from_fork_asm+0x1a/0x30
[   14.912069]  </TASK>
[   14.912079] 
[   14.920524] Allocated by task 283:
[   14.920716]  kasan_save_stack+0x45/0x70
[   14.920918]  kasan_save_track+0x18/0x40
[   14.921115]  kasan_save_alloc_info+0x3b/0x50
[   14.921330]  __kasan_kmalloc+0xb7/0xc0
[   14.921558]  __kmalloc_cache_noprof+0x189/0x420
[   14.921769]  kasan_atomics+0x95/0x310
[   14.921959]  kunit_try_run_case+0x1a5/0x480
[   14.922135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.922337]  kthread+0x337/0x6f0
[   14.922593]  ret_from_fork+0x116/0x1d0
[   14.922765]  ret_from_fork_asm+0x1a/0x30
[   14.922958] 
[   14.923054] The buggy address belongs to the object at ffff8881039b8880
[   14.923054]  which belongs to the cache kmalloc-64 of size 64
[   14.923609] The buggy address is located 0 bytes to the right of
[   14.923609]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.924105] 
[   14.924200] The buggy address belongs to the physical page:
[   14.924629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.924958] flags: 0x200000000000000(node=0|zone=2)
[   14.925197] page_type: f5(slab)
[   14.925343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.925713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.926062] page dumped because: kasan: bad access detected
[   14.926290] 
[   14.926463] Memory state around the buggy address:
[   14.926655]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.926950]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.927235] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.927577]                                      ^
[   14.927814]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928116]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928557] ==================================================================
[   15.390495] ==================================================================
[   15.390797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.391124] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.391873] 
[   15.391998] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.392070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.392083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.392104] Call Trace:
[   15.392116]  <TASK>
[   15.392146]  dump_stack_lvl+0x73/0xb0
[   15.392174]  print_report+0xd1/0x610
[   15.392196]  ? __virt_addr_valid+0x1db/0x2d0
[   15.392219]  ? kasan_atomics_helper+0x1818/0x5450
[   15.392240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.392262]  ? kasan_atomics_helper+0x1818/0x5450
[   15.392284]  kasan_report+0x141/0x180
[   15.392306]  ? kasan_atomics_helper+0x1818/0x5450
[   15.392332]  kasan_check_range+0x10c/0x1c0
[   15.392355]  __kasan_check_write+0x18/0x20
[   15.392374]  kasan_atomics_helper+0x1818/0x5450
[   15.392396]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.392419]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.392481]  ? kasan_atomics+0x152/0x310
[   15.392509]  kasan_atomics+0x1dc/0x310
[   15.392531]  ? __pfx_kasan_atomics+0x10/0x10
[   15.392555]  ? __pfx_read_tsc+0x10/0x10
[   15.392575]  ? ktime_get_ts64+0x86/0x230
[   15.392598]  kunit_try_run_case+0x1a5/0x480
[   15.392623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.392645]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.392668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.392691]  ? __kthread_parkme+0x82/0x180
[   15.392778]  ? preempt_count_sub+0x50/0x80
[   15.392804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.392828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.392852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.392875]  kthread+0x337/0x6f0
[   15.392894]  ? trace_preempt_on+0x20/0xc0
[   15.392918]  ? __pfx_kthread+0x10/0x10
[   15.392940]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.392962]  ? calculate_sigpending+0x7b/0xa0
[   15.392993]  ? __pfx_kthread+0x10/0x10
[   15.393026]  ret_from_fork+0x116/0x1d0
[   15.393045]  ? __pfx_kthread+0x10/0x10
[   15.393065]  ret_from_fork_asm+0x1a/0x30
[   15.393096]  </TASK>
[   15.393106] 
[   15.402024] Allocated by task 283:
[   15.402206]  kasan_save_stack+0x45/0x70
[   15.402560]  kasan_save_track+0x18/0x40
[   15.402793]  kasan_save_alloc_info+0x3b/0x50
[   15.402966]  __kasan_kmalloc+0xb7/0xc0
[   15.403188]  __kmalloc_cache_noprof+0x189/0x420
[   15.403483]  kasan_atomics+0x95/0x310
[   15.403672]  kunit_try_run_case+0x1a5/0x480
[   15.403934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.404206]  kthread+0x337/0x6f0
[   15.404454]  ret_from_fork+0x116/0x1d0
[   15.404639]  ret_from_fork_asm+0x1a/0x30
[   15.404841] 
[   15.404934] The buggy address belongs to the object at ffff8881039b8880
[   15.404934]  which belongs to the cache kmalloc-64 of size 64
[   15.405492] The buggy address is located 0 bytes to the right of
[   15.405492]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.405957] 
[   15.406065] The buggy address belongs to the physical page:
[   15.406313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.406661] flags: 0x200000000000000(node=0|zone=2)
[   15.406963] page_type: f5(slab)
[   15.407315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.407561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.408352] page dumped because: kasan: bad access detected
[   15.408693] 
[   15.408808] Memory state around the buggy address:
[   15.409081]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.409593]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.410225] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.411437]                                      ^
[   15.411636]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.411986]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.412327] ==================================================================
[   14.784684] ==================================================================
[   14.784917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.785169] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.785631] 
[   14.785725] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.785766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.785779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.785800] Call Trace:
[   14.785815]  <TASK>
[   14.785829]  dump_stack_lvl+0x73/0xb0
[   14.785858]  print_report+0xd1/0x610
[   14.785880]  ? __virt_addr_valid+0x1db/0x2d0
[   14.785902]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.785923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.785945]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.785966]  kasan_report+0x141/0x180
[   14.785988]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.786029]  kasan_check_range+0x10c/0x1c0
[   14.786052]  __kasan_check_write+0x18/0x20
[   14.786072]  kasan_atomics_helper+0xb6a/0x5450
[   14.786096]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.786118]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.786143]  ? kasan_atomics+0x152/0x310
[   14.786170]  kasan_atomics+0x1dc/0x310
[   14.786193]  ? __pfx_kasan_atomics+0x10/0x10
[   14.786217]  ? __pfx_read_tsc+0x10/0x10
[   14.786238]  ? ktime_get_ts64+0x86/0x230
[   14.786262]  kunit_try_run_case+0x1a5/0x480
[   14.786285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.786308]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.786331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.786446]  ? __kthread_parkme+0x82/0x180
[   14.786469]  ? preempt_count_sub+0x50/0x80
[   14.786494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.786518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.786541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.786565]  kthread+0x337/0x6f0
[   14.786584]  ? trace_preempt_on+0x20/0xc0
[   14.786607]  ? __pfx_kthread+0x10/0x10
[   14.786627]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.786650]  ? calculate_sigpending+0x7b/0xa0
[   14.786674]  ? __pfx_kthread+0x10/0x10
[   14.786696]  ret_from_fork+0x116/0x1d0
[   14.786714]  ? __pfx_kthread+0x10/0x10
[   14.786735]  ret_from_fork_asm+0x1a/0x30
[   14.786766]  </TASK>
[   14.786777] 
[   14.794864] Allocated by task 283:
[   14.794997]  kasan_save_stack+0x45/0x70
[   14.795192]  kasan_save_track+0x18/0x40
[   14.795329]  kasan_save_alloc_info+0x3b/0x50
[   14.795602]  __kasan_kmalloc+0xb7/0xc0
[   14.795792]  __kmalloc_cache_noprof+0x189/0x420
[   14.796021]  kasan_atomics+0x95/0x310
[   14.796206]  kunit_try_run_case+0x1a5/0x480
[   14.796487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.796745]  kthread+0x337/0x6f0
[   14.796913]  ret_from_fork+0x116/0x1d0
[   14.797125]  ret_from_fork_asm+0x1a/0x30
[   14.797324] 
[   14.797607] The buggy address belongs to the object at ffff8881039b8880
[   14.797607]  which belongs to the cache kmalloc-64 of size 64
[   14.798158] The buggy address is located 0 bytes to the right of
[   14.798158]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.798699] 
[   14.798777] The buggy address belongs to the physical page:
[   14.798948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.799318] flags: 0x200000000000000(node=0|zone=2)
[   14.799655] page_type: f5(slab)
[   14.799832] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.800188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.800564] page dumped because: kasan: bad access detected
[   14.800812] 
[   14.800890] Memory state around the buggy address:
[   14.801108]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.801626]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.801934] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.802239]                                      ^
[   14.802534]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.802760]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.802974] ==================================================================
[   15.560783] ==================================================================
[   15.561113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.561592] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.561907] 
[   15.561992] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.562043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.562055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.562077] Call Trace:
[   15.562091]  <TASK>
[   15.562104]  dump_stack_lvl+0x73/0xb0
[   15.562130]  print_report+0xd1/0x610
[   15.562152]  ? __virt_addr_valid+0x1db/0x2d0
[   15.562174]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.562196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.562218]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.562240]  kasan_report+0x141/0x180
[   15.562262]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.562311]  __asan_report_load8_noabort+0x18/0x20
[   15.562337]  kasan_atomics_helper+0x4f30/0x5450
[   15.562359]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.562381]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.562405]  ? kasan_atomics+0x152/0x310
[   15.562432]  kasan_atomics+0x1dc/0x310
[   15.562454]  ? __pfx_kasan_atomics+0x10/0x10
[   15.562477]  ? __pfx_read_tsc+0x10/0x10
[   15.562498]  ? ktime_get_ts64+0x86/0x230
[   15.562521]  kunit_try_run_case+0x1a5/0x480
[   15.562547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.562569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.562592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.562615]  ? __kthread_parkme+0x82/0x180
[   15.562635]  ? preempt_count_sub+0x50/0x80
[   15.562659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.562682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.562897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.562923]  kthread+0x337/0x6f0
[   15.562943]  ? trace_preempt_on+0x20/0xc0
[   15.562967]  ? __pfx_kthread+0x10/0x10
[   15.562988]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.563021]  ? calculate_sigpending+0x7b/0xa0
[   15.563044]  ? __pfx_kthread+0x10/0x10
[   15.563066]  ret_from_fork+0x116/0x1d0
[   15.563085]  ? __pfx_kthread+0x10/0x10
[   15.563105]  ret_from_fork_asm+0x1a/0x30
[   15.563136]  </TASK>
[   15.563147] 
[   15.571939] Allocated by task 283:
[   15.572121]  kasan_save_stack+0x45/0x70
[   15.572317]  kasan_save_track+0x18/0x40
[   15.572614]  kasan_save_alloc_info+0x3b/0x50
[   15.572820]  __kasan_kmalloc+0xb7/0xc0
[   15.573023]  __kmalloc_cache_noprof+0x189/0x420
[   15.573241]  kasan_atomics+0x95/0x310
[   15.573539]  kunit_try_run_case+0x1a5/0x480
[   15.573717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.573888]  kthread+0x337/0x6f0
[   15.574017]  ret_from_fork+0x116/0x1d0
[   15.574203]  ret_from_fork_asm+0x1a/0x30
[   15.574526] 
[   15.574630] The buggy address belongs to the object at ffff8881039b8880
[   15.574630]  which belongs to the cache kmalloc-64 of size 64
[   15.575230] The buggy address is located 0 bytes to the right of
[   15.575230]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.575974] 
[   15.576092] The buggy address belongs to the physical page:
[   15.576299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.576837] flags: 0x200000000000000(node=0|zone=2)
[   15.577026] page_type: f5(slab)
[   15.577272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.577811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.578056] page dumped because: kasan: bad access detected
[   15.578228] 
[   15.578297] Memory state around the buggy address:
[   15.578638]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.579306]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.579959] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.580280]                                      ^
[   15.580613]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.580835]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.581071] ==================================================================
[   15.702574] ==================================================================
[   15.702908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.703251] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.703661] 
[   15.703772] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.703815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.703828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.703848] Call Trace:
[   15.703862]  <TASK>
[   15.703875]  dump_stack_lvl+0x73/0xb0
[   15.703903]  print_report+0xd1/0x610
[   15.703925]  ? __virt_addr_valid+0x1db/0x2d0
[   15.703948]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.703969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.703991]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.704024]  kasan_report+0x141/0x180
[   15.704046]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.704073]  __asan_report_load8_noabort+0x18/0x20
[   15.704097]  kasan_atomics_helper+0x4f71/0x5450
[   15.704120]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.704144]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.704170]  ? kasan_atomics+0x152/0x310
[   15.704197]  kasan_atomics+0x1dc/0x310
[   15.704220]  ? __pfx_kasan_atomics+0x10/0x10
[   15.704244]  ? __pfx_read_tsc+0x10/0x10
[   15.704264]  ? ktime_get_ts64+0x86/0x230
[   15.704288]  kunit_try_run_case+0x1a5/0x480
[   15.704312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.704334]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.704436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.704461]  ? __kthread_parkme+0x82/0x180
[   15.704482]  ? preempt_count_sub+0x50/0x80
[   15.704505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.704530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.704554]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.704577]  kthread+0x337/0x6f0
[   15.704597]  ? trace_preempt_on+0x20/0xc0
[   15.704620]  ? __pfx_kthread+0x10/0x10
[   15.704641]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.704663]  ? calculate_sigpending+0x7b/0xa0
[   15.704686]  ? __pfx_kthread+0x10/0x10
[   15.704708]  ret_from_fork+0x116/0x1d0
[   15.704727]  ? __pfx_kthread+0x10/0x10
[   15.704747]  ret_from_fork_asm+0x1a/0x30
[   15.704778]  </TASK>
[   15.704788] 
[   15.712817] Allocated by task 283:
[   15.712994]  kasan_save_stack+0x45/0x70
[   15.713156]  kasan_save_track+0x18/0x40
[   15.713526]  kasan_save_alloc_info+0x3b/0x50
[   15.713750]  __kasan_kmalloc+0xb7/0xc0
[   15.713944]  __kmalloc_cache_noprof+0x189/0x420
[   15.714150]  kasan_atomics+0x95/0x310
[   15.714329]  kunit_try_run_case+0x1a5/0x480
[   15.714601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.714857]  kthread+0x337/0x6f0
[   15.714986]  ret_from_fork+0x116/0x1d0
[   15.715131]  ret_from_fork_asm+0x1a/0x30
[   15.715270] 
[   15.715342] The buggy address belongs to the object at ffff8881039b8880
[   15.715342]  which belongs to the cache kmalloc-64 of size 64
[   15.715772] The buggy address is located 0 bytes to the right of
[   15.715772]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.716226] 
[   15.716323] The buggy address belongs to the physical page:
[   15.716651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.717018] flags: 0x200000000000000(node=0|zone=2)
[   15.717250] page_type: f5(slab)
[   15.717619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.717964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.718316] page dumped because: kasan: bad access detected
[   15.718650] 
[   15.718748] Memory state around the buggy address:
[   15.718973]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.719307]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.719657] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.719936]                                      ^
[   15.720154]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.720519]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.720782] ==================================================================
[   14.473631] ==================================================================
[   14.474388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.475227] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.476031] 
[   14.476200] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.476241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.476252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.476275] Call Trace:
[   14.476289]  <TASK>
[   14.476304]  dump_stack_lvl+0x73/0xb0
[   14.476342]  print_report+0xd1/0x610
[   14.476364]  ? __virt_addr_valid+0x1db/0x2d0
[   14.476386]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.476419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.476442]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.476463]  kasan_report+0x141/0x180
[   14.476486]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.476512]  __asan_report_store4_noabort+0x1b/0x30
[   14.476555]  kasan_atomics_helper+0x4b6e/0x5450
[   14.476595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.476617]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.476642]  ? kasan_atomics+0x152/0x310
[   14.476668]  kasan_atomics+0x1dc/0x310
[   14.476691]  ? __pfx_kasan_atomics+0x10/0x10
[   14.476715]  ? __pfx_read_tsc+0x10/0x10
[   14.476735]  ? ktime_get_ts64+0x86/0x230
[   14.476759]  kunit_try_run_case+0x1a5/0x480
[   14.476782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.476805]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.476827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.476851]  ? __kthread_parkme+0x82/0x180
[   14.476871]  ? preempt_count_sub+0x50/0x80
[   14.476894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.476918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.476941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.476965]  kthread+0x337/0x6f0
[   14.476989]  ? trace_preempt_on+0x20/0xc0
[   14.477021]  ? __pfx_kthread+0x10/0x10
[   14.477043]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.477065]  ? calculate_sigpending+0x7b/0xa0
[   14.477089]  ? __pfx_kthread+0x10/0x10
[   14.477110]  ret_from_fork+0x116/0x1d0
[   14.477129]  ? __pfx_kthread+0x10/0x10
[   14.477150]  ret_from_fork_asm+0x1a/0x30
[   14.477180]  </TASK>
[   14.477190] 
[   14.492080] Allocated by task 283:
[   14.492435]  kasan_save_stack+0x45/0x70
[   14.492752]  kasan_save_track+0x18/0x40
[   14.492891]  kasan_save_alloc_info+0x3b/0x50
[   14.493060]  __kasan_kmalloc+0xb7/0xc0
[   14.493193]  __kmalloc_cache_noprof+0x189/0x420
[   14.493347]  kasan_atomics+0x95/0x310
[   14.493541]  kunit_try_run_case+0x1a5/0x480
[   14.493957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.494483]  kthread+0x337/0x6f0
[   14.494736]  ret_from_fork+0x116/0x1d0
[   14.494869]  ret_from_fork_asm+0x1a/0x30
[   14.495017] 
[   14.495087] The buggy address belongs to the object at ffff8881039b8880
[   14.495087]  which belongs to the cache kmalloc-64 of size 64
[   14.495512] The buggy address is located 0 bytes to the right of
[   14.495512]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.496843] 
[   14.497030] The buggy address belongs to the physical page:
[   14.497533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.498000] flags: 0x200000000000000(node=0|zone=2)
[   14.498461] page_type: f5(slab)
[   14.498781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.499333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.500037] page dumped because: kasan: bad access detected
[   14.500499] 
[   14.500711] Memory state around the buggy address:
[   14.501090]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.501627]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.502276] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.502985]                                      ^
[   14.503487]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.504183]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.504761] ==================================================================
[   14.595366] ==================================================================
[   14.595727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.595954] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.596192] 
[   14.596274] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.596315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.596327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.596347] Call Trace:
[   14.596360]  <TASK>
[   14.596374]  dump_stack_lvl+0x73/0xb0
[   14.596399]  print_report+0xd1/0x610
[   14.596421]  ? __virt_addr_valid+0x1db/0x2d0
[   14.596443]  ? kasan_atomics_helper+0x565/0x5450
[   14.596463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.596485]  ? kasan_atomics_helper+0x565/0x5450
[   14.596506]  kasan_report+0x141/0x180
[   14.596529]  ? kasan_atomics_helper+0x565/0x5450
[   14.596554]  kasan_check_range+0x10c/0x1c0
[   14.596577]  __kasan_check_write+0x18/0x20
[   14.596598]  kasan_atomics_helper+0x565/0x5450
[   14.596620]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.596642]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.596666]  ? kasan_atomics+0x152/0x310
[   14.596691]  kasan_atomics+0x1dc/0x310
[   14.596714]  ? __pfx_kasan_atomics+0x10/0x10
[   14.596738]  ? __pfx_read_tsc+0x10/0x10
[   14.596759]  ? ktime_get_ts64+0x86/0x230
[   14.596782]  kunit_try_run_case+0x1a5/0x480
[   14.596806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.596828]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.596851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.596924]  ? __kthread_parkme+0x82/0x180
[   14.596944]  ? preempt_count_sub+0x50/0x80
[   14.596973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.596997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.597030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.597054]  kthread+0x337/0x6f0
[   14.597073]  ? trace_preempt_on+0x20/0xc0
[   14.597095]  ? __pfx_kthread+0x10/0x10
[   14.597115]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.597137]  ? calculate_sigpending+0x7b/0xa0
[   14.597159]  ? __pfx_kthread+0x10/0x10
[   14.597181]  ret_from_fork+0x116/0x1d0
[   14.597198]  ? __pfx_kthread+0x10/0x10
[   14.597219]  ret_from_fork_asm+0x1a/0x30
[   14.597249]  </TASK>
[   14.597259] 
[   14.606193] Allocated by task 283:
[   14.606322]  kasan_save_stack+0x45/0x70
[   14.606648]  kasan_save_track+0x18/0x40
[   14.606974]  kasan_save_alloc_info+0x3b/0x50
[   14.607198]  __kasan_kmalloc+0xb7/0xc0
[   14.607392]  __kmalloc_cache_noprof+0x189/0x420
[   14.607614]  kasan_atomics+0x95/0x310
[   14.607774]  kunit_try_run_case+0x1a5/0x480
[   14.607921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.608104]  kthread+0x337/0x6f0
[   14.608226]  ret_from_fork+0x116/0x1d0
[   14.608358]  ret_from_fork_asm+0x1a/0x30
[   14.608652] 
[   14.608768] The buggy address belongs to the object at ffff8881039b8880
[   14.608768]  which belongs to the cache kmalloc-64 of size 64
[   14.609320] The buggy address is located 0 bytes to the right of
[   14.609320]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.610248] 
[   14.610319] The buggy address belongs to the physical page:
[   14.610489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.610727] flags: 0x200000000000000(node=0|zone=2)
[   14.610887] page_type: f5(slab)
[   14.611012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.611240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.611464] page dumped because: kasan: bad access detected
[   14.611634] 
[   14.611702] Memory state around the buggy address:
[   14.612024]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.612716]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.613438] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.613770]                                      ^
[   14.613994]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.614318]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.614625] ==================================================================
[   15.767807] ==================================================================
[   15.768133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.768389] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.768812] 
[   15.768919] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.768962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.768980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.769002] Call Trace:
[   15.769026]  <TASK>
[   15.769041]  dump_stack_lvl+0x73/0xb0
[   15.769068]  print_report+0xd1/0x610
[   15.769089]  ? __virt_addr_valid+0x1db/0x2d0
[   15.769111]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.769132]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.769154]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.769176]  kasan_report+0x141/0x180
[   15.769197]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.769224]  kasan_check_range+0x10c/0x1c0
[   15.769248]  __kasan_check_write+0x18/0x20
[   15.769267]  kasan_atomics_helper+0x20c8/0x5450
[   15.769290]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.769312]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.769336]  ? kasan_atomics+0x152/0x310
[   15.769362]  kasan_atomics+0x1dc/0x310
[   15.769384]  ? __pfx_kasan_atomics+0x10/0x10
[   15.769434]  ? __pfx_read_tsc+0x10/0x10
[   15.769456]  ? ktime_get_ts64+0x86/0x230
[   15.769481]  kunit_try_run_case+0x1a5/0x480
[   15.769505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.769527]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.769550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.769573]  ? __kthread_parkme+0x82/0x180
[   15.769593]  ? preempt_count_sub+0x50/0x80
[   15.769616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.769640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.769664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.769690]  kthread+0x337/0x6f0
[   15.769709]  ? trace_preempt_on+0x20/0xc0
[   15.769731]  ? __pfx_kthread+0x10/0x10
[   15.769752]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.769773]  ? calculate_sigpending+0x7b/0xa0
[   15.769796]  ? __pfx_kthread+0x10/0x10
[   15.769818]  ret_from_fork+0x116/0x1d0
[   15.769836]  ? __pfx_kthread+0x10/0x10
[   15.769857]  ret_from_fork_asm+0x1a/0x30
[   15.769888]  </TASK>
[   15.769898] 
[   15.777635] Allocated by task 283:
[   15.778023]  kasan_save_stack+0x45/0x70
[   15.778225]  kasan_save_track+0x18/0x40
[   15.778413]  kasan_save_alloc_info+0x3b/0x50
[   15.778626]  __kasan_kmalloc+0xb7/0xc0
[   15.778978]  __kmalloc_cache_noprof+0x189/0x420
[   15.779144]  kasan_atomics+0x95/0x310
[   15.779277]  kunit_try_run_case+0x1a5/0x480
[   15.779504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.779761]  kthread+0x337/0x6f0
[   15.779949]  ret_from_fork+0x116/0x1d0
[   15.780150]  ret_from_fork_asm+0x1a/0x30
[   15.780363] 
[   15.780503] The buggy address belongs to the object at ffff8881039b8880
[   15.780503]  which belongs to the cache kmalloc-64 of size 64
[   15.780939] The buggy address is located 0 bytes to the right of
[   15.780939]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.781499] 
[   15.781615] The buggy address belongs to the physical page:
[   15.781842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.782157] flags: 0x200000000000000(node=0|zone=2)
[   15.782426] page_type: f5(slab)
[   15.782592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.782900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.783167] page dumped because: kasan: bad access detected
[   15.783338] 
[   15.783408] Memory state around the buggy address:
[   15.783561]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.783779]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.784502] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.784817]                                      ^
[   15.785053]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.785367]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.785662] ==================================================================
[   14.969589] ==================================================================
[   14.970031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.970368] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.970671] 
[   14.970754] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.970794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.970806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.970826] Call Trace:
[   14.970839]  <TASK>
[   14.970854]  dump_stack_lvl+0x73/0xb0
[   14.970880]  print_report+0xd1/0x610
[   14.970903]  ? __virt_addr_valid+0x1db/0x2d0
[   14.970925]  ? kasan_atomics_helper+0x1079/0x5450
[   14.970946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.970968]  ? kasan_atomics_helper+0x1079/0x5450
[   14.970990]  kasan_report+0x141/0x180
[   14.971022]  ? kasan_atomics_helper+0x1079/0x5450
[   14.971048]  kasan_check_range+0x10c/0x1c0
[   14.971072]  __kasan_check_write+0x18/0x20
[   14.971091]  kasan_atomics_helper+0x1079/0x5450
[   14.971113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.971136]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.971160]  ? kasan_atomics+0x152/0x310
[   14.971186]  kasan_atomics+0x1dc/0x310
[   14.971208]  ? __pfx_kasan_atomics+0x10/0x10
[   14.971232]  ? __pfx_read_tsc+0x10/0x10
[   14.971252]  ? ktime_get_ts64+0x86/0x230
[   14.971276]  kunit_try_run_case+0x1a5/0x480
[   14.971300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.971323]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.971345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.971368]  ? __kthread_parkme+0x82/0x180
[   14.971411]  ? preempt_count_sub+0x50/0x80
[   14.971436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.971461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.971485]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.971509]  kthread+0x337/0x6f0
[   14.971529]  ? trace_preempt_on+0x20/0xc0
[   14.971552]  ? __pfx_kthread+0x10/0x10
[   14.971572]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.971595]  ? calculate_sigpending+0x7b/0xa0
[   14.971619]  ? __pfx_kthread+0x10/0x10
[   14.971640]  ret_from_fork+0x116/0x1d0
[   14.971659]  ? __pfx_kthread+0x10/0x10
[   14.971698]  ret_from_fork_asm+0x1a/0x30
[   14.971729]  </TASK>
[   14.971739] 
[   14.979230] Allocated by task 283:
[   14.979416]  kasan_save_stack+0x45/0x70
[   14.979718]  kasan_save_track+0x18/0x40
[   14.979913]  kasan_save_alloc_info+0x3b/0x50
[   14.980142]  __kasan_kmalloc+0xb7/0xc0
[   14.980336]  __kmalloc_cache_noprof+0x189/0x420
[   14.980559]  kasan_atomics+0x95/0x310
[   14.980740]  kunit_try_run_case+0x1a5/0x480
[   14.980886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.981242]  kthread+0x337/0x6f0
[   14.981573]  ret_from_fork+0x116/0x1d0
[   14.981761]  ret_from_fork_asm+0x1a/0x30
[   14.981907] 
[   14.982003] The buggy address belongs to the object at ffff8881039b8880
[   14.982003]  which belongs to the cache kmalloc-64 of size 64
[   14.982415] The buggy address is located 0 bytes to the right of
[   14.982415]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.983377] 
[   14.983468] The buggy address belongs to the physical page:
[   14.983727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.984056] flags: 0x200000000000000(node=0|zone=2)
[   14.984275] page_type: f5(slab)
[   14.984438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.984690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.984957] page dumped because: kasan: bad access detected
[   14.985487] 
[   14.985585] Memory state around the buggy address:
[   14.985757]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.986057]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.986334] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.986621]                                      ^
[   14.986819]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987174]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987482] ==================================================================
[   14.848068] ==================================================================
[   14.848593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.848892] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.849315] 
[   14.849437] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.849509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.849522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.849544] Call Trace:
[   14.849557]  <TASK>
[   14.849570]  dump_stack_lvl+0x73/0xb0
[   14.849612]  print_report+0xd1/0x610
[   14.849647]  ? __virt_addr_valid+0x1db/0x2d0
[   14.849669]  ? kasan_atomics_helper+0xd47/0x5450
[   14.849690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.849713]  ? kasan_atomics_helper+0xd47/0x5450
[   14.849738]  kasan_report+0x141/0x180
[   14.849760]  ? kasan_atomics_helper+0xd47/0x5450
[   14.849787]  kasan_check_range+0x10c/0x1c0
[   14.849811]  __kasan_check_write+0x18/0x20
[   14.849830]  kasan_atomics_helper+0xd47/0x5450
[   14.849853]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.849876]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.849900]  ? kasan_atomics+0x152/0x310
[   14.849942]  kasan_atomics+0x1dc/0x310
[   14.849965]  ? __pfx_kasan_atomics+0x10/0x10
[   14.849989]  ? __pfx_read_tsc+0x10/0x10
[   14.850020]  ? ktime_get_ts64+0x86/0x230
[   14.850045]  kunit_try_run_case+0x1a5/0x480
[   14.850068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.850091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.850114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.850138]  ? __kthread_parkme+0x82/0x180
[   14.850158]  ? preempt_count_sub+0x50/0x80
[   14.850181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.850207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.850231]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.850255]  kthread+0x337/0x6f0
[   14.850274]  ? trace_preempt_on+0x20/0xc0
[   14.850312]  ? __pfx_kthread+0x10/0x10
[   14.850334]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.850356]  ? calculate_sigpending+0x7b/0xa0
[   14.850379]  ? __pfx_kthread+0x10/0x10
[   14.850401]  ret_from_fork+0x116/0x1d0
[   14.850420]  ? __pfx_kthread+0x10/0x10
[   14.850440]  ret_from_fork_asm+0x1a/0x30
[   14.850470]  </TASK>
[   14.850481] 
[   14.863025] Allocated by task 283:
[   14.863364]  kasan_save_stack+0x45/0x70
[   14.863801]  kasan_save_track+0x18/0x40
[   14.864247]  kasan_save_alloc_info+0x3b/0x50
[   14.864566]  __kasan_kmalloc+0xb7/0xc0
[   14.864892]  __kmalloc_cache_noprof+0x189/0x420
[   14.865350]  kasan_atomics+0x95/0x310
[   14.865544]  kunit_try_run_case+0x1a5/0x480
[   14.865694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.865955]  kthread+0x337/0x6f0
[   14.866109]  ret_from_fork+0x116/0x1d0
[   14.866284]  ret_from_fork_asm+0x1a/0x30
[   14.866491] 
[   14.866565] The buggy address belongs to the object at ffff8881039b8880
[   14.866565]  which belongs to the cache kmalloc-64 of size 64
[   14.867016] The buggy address is located 0 bytes to the right of
[   14.867016]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.867655] 
[   14.867738] The buggy address belongs to the physical page:
[   14.867990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.868357] flags: 0x200000000000000(node=0|zone=2)
[   14.868708] page_type: f5(slab)
[   14.868839] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.869171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.869400] page dumped because: kasan: bad access detected
[   14.869769] 
[   14.869862] Memory state around the buggy address:
[   14.870064]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.870461]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.870778] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.871016]                                      ^
[   14.871173]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.871454]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.871776] ==================================================================
[   15.178106] ==================================================================
[   15.179025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.180191] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.180962] 
[   15.181070] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.181116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.181129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.181150] Call Trace:
[   15.181166]  <TASK>
[   15.181180]  dump_stack_lvl+0x73/0xb0
[   15.181209]  print_report+0xd1/0x610
[   15.181232]  ? __virt_addr_valid+0x1db/0x2d0
[   15.181253]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.181273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.181295]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.181316]  kasan_report+0x141/0x180
[   15.181338]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.181378]  __asan_report_load8_noabort+0x18/0x20
[   15.181413]  kasan_atomics_helper+0x4eae/0x5450
[   15.181435]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.181456]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.181481]  ? kasan_atomics+0x152/0x310
[   15.181506]  kasan_atomics+0x1dc/0x310
[   15.181528]  ? __pfx_kasan_atomics+0x10/0x10
[   15.181552]  ? __pfx_read_tsc+0x10/0x10
[   15.181573]  ? ktime_get_ts64+0x86/0x230
[   15.181596]  kunit_try_run_case+0x1a5/0x480
[   15.181619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181651]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.181807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.181836]  ? __kthread_parkme+0x82/0x180
[   15.181856]  ? preempt_count_sub+0x50/0x80
[   15.181880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.181928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.181952]  kthread+0x337/0x6f0
[   15.181971]  ? trace_preempt_on+0x20/0xc0
[   15.181995]  ? __pfx_kthread+0x10/0x10
[   15.182029]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.182050]  ? calculate_sigpending+0x7b/0xa0
[   15.182074]  ? __pfx_kthread+0x10/0x10
[   15.182095]  ret_from_fork+0x116/0x1d0
[   15.182113]  ? __pfx_kthread+0x10/0x10
[   15.182134]  ret_from_fork_asm+0x1a/0x30
[   15.182164]  </TASK>
[   15.182176] 
[   15.194931] Allocated by task 283:
[   15.195092]  kasan_save_stack+0x45/0x70
[   15.195442]  kasan_save_track+0x18/0x40
[   15.195773]  kasan_save_alloc_info+0x3b/0x50
[   15.196205]  __kasan_kmalloc+0xb7/0xc0
[   15.196366]  __kmalloc_cache_noprof+0x189/0x420
[   15.196799]  kasan_atomics+0x95/0x310
[   15.197077]  kunit_try_run_case+0x1a5/0x480
[   15.197347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.197698]  kthread+0x337/0x6f0
[   15.197878]  ret_from_fork+0x116/0x1d0
[   15.198194]  ret_from_fork_asm+0x1a/0x30
[   15.198543] 
[   15.198655] The buggy address belongs to the object at ffff8881039b8880
[   15.198655]  which belongs to the cache kmalloc-64 of size 64
[   15.199264] The buggy address is located 0 bytes to the right of
[   15.199264]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.200041] 
[   15.200145] The buggy address belongs to the physical page:
[   15.200319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.200694] flags: 0x200000000000000(node=0|zone=2)
[   15.201262] page_type: f5(slab)
[   15.201669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.201993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.202316] page dumped because: kasan: bad access detected
[   15.202821] 
[   15.203090] Memory state around the buggy address:
[   15.203322]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.203990]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.204288] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.204976]                                      ^
[   15.205209]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.205723]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.206173] ==================================================================
[   15.804500] ==================================================================
[   15.804786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.805141] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.805515] 
[   15.805611] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.805651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.805663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.805684] Call Trace:
[   15.805696]  <TASK>
[   15.805710]  dump_stack_lvl+0x73/0xb0
[   15.805736]  print_report+0xd1/0x610
[   15.805759]  ? __virt_addr_valid+0x1db/0x2d0
[   15.805781]  ? kasan_atomics_helper+0x218a/0x5450
[   15.805801]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.805847]  ? kasan_atomics_helper+0x218a/0x5450
[   15.805869]  kasan_report+0x141/0x180
[   15.805890]  ? kasan_atomics_helper+0x218a/0x5450
[   15.805917]  kasan_check_range+0x10c/0x1c0
[   15.805941]  __kasan_check_write+0x18/0x20
[   15.805961]  kasan_atomics_helper+0x218a/0x5450
[   15.806001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.806033]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.806057]  ? kasan_atomics+0x152/0x310
[   15.806083]  kasan_atomics+0x1dc/0x310
[   15.806105]  ? __pfx_kasan_atomics+0x10/0x10
[   15.806130]  ? __pfx_read_tsc+0x10/0x10
[   15.806151]  ? ktime_get_ts64+0x86/0x230
[   15.806175]  kunit_try_run_case+0x1a5/0x480
[   15.806199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.806221]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.806243]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.806267]  ? __kthread_parkme+0x82/0x180
[   15.806307]  ? preempt_count_sub+0x50/0x80
[   15.806330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.806354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.806396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.806420]  kthread+0x337/0x6f0
[   15.806440]  ? trace_preempt_on+0x20/0xc0
[   15.806462]  ? __pfx_kthread+0x10/0x10
[   15.806483]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.806504]  ? calculate_sigpending+0x7b/0xa0
[   15.806527]  ? __pfx_kthread+0x10/0x10
[   15.806549]  ret_from_fork+0x116/0x1d0
[   15.806567]  ? __pfx_kthread+0x10/0x10
[   15.806587]  ret_from_fork_asm+0x1a/0x30
[   15.806618]  </TASK>
[   15.806628] 
[   15.813844] Allocated by task 283:
[   15.814023]  kasan_save_stack+0x45/0x70
[   15.814218]  kasan_save_track+0x18/0x40
[   15.814350]  kasan_save_alloc_info+0x3b/0x50
[   15.814513]  __kasan_kmalloc+0xb7/0xc0
[   15.814642]  __kmalloc_cache_noprof+0x189/0x420
[   15.814792]  kasan_atomics+0x95/0x310
[   15.814919]  kunit_try_run_case+0x1a5/0x480
[   15.815097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.815341]  kthread+0x337/0x6f0
[   15.815552]  ret_from_fork+0x116/0x1d0
[   15.815739]  ret_from_fork_asm+0x1a/0x30
[   15.815937] 
[   15.816040] The buggy address belongs to the object at ffff8881039b8880
[   15.816040]  which belongs to the cache kmalloc-64 of size 64
[   15.816583] The buggy address is located 0 bytes to the right of
[   15.816583]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.817040] 
[   15.817114] The buggy address belongs to the physical page:
[   15.817366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.817756] flags: 0x200000000000000(node=0|zone=2)
[   15.817997] page_type: f5(slab)
[   15.818158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.818485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.818788] page dumped because: kasan: bad access detected
[   15.819064] 
[   15.819137] Memory state around the buggy address:
[   15.819292]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.819529]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.819747] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.820091]                                      ^
[   15.820306]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820641]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820947] ==================================================================
[   15.090116] ==================================================================
[   15.091346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.091631] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.091859] 
[   15.091944] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.091988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.092000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.092040] Call Trace:
[   15.092053]  <TASK>
[   15.092068]  dump_stack_lvl+0x73/0xb0
[   15.092095]  print_report+0xd1/0x610
[   15.092117]  ? __virt_addr_valid+0x1db/0x2d0
[   15.092139]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.092161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.092183]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.092204]  kasan_report+0x141/0x180
[   15.092226]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.092252]  kasan_check_range+0x10c/0x1c0
[   15.092275]  __kasan_check_write+0x18/0x20
[   15.092295]  kasan_atomics_helper+0x12e6/0x5450
[   15.092317]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.092340]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.092364]  ? kasan_atomics+0x152/0x310
[   15.092390]  kasan_atomics+0x1dc/0x310
[   15.092413]  ? __pfx_kasan_atomics+0x10/0x10
[   15.092437]  ? __pfx_read_tsc+0x10/0x10
[   15.092459]  ? ktime_get_ts64+0x86/0x230
[   15.092483]  kunit_try_run_case+0x1a5/0x480
[   15.092507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.092529]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.092552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.092576]  ? __kthread_parkme+0x82/0x180
[   15.092595]  ? preempt_count_sub+0x50/0x80
[   15.092619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.092642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.092676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.092700]  kthread+0x337/0x6f0
[   15.092719]  ? trace_preempt_on+0x20/0xc0
[   15.092754]  ? __pfx_kthread+0x10/0x10
[   15.092775]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.092797]  ? calculate_sigpending+0x7b/0xa0
[   15.092820]  ? __pfx_kthread+0x10/0x10
[   15.092841]  ret_from_fork+0x116/0x1d0
[   15.092859]  ? __pfx_kthread+0x10/0x10
[   15.092880]  ret_from_fork_asm+0x1a/0x30
[   15.092910]  </TASK>
[   15.092921] 
[   15.108244] Allocated by task 283:
[   15.108588]  kasan_save_stack+0x45/0x70
[   15.109061]  kasan_save_track+0x18/0x40
[   15.109418]  kasan_save_alloc_info+0x3b/0x50
[   15.109872]  __kasan_kmalloc+0xb7/0xc0
[   15.110247]  __kmalloc_cache_noprof+0x189/0x420
[   15.110789]  kasan_atomics+0x95/0x310
[   15.111263]  kunit_try_run_case+0x1a5/0x480
[   15.111643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.112200]  kthread+0x337/0x6f0
[   15.112322]  ret_from_fork+0x116/0x1d0
[   15.112687]  ret_from_fork_asm+0x1a/0x30
[   15.113061] 
[   15.113143] The buggy address belongs to the object at ffff8881039b8880
[   15.113143]  which belongs to the cache kmalloc-64 of size 64
[   15.113922] The buggy address is located 0 bytes to the right of
[   15.113922]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.114306] 
[   15.114381] The buggy address belongs to the physical page:
[   15.114571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.115089] flags: 0x200000000000000(node=0|zone=2)
[   15.115523] page_type: f5(slab)
[   15.115806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.116647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.117121] page dumped because: kasan: bad access detected
[   15.117300] 
[   15.117370] Memory state around the buggy address:
[   15.117818]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.118515]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.119276] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.119911]                                      ^
[   15.120490]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.121221]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.121798] ==================================================================
[   15.413203] ==================================================================
[   15.413547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.414305] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.415048] 
[   15.415349] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.415394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.415500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.415525] Call Trace:
[   15.415538]  <TASK>
[   15.415552]  dump_stack_lvl+0x73/0xb0
[   15.415581]  print_report+0xd1/0x610
[   15.415603]  ? __virt_addr_valid+0x1db/0x2d0
[   15.415626]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.415647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.415669]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.415690]  kasan_report+0x141/0x180
[   15.415712]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.415739]  kasan_check_range+0x10c/0x1c0
[   15.415762]  __kasan_check_write+0x18/0x20
[   15.415782]  kasan_atomics_helper+0x18b1/0x5450
[   15.415804]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.415826]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.415850]  ? kasan_atomics+0x152/0x310
[   15.415876]  kasan_atomics+0x1dc/0x310
[   15.415899]  ? __pfx_kasan_atomics+0x10/0x10
[   15.415923]  ? __pfx_read_tsc+0x10/0x10
[   15.415944]  ? ktime_get_ts64+0x86/0x230
[   15.415969]  kunit_try_run_case+0x1a5/0x480
[   15.415992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.416027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.416051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.416073]  ? __kthread_parkme+0x82/0x180
[   15.416093]  ? preempt_count_sub+0x50/0x80
[   15.416116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.416140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.416164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.416188]  kthread+0x337/0x6f0
[   15.416207]  ? trace_preempt_on+0x20/0xc0
[   15.416230]  ? __pfx_kthread+0x10/0x10
[   15.416251]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.416272]  ? calculate_sigpending+0x7b/0xa0
[   15.416295]  ? __pfx_kthread+0x10/0x10
[   15.416318]  ret_from_fork+0x116/0x1d0
[   15.416336]  ? __pfx_kthread+0x10/0x10
[   15.416357]  ret_from_fork_asm+0x1a/0x30
[   15.416466]  </TASK>
[   15.416476] 
[   15.428756] Allocated by task 283:
[   15.429191]  kasan_save_stack+0x45/0x70
[   15.429525]  kasan_save_track+0x18/0x40
[   15.429736]  kasan_save_alloc_info+0x3b/0x50
[   15.430092]  __kasan_kmalloc+0xb7/0xc0
[   15.430367]  __kmalloc_cache_noprof+0x189/0x420
[   15.430686]  kasan_atomics+0x95/0x310
[   15.431079]  kunit_try_run_case+0x1a5/0x480
[   15.431553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.431809]  kthread+0x337/0x6f0
[   15.432179]  ret_from_fork+0x116/0x1d0
[   15.432491]  ret_from_fork_asm+0x1a/0x30
[   15.432870] 
[   15.432996] The buggy address belongs to the object at ffff8881039b8880
[   15.432996]  which belongs to the cache kmalloc-64 of size 64
[   15.433897] The buggy address is located 0 bytes to the right of
[   15.433897]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.434719] 
[   15.434917] The buggy address belongs to the physical page:
[   15.435183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.435731] flags: 0x200000000000000(node=0|zone=2)
[   15.436245] page_type: f5(slab)
[   15.436510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.436836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.437182] page dumped because: kasan: bad access detected
[   15.437778] 
[   15.437887] Memory state around the buggy address:
[   15.438093]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.438822]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.439236] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.439930]                                      ^
[   15.440199]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.440720]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.441229] ==================================================================
[   15.499273] ==================================================================
[   15.499789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.500255] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.500983] 
[   15.501105] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.501150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.501163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.501185] Call Trace:
[   15.501200]  <TASK>
[   15.501215]  dump_stack_lvl+0x73/0xb0
[   15.501244]  print_report+0xd1/0x610
[   15.501266]  ? __virt_addr_valid+0x1db/0x2d0
[   15.501288]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.501309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.501332]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.501354]  kasan_report+0x141/0x180
[   15.501377]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.501593]  kasan_check_range+0x10c/0x1c0
[   15.501624]  __kasan_check_write+0x18/0x20
[   15.501644]  kasan_atomics_helper+0x1a7f/0x5450
[   15.501667]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.501690]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.501714]  ? kasan_atomics+0x152/0x310
[   15.501740]  kasan_atomics+0x1dc/0x310
[   15.501762]  ? __pfx_kasan_atomics+0x10/0x10
[   15.501786]  ? __pfx_read_tsc+0x10/0x10
[   15.501808]  ? ktime_get_ts64+0x86/0x230
[   15.501832]  kunit_try_run_case+0x1a5/0x480
[   15.501858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.501880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.501903]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.501927]  ? __kthread_parkme+0x82/0x180
[   15.501948]  ? preempt_count_sub+0x50/0x80
[   15.501972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.501996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.502035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.502058]  kthread+0x337/0x6f0
[   15.502078]  ? trace_preempt_on+0x20/0xc0
[   15.502100]  ? __pfx_kthread+0x10/0x10
[   15.502121]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.502143]  ? calculate_sigpending+0x7b/0xa0
[   15.502166]  ? __pfx_kthread+0x10/0x10
[   15.502188]  ret_from_fork+0x116/0x1d0
[   15.502206]  ? __pfx_kthread+0x10/0x10
[   15.502227]  ret_from_fork_asm+0x1a/0x30
[   15.502258]  </TASK>
[   15.502269] 
[   15.510571] Allocated by task 283:
[   15.510699]  kasan_save_stack+0x45/0x70
[   15.510842]  kasan_save_track+0x18/0x40
[   15.511322]  kasan_save_alloc_info+0x3b/0x50
[   15.511639]  __kasan_kmalloc+0xb7/0xc0
[   15.511906]  __kmalloc_cache_noprof+0x189/0x420
[   15.512146]  kasan_atomics+0x95/0x310
[   15.512334]  kunit_try_run_case+0x1a5/0x480
[   15.512634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.512873]  kthread+0x337/0x6f0
[   15.513055]  ret_from_fork+0x116/0x1d0
[   15.513243]  ret_from_fork_asm+0x1a/0x30
[   15.513544] 
[   15.513664] The buggy address belongs to the object at ffff8881039b8880
[   15.513664]  which belongs to the cache kmalloc-64 of size 64
[   15.514145] The buggy address is located 0 bytes to the right of
[   15.514145]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.514886] 
[   15.515094] The buggy address belongs to the physical page:
[   15.515286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.515686] flags: 0x200000000000000(node=0|zone=2)
[   15.516108] page_type: f5(slab)
[   15.516237] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.516781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.517125] page dumped because: kasan: bad access detected
[   15.517347] 
[   15.517417] Memory state around the buggy address:
[   15.517572]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.517787]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.518238] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.518604]                                      ^
[   15.519058]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.519453]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.519727] ==================================================================
[   14.928891] ==================================================================
[   14.929143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.929489] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.929821] 
[   14.929927] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.929969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.929982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.930014] Call Trace:
[   14.930027]  <TASK>
[   14.930039]  dump_stack_lvl+0x73/0xb0
[   14.930065]  print_report+0xd1/0x610
[   14.930087]  ? __virt_addr_valid+0x1db/0x2d0
[   14.930109]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.930130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.930153]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.930174]  kasan_report+0x141/0x180
[   14.930196]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.930222]  kasan_check_range+0x10c/0x1c0
[   14.930246]  __kasan_check_write+0x18/0x20
[   14.930265]  kasan_atomics_helper+0xfa9/0x5450
[   14.930288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.930310]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.930334]  ? kasan_atomics+0x152/0x310
[   14.930367]  kasan_atomics+0x1dc/0x310
[   14.930389]  ? __pfx_kasan_atomics+0x10/0x10
[   14.930413]  ? __pfx_read_tsc+0x10/0x10
[   14.930435]  ? ktime_get_ts64+0x86/0x230
[   14.930458]  kunit_try_run_case+0x1a5/0x480
[   14.930482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.930504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.930527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.930550]  ? __kthread_parkme+0x82/0x180
[   14.930570]  ? preempt_count_sub+0x50/0x80
[   14.930594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.930618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.930641]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.930665]  kthread+0x337/0x6f0
[   14.930684]  ? trace_preempt_on+0x20/0xc0
[   14.930706]  ? __pfx_kthread+0x10/0x10
[   14.930726]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.930748]  ? calculate_sigpending+0x7b/0xa0
[   14.930771]  ? __pfx_kthread+0x10/0x10
[   14.930792]  ret_from_fork+0x116/0x1d0
[   14.930812]  ? __pfx_kthread+0x10/0x10
[   14.930833]  ret_from_fork_asm+0x1a/0x30
[   14.930863]  </TASK>
[   14.930874] 
[   14.938987] Allocated by task 283:
[   14.939166]  kasan_save_stack+0x45/0x70
[   14.939342]  kasan_save_track+0x18/0x40
[   14.939616]  kasan_save_alloc_info+0x3b/0x50
[   14.939806]  __kasan_kmalloc+0xb7/0xc0
[   14.939984]  __kmalloc_cache_noprof+0x189/0x420
[   14.940196]  kasan_atomics+0x95/0x310
[   14.940657]  kunit_try_run_case+0x1a5/0x480
[   14.940873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.941134]  kthread+0x337/0x6f0
[   14.941306]  ret_from_fork+0x116/0x1d0
[   14.941564]  ret_from_fork_asm+0x1a/0x30
[   14.941729] 
[   14.941828] The buggy address belongs to the object at ffff8881039b8880
[   14.941828]  which belongs to the cache kmalloc-64 of size 64
[   14.942243] The buggy address is located 0 bytes to the right of
[   14.942243]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.942705] 
[   14.942781] The buggy address belongs to the physical page:
[   14.942956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.943212] flags: 0x200000000000000(node=0|zone=2)
[   14.943499] page_type: f5(slab)
[   14.943672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.944019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.944540] page dumped because: kasan: bad access detected
[   14.944808] 
[   14.944902] Memory state around the buggy address:
[   14.945169]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.945535]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.945854] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.946175]                                      ^
[   14.946408]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.946724]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.947664] ==================================================================
[   15.367910] ==================================================================
[   15.368292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.368839] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.369231] 
[   15.369341] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.369449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.369498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.369521] Call Trace:
[   15.369537]  <TASK>
[   15.369551]  dump_stack_lvl+0x73/0xb0
[   15.369580]  print_report+0xd1/0x610
[   15.369602]  ? __virt_addr_valid+0x1db/0x2d0
[   15.369624]  ? kasan_atomics_helper+0x177f/0x5450
[   15.369645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.369695]  ? kasan_atomics_helper+0x177f/0x5450
[   15.369736]  kasan_report+0x141/0x180
[   15.369758]  ? kasan_atomics_helper+0x177f/0x5450
[   15.369784]  kasan_check_range+0x10c/0x1c0
[   15.369807]  __kasan_check_write+0x18/0x20
[   15.369827]  kasan_atomics_helper+0x177f/0x5450
[   15.369849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.369870]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.369895]  ? kasan_atomics+0x152/0x310
[   15.369921]  kasan_atomics+0x1dc/0x310
[   15.369943]  ? __pfx_kasan_atomics+0x10/0x10
[   15.369967]  ? __pfx_read_tsc+0x10/0x10
[   15.369987]  ? ktime_get_ts64+0x86/0x230
[   15.370022]  kunit_try_run_case+0x1a5/0x480
[   15.370046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.370068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.370091]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.370115]  ? __kthread_parkme+0x82/0x180
[   15.370135]  ? preempt_count_sub+0x50/0x80
[   15.370158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.370182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.370205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.370229]  kthread+0x337/0x6f0
[   15.370248]  ? trace_preempt_on+0x20/0xc0
[   15.370270]  ? __pfx_kthread+0x10/0x10
[   15.370291]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.370312]  ? calculate_sigpending+0x7b/0xa0
[   15.370336]  ? __pfx_kthread+0x10/0x10
[   15.370358]  ret_from_fork+0x116/0x1d0
[   15.370483]  ? __pfx_kthread+0x10/0x10
[   15.370506]  ret_from_fork_asm+0x1a/0x30
[   15.370537]  </TASK>
[   15.370547] 
[   15.379753] Allocated by task 283:
[   15.379935]  kasan_save_stack+0x45/0x70
[   15.380171]  kasan_save_track+0x18/0x40
[   15.380407]  kasan_save_alloc_info+0x3b/0x50
[   15.380652]  __kasan_kmalloc+0xb7/0xc0
[   15.380787]  __kmalloc_cache_noprof+0x189/0x420
[   15.380939]  kasan_atomics+0x95/0x310
[   15.381090]  kunit_try_run_case+0x1a5/0x480
[   15.381300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.381940]  kthread+0x337/0x6f0
[   15.382198]  ret_from_fork+0x116/0x1d0
[   15.382636]  ret_from_fork_asm+0x1a/0x30
[   15.382896] 
[   15.383086] The buggy address belongs to the object at ffff8881039b8880
[   15.383086]  which belongs to the cache kmalloc-64 of size 64
[   15.383589] The buggy address is located 0 bytes to the right of
[   15.383589]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.383937] 
[   15.384018] The buggy address belongs to the physical page:
[   15.384305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.384761] flags: 0x200000000000000(node=0|zone=2)
[   15.385064] page_type: f5(slab)
[   15.385273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.385716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.385942] page dumped because: kasan: bad access detected
[   15.386185] 
[   15.386277] Memory state around the buggy address:
[   15.386721]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.387063]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.387503] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.387800]                                      ^
[   15.387953]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.388325]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.388928] ==================================================================
[   15.441879] ==================================================================
[   15.442324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.442920] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.443293] 
[   15.443670] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.443738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.443765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.443786] Call Trace:
[   15.443814]  <TASK>
[   15.443828]  dump_stack_lvl+0x73/0xb0
[   15.443870]  print_report+0xd1/0x610
[   15.443893]  ? __virt_addr_valid+0x1db/0x2d0
[   15.443928]  ? kasan_atomics_helper+0x194a/0x5450
[   15.443969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.444279]  ? kasan_atomics_helper+0x194a/0x5450
[   15.444307]  kasan_report+0x141/0x180
[   15.444330]  ? kasan_atomics_helper+0x194a/0x5450
[   15.444356]  kasan_check_range+0x10c/0x1c0
[   15.444397]  __kasan_check_write+0x18/0x20
[   15.444418]  kasan_atomics_helper+0x194a/0x5450
[   15.444447]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.444470]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.444494]  ? kasan_atomics+0x152/0x310
[   15.444521]  kasan_atomics+0x1dc/0x310
[   15.444543]  ? __pfx_kasan_atomics+0x10/0x10
[   15.444567]  ? __pfx_read_tsc+0x10/0x10
[   15.444587]  ? ktime_get_ts64+0x86/0x230
[   15.444611]  kunit_try_run_case+0x1a5/0x480
[   15.444634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.444657]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.444681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.444703]  ? __kthread_parkme+0x82/0x180
[   15.444724]  ? preempt_count_sub+0x50/0x80
[   15.444747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.444771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.444794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.444817]  kthread+0x337/0x6f0
[   15.444837]  ? trace_preempt_on+0x20/0xc0
[   15.444860]  ? __pfx_kthread+0x10/0x10
[   15.444881]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.444902]  ? calculate_sigpending+0x7b/0xa0
[   15.444926]  ? __pfx_kthread+0x10/0x10
[   15.444948]  ret_from_fork+0x116/0x1d0
[   15.444966]  ? __pfx_kthread+0x10/0x10
[   15.444992]  ret_from_fork_asm+0x1a/0x30
[   15.445035]  </TASK>
[   15.445046] 
[   15.456856] Allocated by task 283:
[   15.457068]  kasan_save_stack+0x45/0x70
[   15.457274]  kasan_save_track+0x18/0x40
[   15.458016]  kasan_save_alloc_info+0x3b/0x50
[   15.458245]  __kasan_kmalloc+0xb7/0xc0
[   15.458660]  __kmalloc_cache_noprof+0x189/0x420
[   15.458968]  kasan_atomics+0x95/0x310
[   15.459272]  kunit_try_run_case+0x1a5/0x480
[   15.459508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.459872]  kthread+0x337/0x6f0
[   15.460223]  ret_from_fork+0x116/0x1d0
[   15.460546]  ret_from_fork_asm+0x1a/0x30
[   15.460923] 
[   15.461001] The buggy address belongs to the object at ffff8881039b8880
[   15.461001]  which belongs to the cache kmalloc-64 of size 64
[   15.461580] The buggy address is located 0 bytes to the right of
[   15.461580]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.462652] 
[   15.462773] The buggy address belongs to the physical page:
[   15.463177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.463708] flags: 0x200000000000000(node=0|zone=2)
[   15.464122] page_type: f5(slab)
[   15.464448] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.464785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.465135] page dumped because: kasan: bad access detected
[   15.465611] 
[   15.465726] Memory state around the buggy address:
[   15.466228]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.466600]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.466975] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.467300]                                      ^
[   15.467703]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.468128]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.468615] ==================================================================
[   14.446041] ==================================================================
[   14.446432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.446777] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.447211] 
[   14.447320] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.447408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.447421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.447442] Call Trace:
[   14.447457]  <TASK>
[   14.447471]  dump_stack_lvl+0x73/0xb0
[   14.447497]  print_report+0xd1/0x610
[   14.447519]  ? __virt_addr_valid+0x1db/0x2d0
[   14.447541]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.447562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.447585]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.447607]  kasan_report+0x141/0x180
[   14.447628]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.447654]  __asan_report_load4_noabort+0x18/0x20
[   14.447679]  kasan_atomics_helper+0x4b88/0x5450
[   14.447700]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.447723]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.447748]  ? kasan_atomics+0x152/0x310
[   14.447774]  kasan_atomics+0x1dc/0x310
[   14.447798]  ? __pfx_kasan_atomics+0x10/0x10
[   14.447822]  ? __pfx_read_tsc+0x10/0x10
[   14.447843]  ? ktime_get_ts64+0x86/0x230
[   14.447867]  kunit_try_run_case+0x1a5/0x480
[   14.447891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.447914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.447938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.447962]  ? __kthread_parkme+0x82/0x180
[   14.447983]  ? preempt_count_sub+0x50/0x80
[   14.448017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.448042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.448066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.448090]  kthread+0x337/0x6f0
[   14.448110]  ? trace_preempt_on+0x20/0xc0
[   14.448133]  ? __pfx_kthread+0x10/0x10
[   14.448154]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.448175]  ? calculate_sigpending+0x7b/0xa0
[   14.448199]  ? __pfx_kthread+0x10/0x10
[   14.448221]  ret_from_fork+0x116/0x1d0
[   14.448239]  ? __pfx_kthread+0x10/0x10
[   14.448260]  ret_from_fork_asm+0x1a/0x30
[   14.448291]  </TASK>
[   14.448302] 
[   14.459558] Allocated by task 283:
[   14.459883]  kasan_save_stack+0x45/0x70
[   14.460338]  kasan_save_track+0x18/0x40
[   14.460772]  kasan_save_alloc_info+0x3b/0x50
[   14.461250]  __kasan_kmalloc+0xb7/0xc0
[   14.461662]  __kmalloc_cache_noprof+0x189/0x420
[   14.462180]  kasan_atomics+0x95/0x310
[   14.462610]  kunit_try_run_case+0x1a5/0x480
[   14.463025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.463597]  kthread+0x337/0x6f0
[   14.463946]  ret_from_fork+0x116/0x1d0
[   14.464179]  ret_from_fork_asm+0x1a/0x30
[   14.464608] 
[   14.464736] The buggy address belongs to the object at ffff8881039b8880
[   14.464736]  which belongs to the cache kmalloc-64 of size 64
[   14.465617] The buggy address is located 0 bytes to the right of
[   14.465617]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.466361] 
[   14.466542] The buggy address belongs to the physical page:
[   14.466736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.467314] flags: 0x200000000000000(node=0|zone=2)
[   14.467742] page_type: f5(slab)
[   14.468088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.468650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.469369] page dumped because: kasan: bad access detected
[   14.469893] 
[   14.469998] Memory state around the buggy address:
[   14.470173]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.470929]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.471613] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.472213]                                      ^
[   14.472699]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.472981]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.473196] ==================================================================
[   14.615084] ==================================================================
[   14.615314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.615538] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.615762] 
[   14.615847] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.615889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.615901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.615923] Call Trace:
[   14.615936]  <TASK>
[   14.615951]  dump_stack_lvl+0x73/0xb0
[   14.615976]  print_report+0xd1/0x610
[   14.615997]  ? __virt_addr_valid+0x1db/0x2d0
[   14.616030]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.616051]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.616074]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.616095]  kasan_report+0x141/0x180
[   14.616117]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.616143]  kasan_check_range+0x10c/0x1c0
[   14.616166]  __kasan_check_write+0x18/0x20
[   14.616185]  kasan_atomics_helper+0x5fe/0x5450
[   14.616223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.616245]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.616271]  ? kasan_atomics+0x152/0x310
[   14.616296]  kasan_atomics+0x1dc/0x310
[   14.616319]  ? __pfx_kasan_atomics+0x10/0x10
[   14.616343]  ? __pfx_read_tsc+0x10/0x10
[   14.616363]  ? ktime_get_ts64+0x86/0x230
[   14.616387]  kunit_try_run_case+0x1a5/0x480
[   14.616411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.616433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.616457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.616480]  ? __kthread_parkme+0x82/0x180
[   14.616500]  ? preempt_count_sub+0x50/0x80
[   14.616525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.616549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.616572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.616596]  kthread+0x337/0x6f0
[   14.616615]  ? trace_preempt_on+0x20/0xc0
[   14.616637]  ? __pfx_kthread+0x10/0x10
[   14.616657]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.616679]  ? calculate_sigpending+0x7b/0xa0
[   14.616701]  ? __pfx_kthread+0x10/0x10
[   14.616723]  ret_from_fork+0x116/0x1d0
[   14.616741]  ? __pfx_kthread+0x10/0x10
[   14.616761]  ret_from_fork_asm+0x1a/0x30
[   14.616792]  </TASK>
[   14.616802] 
[   14.626310] Allocated by task 283:
[   14.626572]  kasan_save_stack+0x45/0x70
[   14.626774]  kasan_save_track+0x18/0x40
[   14.626964]  kasan_save_alloc_info+0x3b/0x50
[   14.627171]  __kasan_kmalloc+0xb7/0xc0
[   14.627341]  __kmalloc_cache_noprof+0x189/0x420
[   14.627589]  kasan_atomics+0x95/0x310
[   14.627756]  kunit_try_run_case+0x1a5/0x480
[   14.627945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.628173]  kthread+0x337/0x6f0
[   14.628350]  ret_from_fork+0x116/0x1d0
[   14.628536]  ret_from_fork_asm+0x1a/0x30
[   14.628721] 
[   14.628800] The buggy address belongs to the object at ffff8881039b8880
[   14.628800]  which belongs to the cache kmalloc-64 of size 64
[   14.629197] The buggy address is located 0 bytes to the right of
[   14.629197]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.629984] 
[   14.630116] The buggy address belongs to the physical page:
[   14.630370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.630676] flags: 0x200000000000000(node=0|zone=2)
[   14.630839] page_type: f5(slab)
[   14.631280] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.632062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.632364] page dumped because: kasan: bad access detected
[   14.632597] 
[   14.632679] Memory state around the buggy address:
[   14.632897]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.633135]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.633434] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.633754]                                      ^
[   14.633962]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634241]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634693] ==================================================================
[   14.826282] ==================================================================
[   14.826875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.827240] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.827581] 
[   14.827664] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.827706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.827719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.827740] Call Trace:
[   14.827754]  <TASK>
[   14.827768]  dump_stack_lvl+0x73/0xb0
[   14.827812]  print_report+0xd1/0x610
[   14.827834]  ? __virt_addr_valid+0x1db/0x2d0
[   14.827856]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.827877]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.827900]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.827921]  kasan_report+0x141/0x180
[   14.827944]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.827969]  __asan_report_load4_noabort+0x18/0x20
[   14.827994]  kasan_atomics_helper+0x4a84/0x5450
[   14.828028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.828050]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.828075]  ? kasan_atomics+0x152/0x310
[   14.828101]  kasan_atomics+0x1dc/0x310
[   14.828123]  ? __pfx_kasan_atomics+0x10/0x10
[   14.828147]  ? __pfx_read_tsc+0x10/0x10
[   14.828168]  ? ktime_get_ts64+0x86/0x230
[   14.828193]  kunit_try_run_case+0x1a5/0x480
[   14.828217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.828240]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.828263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.828286]  ? __kthread_parkme+0x82/0x180
[   14.828307]  ? preempt_count_sub+0x50/0x80
[   14.828330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.828354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.828389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.828413]  kthread+0x337/0x6f0
[   14.828434]  ? trace_preempt_on+0x20/0xc0
[   14.828456]  ? __pfx_kthread+0x10/0x10
[   14.828478]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.828507]  ? calculate_sigpending+0x7b/0xa0
[   14.828530]  ? __pfx_kthread+0x10/0x10
[   14.828552]  ret_from_fork+0x116/0x1d0
[   14.828570]  ? __pfx_kthread+0x10/0x10
[   14.828590]  ret_from_fork_asm+0x1a/0x30
[   14.828621]  </TASK>
[   14.828632] 
[   14.836573] Allocated by task 283:
[   14.836743]  kasan_save_stack+0x45/0x70
[   14.837028]  kasan_save_track+0x18/0x40
[   14.837209]  kasan_save_alloc_info+0x3b/0x50
[   14.837358]  __kasan_kmalloc+0xb7/0xc0
[   14.837490]  __kmalloc_cache_noprof+0x189/0x420
[   14.837644]  kasan_atomics+0x95/0x310
[   14.837776]  kunit_try_run_case+0x1a5/0x480
[   14.837921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.838225]  kthread+0x337/0x6f0
[   14.838401]  ret_from_fork+0x116/0x1d0
[   14.838589]  ret_from_fork_asm+0x1a/0x30
[   14.838786] 
[   14.838880] The buggy address belongs to the object at ffff8881039b8880
[   14.838880]  which belongs to the cache kmalloc-64 of size 64
[   14.839530] The buggy address is located 0 bytes to the right of
[   14.839530]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.840162] 
[   14.840237] The buggy address belongs to the physical page:
[   14.840819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.841210] flags: 0x200000000000000(node=0|zone=2)
[   14.843344] page_type: f5(slab)
[   14.843576] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.843907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.844222] page dumped because: kasan: bad access detected
[   14.844416] 
[   14.844515] Memory state around the buggy address:
[   14.845286]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.846189]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.846628] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.846854]                                      ^
[   14.847028]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.847385]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.847681] ==================================================================
[   15.742050] ==================================================================
[   15.742390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.742719] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.742942] 
[   15.743036] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.743078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.743090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.743110] Call Trace:
[   15.743123]  <TASK>
[   15.743138]  dump_stack_lvl+0x73/0xb0
[   15.743164]  print_report+0xd1/0x610
[   15.743185]  ? __virt_addr_valid+0x1db/0x2d0
[   15.743207]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.743228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.743249]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.743271]  kasan_report+0x141/0x180
[   15.743292]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.743318]  __asan_report_load8_noabort+0x18/0x20
[   15.743342]  kasan_atomics_helper+0x4f98/0x5450
[   15.743364]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.743386]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.743410]  ? kasan_atomics+0x152/0x310
[   15.743436]  kasan_atomics+0x1dc/0x310
[   15.743459]  ? __pfx_kasan_atomics+0x10/0x10
[   15.743486]  ? __pfx_read_tsc+0x10/0x10
[   15.743505]  ? ktime_get_ts64+0x86/0x230
[   15.743529]  kunit_try_run_case+0x1a5/0x480
[   15.743552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.743574]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.743598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.743621]  ? __kthread_parkme+0x82/0x180
[   15.743641]  ? preempt_count_sub+0x50/0x80
[   15.743664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.743688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.743711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.743735]  kthread+0x337/0x6f0
[   15.743755]  ? trace_preempt_on+0x20/0xc0
[   15.743777]  ? __pfx_kthread+0x10/0x10
[   15.743798]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.743819]  ? calculate_sigpending+0x7b/0xa0
[   15.743842]  ? __pfx_kthread+0x10/0x10
[   15.743863]  ret_from_fork+0x116/0x1d0
[   15.743881]  ? __pfx_kthread+0x10/0x10
[   15.743902]  ret_from_fork_asm+0x1a/0x30
[   15.743932]  </TASK>
[   15.743943] 
[   15.752965] Allocated by task 283:
[   15.753545]  kasan_save_stack+0x45/0x70
[   15.753984]  kasan_save_track+0x18/0x40
[   15.754156]  kasan_save_alloc_info+0x3b/0x50
[   15.754308]  __kasan_kmalloc+0xb7/0xc0
[   15.754862]  __kmalloc_cache_noprof+0x189/0x420
[   15.755451]  kasan_atomics+0x95/0x310
[   15.755925]  kunit_try_run_case+0x1a5/0x480
[   15.756515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.757055]  kthread+0x337/0x6f0
[   15.757187]  ret_from_fork+0x116/0x1d0
[   15.757321]  ret_from_fork_asm+0x1a/0x30
[   15.757926] 
[   15.758248] The buggy address belongs to the object at ffff8881039b8880
[   15.758248]  which belongs to the cache kmalloc-64 of size 64
[   15.759555] The buggy address is located 0 bytes to the right of
[   15.759555]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.759933] 
[   15.760020] The buggy address belongs to the physical page:
[   15.760196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.760921] flags: 0x200000000000000(node=0|zone=2)
[   15.761632] page_type: f5(slab)
[   15.762130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.763130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.763984] page dumped because: kasan: bad access detected
[   15.764725] 
[   15.765044] Memory state around the buggy address:
[   15.765584]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.765811]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.766042] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.766306]                                      ^
[   15.766594]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.766892]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.767156] ==================================================================
[   15.122491] ==================================================================
[   15.123462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.124171] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.125220] 
[   15.125332] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.125377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.125390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.125413] Call Trace:
[   15.125427]  <TASK>
[   15.125461]  dump_stack_lvl+0x73/0xb0
[   15.125489]  print_report+0xd1/0x610
[   15.125627]  ? __virt_addr_valid+0x1db/0x2d0
[   15.125732]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.125756]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.125779]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.125800]  kasan_report+0x141/0x180
[   15.125823]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.125849]  __asan_report_load4_noabort+0x18/0x20
[   15.125874]  kasan_atomics_helper+0x49ce/0x5450
[   15.125896]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.125918]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.125944]  ? kasan_atomics+0x152/0x310
[   15.125970]  kasan_atomics+0x1dc/0x310
[   15.125992]  ? __pfx_kasan_atomics+0x10/0x10
[   15.126027]  ? __pfx_read_tsc+0x10/0x10
[   15.126047]  ? ktime_get_ts64+0x86/0x230
[   15.126071]  kunit_try_run_case+0x1a5/0x480
[   15.126094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.126116]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.126139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.126163]  ? __kthread_parkme+0x82/0x180
[   15.126183]  ? preempt_count_sub+0x50/0x80
[   15.126206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.126230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.126252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.126276]  kthread+0x337/0x6f0
[   15.126295]  ? trace_preempt_on+0x20/0xc0
[   15.126318]  ? __pfx_kthread+0x10/0x10
[   15.126338]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.126359]  ? calculate_sigpending+0x7b/0xa0
[   15.126382]  ? __pfx_kthread+0x10/0x10
[   15.126404]  ret_from_fork+0x116/0x1d0
[   15.126433]  ? __pfx_kthread+0x10/0x10
[   15.126453]  ret_from_fork_asm+0x1a/0x30
[   15.126485]  </TASK>
[   15.126495] 
[   15.141447] Allocated by task 283:
[   15.141858]  kasan_save_stack+0x45/0x70
[   15.142235]  kasan_save_track+0x18/0x40
[   15.142754]  kasan_save_alloc_info+0x3b/0x50
[   15.143181]  __kasan_kmalloc+0xb7/0xc0
[   15.143617]  __kmalloc_cache_noprof+0x189/0x420
[   15.143840]  kasan_atomics+0x95/0x310
[   15.143973]  kunit_try_run_case+0x1a5/0x480
[   15.144134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.144311]  kthread+0x337/0x6f0
[   15.144463]  ret_from_fork+0x116/0x1d0
[   15.144596]  ret_from_fork_asm+0x1a/0x30
[   15.144900] 
[   15.145020] The buggy address belongs to the object at ffff8881039b8880
[   15.145020]  which belongs to the cache kmalloc-64 of size 64
[   15.145726] The buggy address is located 0 bytes to the right of
[   15.145726]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.146242] 
[   15.146344] The buggy address belongs to the physical page:
[   15.146645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.146974] flags: 0x200000000000000(node=0|zone=2)
[   15.147200] page_type: f5(slab)
[   15.147321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.147611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.148013] page dumped because: kasan: bad access detected
[   15.148183] 
[   15.148253] Memory state around the buggy address:
[   15.148929]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.149524]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.149771] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.150115]                                      ^
[   15.150348]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.151224]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.151696] ==================================================================
[   15.206939] ==================================================================
[   15.207648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.208019] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.208325] 
[   15.208426] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.209023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.209038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.209060] Call Trace:
[   15.209076]  <TASK>
[   15.209092]  dump_stack_lvl+0x73/0xb0
[   15.209121]  print_report+0xd1/0x610
[   15.209143]  ? __virt_addr_valid+0x1db/0x2d0
[   15.209165]  ? kasan_atomics_helper+0x1467/0x5450
[   15.209187]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.209209]  ? kasan_atomics_helper+0x1467/0x5450
[   15.209230]  kasan_report+0x141/0x180
[   15.209252]  ? kasan_atomics_helper+0x1467/0x5450
[   15.209278]  kasan_check_range+0x10c/0x1c0
[   15.209301]  __kasan_check_write+0x18/0x20
[   15.209321]  kasan_atomics_helper+0x1467/0x5450
[   15.209344]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.209461]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.209488]  ? kasan_atomics+0x152/0x310
[   15.209515]  kasan_atomics+0x1dc/0x310
[   15.209538]  ? __pfx_kasan_atomics+0x10/0x10
[   15.209563]  ? __pfx_read_tsc+0x10/0x10
[   15.209584]  ? ktime_get_ts64+0x86/0x230
[   15.209608]  kunit_try_run_case+0x1a5/0x480
[   15.209633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.209655]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.209678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.209702]  ? __kthread_parkme+0x82/0x180
[   15.209722]  ? preempt_count_sub+0x50/0x80
[   15.209746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.209769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.209793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.209817]  kthread+0x337/0x6f0
[   15.209836]  ? trace_preempt_on+0x20/0xc0
[   15.209858]  ? __pfx_kthread+0x10/0x10
[   15.209879]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.209901]  ? calculate_sigpending+0x7b/0xa0
[   15.209924]  ? __pfx_kthread+0x10/0x10
[   15.209945]  ret_from_fork+0x116/0x1d0
[   15.209964]  ? __pfx_kthread+0x10/0x10
[   15.209984]  ret_from_fork_asm+0x1a/0x30
[   15.210026]  </TASK>
[   15.210037] 
[   15.221899] Allocated by task 283:
[   15.222048]  kasan_save_stack+0x45/0x70
[   15.222493]  kasan_save_track+0x18/0x40
[   15.222869]  kasan_save_alloc_info+0x3b/0x50
[   15.223094]  __kasan_kmalloc+0xb7/0xc0
[   15.223276]  __kmalloc_cache_noprof+0x189/0x420
[   15.223689]  kasan_atomics+0x95/0x310
[   15.223981]  kunit_try_run_case+0x1a5/0x480
[   15.224160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.224631]  kthread+0x337/0x6f0
[   15.225097]  ret_from_fork+0x116/0x1d0
[   15.225266]  ret_from_fork_asm+0x1a/0x30
[   15.225812] 
[   15.225914] The buggy address belongs to the object at ffff8881039b8880
[   15.225914]  which belongs to the cache kmalloc-64 of size 64
[   15.226785] The buggy address is located 0 bytes to the right of
[   15.226785]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.227504] 
[   15.227625] The buggy address belongs to the physical page:
[   15.227866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.228223] flags: 0x200000000000000(node=0|zone=2)
[   15.228834] page_type: f5(slab)
[   15.229014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.229556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.229976] page dumped because: kasan: bad access detected
[   15.230324] 
[   15.230547] Memory state around the buggy address:
[   15.230838]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.231169]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.231766] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.232039]                                      ^
[   15.232690]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.232976]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.233460] ==================================================================
[   15.319163] ==================================================================
[   15.319664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.320151] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.320795] 
[   15.320906] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.320950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.320962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.320987] Call Trace:
[   15.321002]  <TASK>
[   15.321028]  dump_stack_lvl+0x73/0xb0
[   15.321056]  print_report+0xd1/0x610
[   15.321078]  ? __virt_addr_valid+0x1db/0x2d0
[   15.321218]  ? kasan_atomics_helper+0x164f/0x5450
[   15.321240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.321262]  ? kasan_atomics_helper+0x164f/0x5450
[   15.321284]  kasan_report+0x141/0x180
[   15.321306]  ? kasan_atomics_helper+0x164f/0x5450
[   15.321333]  kasan_check_range+0x10c/0x1c0
[   15.321356]  __kasan_check_write+0x18/0x20
[   15.321442]  kasan_atomics_helper+0x164f/0x5450
[   15.321465]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.321487]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.321512]  ? kasan_atomics+0x152/0x310
[   15.321537]  kasan_atomics+0x1dc/0x310
[   15.321559]  ? __pfx_kasan_atomics+0x10/0x10
[   15.321583]  ? __pfx_read_tsc+0x10/0x10
[   15.321605]  ? ktime_get_ts64+0x86/0x230
[   15.321629]  kunit_try_run_case+0x1a5/0x480
[   15.321653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.321675]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.321699]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.321722]  ? __kthread_parkme+0x82/0x180
[   15.321742]  ? preempt_count_sub+0x50/0x80
[   15.321765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.321789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.321812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.321835]  kthread+0x337/0x6f0
[   15.321855]  ? trace_preempt_on+0x20/0xc0
[   15.321878]  ? __pfx_kthread+0x10/0x10
[   15.321900]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.321920]  ? calculate_sigpending+0x7b/0xa0
[   15.321944]  ? __pfx_kthread+0x10/0x10
[   15.321966]  ret_from_fork+0x116/0x1d0
[   15.321984]  ? __pfx_kthread+0x10/0x10
[   15.322018]  ret_from_fork_asm+0x1a/0x30
[   15.322049]  </TASK>
[   15.322059] 
[   15.334730] Allocated by task 283:
[   15.334988]  kasan_save_stack+0x45/0x70
[   15.335292]  kasan_save_track+0x18/0x40
[   15.335544]  kasan_save_alloc_info+0x3b/0x50
[   15.335839]  __kasan_kmalloc+0xb7/0xc0
[   15.336037]  __kmalloc_cache_noprof+0x189/0x420
[   15.336258]  kasan_atomics+0x95/0x310
[   15.336882]  kunit_try_run_case+0x1a5/0x480
[   15.337104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.337782]  kthread+0x337/0x6f0
[   15.338079]  ret_from_fork+0x116/0x1d0
[   15.338376]  ret_from_fork_asm+0x1a/0x30
[   15.338832] 
[   15.338938] The buggy address belongs to the object at ffff8881039b8880
[   15.338938]  which belongs to the cache kmalloc-64 of size 64
[   15.339720] The buggy address is located 0 bytes to the right of
[   15.339720]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.340373] 
[   15.340730] The buggy address belongs to the physical page:
[   15.340931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.341349] flags: 0x200000000000000(node=0|zone=2)
[   15.341742] page_type: f5(slab)
[   15.341911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.342264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.342607] page dumped because: kasan: bad access detected
[   15.343044] 
[   15.343217] Memory state around the buggy address:
[   15.343545]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.343861]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.344136] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.344762]                                      ^
[   15.345026]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.345329]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.345697] ==================================================================
[   15.721269] ==================================================================
[   15.721769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.722128] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.722526] 
[   15.722618] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.722660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.722672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.722692] Call Trace:
[   15.722706]  <TASK>
[   15.722719]  dump_stack_lvl+0x73/0xb0
[   15.722746]  print_report+0xd1/0x610
[   15.722768]  ? __virt_addr_valid+0x1db/0x2d0
[   15.722789]  ? kasan_atomics_helper+0x2006/0x5450
[   15.722810]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.722833]  ? kasan_atomics_helper+0x2006/0x5450
[   15.722855]  kasan_report+0x141/0x180
[   15.722877]  ? kasan_atomics_helper+0x2006/0x5450
[   15.722904]  kasan_check_range+0x10c/0x1c0
[   15.722928]  __kasan_check_write+0x18/0x20
[   15.722947]  kasan_atomics_helper+0x2006/0x5450
[   15.722970]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.722992]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.723028]  ? kasan_atomics+0x152/0x310
[   15.723054]  kasan_atomics+0x1dc/0x310
[   15.723076]  ? __pfx_kasan_atomics+0x10/0x10
[   15.723100]  ? __pfx_read_tsc+0x10/0x10
[   15.723120]  ? ktime_get_ts64+0x86/0x230
[   15.723146]  kunit_try_run_case+0x1a5/0x480
[   15.723170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.723191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.723215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.723238]  ? __kthread_parkme+0x82/0x180
[   15.723258]  ? preempt_count_sub+0x50/0x80
[   15.723282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.723306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.723330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.723428]  kthread+0x337/0x6f0
[   15.723451]  ? trace_preempt_on+0x20/0xc0
[   15.723475]  ? __pfx_kthread+0x10/0x10
[   15.723496]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.723518]  ? calculate_sigpending+0x7b/0xa0
[   15.723541]  ? __pfx_kthread+0x10/0x10
[   15.723563]  ret_from_fork+0x116/0x1d0
[   15.723582]  ? __pfx_kthread+0x10/0x10
[   15.723602]  ret_from_fork_asm+0x1a/0x30
[   15.723632]  </TASK>
[   15.723644] 
[   15.731732] Allocated by task 283:
[   15.731884]  kasan_save_stack+0x45/0x70
[   15.732101]  kasan_save_track+0x18/0x40
[   15.732279]  kasan_save_alloc_info+0x3b/0x50
[   15.732837]  __kasan_kmalloc+0xb7/0xc0
[   15.733058]  __kmalloc_cache_noprof+0x189/0x420
[   15.733215]  kasan_atomics+0x95/0x310
[   15.733599]  kunit_try_run_case+0x1a5/0x480
[   15.733823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.734087]  kthread+0x337/0x6f0
[   15.734245]  ret_from_fork+0x116/0x1d0
[   15.734494]  ret_from_fork_asm+0x1a/0x30
[   15.734670] 
[   15.734767] The buggy address belongs to the object at ffff8881039b8880
[   15.734767]  which belongs to the cache kmalloc-64 of size 64
[   15.735256] The buggy address is located 0 bytes to the right of
[   15.735256]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.735751] 
[   15.735828] The buggy address belongs to the physical page:
[   15.736002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.736255] flags: 0x200000000000000(node=0|zone=2)
[   15.736553] page_type: f5(slab)
[   15.736725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.737084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.737614] page dumped because: kasan: bad access detected
[   15.737871] 
[   15.737967] Memory state around the buggy address:
[   15.738195]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.738503]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.738788] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.739123]                                      ^
[   15.739417]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.739746]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.740052] ==================================================================
[   14.537840] ==================================================================
[   14.538470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.539185] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.539937] 
[   14.540128] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.540172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.540184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.540206] Call Trace:
[   14.540222]  <TASK>
[   14.540239]  dump_stack_lvl+0x73/0xb0
[   14.540267]  print_report+0xd1/0x610
[   14.540289]  ? __virt_addr_valid+0x1db/0x2d0
[   14.540310]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.540331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.540353]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.540392]  kasan_report+0x141/0x180
[   14.540415]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.540441]  __asan_report_load4_noabort+0x18/0x20
[   14.540465]  kasan_atomics_helper+0x4b54/0x5450
[   14.540487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.540509]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.540534]  ? kasan_atomics+0x152/0x310
[   14.540559]  kasan_atomics+0x1dc/0x310
[   14.540581]  ? __pfx_kasan_atomics+0x10/0x10
[   14.540606]  ? __pfx_read_tsc+0x10/0x10
[   14.540627]  ? ktime_get_ts64+0x86/0x230
[   14.540651]  kunit_try_run_case+0x1a5/0x480
[   14.540674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.540698]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.540720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.540744]  ? __kthread_parkme+0x82/0x180
[   14.540764]  ? preempt_count_sub+0x50/0x80
[   14.540787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.540812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.540835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.540858]  kthread+0x337/0x6f0
[   14.540878]  ? trace_preempt_on+0x20/0xc0
[   14.540900]  ? __pfx_kthread+0x10/0x10
[   14.540921]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.540943]  ? calculate_sigpending+0x7b/0xa0
[   14.540967]  ? __pfx_kthread+0x10/0x10
[   14.540997]  ret_from_fork+0x116/0x1d0
[   14.541025]  ? __pfx_kthread+0x10/0x10
[   14.541046]  ret_from_fork_asm+0x1a/0x30
[   14.541099]  </TASK>
[   14.541109] 
[   14.548995] Allocated by task 283:
[   14.549173]  kasan_save_stack+0x45/0x70
[   14.549353]  kasan_save_track+0x18/0x40
[   14.549586]  kasan_save_alloc_info+0x3b/0x50
[   14.549799]  __kasan_kmalloc+0xb7/0xc0
[   14.549960]  __kmalloc_cache_noprof+0x189/0x420
[   14.550148]  kasan_atomics+0x95/0x310
[   14.550341]  kunit_try_run_case+0x1a5/0x480
[   14.550590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.550822]  kthread+0x337/0x6f0
[   14.550944]  ret_from_fork+0x116/0x1d0
[   14.551089]  ret_from_fork_asm+0x1a/0x30
[   14.551309] 
[   14.551403] The buggy address belongs to the object at ffff8881039b8880
[   14.551403]  which belongs to the cache kmalloc-64 of size 64
[   14.551963] The buggy address is located 0 bytes to the right of
[   14.551963]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.552522] 
[   14.552703] The buggy address belongs to the physical page:
[   14.552957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.553261] flags: 0x200000000000000(node=0|zone=2)
[   14.553483] page_type: f5(slab)
[   14.553603] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.553837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.554072] page dumped because: kasan: bad access detected
[   14.554242] 
[   14.554312] Memory state around the buggy address:
[   14.554557]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.554875]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.555201] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.555677]                                      ^
[   14.555899]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556385]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556602] ==================================================================
[   14.691701] ==================================================================
[   14.691927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.692239] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.692667] 
[   14.692779] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.692820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.692833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.692854] Call Trace:
[   14.692868]  <TASK>
[   14.692882]  dump_stack_lvl+0x73/0xb0
[   14.692908]  print_report+0xd1/0x610
[   14.692930]  ? __virt_addr_valid+0x1db/0x2d0
[   14.692952]  ? kasan_atomics_helper+0x860/0x5450
[   14.692979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.693001]  ? kasan_atomics_helper+0x860/0x5450
[   14.693034]  kasan_report+0x141/0x180
[   14.693056]  ? kasan_atomics_helper+0x860/0x5450
[   14.693082]  kasan_check_range+0x10c/0x1c0
[   14.693105]  __kasan_check_write+0x18/0x20
[   14.693125]  kasan_atomics_helper+0x860/0x5450
[   14.693147]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.693169]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.693194]  ? kasan_atomics+0x152/0x310
[   14.693220]  kasan_atomics+0x1dc/0x310
[   14.693243]  ? __pfx_kasan_atomics+0x10/0x10
[   14.693267]  ? __pfx_read_tsc+0x10/0x10
[   14.693287]  ? ktime_get_ts64+0x86/0x230
[   14.693311]  kunit_try_run_case+0x1a5/0x480
[   14.693334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.693532]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.693560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.693585]  ? __kthread_parkme+0x82/0x180
[   14.693605]  ? preempt_count_sub+0x50/0x80
[   14.693627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.693651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.693676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.693700]  kthread+0x337/0x6f0
[   14.693719]  ? trace_preempt_on+0x20/0xc0
[   14.693741]  ? __pfx_kthread+0x10/0x10
[   14.693762]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.693783]  ? calculate_sigpending+0x7b/0xa0
[   14.693807]  ? __pfx_kthread+0x10/0x10
[   14.693829]  ret_from_fork+0x116/0x1d0
[   14.693848]  ? __pfx_kthread+0x10/0x10
[   14.693868]  ret_from_fork_asm+0x1a/0x30
[   14.693899]  </TASK>
[   14.693909] 
[   14.701886] Allocated by task 283:
[   14.702060]  kasan_save_stack+0x45/0x70
[   14.702259]  kasan_save_track+0x18/0x40
[   14.702541]  kasan_save_alloc_info+0x3b/0x50
[   14.702755]  __kasan_kmalloc+0xb7/0xc0
[   14.702938]  __kmalloc_cache_noprof+0x189/0x420
[   14.703168]  kasan_atomics+0x95/0x310
[   14.703428]  kunit_try_run_case+0x1a5/0x480
[   14.703650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.703902]  kthread+0x337/0x6f0
[   14.704078]  ret_from_fork+0x116/0x1d0
[   14.704266]  ret_from_fork_asm+0x1a/0x30
[   14.704542] 
[   14.704643] The buggy address belongs to the object at ffff8881039b8880
[   14.704643]  which belongs to the cache kmalloc-64 of size 64
[   14.705163] The buggy address is located 0 bytes to the right of
[   14.705163]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.705825] 
[   14.705928] The buggy address belongs to the physical page:
[   14.706112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.706344] flags: 0x200000000000000(node=0|zone=2)
[   14.706670] page_type: f5(slab)
[   14.706842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.707194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.707595] page dumped because: kasan: bad access detected
[   14.707841] 
[   14.707915] Memory state around the buggy address:
[   14.708122]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.708643]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.708942] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.709233]                                      ^
[   14.709628]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.709853]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.710115] ==================================================================
[   15.346152] ==================================================================
[   15.346780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.347060] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.347495] 
[   15.347613] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.347689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.347702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.347723] Call Trace:
[   15.347738]  <TASK>
[   15.347752]  dump_stack_lvl+0x73/0xb0
[   15.347809]  print_report+0xd1/0x610
[   15.347832]  ? __virt_addr_valid+0x1db/0x2d0
[   15.347854]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.347875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.347898]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.347919]  kasan_report+0x141/0x180
[   15.347942]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.347995]  kasan_check_range+0x10c/0x1c0
[   15.348028]  __kasan_check_write+0x18/0x20
[   15.348048]  kasan_atomics_helper+0x16e7/0x5450
[   15.348070]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.348092]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.348117]  ? kasan_atomics+0x152/0x310
[   15.348143]  kasan_atomics+0x1dc/0x310
[   15.348166]  ? __pfx_kasan_atomics+0x10/0x10
[   15.348190]  ? __pfx_read_tsc+0x10/0x10
[   15.348211]  ? ktime_get_ts64+0x86/0x230
[   15.348235]  kunit_try_run_case+0x1a5/0x480
[   15.348261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.348283]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.348306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.348330]  ? __kthread_parkme+0x82/0x180
[   15.348350]  ? preempt_count_sub+0x50/0x80
[   15.348595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.348621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.348645]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.348669]  kthread+0x337/0x6f0
[   15.348689]  ? trace_preempt_on+0x20/0xc0
[   15.348712]  ? __pfx_kthread+0x10/0x10
[   15.348733]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.348756]  ? calculate_sigpending+0x7b/0xa0
[   15.348780]  ? __pfx_kthread+0x10/0x10
[   15.348801]  ret_from_fork+0x116/0x1d0
[   15.348819]  ? __pfx_kthread+0x10/0x10
[   15.348840]  ret_from_fork_asm+0x1a/0x30
[   15.348871]  </TASK>
[   15.348882] 
[   15.357948] Allocated by task 283:
[   15.358182]  kasan_save_stack+0x45/0x70
[   15.358687]  kasan_save_track+0x18/0x40
[   15.358890]  kasan_save_alloc_info+0x3b/0x50
[   15.359077]  __kasan_kmalloc+0xb7/0xc0
[   15.359213]  __kmalloc_cache_noprof+0x189/0x420
[   15.359429]  kasan_atomics+0x95/0x310
[   15.359613]  kunit_try_run_case+0x1a5/0x480
[   15.360048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.360255]  kthread+0x337/0x6f0
[   15.360584]  ret_from_fork+0x116/0x1d0
[   15.360784]  ret_from_fork_asm+0x1a/0x30
[   15.361215] 
[   15.361321] The buggy address belongs to the object at ffff8881039b8880
[   15.361321]  which belongs to the cache kmalloc-64 of size 64
[   15.361958] The buggy address is located 0 bytes to the right of
[   15.361958]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.362639] 
[   15.362730] The buggy address belongs to the physical page:
[   15.362997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.363365] flags: 0x200000000000000(node=0|zone=2)
[   15.363572] page_type: f5(slab)
[   15.363730] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.363962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.364269] page dumped because: kasan: bad access detected
[   15.364651] 
[   15.364829] Memory state around the buggy address:
[   15.365404]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.365817]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.366160] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.366393]                                      ^
[   15.366550]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.366852]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.367239] ==================================================================
[   15.520140] ==================================================================
[   15.520588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.521045] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.521448] 
[   15.521564] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.521607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.521620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.521642] Call Trace:
[   15.521656]  <TASK>
[   15.521670]  dump_stack_lvl+0x73/0xb0
[   15.521698]  print_report+0xd1/0x610
[   15.521719]  ? __virt_addr_valid+0x1db/0x2d0
[   15.521767]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.521788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.521811]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.521832]  kasan_report+0x141/0x180
[   15.521854]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.521881]  kasan_check_range+0x10c/0x1c0
[   15.521921]  __kasan_check_write+0x18/0x20
[   15.521942]  kasan_atomics_helper+0x1b22/0x5450
[   15.521965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.521987]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.522021]  ? kasan_atomics+0x152/0x310
[   15.522048]  kasan_atomics+0x1dc/0x310
[   15.522070]  ? __pfx_kasan_atomics+0x10/0x10
[   15.522095]  ? __pfx_read_tsc+0x10/0x10
[   15.522115]  ? ktime_get_ts64+0x86/0x230
[   15.522138]  kunit_try_run_case+0x1a5/0x480
[   15.522162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.522185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.522208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.522231]  ? __kthread_parkme+0x82/0x180
[   15.522251]  ? preempt_count_sub+0x50/0x80
[   15.522274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.522298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.522322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.522345]  kthread+0x337/0x6f0
[   15.522364]  ? trace_preempt_on+0x20/0xc0
[   15.522591]  ? __pfx_kthread+0x10/0x10
[   15.522613]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.522635]  ? calculate_sigpending+0x7b/0xa0
[   15.522658]  ? __pfx_kthread+0x10/0x10
[   15.522680]  ret_from_fork+0x116/0x1d0
[   15.522698]  ? __pfx_kthread+0x10/0x10
[   15.522720]  ret_from_fork_asm+0x1a/0x30
[   15.522749]  </TASK>
[   15.522761] 
[   15.531367] Allocated by task 283:
[   15.531608]  kasan_save_stack+0x45/0x70
[   15.531757]  kasan_save_track+0x18/0x40
[   15.531893]  kasan_save_alloc_info+0x3b/0x50
[   15.532055]  __kasan_kmalloc+0xb7/0xc0
[   15.532259]  __kmalloc_cache_noprof+0x189/0x420
[   15.532479]  kasan_atomics+0x95/0x310
[   15.532666]  kunit_try_run_case+0x1a5/0x480
[   15.532873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.533211]  kthread+0x337/0x6f0
[   15.533332]  ret_from_fork+0x116/0x1d0
[   15.533464]  ret_from_fork_asm+0x1a/0x30
[   15.533940] 
[   15.534059] The buggy address belongs to the object at ffff8881039b8880
[   15.534059]  which belongs to the cache kmalloc-64 of size 64
[   15.534621] The buggy address is located 0 bytes to the right of
[   15.534621]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.535275] 
[   15.535355] The buggy address belongs to the physical page:
[   15.535530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.535774] flags: 0x200000000000000(node=0|zone=2)
[   15.536013] page_type: f5(slab)
[   15.536180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.536525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.537385] page dumped because: kasan: bad access detected
[   15.537654] 
[   15.537729] Memory state around the buggy address:
[   15.537887]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.538126]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.538545] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.539099]                                      ^
[   15.539423]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.539762]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540113] ==================================================================
[   15.261831] ==================================================================
[   15.262480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.262920] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.263274] 
[   15.263367] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.263761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.263774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.263796] Call Trace:
[   15.263811]  <TASK>
[   15.263826]  dump_stack_lvl+0x73/0xb0
[   15.263855]  print_report+0xd1/0x610
[   15.263877]  ? __virt_addr_valid+0x1db/0x2d0
[   15.263899]  ? kasan_atomics_helper+0x151d/0x5450
[   15.263920]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.263942]  ? kasan_atomics_helper+0x151d/0x5450
[   15.263964]  kasan_report+0x141/0x180
[   15.263985]  ? kasan_atomics_helper+0x151d/0x5450
[   15.264025]  kasan_check_range+0x10c/0x1c0
[   15.264049]  __kasan_check_write+0x18/0x20
[   15.264068]  kasan_atomics_helper+0x151d/0x5450
[   15.264092]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.264114]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.264139]  ? kasan_atomics+0x152/0x310
[   15.264165]  kasan_atomics+0x1dc/0x310
[   15.264187]  ? __pfx_kasan_atomics+0x10/0x10
[   15.264211]  ? __pfx_read_tsc+0x10/0x10
[   15.264233]  ? ktime_get_ts64+0x86/0x230
[   15.264257]  kunit_try_run_case+0x1a5/0x480
[   15.264281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.264303]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.264326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.264351]  ? __kthread_parkme+0x82/0x180
[   15.264384]  ? preempt_count_sub+0x50/0x80
[   15.264407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.264444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.264468]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.264491]  kthread+0x337/0x6f0
[   15.264511]  ? trace_preempt_on+0x20/0xc0
[   15.264534]  ? __pfx_kthread+0x10/0x10
[   15.264554]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.264576]  ? calculate_sigpending+0x7b/0xa0
[   15.264599]  ? __pfx_kthread+0x10/0x10
[   15.264621]  ret_from_fork+0x116/0x1d0
[   15.264640]  ? __pfx_kthread+0x10/0x10
[   15.264660]  ret_from_fork_asm+0x1a/0x30
[   15.264690]  </TASK>
[   15.264701] 
[   15.277043] Allocated by task 283:
[   15.277509]  kasan_save_stack+0x45/0x70
[   15.278150]  kasan_save_track+0x18/0x40
[   15.278332]  kasan_save_alloc_info+0x3b/0x50
[   15.278974]  __kasan_kmalloc+0xb7/0xc0
[   15.279174]  __kmalloc_cache_noprof+0x189/0x420
[   15.279386]  kasan_atomics+0x95/0x310
[   15.279875]  kunit_try_run_case+0x1a5/0x480
[   15.280161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.280632]  kthread+0x337/0x6f0
[   15.280915]  ret_from_fork+0x116/0x1d0
[   15.281222]  ret_from_fork_asm+0x1a/0x30
[   15.281567] 
[   15.281976] The buggy address belongs to the object at ffff8881039b8880
[   15.281976]  which belongs to the cache kmalloc-64 of size 64
[   15.282481] The buggy address is located 0 bytes to the right of
[   15.282481]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.283374] 
[   15.283832] The buggy address belongs to the physical page:
[   15.284084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.284656] flags: 0x200000000000000(node=0|zone=2)
[   15.284991] page_type: f5(slab)
[   15.285288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.286025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.286340] page dumped because: kasan: bad access detected
[   15.286832] 
[   15.286945] Memory state around the buggy address:
[   15.287181]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.287776]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.288161] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.288674]                                      ^
[   15.289023]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.289486]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.290093] ==================================================================
[   15.683965] ==================================================================
[   15.684233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.684532] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.684866] 
[   15.684982] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.685035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.685049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.685070] Call Trace:
[   15.685085]  <TASK>
[   15.685098]  dump_stack_lvl+0x73/0xb0
[   15.685124]  print_report+0xd1/0x610
[   15.685146]  ? __virt_addr_valid+0x1db/0x2d0
[   15.685167]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.685188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.685209]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.685231]  kasan_report+0x141/0x180
[   15.685252]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.685278]  kasan_check_range+0x10c/0x1c0
[   15.685301]  __kasan_check_write+0x18/0x20
[   15.685320]  kasan_atomics_helper+0x1f43/0x5450
[   15.685342]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.685364]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.685388]  ? kasan_atomics+0x152/0x310
[   15.685414]  kasan_atomics+0x1dc/0x310
[   15.685436]  ? __pfx_kasan_atomics+0x10/0x10
[   15.685459]  ? __pfx_read_tsc+0x10/0x10
[   15.685480]  ? ktime_get_ts64+0x86/0x230
[   15.685503]  kunit_try_run_case+0x1a5/0x480
[   15.685526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.685549]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.685572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.685594]  ? __kthread_parkme+0x82/0x180
[   15.685614]  ? preempt_count_sub+0x50/0x80
[   15.685637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.685661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.685684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.685707]  kthread+0x337/0x6f0
[   15.685726]  ? trace_preempt_on+0x20/0xc0
[   15.685748]  ? __pfx_kthread+0x10/0x10
[   15.685769]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.685791]  ? calculate_sigpending+0x7b/0xa0
[   15.685814]  ? __pfx_kthread+0x10/0x10
[   15.685835]  ret_from_fork+0x116/0x1d0
[   15.685853]  ? __pfx_kthread+0x10/0x10
[   15.685873]  ret_from_fork_asm+0x1a/0x30
[   15.685902]  </TASK>
[   15.685913] 
[   15.694153] Allocated by task 283:
[   15.694287]  kasan_save_stack+0x45/0x70
[   15.694559]  kasan_save_track+0x18/0x40
[   15.694756]  kasan_save_alloc_info+0x3b/0x50
[   15.694965]  __kasan_kmalloc+0xb7/0xc0
[   15.695166]  __kmalloc_cache_noprof+0x189/0x420
[   15.695463]  kasan_atomics+0x95/0x310
[   15.695657]  kunit_try_run_case+0x1a5/0x480
[   15.695865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.696122]  kthread+0x337/0x6f0
[   15.696243]  ret_from_fork+0x116/0x1d0
[   15.696504]  ret_from_fork_asm+0x1a/0x30
[   15.696703] 
[   15.696785] The buggy address belongs to the object at ffff8881039b8880
[   15.696785]  which belongs to the cache kmalloc-64 of size 64
[   15.697273] The buggy address is located 0 bytes to the right of
[   15.697273]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.697961] 
[   15.698066] The buggy address belongs to the physical page:
[   15.698300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.698701] flags: 0x200000000000000(node=0|zone=2)
[   15.698910] page_type: f5(slab)
[   15.699092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.699481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.699787] page dumped because: kasan: bad access detected
[   15.699961] 
[   15.700042] Memory state around the buggy address:
[   15.700196]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.700509]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.700830] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.701168]                                      ^
[   15.701599]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.701907]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.702136] ==================================================================
[   14.765784] ==================================================================
[   14.766085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.766476] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.766710] 
[   14.766797] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.766838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.766853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.766874] Call Trace:
[   14.766890]  <TASK>
[   14.766904]  dump_stack_lvl+0x73/0xb0
[   14.766932]  print_report+0xd1/0x610
[   14.766953]  ? __virt_addr_valid+0x1db/0x2d0
[   14.766975]  ? kasan_atomics_helper+0xac7/0x5450
[   14.766996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.767030]  ? kasan_atomics_helper+0xac7/0x5450
[   14.767052]  kasan_report+0x141/0x180
[   14.767074]  ? kasan_atomics_helper+0xac7/0x5450
[   14.767100]  kasan_check_range+0x10c/0x1c0
[   14.767123]  __kasan_check_write+0x18/0x20
[   14.767142]  kasan_atomics_helper+0xac7/0x5450
[   14.767165]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.767186]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.767211]  ? kasan_atomics+0x152/0x310
[   14.767237]  kasan_atomics+0x1dc/0x310
[   14.767259]  ? __pfx_kasan_atomics+0x10/0x10
[   14.767283]  ? __pfx_read_tsc+0x10/0x10
[   14.767306]  ? ktime_get_ts64+0x86/0x230
[   14.767330]  kunit_try_run_case+0x1a5/0x480
[   14.767431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.767457]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.767481]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.767505]  ? __kthread_parkme+0x82/0x180
[   14.767525]  ? preempt_count_sub+0x50/0x80
[   14.767549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.767573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.767596]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.767619]  kthread+0x337/0x6f0
[   14.767638]  ? trace_preempt_on+0x20/0xc0
[   14.767661]  ? __pfx_kthread+0x10/0x10
[   14.767682]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.767703]  ? calculate_sigpending+0x7b/0xa0
[   14.767727]  ? __pfx_kthread+0x10/0x10
[   14.767749]  ret_from_fork+0x116/0x1d0
[   14.767768]  ? __pfx_kthread+0x10/0x10
[   14.767788]  ret_from_fork_asm+0x1a/0x30
[   14.767818]  </TASK>
[   14.767828] 
[   14.776160] Allocated by task 283:
[   14.776344]  kasan_save_stack+0x45/0x70
[   14.776621]  kasan_save_track+0x18/0x40
[   14.776809]  kasan_save_alloc_info+0x3b/0x50
[   14.777036]  __kasan_kmalloc+0xb7/0xc0
[   14.777206]  __kmalloc_cache_noprof+0x189/0x420
[   14.777602]  kasan_atomics+0x95/0x310
[   14.777763]  kunit_try_run_case+0x1a5/0x480
[   14.777971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.778166]  kthread+0x337/0x6f0
[   14.778290]  ret_from_fork+0x116/0x1d0
[   14.778520]  ret_from_fork_asm+0x1a/0x30
[   14.778667] 
[   14.778740] The buggy address belongs to the object at ffff8881039b8880
[   14.778740]  which belongs to the cache kmalloc-64 of size 64
[   14.779292] The buggy address is located 0 bytes to the right of
[   14.779292]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.779864] 
[   14.779964] The buggy address belongs to the physical page:
[   14.780328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.780756] flags: 0x200000000000000(node=0|zone=2)
[   14.781015] page_type: f5(slab)
[   14.781189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.781738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.781976] page dumped because: kasan: bad access detected
[   14.782162] 
[   14.782234] Memory state around the buggy address:
[   14.782479]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.782806]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.783137] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.783534]                                      ^
[   14.783769]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.784026]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.784242] ==================================================================
[   14.891232] ==================================================================
[   14.891630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.891926] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.892260] 
[   14.892557] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.892603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.892615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.892636] Call Trace:
[   14.892650]  <TASK>
[   14.892665]  dump_stack_lvl+0x73/0xb0
[   14.892692]  print_report+0xd1/0x610
[   14.892715]  ? __virt_addr_valid+0x1db/0x2d0
[   14.892737]  ? kasan_atomics_helper+0xe78/0x5450
[   14.892758]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.892780]  ? kasan_atomics_helper+0xe78/0x5450
[   14.892802]  kasan_report+0x141/0x180
[   14.892824]  ? kasan_atomics_helper+0xe78/0x5450
[   14.892850]  kasan_check_range+0x10c/0x1c0
[   14.892873]  __kasan_check_write+0x18/0x20
[   14.892893]  kasan_atomics_helper+0xe78/0x5450
[   14.892915]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.892937]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.892961]  ? kasan_atomics+0x152/0x310
[   14.892994]  kasan_atomics+0x1dc/0x310
[   14.893028]  ? __pfx_kasan_atomics+0x10/0x10
[   14.893052]  ? __pfx_read_tsc+0x10/0x10
[   14.893073]  ? ktime_get_ts64+0x86/0x230
[   14.893097]  kunit_try_run_case+0x1a5/0x480
[   14.893121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.893144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.893167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.893190]  ? __kthread_parkme+0x82/0x180
[   14.893211]  ? preempt_count_sub+0x50/0x80
[   14.893234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.893257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.893281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.893305]  kthread+0x337/0x6f0
[   14.893323]  ? trace_preempt_on+0x20/0xc0
[   14.893450]  ? __pfx_kthread+0x10/0x10
[   14.893476]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.893499]  ? calculate_sigpending+0x7b/0xa0
[   14.893523]  ? __pfx_kthread+0x10/0x10
[   14.893545]  ret_from_fork+0x116/0x1d0
[   14.893564]  ? __pfx_kthread+0x10/0x10
[   14.893584]  ret_from_fork_asm+0x1a/0x30
[   14.893615]  </TASK>
[   14.893626] 
[   14.901663] Allocated by task 283:
[   14.901810]  kasan_save_stack+0x45/0x70
[   14.901952]  kasan_save_track+0x18/0x40
[   14.902099]  kasan_save_alloc_info+0x3b/0x50
[   14.902250]  __kasan_kmalloc+0xb7/0xc0
[   14.902460]  __kmalloc_cache_noprof+0x189/0x420
[   14.902623]  kasan_atomics+0x95/0x310
[   14.902758]  kunit_try_run_case+0x1a5/0x480
[   14.902968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.903230]  kthread+0x337/0x6f0
[   14.903479]  ret_from_fork+0x116/0x1d0
[   14.903673]  ret_from_fork_asm+0x1a/0x30
[   14.903876] 
[   14.903971] The buggy address belongs to the object at ffff8881039b8880
[   14.903971]  which belongs to the cache kmalloc-64 of size 64
[   14.904723] The buggy address is located 0 bytes to the right of
[   14.904723]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.905150] 
[   14.905249] The buggy address belongs to the physical page:
[   14.905597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.905965] flags: 0x200000000000000(node=0|zone=2)
[   14.906212] page_type: f5(slab)
[   14.906458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.906757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.907080] page dumped because: kasan: bad access detected
[   14.907304] 
[   14.907493] Memory state around the buggy address:
[   14.907693]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.907983]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.908276] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.908773]                                      ^
[   14.908994]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.909291]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.909703] ==================================================================
[   14.747065] ==================================================================
[   14.747492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.747779] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.748028] 
[   14.748122] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.748163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.748175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.748195] Call Trace:
[   14.748210]  <TASK>
[   14.748223]  dump_stack_lvl+0x73/0xb0
[   14.748248]  print_report+0xd1/0x610
[   14.748270]  ? __virt_addr_valid+0x1db/0x2d0
[   14.748292]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.748313]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.748335]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.748430]  kasan_report+0x141/0x180
[   14.748455]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.748481]  kasan_check_range+0x10c/0x1c0
[   14.748504]  __kasan_check_write+0x18/0x20
[   14.748523]  kasan_atomics_helper+0xa2b/0x5450
[   14.748545]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.748567]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.748591]  ? kasan_atomics+0x152/0x310
[   14.748616]  kasan_atomics+0x1dc/0x310
[   14.748639]  ? __pfx_kasan_atomics+0x10/0x10
[   14.748663]  ? __pfx_read_tsc+0x10/0x10
[   14.748684]  ? ktime_get_ts64+0x86/0x230
[   14.748708]  kunit_try_run_case+0x1a5/0x480
[   14.748732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.748756]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.748779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.748803]  ? __kthread_parkme+0x82/0x180
[   14.748824]  ? preempt_count_sub+0x50/0x80
[   14.748847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.748871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.748895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.748918]  kthread+0x337/0x6f0
[   14.748937]  ? trace_preempt_on+0x20/0xc0
[   14.748961]  ? __pfx_kthread+0x10/0x10
[   14.748988]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.749018]  ? calculate_sigpending+0x7b/0xa0
[   14.749041]  ? __pfx_kthread+0x10/0x10
[   14.749062]  ret_from_fork+0x116/0x1d0
[   14.749081]  ? __pfx_kthread+0x10/0x10
[   14.749101]  ret_from_fork_asm+0x1a/0x30
[   14.749132]  </TASK>
[   14.749141] 
[   14.757031] Allocated by task 283:
[   14.757214]  kasan_save_stack+0x45/0x70
[   14.757625]  kasan_save_track+0x18/0x40
[   14.757821]  kasan_save_alloc_info+0x3b/0x50
[   14.757991]  __kasan_kmalloc+0xb7/0xc0
[   14.758193]  __kmalloc_cache_noprof+0x189/0x420
[   14.758492]  kasan_atomics+0x95/0x310
[   14.758693]  kunit_try_run_case+0x1a5/0x480
[   14.758877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.759102]  kthread+0x337/0x6f0
[   14.759258]  ret_from_fork+0x116/0x1d0
[   14.759521]  ret_from_fork_asm+0x1a/0x30
[   14.759688] 
[   14.759786] The buggy address belongs to the object at ffff8881039b8880
[   14.759786]  which belongs to the cache kmalloc-64 of size 64
[   14.760277] The buggy address is located 0 bytes to the right of
[   14.760277]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.760849] 
[   14.760948] The buggy address belongs to the physical page:
[   14.761143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.761579] flags: 0x200000000000000(node=0|zone=2)
[   14.761758] page_type: f5(slab)
[   14.761926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.762278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.762727] page dumped because: kasan: bad access detected
[   14.762984] 
[   14.763092] Memory state around the buggy address:
[   14.763317]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.763627]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.763901] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.764243]                                      ^
[   14.764550]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.764842]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.765135] ==================================================================
[   15.638136] ==================================================================
[   15.638485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.638931] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.639224] 
[   15.639308] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.639352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.639364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.639385] Call Trace:
[   15.639399]  <TASK>
[   15.639413]  dump_stack_lvl+0x73/0xb0
[   15.639478]  print_report+0xd1/0x610
[   15.639501]  ? __virt_addr_valid+0x1db/0x2d0
[   15.639523]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.639544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.639566]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.639588]  kasan_report+0x141/0x180
[   15.639610]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.639636]  kasan_check_range+0x10c/0x1c0
[   15.639660]  __kasan_check_write+0x18/0x20
[   15.639680]  kasan_atomics_helper+0x1e12/0x5450
[   15.639703]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.639726]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.639750]  ? kasan_atomics+0x152/0x310
[   15.639776]  kasan_atomics+0x1dc/0x310
[   15.639801]  ? __pfx_kasan_atomics+0x10/0x10
[   15.639825]  ? __pfx_read_tsc+0x10/0x10
[   15.639846]  ? ktime_get_ts64+0x86/0x230
[   15.639871]  kunit_try_run_case+0x1a5/0x480
[   15.639895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.639918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.639974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.640032]  ? __kthread_parkme+0x82/0x180
[   15.640055]  ? preempt_count_sub+0x50/0x80
[   15.640077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.640101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.640124]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.640148]  kthread+0x337/0x6f0
[   15.640167]  ? trace_preempt_on+0x20/0xc0
[   15.640189]  ? __pfx_kthread+0x10/0x10
[   15.640210]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.640231]  ? calculate_sigpending+0x7b/0xa0
[   15.640254]  ? __pfx_kthread+0x10/0x10
[   15.640276]  ret_from_fork+0x116/0x1d0
[   15.640294]  ? __pfx_kthread+0x10/0x10
[   15.640317]  ret_from_fork_asm+0x1a/0x30
[   15.640348]  </TASK>
[   15.640358] 
[   15.648840] Allocated by task 283:
[   15.649020]  kasan_save_stack+0x45/0x70
[   15.649254]  kasan_save_track+0x18/0x40
[   15.649561]  kasan_save_alloc_info+0x3b/0x50
[   15.649820]  __kasan_kmalloc+0xb7/0xc0
[   15.650031]  __kmalloc_cache_noprof+0x189/0x420
[   15.650256]  kasan_atomics+0x95/0x310
[   15.650530]  kunit_try_run_case+0x1a5/0x480
[   15.650827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.651091]  kthread+0x337/0x6f0
[   15.651293]  ret_from_fork+0x116/0x1d0
[   15.651550]  ret_from_fork_asm+0x1a/0x30
[   15.651724] 
[   15.651794] The buggy address belongs to the object at ffff8881039b8880
[   15.651794]  which belongs to the cache kmalloc-64 of size 64
[   15.652271] The buggy address is located 0 bytes to the right of
[   15.652271]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.652749] 
[   15.652821] The buggy address belongs to the physical page:
[   15.652989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.653230] flags: 0x200000000000000(node=0|zone=2)
[   15.653386] page_type: f5(slab)
[   15.653670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.654017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.654765] page dumped because: kasan: bad access detected
[   15.655014] 
[   15.655107] Memory state around the buggy address:
[   15.655254]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.655460]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.655666] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.655877]                                      ^
[   15.656032]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.656704]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.657038] ==================================================================
[   15.821550] ==================================================================
[   15.821898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.822231] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.822543] 
[   15.822649] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.822712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.822724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.822744] Call Trace:
[   15.822758]  <TASK>
[   15.822773]  dump_stack_lvl+0x73/0xb0
[   15.822800]  print_report+0xd1/0x610
[   15.822822]  ? __virt_addr_valid+0x1db/0x2d0
[   15.822843]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.822886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.822908]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.822929]  kasan_report+0x141/0x180
[   15.822951]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.822978]  __asan_report_load8_noabort+0x18/0x20
[   15.823002]  kasan_atomics_helper+0x4fa5/0x5450
[   15.823035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.823057]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.823080]  ? kasan_atomics+0x152/0x310
[   15.823106]  kasan_atomics+0x1dc/0x310
[   15.823129]  ? __pfx_kasan_atomics+0x10/0x10
[   15.823153]  ? __pfx_read_tsc+0x10/0x10
[   15.823173]  ? ktime_get_ts64+0x86/0x230
[   15.823196]  kunit_try_run_case+0x1a5/0x480
[   15.823220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.823242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.823265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.823289]  ? __kthread_parkme+0x82/0x180
[   15.823309]  ? preempt_count_sub+0x50/0x80
[   15.823332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.823356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.823399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.823424]  kthread+0x337/0x6f0
[   15.823443]  ? trace_preempt_on+0x20/0xc0
[   15.823466]  ? __pfx_kthread+0x10/0x10
[   15.823486]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.823509]  ? calculate_sigpending+0x7b/0xa0
[   15.823532]  ? __pfx_kthread+0x10/0x10
[   15.823554]  ret_from_fork+0x116/0x1d0
[   15.823572]  ? __pfx_kthread+0x10/0x10
[   15.823613]  ret_from_fork_asm+0x1a/0x30
[   15.823644]  </TASK>
[   15.823654] 
[   15.830752] Allocated by task 283:
[   15.830934]  kasan_save_stack+0x45/0x70
[   15.831138]  kasan_save_track+0x18/0x40
[   15.831331]  kasan_save_alloc_info+0x3b/0x50
[   15.831506]  __kasan_kmalloc+0xb7/0xc0
[   15.831639]  __kmalloc_cache_noprof+0x189/0x420
[   15.831794]  kasan_atomics+0x95/0x310
[   15.831927]  kunit_try_run_case+0x1a5/0x480
[   15.832116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.832371]  kthread+0x337/0x6f0
[   15.832560]  ret_from_fork+0x116/0x1d0
[   15.832752]  ret_from_fork_asm+0x1a/0x30
[   15.832955] 
[   15.833068] The buggy address belongs to the object at ffff8881039b8880
[   15.833068]  which belongs to the cache kmalloc-64 of size 64
[   15.833659] The buggy address is located 0 bytes to the right of
[   15.833659]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.834232] 
[   15.834307] The buggy address belongs to the physical page:
[   15.834503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.834744] flags: 0x200000000000000(node=0|zone=2)
[   15.834934] page_type: f5(slab)
[   15.835110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.835517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.835872] page dumped because: kasan: bad access detected
[   15.836137] 
[   15.836251] Memory state around the buggy address:
[   15.836484]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.836787]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.837103] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.837410]                                      ^
[   15.837628]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.837862]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.838118] ==================================================================
[   14.872427] ==================================================================
[   14.872840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.873215] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.873537] 
[   14.873652] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.873694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.873706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.873728] Call Trace:
[   14.873743]  <TASK>
[   14.873759]  dump_stack_lvl+0x73/0xb0
[   14.873785]  print_report+0xd1/0x610
[   14.873807]  ? __virt_addr_valid+0x1db/0x2d0
[   14.873828]  ? kasan_atomics_helper+0xde0/0x5450
[   14.873853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.873875]  ? kasan_atomics_helper+0xde0/0x5450
[   14.873905]  kasan_report+0x141/0x180
[   14.873927]  ? kasan_atomics_helper+0xde0/0x5450
[   14.873954]  kasan_check_range+0x10c/0x1c0
[   14.873978]  __kasan_check_write+0x18/0x20
[   14.874023]  kasan_atomics_helper+0xde0/0x5450
[   14.874045]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.874067]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.874092]  ? kasan_atomics+0x152/0x310
[   14.874118]  kasan_atomics+0x1dc/0x310
[   14.874141]  ? __pfx_kasan_atomics+0x10/0x10
[   14.874165]  ? __pfx_read_tsc+0x10/0x10
[   14.874186]  ? ktime_get_ts64+0x86/0x230
[   14.874210]  kunit_try_run_case+0x1a5/0x480
[   14.874235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.874257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.874280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.874304]  ? __kthread_parkme+0x82/0x180
[   14.874325]  ? preempt_count_sub+0x50/0x80
[   14.874348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.874373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.874404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.874428]  kthread+0x337/0x6f0
[   14.874448]  ? trace_preempt_on+0x20/0xc0
[   14.874471]  ? __pfx_kthread+0x10/0x10
[   14.874492]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.874513]  ? calculate_sigpending+0x7b/0xa0
[   14.874537]  ? __pfx_kthread+0x10/0x10
[   14.874558]  ret_from_fork+0x116/0x1d0
[   14.874577]  ? __pfx_kthread+0x10/0x10
[   14.874597]  ret_from_fork_asm+0x1a/0x30
[   14.874628]  </TASK>
[   14.874638] 
[   14.882294] Allocated by task 283:
[   14.882438]  kasan_save_stack+0x45/0x70
[   14.882633]  kasan_save_track+0x18/0x40
[   14.882823]  kasan_save_alloc_info+0x3b/0x50
[   14.883058]  __kasan_kmalloc+0xb7/0xc0
[   14.883245]  __kmalloc_cache_noprof+0x189/0x420
[   14.883465]  kasan_atomics+0x95/0x310
[   14.883651]  kunit_try_run_case+0x1a5/0x480
[   14.883857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.884669]  kthread+0x337/0x6f0
[   14.884845]  ret_from_fork+0x116/0x1d0
[   14.885035]  ret_from_fork_asm+0x1a/0x30
[   14.885209] 
[   14.885281] The buggy address belongs to the object at ffff8881039b8880
[   14.885281]  which belongs to the cache kmalloc-64 of size 64
[   14.885734] The buggy address is located 0 bytes to the right of
[   14.885734]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.886123] 
[   14.886227] The buggy address belongs to the physical page:
[   14.886570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.886926] flags: 0x200000000000000(node=0|zone=2)
[   14.887165] page_type: f5(slab)
[   14.887333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.887775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.888130] page dumped because: kasan: bad access detected
[   14.888586] 
[   14.888688] Memory state around the buggy address:
[   14.888920]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.889233]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.889600] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.889907]                                      ^
[   14.890115]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.890474]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.890777] ==================================================================
[   15.023965] ==================================================================
[   15.024311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.024585] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.024809] 
[   15.024889] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.024930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.024943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.024964] Call Trace:
[   15.024984]  <TASK>
[   15.024997]  dump_stack_lvl+0x73/0xb0
[   15.025045]  print_report+0xd1/0x610
[   15.025067]  ? __virt_addr_valid+0x1db/0x2d0
[   15.025110]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.025133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.025156]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.025178]  kasan_report+0x141/0x180
[   15.025200]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.025226]  __asan_report_load4_noabort+0x18/0x20
[   15.025251]  kasan_atomics_helper+0x4a02/0x5450
[   15.025273]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.025295]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.025319]  ? kasan_atomics+0x152/0x310
[   15.025364]  kasan_atomics+0x1dc/0x310
[   15.025403]  ? __pfx_kasan_atomics+0x10/0x10
[   15.025427]  ? __pfx_read_tsc+0x10/0x10
[   15.025447]  ? ktime_get_ts64+0x86/0x230
[   15.025471]  kunit_try_run_case+0x1a5/0x480
[   15.025495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.025517]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.025541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.025564]  ? __kthread_parkme+0x82/0x180
[   15.025585]  ? preempt_count_sub+0x50/0x80
[   15.025608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.025632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.025655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.025679]  kthread+0x337/0x6f0
[   15.025699]  ? trace_preempt_on+0x20/0xc0
[   15.025720]  ? __pfx_kthread+0x10/0x10
[   15.025742]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.025763]  ? calculate_sigpending+0x7b/0xa0
[   15.025787]  ? __pfx_kthread+0x10/0x10
[   15.025808]  ret_from_fork+0x116/0x1d0
[   15.025827]  ? __pfx_kthread+0x10/0x10
[   15.025847]  ret_from_fork_asm+0x1a/0x30
[   15.025877]  </TASK>
[   15.025888] 
[   15.034017] Allocated by task 283:
[   15.034236]  kasan_save_stack+0x45/0x70
[   15.034453]  kasan_save_track+0x18/0x40
[   15.034733]  kasan_save_alloc_info+0x3b/0x50
[   15.035074]  __kasan_kmalloc+0xb7/0xc0
[   15.035210]  __kmalloc_cache_noprof+0x189/0x420
[   15.035487]  kasan_atomics+0x95/0x310
[   15.035673]  kunit_try_run_case+0x1a5/0x480
[   15.035838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.036026]  kthread+0x337/0x6f0
[   15.036261]  ret_from_fork+0x116/0x1d0
[   15.036474]  ret_from_fork_asm+0x1a/0x30
[   15.036770] 
[   15.036842] The buggy address belongs to the object at ffff8881039b8880
[   15.036842]  which belongs to the cache kmalloc-64 of size 64
[   15.037374] The buggy address is located 0 bytes to the right of
[   15.037374]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.037771] 
[   15.037867] The buggy address belongs to the physical page:
[   15.038127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.038484] flags: 0x200000000000000(node=0|zone=2)
[   15.038704] page_type: f5(slab)
[   15.038852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.039229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.039641] page dumped because: kasan: bad access detected
[   15.039859] 
[   15.040021] Memory state around the buggy address:
[   15.040262]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.040551]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.040849] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.041175]                                      ^
[   15.041337]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.041553]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.041764] ==================================================================
[   15.862279] ==================================================================
[   15.863383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.864260] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.864862] 
[   15.864954] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.865004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.865028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.865050] Call Trace:
[   15.865065]  <TASK>
[   15.865080]  dump_stack_lvl+0x73/0xb0
[   15.865108]  print_report+0xd1/0x610
[   15.865129]  ? __virt_addr_valid+0x1db/0x2d0
[   15.865151]  ? kasan_atomics_helper+0x5115/0x5450
[   15.865173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.865195]  ? kasan_atomics_helper+0x5115/0x5450
[   15.865216]  kasan_report+0x141/0x180
[   15.865239]  ? kasan_atomics_helper+0x5115/0x5450
[   15.865266]  __asan_report_load8_noabort+0x18/0x20
[   15.865290]  kasan_atomics_helper+0x5115/0x5450
[   15.865313]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.865335]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.865360]  ? kasan_atomics+0x152/0x310
[   15.865386]  kasan_atomics+0x1dc/0x310
[   15.865409]  ? __pfx_kasan_atomics+0x10/0x10
[   15.865433]  ? __pfx_read_tsc+0x10/0x10
[   15.865453]  ? ktime_get_ts64+0x86/0x230
[   15.865478]  kunit_try_run_case+0x1a5/0x480
[   15.865599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.865623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.865647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.865671]  ? __kthread_parkme+0x82/0x180
[   15.865691]  ? preempt_count_sub+0x50/0x80
[   15.865716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.865741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.865766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.865792]  kthread+0x337/0x6f0
[   15.865811]  ? trace_preempt_on+0x20/0xc0
[   15.865835]  ? __pfx_kthread+0x10/0x10
[   15.865858]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.865880]  ? calculate_sigpending+0x7b/0xa0
[   15.865905]  ? __pfx_kthread+0x10/0x10
[   15.865926]  ret_from_fork+0x116/0x1d0
[   15.865945]  ? __pfx_kthread+0x10/0x10
[   15.865966]  ret_from_fork_asm+0x1a/0x30
[   15.865998]  </TASK>
[   15.866017] 
[   15.873497] Allocated by task 283:
[   15.873685]  kasan_save_stack+0x45/0x70
[   15.873886]  kasan_save_track+0x18/0x40
[   15.874093]  kasan_save_alloc_info+0x3b/0x50
[   15.874318]  __kasan_kmalloc+0xb7/0xc0
[   15.874519]  __kmalloc_cache_noprof+0x189/0x420
[   15.874742]  kasan_atomics+0x95/0x310
[   15.874909]  kunit_try_run_case+0x1a5/0x480
[   15.875088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.875366]  kthread+0x337/0x6f0
[   15.875562]  ret_from_fork+0x116/0x1d0
[   15.875738]  ret_from_fork_asm+0x1a/0x30
[   15.875941] 
[   15.876045] The buggy address belongs to the object at ffff8881039b8880
[   15.876045]  which belongs to the cache kmalloc-64 of size 64
[   15.876504] The buggy address is located 0 bytes to the right of
[   15.876504]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.876869] 
[   15.876941] The buggy address belongs to the physical page:
[   15.877131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.877592] flags: 0x200000000000000(node=0|zone=2)
[   15.877855] page_type: f5(slab)
[   15.878042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.878382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.878630] page dumped because: kasan: bad access detected
[   15.878800] 
[   15.878869] Memory state around the buggy address:
[   15.879041]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.879364]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.879723] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.880048]                                      ^
[   15.880293]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.880573]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.880909] ==================================================================
[   14.672991] ==================================================================
[   14.673337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.673869] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.674213] 
[   14.674317] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.674396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.674409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.674430] Call Trace:
[   14.674443]  <TASK>
[   14.674457]  dump_stack_lvl+0x73/0xb0
[   14.674483]  print_report+0xd1/0x610
[   14.674505]  ? __virt_addr_valid+0x1db/0x2d0
[   14.674526]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.674546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.674569]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.674590]  kasan_report+0x141/0x180
[   14.674612]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.674638]  kasan_check_range+0x10c/0x1c0
[   14.674662]  __kasan_check_write+0x18/0x20
[   14.674681]  kasan_atomics_helper+0x7c7/0x5450
[   14.674704]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.674726]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.674750]  ? kasan_atomics+0x152/0x310
[   14.674776]  kasan_atomics+0x1dc/0x310
[   14.674799]  ? __pfx_kasan_atomics+0x10/0x10
[   14.674823]  ? __pfx_read_tsc+0x10/0x10
[   14.674843]  ? ktime_get_ts64+0x86/0x230
[   14.674867]  kunit_try_run_case+0x1a5/0x480
[   14.674892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.674914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.674936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.674959]  ? __kthread_parkme+0x82/0x180
[   14.674979]  ? preempt_count_sub+0x50/0x80
[   14.675012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.675036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.675060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.675084]  kthread+0x337/0x6f0
[   14.675103]  ? trace_preempt_on+0x20/0xc0
[   14.675126]  ? __pfx_kthread+0x10/0x10
[   14.675146]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.675167]  ? calculate_sigpending+0x7b/0xa0
[   14.675191]  ? __pfx_kthread+0x10/0x10
[   14.675212]  ret_from_fork+0x116/0x1d0
[   14.675231]  ? __pfx_kthread+0x10/0x10
[   14.675251]  ret_from_fork_asm+0x1a/0x30
[   14.675281]  </TASK>
[   14.675291] 
[   14.683284] Allocated by task 283:
[   14.683498]  kasan_save_stack+0x45/0x70
[   14.683648]  kasan_save_track+0x18/0x40
[   14.683801]  kasan_save_alloc_info+0x3b/0x50
[   14.684027]  __kasan_kmalloc+0xb7/0xc0
[   14.684216]  __kmalloc_cache_noprof+0x189/0x420
[   14.684543]  kasan_atomics+0x95/0x310
[   14.684739]  kunit_try_run_case+0x1a5/0x480
[   14.684952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.685225]  kthread+0x337/0x6f0
[   14.685586]  ret_from_fork+0x116/0x1d0
[   14.685790]  ret_from_fork_asm+0x1a/0x30
[   14.685975] 
[   14.686078] The buggy address belongs to the object at ffff8881039b8880
[   14.686078]  which belongs to the cache kmalloc-64 of size 64
[   14.686631] The buggy address is located 0 bytes to the right of
[   14.686631]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.687133] 
[   14.687218] The buggy address belongs to the physical page:
[   14.687502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.687826] flags: 0x200000000000000(node=0|zone=2)
[   14.688074] page_type: f5(slab)
[   14.688199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.688508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.688740] page dumped because: kasan: bad access detected
[   14.689013] 
[   14.689107] Memory state around the buggy address:
[   14.689329]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.689840]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.690179] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.690587]                                      ^
[   14.690781]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.691068]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.691286] ==================================================================
[   14.987923] ==================================================================
[   14.988249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.988577] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.988803] 
[   14.988884] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.988923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.988935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.988955] Call Trace:
[   14.988974]  <TASK>
[   14.988988]  dump_stack_lvl+0x73/0xb0
[   14.989024]  print_report+0xd1/0x610
[   14.989046]  ? __virt_addr_valid+0x1db/0x2d0
[   14.989071]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.989092]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.989115]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.989166]  kasan_report+0x141/0x180
[   14.989188]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.989215]  __asan_report_load4_noabort+0x18/0x20
[   14.989239]  kasan_atomics_helper+0x4a1c/0x5450
[   14.989263]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.989285]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.989310]  ? kasan_atomics+0x152/0x310
[   14.989337]  kasan_atomics+0x1dc/0x310
[   14.989368]  ? __pfx_kasan_atomics+0x10/0x10
[   14.989392]  ? __pfx_read_tsc+0x10/0x10
[   14.989412]  ? ktime_get_ts64+0x86/0x230
[   14.989436]  kunit_try_run_case+0x1a5/0x480
[   14.989460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.989482]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.989506]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.989529]  ? __kthread_parkme+0x82/0x180
[   14.989550]  ? preempt_count_sub+0x50/0x80
[   14.989573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.989598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.989621]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.989645]  kthread+0x337/0x6f0
[   14.989664]  ? trace_preempt_on+0x20/0xc0
[   14.989687]  ? __pfx_kthread+0x10/0x10
[   14.989708]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.989729]  ? calculate_sigpending+0x7b/0xa0
[   14.989752]  ? __pfx_kthread+0x10/0x10
[   14.989774]  ret_from_fork+0x116/0x1d0
[   14.989793]  ? __pfx_kthread+0x10/0x10
[   14.989814]  ret_from_fork_asm+0x1a/0x30
[   14.989843]  </TASK>
[   14.989853] 
[   14.997802] Allocated by task 283:
[   14.997953]  kasan_save_stack+0x45/0x70
[   14.998174]  kasan_save_track+0x18/0x40
[   14.998361]  kasan_save_alloc_info+0x3b/0x50
[   14.998584]  __kasan_kmalloc+0xb7/0xc0
[   14.998718]  __kmalloc_cache_noprof+0x189/0x420
[   14.998874]  kasan_atomics+0x95/0x310
[   14.999016]  kunit_try_run_case+0x1a5/0x480
[   14.999224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.999517]  kthread+0x337/0x6f0
[   14.999685]  ret_from_fork+0x116/0x1d0
[   14.999871]  ret_from_fork_asm+0x1a/0x30
[   15.000155] 
[   15.000268] The buggy address belongs to the object at ffff8881039b8880
[   15.000268]  which belongs to the cache kmalloc-64 of size 64
[   15.000810] The buggy address is located 0 bytes to the right of
[   15.000810]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.001385] 
[   15.001483] The buggy address belongs to the physical page:
[   15.001703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.002000] flags: 0x200000000000000(node=0|zone=2)
[   15.002208] page_type: f5(slab)
[   15.002364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.002671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.002966] page dumped because: kasan: bad access detected
[   15.003221] 
[   15.003305] Memory state around the buggy address:
[   15.003484]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.003791]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.004074] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.004288]                                      ^
[   15.004636]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.004982]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.005255] ==================================================================
[   15.152342] ==================================================================
[   15.153084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.153367] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.153862] 
[   15.153971] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.154179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.154245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.154267] Call Trace:
[   15.154281]  <TASK>
[   15.154295]  dump_stack_lvl+0x73/0xb0
[   15.154324]  print_report+0xd1/0x610
[   15.154346]  ? __virt_addr_valid+0x1db/0x2d0
[   15.154562]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.154590]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.154612]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.154634]  kasan_report+0x141/0x180
[   15.154657]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.154683]  kasan_check_range+0x10c/0x1c0
[   15.154707]  __kasan_check_read+0x15/0x20
[   15.154725]  kasan_atomics_helper+0x13b5/0x5450
[   15.154748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.154770]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.154794]  ? kasan_atomics+0x152/0x310
[   15.154820]  kasan_atomics+0x1dc/0x310
[   15.154842]  ? __pfx_kasan_atomics+0x10/0x10
[   15.154866]  ? __pfx_read_tsc+0x10/0x10
[   15.154886]  ? ktime_get_ts64+0x86/0x230
[   15.154912]  kunit_try_run_case+0x1a5/0x480
[   15.154935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.154958]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.154980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.155016]  ? __kthread_parkme+0x82/0x180
[   15.155037]  ? preempt_count_sub+0x50/0x80
[   15.155061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.155086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.155109]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.155133]  kthread+0x337/0x6f0
[   15.155151]  ? trace_preempt_on+0x20/0xc0
[   15.155174]  ? __pfx_kthread+0x10/0x10
[   15.155194]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.155216]  ? calculate_sigpending+0x7b/0xa0
[   15.155239]  ? __pfx_kthread+0x10/0x10
[   15.155260]  ret_from_fork+0x116/0x1d0
[   15.155279]  ? __pfx_kthread+0x10/0x10
[   15.155299]  ret_from_fork_asm+0x1a/0x30
[   15.155329]  </TASK>
[   15.155339] 
[   15.166394] Allocated by task 283:
[   15.166792]  kasan_save_stack+0x45/0x70
[   15.167080]  kasan_save_track+0x18/0x40
[   15.167237]  kasan_save_alloc_info+0x3b/0x50
[   15.167458]  __kasan_kmalloc+0xb7/0xc0
[   15.167917]  __kmalloc_cache_noprof+0x189/0x420
[   15.168160]  kasan_atomics+0x95/0x310
[   15.168338]  kunit_try_run_case+0x1a5/0x480
[   15.168864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.169096]  kthread+0x337/0x6f0
[   15.169497]  ret_from_fork+0x116/0x1d0
[   15.169685]  ret_from_fork_asm+0x1a/0x30
[   15.169867] 
[   15.169950] The buggy address belongs to the object at ffff8881039b8880
[   15.169950]  which belongs to the cache kmalloc-64 of size 64
[   15.170488] The buggy address is located 0 bytes to the right of
[   15.170488]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.171348] 
[   15.171627] The buggy address belongs to the physical page:
[   15.172161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.172658] flags: 0x200000000000000(node=0|zone=2)
[   15.172960] page_type: f5(slab)
[   15.173107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.173615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.173896] page dumped because: kasan: bad access detected
[   15.174164] 
[   15.174263] Memory state around the buggy address:
[   15.174432]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.174749]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.175042] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.175328]                                      ^
[   15.176138]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.176494]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.177104] ==================================================================
[   14.505522] ==================================================================
[   14.506216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.506913] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.507519] 
[   14.507679] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.507721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.507733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.507755] Call Trace:
[   14.507769]  <TASK>
[   14.507782]  dump_stack_lvl+0x73/0xb0
[   14.507810]  print_report+0xd1/0x610
[   14.507832]  ? __virt_addr_valid+0x1db/0x2d0
[   14.507854]  ? kasan_atomics_helper+0x3df/0x5450
[   14.507874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.507896]  ? kasan_atomics_helper+0x3df/0x5450
[   14.507918]  kasan_report+0x141/0x180
[   14.507939]  ? kasan_atomics_helper+0x3df/0x5450
[   14.507966]  kasan_check_range+0x10c/0x1c0
[   14.507989]  __kasan_check_read+0x15/0x20
[   14.508019]  kasan_atomics_helper+0x3df/0x5450
[   14.508041]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.508064]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.508088]  ? kasan_atomics+0x152/0x310
[   14.508114]  kasan_atomics+0x1dc/0x310
[   14.508136]  ? __pfx_kasan_atomics+0x10/0x10
[   14.508160]  ? __pfx_read_tsc+0x10/0x10
[   14.508182]  ? ktime_get_ts64+0x86/0x230
[   14.508206]  kunit_try_run_case+0x1a5/0x480
[   14.508231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.508253]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.508278]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.508303]  ? __kthread_parkme+0x82/0x180
[   14.508323]  ? preempt_count_sub+0x50/0x80
[   14.508347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.508382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.508406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.508429]  kthread+0x337/0x6f0
[   14.508449]  ? trace_preempt_on+0x20/0xc0
[   14.508472]  ? __pfx_kthread+0x10/0x10
[   14.508495]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.508527]  ? calculate_sigpending+0x7b/0xa0
[   14.508551]  ? __pfx_kthread+0x10/0x10
[   14.508574]  ret_from_fork+0x116/0x1d0
[   14.508592]  ? __pfx_kthread+0x10/0x10
[   14.508613]  ret_from_fork_asm+0x1a/0x30
[   14.508644]  </TASK>
[   14.508654] 
[   14.523251] Allocated by task 283:
[   14.523565]  kasan_save_stack+0x45/0x70
[   14.524001]  kasan_save_track+0x18/0x40
[   14.524443]  kasan_save_alloc_info+0x3b/0x50
[   14.524822]  __kasan_kmalloc+0xb7/0xc0
[   14.525224]  __kmalloc_cache_noprof+0x189/0x420
[   14.525624]  kasan_atomics+0x95/0x310
[   14.525772]  kunit_try_run_case+0x1a5/0x480
[   14.526181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.526789]  kthread+0x337/0x6f0
[   14.526918]  ret_from_fork+0x116/0x1d0
[   14.527275]  ret_from_fork_asm+0x1a/0x30
[   14.527659] 
[   14.527816] The buggy address belongs to the object at ffff8881039b8880
[   14.527816]  which belongs to the cache kmalloc-64 of size 64
[   14.528717] The buggy address is located 0 bytes to the right of
[   14.528717]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.529943] 
[   14.530036] The buggy address belongs to the physical page:
[   14.530207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.530549] flags: 0x200000000000000(node=0|zone=2)
[   14.531468] page_type: f5(slab)
[   14.531789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.532547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.533211] page dumped because: kasan: bad access detected
[   14.533802] 
[   14.533961] Memory state around the buggy address:
[   14.534445]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.534778]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.534989] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.535211]                                      ^
[   14.535374]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.536202]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.537054] ==================================================================
[   15.609703] ==================================================================
[   15.610297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.610977] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.611261] 
[   15.611347] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.611390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.611403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.611425] Call Trace:
[   15.611441]  <TASK>
[   15.611456]  dump_stack_lvl+0x73/0xb0
[   15.611485]  print_report+0xd1/0x610
[   15.611507]  ? __virt_addr_valid+0x1db/0x2d0
[   15.611529]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.611550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.611573]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.611595]  kasan_report+0x141/0x180
[   15.611617]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.611644]  kasan_check_range+0x10c/0x1c0
[   15.611667]  __kasan_check_write+0x18/0x20
[   15.611687]  kasan_atomics_helper+0x1d7a/0x5450
[   15.611709]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.611731]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.611756]  ? kasan_atomics+0x152/0x310
[   15.611782]  kasan_atomics+0x1dc/0x310
[   15.611804]  ? __pfx_kasan_atomics+0x10/0x10
[   15.611828]  ? __pfx_read_tsc+0x10/0x10
[   15.611849]  ? ktime_get_ts64+0x86/0x230
[   15.611872]  kunit_try_run_case+0x1a5/0x480
[   15.611896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.611918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.611941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.611964]  ? __kthread_parkme+0x82/0x180
[   15.611983]  ? preempt_count_sub+0x50/0x80
[   15.612017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.612041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.612063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.612087]  kthread+0x337/0x6f0
[   15.612106]  ? trace_preempt_on+0x20/0xc0
[   15.612128]  ? __pfx_kthread+0x10/0x10
[   15.612148]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.612170]  ? calculate_sigpending+0x7b/0xa0
[   15.612194]  ? __pfx_kthread+0x10/0x10
[   15.612215]  ret_from_fork+0x116/0x1d0
[   15.612233]  ? __pfx_kthread+0x10/0x10
[   15.612254]  ret_from_fork_asm+0x1a/0x30
[   15.612285]  </TASK>
[   15.612295] 
[   15.625131] Allocated by task 283:
[   15.625328]  kasan_save_stack+0x45/0x70
[   15.625907]  kasan_save_track+0x18/0x40
[   15.626077]  kasan_save_alloc_info+0x3b/0x50
[   15.626505]  __kasan_kmalloc+0xb7/0xc0
[   15.626860]  __kmalloc_cache_noprof+0x189/0x420
[   15.627101]  kasan_atomics+0x95/0x310
[   15.627295]  kunit_try_run_case+0x1a5/0x480
[   15.627811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.628255]  kthread+0x337/0x6f0
[   15.628587]  ret_from_fork+0x116/0x1d0
[   15.628802]  ret_from_fork_asm+0x1a/0x30
[   15.629207] 
[   15.629453] The buggy address belongs to the object at ffff8881039b8880
[   15.629453]  which belongs to the cache kmalloc-64 of size 64
[   15.630259] The buggy address is located 0 bytes to the right of
[   15.630259]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.631030] 
[   15.631312] The buggy address belongs to the physical page:
[   15.631640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.632030] flags: 0x200000000000000(node=0|zone=2)
[   15.632501] page_type: f5(slab)
[   15.632754] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.633193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.633724] page dumped because: kasan: bad access detected
[   15.634169] 
[   15.634271] Memory state around the buggy address:
[   15.634551]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.635138]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.635644] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.636105]                                      ^
[   15.636317]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.636884]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.637481] ==================================================================
[   15.786239] ==================================================================
[   15.786591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.787345] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.787831] 
[   15.787943] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.787986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.787999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.788032] Call Trace:
[   15.788048]  <TASK>
[   15.788062]  dump_stack_lvl+0x73/0xb0
[   15.788089]  print_report+0xd1/0x610
[   15.788112]  ? __virt_addr_valid+0x1db/0x2d0
[   15.788134]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.788155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.788178]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.788199]  kasan_report+0x141/0x180
[   15.788243]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.788270]  __asan_report_load8_noabort+0x18/0x20
[   15.788295]  kasan_atomics_helper+0x4fb2/0x5450
[   15.788318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.788340]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.788401]  ? kasan_atomics+0x152/0x310
[   15.788427]  kasan_atomics+0x1dc/0x310
[   15.788449]  ? __pfx_kasan_atomics+0x10/0x10
[   15.788472]  ? __pfx_read_tsc+0x10/0x10
[   15.788493]  ? ktime_get_ts64+0x86/0x230
[   15.788517]  kunit_try_run_case+0x1a5/0x480
[   15.788541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.788563]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.788586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.788610]  ? __kthread_parkme+0x82/0x180
[   15.788630]  ? preempt_count_sub+0x50/0x80
[   15.788653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.788677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.788701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.788724]  kthread+0x337/0x6f0
[   15.788761]  ? trace_preempt_on+0x20/0xc0
[   15.788785]  ? __pfx_kthread+0x10/0x10
[   15.788806]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.788828]  ? calculate_sigpending+0x7b/0xa0
[   15.788851]  ? __pfx_kthread+0x10/0x10
[   15.788872]  ret_from_fork+0x116/0x1d0
[   15.788891]  ? __pfx_kthread+0x10/0x10
[   15.788911]  ret_from_fork_asm+0x1a/0x30
[   15.788942]  </TASK>
[   15.788952] 
[   15.796341] Allocated by task 283:
[   15.796559]  kasan_save_stack+0x45/0x70
[   15.796740]  kasan_save_track+0x18/0x40
[   15.796942]  kasan_save_alloc_info+0x3b/0x50
[   15.797146]  __kasan_kmalloc+0xb7/0xc0
[   15.797332]  __kmalloc_cache_noprof+0x189/0x420
[   15.797562]  kasan_atomics+0x95/0x310
[   15.797746]  kunit_try_run_case+0x1a5/0x480
[   15.797965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.798204]  kthread+0x337/0x6f0
[   15.798371]  ret_from_fork+0x116/0x1d0
[   15.798531]  ret_from_fork_asm+0x1a/0x30
[   15.798672] 
[   15.798744] The buggy address belongs to the object at ffff8881039b8880
[   15.798744]  which belongs to the cache kmalloc-64 of size 64
[   15.799248] The buggy address is located 0 bytes to the right of
[   15.799248]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.799815] 
[   15.799901] The buggy address belongs to the physical page:
[   15.800083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.800460] flags: 0x200000000000000(node=0|zone=2)
[   15.800670] page_type: f5(slab)
[   15.800789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.801056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.801438] page dumped because: kasan: bad access detected
[   15.801692] 
[   15.801788] Memory state around the buggy address:
[   15.802040]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.802372]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.802610] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.802826]                                      ^
[   15.803031]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.803392]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.803748] ==================================================================
[   15.060565] ==================================================================
[   15.060799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.061051] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.061272] 
[   15.061392] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.061434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.061446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.061466] Call Trace:
[   15.061479]  <TASK>
[   15.061493]  dump_stack_lvl+0x73/0xb0
[   15.061519]  print_report+0xd1/0x610
[   15.061541]  ? __virt_addr_valid+0x1db/0x2d0
[   15.061563]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.061584]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.061606]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.061628]  kasan_report+0x141/0x180
[   15.061649]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.061676]  __asan_report_load4_noabort+0x18/0x20
[   15.061700]  kasan_atomics_helper+0x49e8/0x5450
[   15.061722]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.061744]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.061768]  ? kasan_atomics+0x152/0x310
[   15.061794]  kasan_atomics+0x1dc/0x310
[   15.061830]  ? __pfx_kasan_atomics+0x10/0x10
[   15.061855]  ? __pfx_read_tsc+0x10/0x10
[   15.061875]  ? ktime_get_ts64+0x86/0x230
[   15.061898]  kunit_try_run_case+0x1a5/0x480
[   15.061922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.061944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.061967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.061990]  ? __kthread_parkme+0x82/0x180
[   15.062020]  ? preempt_count_sub+0x50/0x80
[   15.062043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.062066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.062090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.062113]  kthread+0x337/0x6f0
[   15.062133]  ? trace_preempt_on+0x20/0xc0
[   15.062155]  ? __pfx_kthread+0x10/0x10
[   15.062176]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.062197]  ? calculate_sigpending+0x7b/0xa0
[   15.062220]  ? __pfx_kthread+0x10/0x10
[   15.062242]  ret_from_fork+0x116/0x1d0
[   15.062260]  ? __pfx_kthread+0x10/0x10
[   15.062281]  ret_from_fork_asm+0x1a/0x30
[   15.062310]  </TASK>
[   15.062321] 
[   15.071129] Allocated by task 283:
[   15.071982]  kasan_save_stack+0x45/0x70
[   15.072528]  kasan_save_track+0x18/0x40
[   15.072830]  kasan_save_alloc_info+0x3b/0x50
[   15.073063]  __kasan_kmalloc+0xb7/0xc0
[   15.073220]  __kmalloc_cache_noprof+0x189/0x420
[   15.073767]  kasan_atomics+0x95/0x310
[   15.073986]  kunit_try_run_case+0x1a5/0x480
[   15.074817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.075725]  kthread+0x337/0x6f0
[   15.076265]  ret_from_fork+0x116/0x1d0
[   15.077027]  ret_from_fork_asm+0x1a/0x30
[   15.077820] 
[   15.077961] The buggy address belongs to the object at ffff8881039b8880
[   15.077961]  which belongs to the cache kmalloc-64 of size 64
[   15.078955] The buggy address is located 0 bytes to the right of
[   15.078955]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.080600] 
[   15.080684] The buggy address belongs to the physical page:
[   15.080941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.081273] flags: 0x200000000000000(node=0|zone=2)
[   15.081530] page_type: f5(slab)
[   15.081695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.081928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.082166] page dumped because: kasan: bad access detected
[   15.082338] 
[   15.082408] Memory state around the buggy address:
[   15.082563]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.082887]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.084839] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.085929]                                      ^
[   15.086560]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087691]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.088718] ==================================================================
[   14.575548] ==================================================================
[   14.576132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.576673] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.577245] 
[   14.577328] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.577368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.577380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.577400] Call Trace:
[   14.577412]  <TASK>
[   14.577425]  dump_stack_lvl+0x73/0xb0
[   14.577458]  print_report+0xd1/0x610
[   14.577487]  ? __virt_addr_valid+0x1db/0x2d0
[   14.577517]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.577538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.577560]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.577582]  kasan_report+0x141/0x180
[   14.577603]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.577629]  __asan_report_store4_noabort+0x1b/0x30
[   14.577653]  kasan_atomics_helper+0x4b3a/0x5450
[   14.577676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.577698]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.577722]  ? kasan_atomics+0x152/0x310
[   14.577748]  kasan_atomics+0x1dc/0x310
[   14.577771]  ? __pfx_kasan_atomics+0x10/0x10
[   14.577794]  ? __pfx_read_tsc+0x10/0x10
[   14.577815]  ? ktime_get_ts64+0x86/0x230
[   14.577838]  kunit_try_run_case+0x1a5/0x480
[   14.577862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.577884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.577906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.577929]  ? __kthread_parkme+0x82/0x180
[   14.577949]  ? preempt_count_sub+0x50/0x80
[   14.577972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.577996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.578030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.578054]  kthread+0x337/0x6f0
[   14.578072]  ? trace_preempt_on+0x20/0xc0
[   14.578095]  ? __pfx_kthread+0x10/0x10
[   14.578116]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.578136]  ? calculate_sigpending+0x7b/0xa0
[   14.578159]  ? __pfx_kthread+0x10/0x10
[   14.578181]  ret_from_fork+0x116/0x1d0
[   14.578199]  ? __pfx_kthread+0x10/0x10
[   14.578219]  ret_from_fork_asm+0x1a/0x30
[   14.578250]  </TASK>
[   14.578260] 
[   14.586641] Allocated by task 283:
[   14.586818]  kasan_save_stack+0x45/0x70
[   14.587107]  kasan_save_track+0x18/0x40
[   14.587319]  kasan_save_alloc_info+0x3b/0x50
[   14.587670]  __kasan_kmalloc+0xb7/0xc0
[   14.587846]  __kmalloc_cache_noprof+0x189/0x420
[   14.588065]  kasan_atomics+0x95/0x310
[   14.588198]  kunit_try_run_case+0x1a5/0x480
[   14.588343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.588599]  kthread+0x337/0x6f0
[   14.588912]  ret_from_fork+0x116/0x1d0
[   14.589135]  ret_from_fork_asm+0x1a/0x30
[   14.589275] 
[   14.589345] The buggy address belongs to the object at ffff8881039b8880
[   14.589345]  which belongs to the cache kmalloc-64 of size 64
[   14.590096] The buggy address is located 0 bytes to the right of
[   14.590096]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.590667] 
[   14.590772] The buggy address belongs to the physical page:
[   14.590950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.591199] flags: 0x200000000000000(node=0|zone=2)
[   14.591430] page_type: f5(slab)
[   14.591751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.592104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.592425] page dumped because: kasan: bad access detected
[   14.592656] 
[   14.592772] Memory state around the buggy address:
[   14.592971]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.593203]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.593676] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.594029]                                      ^
[   14.594229]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.594620]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.594949] ==================================================================
[   15.290923] ==================================================================
[   15.291212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.292095] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.292788] 
[   15.292907] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.293097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.293113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.293136] Call Trace:
[   15.293152]  <TASK>
[   15.293168]  dump_stack_lvl+0x73/0xb0
[   15.293199]  print_report+0xd1/0x610
[   15.293223]  ? __virt_addr_valid+0x1db/0x2d0
[   15.293245]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.293267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.293290]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.293312]  kasan_report+0x141/0x180
[   15.293334]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.293361]  kasan_check_range+0x10c/0x1c0
[   15.293409]  __kasan_check_write+0x18/0x20
[   15.293428]  kasan_atomics_helper+0x15b6/0x5450
[   15.293451]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.293473]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.293498]  ? kasan_atomics+0x152/0x310
[   15.293524]  kasan_atomics+0x1dc/0x310
[   15.293547]  ? __pfx_kasan_atomics+0x10/0x10
[   15.293570]  ? __pfx_read_tsc+0x10/0x10
[   15.293591]  ? ktime_get_ts64+0x86/0x230
[   15.293615]  kunit_try_run_case+0x1a5/0x480
[   15.293639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.293661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.293684]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.293707]  ? __kthread_parkme+0x82/0x180
[   15.293728]  ? preempt_count_sub+0x50/0x80
[   15.293751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.293775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.293798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.293822]  kthread+0x337/0x6f0
[   15.293840]  ? trace_preempt_on+0x20/0xc0
[   15.293863]  ? __pfx_kthread+0x10/0x10
[   15.293884]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.293906]  ? calculate_sigpending+0x7b/0xa0
[   15.293929]  ? __pfx_kthread+0x10/0x10
[   15.293951]  ret_from_fork+0x116/0x1d0
[   15.293970]  ? __pfx_kthread+0x10/0x10
[   15.293990]  ret_from_fork_asm+0x1a/0x30
[   15.294033]  </TASK>
[   15.294043] 
[   15.305930] Allocated by task 283:
[   15.306118]  kasan_save_stack+0x45/0x70
[   15.306309]  kasan_save_track+0x18/0x40
[   15.307144]  kasan_save_alloc_info+0x3b/0x50
[   15.307417]  __kasan_kmalloc+0xb7/0xc0
[   15.307797]  __kmalloc_cache_noprof+0x189/0x420
[   15.308134]  kasan_atomics+0x95/0x310
[   15.308533]  kunit_try_run_case+0x1a5/0x480
[   15.308915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.309189]  kthread+0x337/0x6f0
[   15.309558]  ret_from_fork+0x116/0x1d0
[   15.309985]  ret_from_fork_asm+0x1a/0x30
[   15.310272] 
[   15.310351] The buggy address belongs to the object at ffff8881039b8880
[   15.310351]  which belongs to the cache kmalloc-64 of size 64
[   15.310927] The buggy address is located 0 bytes to the right of
[   15.310927]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.311984] 
[   15.312104] The buggy address belongs to the physical page:
[   15.312315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.312936] flags: 0x200000000000000(node=0|zone=2)
[   15.313276] page_type: f5(slab)
[   15.313674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.314143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.314711] page dumped because: kasan: bad access detected
[   15.314940] 
[   15.315053] Memory state around the buggy address:
[   15.315267]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.316017]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.316657] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.317003]                                      ^
[   15.317351]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.317850]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.318166] ==================================================================
[   15.540577] ==================================================================
[   15.540861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.541317] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.541748] 
[   15.541836] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.541879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.541891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.541912] Call Trace:
[   15.541927]  <TASK>
[   15.541942]  dump_stack_lvl+0x73/0xb0
[   15.541969]  print_report+0xd1/0x610
[   15.541991]  ? __virt_addr_valid+0x1db/0x2d0
[   15.542025]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.542051]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.542073]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.542095]  kasan_report+0x141/0x180
[   15.542117]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.542144]  kasan_check_range+0x10c/0x1c0
[   15.542167]  __kasan_check_write+0x18/0x20
[   15.542187]  kasan_atomics_helper+0x1c18/0x5450
[   15.542209]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.542231]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.542256]  ? kasan_atomics+0x152/0x310
[   15.542282]  kasan_atomics+0x1dc/0x310
[   15.542305]  ? __pfx_kasan_atomics+0x10/0x10
[   15.542332]  ? __pfx_read_tsc+0x10/0x10
[   15.542353]  ? ktime_get_ts64+0x86/0x230
[   15.542393]  kunit_try_run_case+0x1a5/0x480
[   15.542443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.542467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.542489]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.542513]  ? __kthread_parkme+0x82/0x180
[   15.542533]  ? preempt_count_sub+0x50/0x80
[   15.542558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.542583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.542606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.542836]  kthread+0x337/0x6f0
[   15.542858]  ? trace_preempt_on+0x20/0xc0
[   15.542881]  ? __pfx_kthread+0x10/0x10
[   15.542901]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.542923]  ? calculate_sigpending+0x7b/0xa0
[   15.542947]  ? __pfx_kthread+0x10/0x10
[   15.542968]  ret_from_fork+0x116/0x1d0
[   15.542987]  ? __pfx_kthread+0x10/0x10
[   15.543021]  ret_from_fork_asm+0x1a/0x30
[   15.543052]  </TASK>
[   15.543062] 
[   15.551916] Allocated by task 283:
[   15.552114]  kasan_save_stack+0x45/0x70
[   15.552257]  kasan_save_track+0x18/0x40
[   15.552541]  kasan_save_alloc_info+0x3b/0x50
[   15.552755]  __kasan_kmalloc+0xb7/0xc0
[   15.552946]  __kmalloc_cache_noprof+0x189/0x420
[   15.553154]  kasan_atomics+0x95/0x310
[   15.553288]  kunit_try_run_case+0x1a5/0x480
[   15.553652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.553927]  kthread+0x337/0x6f0
[   15.554107]  ret_from_fork+0x116/0x1d0
[   15.554304]  ret_from_fork_asm+0x1a/0x30
[   15.554682] 
[   15.554816] The buggy address belongs to the object at ffff8881039b8880
[   15.554816]  which belongs to the cache kmalloc-64 of size 64
[   15.555301] The buggy address is located 0 bytes to the right of
[   15.555301]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.555944] 
[   15.556046] The buggy address belongs to the physical page:
[   15.556288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.556702] flags: 0x200000000000000(node=0|zone=2)
[   15.556870] page_type: f5(slab)
[   15.556992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.557236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.557592] page dumped because: kasan: bad access detected
[   15.557845] 
[   15.557968] Memory state around the buggy address:
[   15.558589]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.558826]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.559125] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.559584]                                      ^
[   15.559835]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.560064]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.560380] ==================================================================
[   14.635136] ==================================================================
[   14.635489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.635815] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.636136] 
[   14.636231] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.636272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.636285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.636305] Call Trace:
[   14.636321]  <TASK>
[   14.636336]  dump_stack_lvl+0x73/0xb0
[   14.636362]  print_report+0xd1/0x610
[   14.636384]  ? __virt_addr_valid+0x1db/0x2d0
[   14.636406]  ? kasan_atomics_helper+0x697/0x5450
[   14.636427]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.636449]  ? kasan_atomics_helper+0x697/0x5450
[   14.636471]  kasan_report+0x141/0x180
[   14.636493]  ? kasan_atomics_helper+0x697/0x5450
[   14.636518]  kasan_check_range+0x10c/0x1c0
[   14.636542]  __kasan_check_write+0x18/0x20
[   14.636561]  kasan_atomics_helper+0x697/0x5450
[   14.636583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.636604]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.636628]  ? kasan_atomics+0x152/0x310
[   14.636655]  kasan_atomics+0x1dc/0x310
[   14.636676]  ? __pfx_kasan_atomics+0x10/0x10
[   14.636700]  ? __pfx_read_tsc+0x10/0x10
[   14.636720]  ? ktime_get_ts64+0x86/0x230
[   14.636744]  kunit_try_run_case+0x1a5/0x480
[   14.636768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.636790]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.636814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.636836]  ? __kthread_parkme+0x82/0x180
[   14.636856]  ? preempt_count_sub+0x50/0x80
[   14.636880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.636904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.636927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.636951]  kthread+0x337/0x6f0
[   14.636975]  ? trace_preempt_on+0x20/0xc0
[   14.636997]  ? __pfx_kthread+0x10/0x10
[   14.637207]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.637231]  ? calculate_sigpending+0x7b/0xa0
[   14.637256]  ? __pfx_kthread+0x10/0x10
[   14.637278]  ret_from_fork+0x116/0x1d0
[   14.637299]  ? __pfx_kthread+0x10/0x10
[   14.637320]  ret_from_fork_asm+0x1a/0x30
[   14.637351]  </TASK>
[   14.637361] 
[   14.645200] Allocated by task 283:
[   14.645375]  kasan_save_stack+0x45/0x70
[   14.645723]  kasan_save_track+0x18/0x40
[   14.645867]  kasan_save_alloc_info+0x3b/0x50
[   14.646097]  __kasan_kmalloc+0xb7/0xc0
[   14.646276]  __kmalloc_cache_noprof+0x189/0x420
[   14.646574]  kasan_atomics+0x95/0x310
[   14.646725]  kunit_try_run_case+0x1a5/0x480
[   14.646937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647164]  kthread+0x337/0x6f0
[   14.647334]  ret_from_fork+0x116/0x1d0
[   14.647535]  ret_from_fork_asm+0x1a/0x30
[   14.647744] 
[   14.647837] The buggy address belongs to the object at ffff8881039b8880
[   14.647837]  which belongs to the cache kmalloc-64 of size 64
[   14.648301] The buggy address is located 0 bytes to the right of
[   14.648301]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.649015] 
[   14.649105] The buggy address belongs to the physical page:
[   14.649361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.649814] flags: 0x200000000000000(node=0|zone=2)
[   14.650072] page_type: f5(slab)
[   14.650227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.650465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.650692] page dumped because: kasan: bad access detected
[   14.650862] 
[   14.650932] Memory state around the buggy address:
[   14.651167]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.651486]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.651867] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.652457]                                      ^
[   14.652613]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.652828]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.653173] ==================================================================
[   15.581678] ==================================================================
[   15.582091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.583195] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.583502] 
[   15.583581] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.583622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.583634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.583655] Call Trace:
[   15.583669]  <TASK>
[   15.583683]  dump_stack_lvl+0x73/0xb0
[   15.583710]  print_report+0xd1/0x610
[   15.583788]  ? __virt_addr_valid+0x1db/0x2d0
[   15.583810]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.583831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.583854]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.583876]  kasan_report+0x141/0x180
[   15.583898]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.583924]  kasan_check_range+0x10c/0x1c0
[   15.583948]  __kasan_check_write+0x18/0x20
[   15.583967]  kasan_atomics_helper+0x1ce1/0x5450
[   15.583990]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.584024]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.584048]  ? kasan_atomics+0x152/0x310
[   15.584075]  kasan_atomics+0x1dc/0x310
[   15.584097]  ? __pfx_kasan_atomics+0x10/0x10
[   15.584120]  ? __pfx_read_tsc+0x10/0x10
[   15.584142]  ? ktime_get_ts64+0x86/0x230
[   15.584166]  kunit_try_run_case+0x1a5/0x480
[   15.584190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.584213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.584235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.584259]  ? __kthread_parkme+0x82/0x180
[   15.584279]  ? preempt_count_sub+0x50/0x80
[   15.584302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.584326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.584350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.584373]  kthread+0x337/0x6f0
[   15.584510]  ? trace_preempt_on+0x20/0xc0
[   15.584538]  ? __pfx_kthread+0x10/0x10
[   15.584559]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.584581]  ? calculate_sigpending+0x7b/0xa0
[   15.584603]  ? __pfx_kthread+0x10/0x10
[   15.584625]  ret_from_fork+0x116/0x1d0
[   15.584643]  ? __pfx_kthread+0x10/0x10
[   15.584698]  ret_from_fork_asm+0x1a/0x30
[   15.584729]  </TASK>
[   15.584740] 
[   15.596221] Allocated by task 283:
[   15.596635]  kasan_save_stack+0x45/0x70
[   15.596839]  kasan_save_track+0x18/0x40
[   15.597152]  kasan_save_alloc_info+0x3b/0x50
[   15.597549]  __kasan_kmalloc+0xb7/0xc0
[   15.597938]  __kmalloc_cache_noprof+0x189/0x420
[   15.598409]  kasan_atomics+0x95/0x310
[   15.598690]  kunit_try_run_case+0x1a5/0x480
[   15.598974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.599278]  kthread+0x337/0x6f0
[   15.599446]  ret_from_fork+0x116/0x1d0
[   15.600024]  ret_from_fork_asm+0x1a/0x30
[   15.600295] 
[   15.600374] The buggy address belongs to the object at ffff8881039b8880
[   15.600374]  which belongs to the cache kmalloc-64 of size 64
[   15.601258] The buggy address is located 0 bytes to the right of
[   15.601258]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.602281] 
[   15.602389] The buggy address belongs to the physical page:
[   15.602748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.603276] flags: 0x200000000000000(node=0|zone=2)
[   15.603689] page_type: f5(slab)
[   15.603875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.604557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.604928] page dumped because: kasan: bad access detected
[   15.605287] 
[   15.605423] Memory state around the buggy address:
[   15.605593]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.606250]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.606904] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.607383]                                      ^
[   15.607785]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.608310]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.608807] ==================================================================
[   14.653796] ==================================================================
[   14.654122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.654525] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.654861] 
[   14.654944] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.654985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.654997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.655029] Call Trace:
[   14.655041]  <TASK>
[   14.655055]  dump_stack_lvl+0x73/0xb0
[   14.655081]  print_report+0xd1/0x610
[   14.655103]  ? __virt_addr_valid+0x1db/0x2d0
[   14.655126]  ? kasan_atomics_helper+0x72f/0x5450
[   14.655146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.655171]  ? kasan_atomics_helper+0x72f/0x5450
[   14.655192]  kasan_report+0x141/0x180
[   14.655214]  ? kasan_atomics_helper+0x72f/0x5450
[   14.655240]  kasan_check_range+0x10c/0x1c0
[   14.655264]  __kasan_check_write+0x18/0x20
[   14.655283]  kasan_atomics_helper+0x72f/0x5450
[   14.655304]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.655326]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.655425]  ? kasan_atomics+0x152/0x310
[   14.655455]  kasan_atomics+0x1dc/0x310
[   14.655479]  ? __pfx_kasan_atomics+0x10/0x10
[   14.655504]  ? __pfx_read_tsc+0x10/0x10
[   14.655524]  ? ktime_get_ts64+0x86/0x230
[   14.655548]  kunit_try_run_case+0x1a5/0x480
[   14.655572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.655595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.655617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.655640]  ? __kthread_parkme+0x82/0x180
[   14.655673]  ? preempt_count_sub+0x50/0x80
[   14.655696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.655721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.655744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.655767]  kthread+0x337/0x6f0
[   14.655786]  ? trace_preempt_on+0x20/0xc0
[   14.655809]  ? __pfx_kthread+0x10/0x10
[   14.655829]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.655852]  ? calculate_sigpending+0x7b/0xa0
[   14.655874]  ? __pfx_kthread+0x10/0x10
[   14.655896]  ret_from_fork+0x116/0x1d0
[   14.655914]  ? __pfx_kthread+0x10/0x10
[   14.655934]  ret_from_fork_asm+0x1a/0x30
[   14.655964]  </TASK>
[   14.655975] 
[   14.664498] Allocated by task 283:
[   14.664683]  kasan_save_stack+0x45/0x70
[   14.664886]  kasan_save_track+0x18/0x40
[   14.665094]  kasan_save_alloc_info+0x3b/0x50
[   14.665305]  __kasan_kmalloc+0xb7/0xc0
[   14.665673]  __kmalloc_cache_noprof+0x189/0x420
[   14.665902]  kasan_atomics+0x95/0x310
[   14.666101]  kunit_try_run_case+0x1a5/0x480
[   14.666309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.666669]  kthread+0x337/0x6f0
[   14.666840]  ret_from_fork+0x116/0x1d0
[   14.667035]  ret_from_fork_asm+0x1a/0x30
[   14.667237] 
[   14.667320] The buggy address belongs to the object at ffff8881039b8880
[   14.667320]  which belongs to the cache kmalloc-64 of size 64
[   14.667874] The buggy address is located 0 bytes to the right of
[   14.667874]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.668496] 
[   14.668599] The buggy address belongs to the physical page:
[   14.668825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.669137] flags: 0x200000000000000(node=0|zone=2)
[   14.669605] page_type: f5(slab)
[   14.669762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.670082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.670474] page dumped because: kasan: bad access detected
[   14.670696] 
[   14.670790] Memory state around the buggy address:
[   14.670973]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.671266]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.671646] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.671883]                                      ^
[   14.672052]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.672269]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.672582] ==================================================================
[   14.556946] ==================================================================
[   14.557195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.557890] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.558242] 
[   14.558425] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.558466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.558478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.558498] Call Trace:
[   14.558512]  <TASK>
[   14.558526]  dump_stack_lvl+0x73/0xb0
[   14.558552]  print_report+0xd1/0x610
[   14.558573]  ? __virt_addr_valid+0x1db/0x2d0
[   14.558595]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.558615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.558637]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.558658]  kasan_report+0x141/0x180
[   14.558680]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.558706]  kasan_check_range+0x10c/0x1c0
[   14.558729]  __kasan_check_write+0x18/0x20
[   14.558748]  kasan_atomics_helper+0x4a0/0x5450
[   14.558770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.558792]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.558816]  ? kasan_atomics+0x152/0x310
[   14.558842]  kasan_atomics+0x1dc/0x310
[   14.558864]  ? __pfx_kasan_atomics+0x10/0x10
[   14.558888]  ? __pfx_read_tsc+0x10/0x10
[   14.558908]  ? ktime_get_ts64+0x86/0x230
[   14.558932]  kunit_try_run_case+0x1a5/0x480
[   14.558955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.558978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.559001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.559035]  ? __kthread_parkme+0x82/0x180
[   14.559055]  ? preempt_count_sub+0x50/0x80
[   14.559078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559125]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.559149]  kthread+0x337/0x6f0
[   14.559168]  ? trace_preempt_on+0x20/0xc0
[   14.559191]  ? __pfx_kthread+0x10/0x10
[   14.559212]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.559233]  ? calculate_sigpending+0x7b/0xa0
[   14.559256]  ? __pfx_kthread+0x10/0x10
[   14.559278]  ret_from_fork+0x116/0x1d0
[   14.559296]  ? __pfx_kthread+0x10/0x10
[   14.559317]  ret_from_fork_asm+0x1a/0x30
[   14.559347]  </TASK>
[   14.559358] 
[   14.568034] Allocated by task 283:
[   14.568254]  kasan_save_stack+0x45/0x70
[   14.568497]  kasan_save_track+0x18/0x40
[   14.568683]  kasan_save_alloc_info+0x3b/0x50
[   14.568893]  __kasan_kmalloc+0xb7/0xc0
[   14.569045]  __kmalloc_cache_noprof+0x189/0x420
[   14.569209]  kasan_atomics+0x95/0x310
[   14.569344]  kunit_try_run_case+0x1a5/0x480
[   14.569584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.569841]  kthread+0x337/0x6f0
[   14.570019]  ret_from_fork+0x116/0x1d0
[   14.570211]  ret_from_fork_asm+0x1a/0x30
[   14.570368] 
[   14.570438] The buggy address belongs to the object at ffff8881039b8880
[   14.570438]  which belongs to the cache kmalloc-64 of size 64
[   14.570791] The buggy address is located 0 bytes to the right of
[   14.570791]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.571170] 
[   14.571242] The buggy address belongs to the physical page:
[   14.571414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.571660] flags: 0x200000000000000(node=0|zone=2)
[   14.571905] page_type: f5(slab)
[   14.572078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.572433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.572766] page dumped because: kasan: bad access detected
[   14.573029] 
[   14.573121] Memory state around the buggy address:
[   14.573341]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.574035]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.574355] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.574631]                                      ^
[   14.574788]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.575013]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.575225] ==================================================================
[   14.729119] ==================================================================
[   14.729664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.729986] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.730291] 
[   14.730475] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.730518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.730530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.730551] Call Trace:
[   14.730565]  <TASK>
[   14.730578]  dump_stack_lvl+0x73/0xb0
[   14.730604]  print_report+0xd1/0x610
[   14.730626]  ? __virt_addr_valid+0x1db/0x2d0
[   14.730647]  ? kasan_atomics_helper+0x992/0x5450
[   14.730667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.730689]  ? kasan_atomics_helper+0x992/0x5450
[   14.730710]  kasan_report+0x141/0x180
[   14.730732]  ? kasan_atomics_helper+0x992/0x5450
[   14.730757]  kasan_check_range+0x10c/0x1c0
[   14.730781]  __kasan_check_write+0x18/0x20
[   14.730799]  kasan_atomics_helper+0x992/0x5450
[   14.730822]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.730844]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.730868]  ? kasan_atomics+0x152/0x310
[   14.730894]  kasan_atomics+0x1dc/0x310
[   14.730917]  ? __pfx_kasan_atomics+0x10/0x10
[   14.730941]  ? __pfx_read_tsc+0x10/0x10
[   14.730961]  ? ktime_get_ts64+0x86/0x230
[   14.730985]  kunit_try_run_case+0x1a5/0x480
[   14.731020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.731043]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.731067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.731092]  ? __kthread_parkme+0x82/0x180
[   14.731112]  ? preempt_count_sub+0x50/0x80
[   14.731135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.731159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.731183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.731206]  kthread+0x337/0x6f0
[   14.731226]  ? trace_preempt_on+0x20/0xc0
[   14.731249]  ? __pfx_kthread+0x10/0x10
[   14.731270]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.731291]  ? calculate_sigpending+0x7b/0xa0
[   14.731315]  ? __pfx_kthread+0x10/0x10
[   14.731336]  ret_from_fork+0x116/0x1d0
[   14.731428]  ? __pfx_kthread+0x10/0x10
[   14.731452]  ret_from_fork_asm+0x1a/0x30
[   14.731483]  </TASK>
[   14.731494] 
[   14.739065] Allocated by task 283:
[   14.739236]  kasan_save_stack+0x45/0x70
[   14.739470]  kasan_save_track+0x18/0x40
[   14.739613]  kasan_save_alloc_info+0x3b/0x50
[   14.739764]  __kasan_kmalloc+0xb7/0xc0
[   14.739897]  __kmalloc_cache_noprof+0x189/0x420
[   14.740091]  kasan_atomics+0x95/0x310
[   14.740277]  kunit_try_run_case+0x1a5/0x480
[   14.740565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.740826]  kthread+0x337/0x6f0
[   14.741014]  ret_from_fork+0x116/0x1d0
[   14.741151]  ret_from_fork_asm+0x1a/0x30
[   14.741290] 
[   14.741562] The buggy address belongs to the object at ffff8881039b8880
[   14.741562]  which belongs to the cache kmalloc-64 of size 64
[   14.741921] The buggy address is located 0 bytes to the right of
[   14.741921]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.742306] 
[   14.742488] The buggy address belongs to the physical page:
[   14.742771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.743134] flags: 0x200000000000000(node=0|zone=2)
[   14.743465] page_type: f5(slab)
[   14.743636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.743984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.744317] page dumped because: kasan: bad access detected
[   14.744573] 
[   14.744649] Memory state around the buggy address:
[   14.744804]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.745046]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.745265] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.745671]                                      ^
[   14.745849]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.746188]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.746592] ==================================================================
[   15.657541] ==================================================================
[   15.657904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.658279] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   15.658512] 
[   15.658590] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.658629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.658642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.658663] Call Trace:
[   15.658675]  <TASK>
[   15.658690]  dump_stack_lvl+0x73/0xb0
[   15.659398]  print_report+0xd1/0x610
[   15.659424]  ? __virt_addr_valid+0x1db/0x2d0
[   15.659448]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.659480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.659503]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.659525]  kasan_report+0x141/0x180
[   15.659548]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.659574]  kasan_check_range+0x10c/0x1c0
[   15.659600]  __kasan_check_write+0x18/0x20
[   15.659620]  kasan_atomics_helper+0x1eaa/0x5450
[   15.659643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.659666]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.659690]  ? kasan_atomics+0x152/0x310
[   15.659717]  kasan_atomics+0x1dc/0x310
[   15.659740]  ? __pfx_kasan_atomics+0x10/0x10
[   15.659764]  ? __pfx_read_tsc+0x10/0x10
[   15.659785]  ? ktime_get_ts64+0x86/0x230
[   15.659810]  kunit_try_run_case+0x1a5/0x480
[   15.659834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.659857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.660514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.660554]  ? __kthread_parkme+0x82/0x180
[   15.660593]  ? preempt_count_sub+0x50/0x80
[   15.660617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.660642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.660666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.660690]  kthread+0x337/0x6f0
[   15.660709]  ? trace_preempt_on+0x20/0xc0
[   15.660734]  ? __pfx_kthread+0x10/0x10
[   15.660754]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.660775]  ? calculate_sigpending+0x7b/0xa0
[   15.660798]  ? __pfx_kthread+0x10/0x10
[   15.660819]  ret_from_fork+0x116/0x1d0
[   15.660838]  ? __pfx_kthread+0x10/0x10
[   15.660858]  ret_from_fork_asm+0x1a/0x30
[   15.660889]  </TASK>
[   15.660899] 
[   15.672344] Allocated by task 283:
[   15.672712]  kasan_save_stack+0x45/0x70
[   15.673083]  kasan_save_track+0x18/0x40
[   15.673426]  kasan_save_alloc_info+0x3b/0x50
[   15.673639]  __kasan_kmalloc+0xb7/0xc0
[   15.673820]  __kmalloc_cache_noprof+0x189/0x420
[   15.674053]  kasan_atomics+0x95/0x310
[   15.674235]  kunit_try_run_case+0x1a5/0x480
[   15.674649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.675042]  kthread+0x337/0x6f0
[   15.675204]  ret_from_fork+0x116/0x1d0
[   15.675524]  ret_from_fork_asm+0x1a/0x30
[   15.675673] 
[   15.675869] The buggy address belongs to the object at ffff8881039b8880
[   15.675869]  which belongs to the cache kmalloc-64 of size 64
[   15.676601] The buggy address is located 0 bytes to the right of
[   15.676601]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   15.677235] 
[   15.677350] The buggy address belongs to the physical page:
[   15.677749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   15.678264] flags: 0x200000000000000(node=0|zone=2)
[   15.678622] page_type: f5(slab)
[   15.678823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.679372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.679938] page dumped because: kasan: bad access detected
[   15.680180] 
[   15.680355] Memory state around the buggy address:
[   15.680573]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.681132]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.681641] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.682191]                                      ^
[   15.682502]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.683048]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.683424] ==================================================================
[   14.710694] ==================================================================
[   14.711053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.711500] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283
[   14.711838] 
[   14.711948] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.711990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.712003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.712035] Call Trace:
[   14.712050]  <TASK>
[   14.712066]  dump_stack_lvl+0x73/0xb0
[   14.712094]  print_report+0xd1/0x610
[   14.712115]  ? __virt_addr_valid+0x1db/0x2d0
[   14.712138]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.712158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.712181]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.712203]  kasan_report+0x141/0x180
[   14.712225]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.712251]  kasan_check_range+0x10c/0x1c0
[   14.712274]  __kasan_check_write+0x18/0x20
[   14.712293]  kasan_atomics_helper+0x8f9/0x5450
[   14.712316]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.712338]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.712440]  ? kasan_atomics+0x152/0x310
[   14.712466]  kasan_atomics+0x1dc/0x310
[   14.712489]  ? __pfx_kasan_atomics+0x10/0x10
[   14.712514]  ? __pfx_read_tsc+0x10/0x10
[   14.712535]  ? ktime_get_ts64+0x86/0x230
[   14.712559]  kunit_try_run_case+0x1a5/0x480
[   14.712584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.712607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.712630]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.712653]  ? __kthread_parkme+0x82/0x180
[   14.712674]  ? preempt_count_sub+0x50/0x80
[   14.712699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.712723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.712747]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.712770]  kthread+0x337/0x6f0
[   14.712789]  ? trace_preempt_on+0x20/0xc0
[   14.712812]  ? __pfx_kthread+0x10/0x10
[   14.712832]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.712854]  ? calculate_sigpending+0x7b/0xa0
[   14.712877]  ? __pfx_kthread+0x10/0x10
[   14.712899]  ret_from_fork+0x116/0x1d0
[   14.712916]  ? __pfx_kthread+0x10/0x10
[   14.712937]  ret_from_fork_asm+0x1a/0x30
[   14.712974]  </TASK>
[   14.712985] 
[   14.720850] Allocated by task 283:
[   14.720991]  kasan_save_stack+0x45/0x70
[   14.721198]  kasan_save_track+0x18/0x40
[   14.721643]  kasan_save_alloc_info+0x3b/0x50
[   14.721866]  __kasan_kmalloc+0xb7/0xc0
[   14.722069]  __kmalloc_cache_noprof+0x189/0x420
[   14.722295]  kasan_atomics+0x95/0x310
[   14.722565]  kunit_try_run_case+0x1a5/0x480
[   14.722748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.722930]  kthread+0x337/0x6f0
[   14.723112]  ret_from_fork+0x116/0x1d0
[   14.723302]  ret_from_fork_asm+0x1a/0x30
[   14.723574] 
[   14.723668] The buggy address belongs to the object at ffff8881039b8880
[   14.723668]  which belongs to the cache kmalloc-64 of size 64
[   14.724107] The buggy address is located 0 bytes to the right of
[   14.724107]  allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0)
[   14.724671] 
[   14.724761] The buggy address belongs to the physical page:
[   14.724967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8
[   14.725304] flags: 0x200000000000000(node=0|zone=2)
[   14.725703] page_type: f5(slab)
[   14.725860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.726161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.726534] page dumped because: kasan: bad access detected
[   14.726701] 
[   14.726770] Memory state around the buggy address:
[   14.726917]  ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   14.727135]  ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.727344] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.727648]                                      ^
[   14.727868]  ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.728260]  ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.728652] ==================================================================