Hay
Date
July 1, 2025, 3:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.731660] ==================================================================
[   19.731837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.731921] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.731978] 
[   19.732164] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.732352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.732386] Hardware name: linux,dummy-virt (DT)
[   19.732420] Call trace:
[   19.732467]  show_stack+0x20/0x38 (C)
[   19.732585]  dump_stack_lvl+0x8c/0xd0
[   19.732634]  print_report+0x118/0x608
[   19.732682]  kasan_report+0xdc/0x128
[   19.732727]  kasan_check_range+0x100/0x1a8
[   19.732782]  __kasan_check_write+0x20/0x30
[   19.732829]  kasan_atomics_helper+0xeb8/0x4858
[   19.732877]  kasan_atomics+0x198/0x2e0
[   19.732924]  kunit_try_run_case+0x170/0x3f0
[   19.732972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.733027]  kthread+0x328/0x630
[   19.733070]  ret_from_fork+0x10/0x20
[   19.733119] 
[   19.733158] Allocated by task 266:
[   19.733193]  kasan_save_stack+0x3c/0x68
[   19.733239]  kasan_save_track+0x20/0x40
[   19.733285]  kasan_save_alloc_info+0x40/0x58
[   19.733337]  __kasan_kmalloc+0xd4/0xd8
[   19.733979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.734143]  kasan_atomics+0xb8/0x2e0
[   19.734240]  kunit_try_run_case+0x170/0x3f0
[   19.734304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.734351]  kthread+0x328/0x630
[   19.734392]  ret_from_fork+0x10/0x20
[   19.734430] 
[   19.734452] The buggy address belongs to the object at fff00000c57aa700
[   19.734452]  which belongs to the cache kmalloc-64 of size 64
[   19.734514] The buggy address is located 0 bytes to the right of
[   19.734514]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.735078] 
[   19.735194] The buggy address belongs to the physical page:
[   19.735288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.735396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.735457] page_type: f5(slab)
[   19.735497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.735845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.735929] page dumped because: kasan: bad access detected
[   19.735977] 
[   19.736028] Memory state around the buggy address:
[   19.736383]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.736581]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.736741] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.736843]                                      ^
[   19.736895]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.737195]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.737267] ==================================================================
[   19.754954] ==================================================================
[   19.755011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.755063] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.755114] 
[   19.755147] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.755232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.755261] Hardware name: linux,dummy-virt (DT)
[   19.755302] Call trace:
[   19.755327]  show_stack+0x20/0x38 (C)
[   19.755388]  dump_stack_lvl+0x8c/0xd0
[   19.755439]  print_report+0x118/0x608
[   19.755485]  kasan_report+0xdc/0x128
[   19.755540]  kasan_check_range+0x100/0x1a8
[   19.755612]  __kasan_check_write+0x20/0x30
[   19.755659]  kasan_atomics_helper+0xff0/0x4858
[   19.755709]  kasan_atomics+0x198/0x2e0
[   19.755754]  kunit_try_run_case+0x170/0x3f0
[   19.755802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.755855]  kthread+0x328/0x630
[   19.755898]  ret_from_fork+0x10/0x20
[   19.755945] 
[   19.755967] Allocated by task 266:
[   19.755995]  kasan_save_stack+0x3c/0x68
[   19.756037]  kasan_save_track+0x20/0x40
[   19.756077]  kasan_save_alloc_info+0x40/0x58
[   19.756117]  __kasan_kmalloc+0xd4/0xd8
[   19.756157]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.756209]  kasan_atomics+0xb8/0x2e0
[   19.756247]  kunit_try_run_case+0x170/0x3f0
[   19.756286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.756332]  kthread+0x328/0x630
[   19.756382]  ret_from_fork+0x10/0x20
[   19.756426] 
[   19.756448] The buggy address belongs to the object at fff00000c57aa700
[   19.756448]  which belongs to the cache kmalloc-64 of size 64
[   19.756508] The buggy address is located 0 bytes to the right of
[   19.756508]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.757125] 
[   19.757196] The buggy address belongs to the physical page:
[   19.757234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.757299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.758099] page_type: f5(slab)
[   19.758177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.758422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.758534] page dumped because: kasan: bad access detected
[   19.758893] 
[   19.758949] Memory state around the buggy address:
[   19.759009]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.759079]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.759359] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.759588]                                      ^
[   19.759901]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.760072]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.760196] ==================================================================
[   19.946740] ==================================================================
[   19.946941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.947014] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.947136] 
[   19.947263] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.947660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.947693] Hardware name: linux,dummy-virt (DT)
[   19.947924] Call trace:
[   19.947948]  show_stack+0x20/0x38 (C)
[   19.947999]  dump_stack_lvl+0x8c/0xd0
[   19.948047]  print_report+0x118/0x608
[   19.948093]  kasan_report+0xdc/0x128
[   19.948141]  kasan_check_range+0x100/0x1a8
[   19.948190]  __kasan_check_write+0x20/0x30
[   19.948235]  kasan_atomics_helper+0x175c/0x4858
[   19.948284]  kasan_atomics+0x198/0x2e0
[   19.948329]  kunit_try_run_case+0x170/0x3f0
[   19.948378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.948431]  kthread+0x328/0x630
[   19.948473]  ret_from_fork+0x10/0x20
[   19.948521] 
[   19.948541] Allocated by task 266:
[   19.948580]  kasan_save_stack+0x3c/0x68
[   19.949093]  kasan_save_track+0x20/0x40
[   19.949151]  kasan_save_alloc_info+0x40/0x58
[   19.949813]  __kasan_kmalloc+0xd4/0xd8
[   19.950238]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.950495]  kasan_atomics+0xb8/0x2e0
[   19.950823]  kunit_try_run_case+0x170/0x3f0
[   19.950882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.950929]  kthread+0x328/0x630
[   19.951081]  ret_from_fork+0x10/0x20
[   19.951311] 
[   19.951442] The buggy address belongs to the object at fff00000c57aa700
[   19.951442]  which belongs to the cache kmalloc-64 of size 64
[   19.951796] The buggy address is located 0 bytes to the right of
[   19.951796]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.951868] 
[   19.951891] The buggy address belongs to the physical page:
[   19.951924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.951979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.952029] page_type: f5(slab)
[   19.952539] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.952630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.953010] page dumped because: kasan: bad access detected
[   19.953162] 
[   19.953364] Memory state around the buggy address:
[   19.953420]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.953470]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.953583] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.953645]                                      ^
[   19.953742]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.953946]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.954083] ==================================================================
[   19.602499] ==================================================================
[   19.602560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.602628] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.602681] 
[   19.602730] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.602852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.603359] Hardware name: linux,dummy-virt (DT)
[   19.603553] Call trace:
[   19.603727]  show_stack+0x20/0x38 (C)
[   19.603937]  dump_stack_lvl+0x8c/0xd0
[   19.604212]  print_report+0x118/0x608
[   19.604263]  kasan_report+0xdc/0x128
[   19.604310]  kasan_check_range+0x100/0x1a8
[   19.604361]  __kasan_check_write+0x20/0x30
[   19.605006]  kasan_atomics_helper+0xad4/0x4858
[   19.605347]  kasan_atomics+0x198/0x2e0
[   19.605434]  kunit_try_run_case+0x170/0x3f0
[   19.605485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.605540]  kthread+0x328/0x630
[   19.605934]  ret_from_fork+0x10/0x20
[   19.605989] 
[   19.606010] Allocated by task 266:
[   19.606298]  kasan_save_stack+0x3c/0x68
[   19.606435]  kasan_save_track+0x20/0x40
[   19.606590]  kasan_save_alloc_info+0x40/0x58
[   19.606634]  __kasan_kmalloc+0xd4/0xd8
[   19.606673]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.606726]  kasan_atomics+0xb8/0x2e0
[   19.606924]  kunit_try_run_case+0x170/0x3f0
[   19.606965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.607011]  kthread+0x328/0x630
[   19.607084]  ret_from_fork+0x10/0x20
[   19.608588] 
[   19.609022] The buggy address belongs to the object at fff00000c57aa700
[   19.609022]  which belongs to the cache kmalloc-64 of size 64
[   19.609351] The buggy address is located 0 bytes to the right of
[   19.609351]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.609423] 
[   19.609556] The buggy address belongs to the physical page:
[   19.609642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.611573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.611645] page_type: f5(slab)
[   19.611689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.611742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.611786] page dumped because: kasan: bad access detected
[   19.611821] 
[   19.611842] Memory state around the buggy address:
[   19.611879]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.611925]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.611970] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.612012]                                      ^
[   19.612046]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.612091]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.612132] ==================================================================
[   19.667089] ==================================================================
[   19.667166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.667220] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.667279] 
[   19.667312] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.667397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.667425] Hardware name: linux,dummy-virt (DT)
[   19.667459] Call trace:
[   19.667482]  show_stack+0x20/0x38 (C)
[   19.667532]  dump_stack_lvl+0x8c/0xd0
[   19.667591]  print_report+0x118/0x608
[   19.667639]  kasan_report+0xdc/0x128
[   19.667684]  kasan_check_range+0x100/0x1a8
[   19.667735]  __kasan_check_write+0x20/0x30
[   19.667780]  kasan_atomics_helper+0xd3c/0x4858
[   19.667828]  kasan_atomics+0x198/0x2e0
[   19.667874]  kunit_try_run_case+0x170/0x3f0
[   19.667922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.667977]  kthread+0x328/0x630
[   19.668020]  ret_from_fork+0x10/0x20
[   19.668069] 
[   19.668089] Allocated by task 266:
[   19.668119]  kasan_save_stack+0x3c/0x68
[   19.668162]  kasan_save_track+0x20/0x40
[   19.668202]  kasan_save_alloc_info+0x40/0x58
[   19.668244]  __kasan_kmalloc+0xd4/0xd8
[   19.668283]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.668325]  kasan_atomics+0xb8/0x2e0
[   19.668361]  kunit_try_run_case+0x170/0x3f0
[   19.668401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.668447]  kthread+0x328/0x630
[   19.669047]  ret_from_fork+0x10/0x20
[   19.669796] 
[   19.669824] The buggy address belongs to the object at fff00000c57aa700
[   19.669824]  which belongs to the cache kmalloc-64 of size 64
[   19.669889] The buggy address is located 0 bytes to the right of
[   19.669889]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.670512] 
[   19.670552] The buggy address belongs to the physical page:
[   19.670687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.670979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.671260] page_type: f5(slab)
[   19.671305] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.671826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.672176] page dumped because: kasan: bad access detected
[   19.672516] 
[   19.672785] Memory state around the buggy address:
[   19.672980]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.673235]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.673532] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.673628]                                      ^
[   19.673849]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.673899]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.673943] ==================================================================
[   19.954383] ==================================================================
[   19.954600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.954653] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.954705] 
[   19.954736] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.954819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.954849] Hardware name: linux,dummy-virt (DT)
[   19.955441] Call trace:
[   19.955738]  show_stack+0x20/0x38 (C)
[   19.955792]  dump_stack_lvl+0x8c/0xd0
[   19.956029]  print_report+0x118/0x608
[   19.956359]  kasan_report+0xdc/0x128
[   19.956716]  __asan_report_load8_noabort+0x20/0x30
[   19.956972]  kasan_atomics_helper+0x3e20/0x4858
[   19.957350]  kasan_atomics+0x198/0x2e0
[   19.957640]  kunit_try_run_case+0x170/0x3f0
[   19.957707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.957863]  kthread+0x328/0x630
[   19.957931]  ret_from_fork+0x10/0x20
[   19.958121] 
[   19.958350] Allocated by task 266:
[   19.958545]  kasan_save_stack+0x3c/0x68
[   19.958606]  kasan_save_track+0x20/0x40
[   19.959057]  kasan_save_alloc_info+0x40/0x58
[   19.959355]  __kasan_kmalloc+0xd4/0xd8
[   19.959395]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.959438]  kasan_atomics+0xb8/0x2e0
[   19.959474]  kunit_try_run_case+0x170/0x3f0
[   19.959515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.959666]  kthread+0x328/0x630
[   19.959710]  ret_from_fork+0x10/0x20
[   19.959762] 
[   19.959785] The buggy address belongs to the object at fff00000c57aa700
[   19.959785]  which belongs to the cache kmalloc-64 of size 64
[   19.959941] The buggy address is located 0 bytes to the right of
[   19.959941]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.960059] 
[   19.960266] The buggy address belongs to the physical page:
[   19.960317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.960387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.960446] page_type: f5(slab)
[   19.960534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.960942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.961078] page dumped because: kasan: bad access detected
[   19.961118] 
[   19.961293] Memory state around the buggy address:
[   19.961495]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.961788]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.961859] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.961927]                                      ^
[   19.962009]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.962611]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.962685] ==================================================================
[   19.924721] ==================================================================
[   19.924777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.924828] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.924879] 
[   19.924911] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.925497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.925540] Hardware name: linux,dummy-virt (DT)
[   19.925592] Call trace:
[   19.925616]  show_stack+0x20/0x38 (C)
[   19.926020]  dump_stack_lvl+0x8c/0xd0
[   19.926486]  print_report+0x118/0x608
[   19.926636]  kasan_report+0xdc/0x128
[   19.926794]  kasan_check_range+0x100/0x1a8
[   19.926976]  __kasan_check_write+0x20/0x30
[   19.927264]  kasan_atomics_helper+0x16d0/0x4858
[   19.927536]  kasan_atomics+0x198/0x2e0
[   19.927597]  kunit_try_run_case+0x170/0x3f0
[   19.928043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.928102]  kthread+0x328/0x630
[   19.928145]  ret_from_fork+0x10/0x20
[   19.928844] 
[   19.929014] Allocated by task 266:
[   19.929054]  kasan_save_stack+0x3c/0x68
[   19.929237]  kasan_save_track+0x20/0x40
[   19.929455]  kasan_save_alloc_info+0x40/0x58
[   19.929510]  __kasan_kmalloc+0xd4/0xd8
[   19.929819]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.930051]  kasan_atomics+0xb8/0x2e0
[   19.930244]  kunit_try_run_case+0x170/0x3f0
[   19.930286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.930596]  kthread+0x328/0x630
[   19.931026]  ret_from_fork+0x10/0x20
[   19.931141] 
[   19.931323] The buggy address belongs to the object at fff00000c57aa700
[   19.931323]  which belongs to the cache kmalloc-64 of size 64
[   19.931389] The buggy address is located 0 bytes to the right of
[   19.931389]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.931636] 
[   19.931676] The buggy address belongs to the physical page:
[   19.931710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.933394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.933451] page_type: f5(slab)
[   19.933491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.933545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.933732] page dumped because: kasan: bad access detected
[   19.934201] 
[   19.934229] Memory state around the buggy address:
[   19.934266]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.934322]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.934370] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.934516]                                      ^
[   19.934560]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.934619]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.935018] ==================================================================
[   19.885550] ==================================================================
[   19.885615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.885787] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.886122] 
[   19.886171] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.886292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.886370] Hardware name: linux,dummy-virt (DT)
[   19.886665] Call trace:
[   19.886695]  show_stack+0x20/0x38 (C)
[   19.886953]  dump_stack_lvl+0x8c/0xd0
[   19.887003]  print_report+0x118/0x608
[   19.887049]  kasan_report+0xdc/0x128
[   19.887096]  kasan_check_range+0x100/0x1a8
[   19.887144]  __kasan_check_write+0x20/0x30
[   19.887192]  kasan_atomics_helper+0x15b4/0x4858
[   19.887732]  kasan_atomics+0x198/0x2e0
[   19.887970]  kunit_try_run_case+0x170/0x3f0
[   19.888095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.888154]  kthread+0x328/0x630
[   19.888366]  ret_from_fork+0x10/0x20
[   19.888502] 
[   19.888524] Allocated by task 266:
[   19.888552]  kasan_save_stack+0x3c/0x68
[   19.888608]  kasan_save_track+0x20/0x40
[   19.888826]  kasan_save_alloc_info+0x40/0x58
[   19.888885]  __kasan_kmalloc+0xd4/0xd8
[   19.888938]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.889771]  kasan_atomics+0xb8/0x2e0
[   19.889854]  kunit_try_run_case+0x170/0x3f0
[   19.889897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.889941]  kthread+0x328/0x630
[   19.889975]  ret_from_fork+0x10/0x20
[   19.890013] 
[   19.890037] The buggy address belongs to the object at fff00000c57aa700
[   19.890037]  which belongs to the cache kmalloc-64 of size 64
[   19.890509] The buggy address is located 0 bytes to the right of
[   19.890509]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.890857] 
[   19.890883] The buggy address belongs to the physical page:
[   19.890976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.891397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.891676] page_type: f5(slab)
[   19.891795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.891916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.892150] page dumped because: kasan: bad access detected
[   19.892191] 
[   19.892375] Memory state around the buggy address:
[   19.892449]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.892710]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.892918] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.893116]                                      ^
[   19.893296]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.893370]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.893658] ==================================================================
[   19.704480] ==================================================================
[   19.704545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.704949] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.705003] 
[   19.705041] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.705124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.706002] Hardware name: linux,dummy-virt (DT)
[   19.706049] Call trace:
[   19.706076]  show_stack+0x20/0x38 (C)
[   19.707221]  dump_stack_lvl+0x8c/0xd0
[   19.707282]  print_report+0x118/0x608
[   19.707331]  kasan_report+0xdc/0x128
[   19.707380]  __asan_report_load8_noabort+0x20/0x30
[   19.707429]  kasan_atomics_helper+0x3f58/0x4858
[   19.707480]  kasan_atomics+0x198/0x2e0
[   19.707526]  kunit_try_run_case+0x170/0x3f0
[   19.707586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.707641]  kthread+0x328/0x630
[   19.707684]  ret_from_fork+0x10/0x20
[   19.707734] 
[   19.707755] Allocated by task 266:
[   19.707786]  kasan_save_stack+0x3c/0x68
[   19.707829]  kasan_save_track+0x20/0x40
[   19.707869]  kasan_save_alloc_info+0x40/0x58
[   19.707912]  __kasan_kmalloc+0xd4/0xd8
[   19.707950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.707992]  kasan_atomics+0xb8/0x2e0
[   19.708046]  kunit_try_run_case+0x170/0x3f0
[   19.708087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.708149]  kthread+0x328/0x630
[   19.708193]  ret_from_fork+0x10/0x20
[   19.708240] 
[   19.708295] The buggy address belongs to the object at fff00000c57aa700
[   19.708295]  which belongs to the cache kmalloc-64 of size 64
[   19.708360] The buggy address is located 0 bytes to the right of
[   19.708360]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.708431] 
[   19.708486] The buggy address belongs to the physical page:
[   19.708577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.708831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.708903] page_type: f5(slab)
[   19.709351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.709661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.709718] page dumped because: kasan: bad access detected
[   19.709751] 
[   19.709770] Memory state around the buggy address:
[   19.709815]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.709863]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.709910] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.710105]                                      ^
[   19.710145]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.710322]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.710470] ==================================================================
[   19.815090] ==================================================================
[   19.815164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.815563] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.815629] 
[   19.815663] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.815957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.816018] Hardware name: linux,dummy-virt (DT)
[   19.816346] Call trace:
[   19.816374]  show_stack+0x20/0x38 (C)
[   19.816425]  dump_stack_lvl+0x8c/0xd0
[   19.816476]  print_report+0x118/0x608
[   19.816524]  kasan_report+0xdc/0x128
[   19.816579]  kasan_check_range+0x100/0x1a8
[   19.817052]  __kasan_check_write+0x20/0x30
[   19.817138]  kasan_atomics_helper+0x12d8/0x4858
[   19.817655]  kasan_atomics+0x198/0x2e0
[   19.817711]  kunit_try_run_case+0x170/0x3f0
[   19.817779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.817834]  kthread+0x328/0x630
[   19.817876]  ret_from_fork+0x10/0x20
[   19.818425] 
[   19.818593] Allocated by task 266:
[   19.818824]  kasan_save_stack+0x3c/0x68
[   19.818887]  kasan_save_track+0x20/0x40
[   19.819023]  kasan_save_alloc_info+0x40/0x58
[   19.819071]  __kasan_kmalloc+0xd4/0xd8
[   19.819460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.819652]  kasan_atomics+0xb8/0x2e0
[   19.820154]  kunit_try_run_case+0x170/0x3f0
[   19.820210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.820373]  kthread+0x328/0x630
[   19.820723]  ret_from_fork+0x10/0x20
[   19.821096] 
[   19.821151] The buggy address belongs to the object at fff00000c57aa700
[   19.821151]  which belongs to the cache kmalloc-64 of size 64
[   19.821378] The buggy address is located 0 bytes to the right of
[   19.821378]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.821448] 
[   19.821471] The buggy address belongs to the physical page:
[   19.821505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.821923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.821982] page_type: f5(slab)
[   19.822155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.822216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.822262] page dumped because: kasan: bad access detected
[   19.822296] 
[   19.822317] Memory state around the buggy address:
[   19.822352]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.822398]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.822877] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.823137]                                      ^
[   19.823185]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.823267]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.823384] ==================================================================
[   19.789767] ==================================================================
[   19.789822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.789873] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.789924] 
[   19.789955] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.790040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.790067] Hardware name: linux,dummy-virt (DT)
[   19.790112] Call trace:
[   19.790242]  show_stack+0x20/0x38 (C)
[   19.790292]  dump_stack_lvl+0x8c/0xd0
[   19.790346]  print_report+0x118/0x608
[   19.790577]  kasan_report+0xdc/0x128
[   19.790695]  kasan_check_range+0x100/0x1a8
[   19.790837]  __kasan_check_write+0x20/0x30
[   19.790885]  kasan_atomics_helper+0x1190/0x4858
[   19.790997]  kasan_atomics+0x198/0x2e0
[   19.791045]  kunit_try_run_case+0x170/0x3f0
[   19.791094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.791156]  kthread+0x328/0x630
[   19.791343]  ret_from_fork+0x10/0x20
[   19.791551] 
[   19.791591] Allocated by task 266:
[   19.791619]  kasan_save_stack+0x3c/0x68
[   19.791663]  kasan_save_track+0x20/0x40
[   19.791752]  kasan_save_alloc_info+0x40/0x58
[   19.791833]  __kasan_kmalloc+0xd4/0xd8
[   19.791926]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.792030]  kasan_atomics+0xb8/0x2e0
[   19.792078]  kunit_try_run_case+0x170/0x3f0
[   19.792119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.792164]  kthread+0x328/0x630
[   19.792199]  ret_from_fork+0x10/0x20
[   19.792235] 
[   19.792255] The buggy address belongs to the object at fff00000c57aa700
[   19.792255]  which belongs to the cache kmalloc-64 of size 64
[   19.792317] The buggy address is located 0 bytes to the right of
[   19.792317]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.792385] 
[   19.792464] The buggy address belongs to the physical page:
[   19.792499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.792553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.792612] page_type: f5(slab)
[   19.792661] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.792715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.792912] page dumped because: kasan: bad access detected
[   19.792960] 
[   19.792981] Memory state around the buggy address:
[   19.793017]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.793128]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.793284] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.793326]                                      ^
[   19.793363]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.793512]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.793586] ==================================================================
[   19.778905] ==================================================================
[   19.778961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.779011] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.779065] 
[   19.779095] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.779179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.779208] Hardware name: linux,dummy-virt (DT)
[   19.779241] Call trace:
[   19.779265]  show_stack+0x20/0x38 (C)
[   19.779313]  dump_stack_lvl+0x8c/0xd0
[   19.779361]  print_report+0x118/0x608
[   19.779408]  kasan_report+0xdc/0x128
[   19.779455]  kasan_check_range+0x100/0x1a8
[   19.779504]  __kasan_check_write+0x20/0x30
[   19.779549]  kasan_atomics_helper+0x1128/0x4858
[   19.779616]  kasan_atomics+0x198/0x2e0
[   19.779662]  kunit_try_run_case+0x170/0x3f0
[   19.779710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.779765]  kthread+0x328/0x630
[   19.779841]  ret_from_fork+0x10/0x20
[   19.779893] 
[   19.779913] Allocated by task 266:
[   19.781501]  kasan_save_stack+0x3c/0x68
[   19.782063]  kasan_save_track+0x20/0x40
[   19.782581]  kasan_save_alloc_info+0x40/0x58
[   19.782658]  __kasan_kmalloc+0xd4/0xd8
[   19.782700]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.782741]  kasan_atomics+0xb8/0x2e0
[   19.782780]  kunit_try_run_case+0x170/0x3f0
[   19.782822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.784353]  kthread+0x328/0x630
[   19.784414]  ret_from_fork+0x10/0x20
[   19.784454] 
[   19.785107] The buggy address belongs to the object at fff00000c57aa700
[   19.785107]  which belongs to the cache kmalloc-64 of size 64
[   19.785186] The buggy address is located 0 bytes to the right of
[   19.785186]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.785256] 
[   19.785285] The buggy address belongs to the physical page:
[   19.785319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.785374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.785426] page_type: f5(slab)
[   19.785464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.785519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.785574] page dumped because: kasan: bad access detected
[   19.787137] 
[   19.787856] Memory state around the buggy address:
[   19.788617]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.788684]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.788776] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.788925]                                      ^
[   19.788964]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.789011]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.789051] ==================================================================
[   19.692132] ==================================================================
[   19.692598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.692840] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.692979] 
[   19.693017] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.693102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.693131] Hardware name: linux,dummy-virt (DT)
[   19.693165] Call trace:
[   19.693616]  show_stack+0x20/0x38 (C)
[   19.693940]  dump_stack_lvl+0x8c/0xd0
[   19.694226]  print_report+0x118/0x608
[   19.694300]  kasan_report+0xdc/0x128
[   19.694349]  kasan_check_range+0x100/0x1a8
[   19.694990]  __kasan_check_read+0x20/0x30
[   19.695050]  kasan_atomics_helper+0xdd4/0x4858
[   19.695099]  kasan_atomics+0x198/0x2e0
[   19.695147]  kunit_try_run_case+0x170/0x3f0
[   19.695195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.695820]  kthread+0x328/0x630
[   19.696352]  ret_from_fork+0x10/0x20
[   19.696735] 
[   19.696761] Allocated by task 266:
[   19.696973]  kasan_save_stack+0x3c/0x68
[   19.697177]  kasan_save_track+0x20/0x40
[   19.697292]  kasan_save_alloc_info+0x40/0x58
[   19.697693]  __kasan_kmalloc+0xd4/0xd8
[   19.697927]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.698021]  kasan_atomics+0xb8/0x2e0
[   19.698060]  kunit_try_run_case+0x170/0x3f0
[   19.698107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.698634]  kthread+0x328/0x630
[   19.698672]  ret_from_fork+0x10/0x20
[   19.698711] 
[   19.698733] The buggy address belongs to the object at fff00000c57aa700
[   19.698733]  which belongs to the cache kmalloc-64 of size 64
[   19.699241] The buggy address is located 0 bytes to the right of
[   19.699241]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.699533] 
[   19.699665] The buggy address belongs to the physical page:
[   19.699985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.700242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.700333] page_type: f5(slab)
[   19.700610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.700868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.701070] page dumped because: kasan: bad access detected
[   19.701368] 
[   19.701528] Memory state around the buggy address:
[   19.701586]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.701711]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.701759] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.701851]                                      ^
[   19.701887]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.702317]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.702485] ==================================================================
[   19.794356] ==================================================================
[   19.794425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.794494] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.794546] 
[   19.794586] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.794671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.794701] Hardware name: linux,dummy-virt (DT)
[   19.794732] Call trace:
[   19.794756]  show_stack+0x20/0x38 (C)
[   19.794803]  dump_stack_lvl+0x8c/0xd0
[   19.794852]  print_report+0x118/0x608
[   19.794901]  kasan_report+0xdc/0x128
[   19.794947]  kasan_check_range+0x100/0x1a8
[   19.794997]  __kasan_check_write+0x20/0x30
[   19.795041]  kasan_atomics_helper+0x11f8/0x4858
[   19.795091]  kasan_atomics+0x198/0x2e0
[   19.795136]  kunit_try_run_case+0x170/0x3f0
[   19.795184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.795239]  kthread+0x328/0x630
[   19.795292]  ret_from_fork+0x10/0x20
[   19.795342] 
[   19.795361] Allocated by task 266:
[   19.795463]  kasan_save_stack+0x3c/0x68
[   19.795558]  kasan_save_track+0x20/0x40
[   19.795650]  kasan_save_alloc_info+0x40/0x58
[   19.795705]  __kasan_kmalloc+0xd4/0xd8
[   19.795748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.795789]  kasan_atomics+0xb8/0x2e0
[   19.795827]  kunit_try_run_case+0x170/0x3f0
[   19.795876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.796032]  kthread+0x328/0x630
[   19.796120]  ret_from_fork+0x10/0x20
[   19.796157] 
[   19.796179] The buggy address belongs to the object at fff00000c57aa700
[   19.796179]  which belongs to the cache kmalloc-64 of size 64
[   19.796270] The buggy address is located 0 bytes to the right of
[   19.796270]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.796340] 
[   19.796362] The buggy address belongs to the physical page:
[   19.796642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.796915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.796982] page_type: f5(slab)
[   19.797027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.797099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.797184] page dumped because: kasan: bad access detected
[   19.797320] 
[   19.797423] Memory state around the buggy address:
[   19.797496]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.797543]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.797596] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.797637]                                      ^
[   19.797679]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.797881]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.798066] ==================================================================
[   19.480424] ==================================================================
[   19.480710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   19.480925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.481248]  __kasan_check_write+0x20/0x30
[   19.483874] 
[   19.484165]  kunit_try_run_case+0x170/0x3f0
[   19.484205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.484476] 
[   19.484498] The buggy address belongs to the physical page:
[   19.484531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.484797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.485091] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.485428]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.486314] ==================================================================
[   19.833547] ==================================================================
[   19.833616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.833668] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.833721] 
[   19.833756] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.833838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.833865] Hardware name: linux,dummy-virt (DT)
[   19.834345] Call trace:
[   19.834382]  show_stack+0x20/0x38 (C)
[   19.834732]  dump_stack_lvl+0x8c/0xd0
[   19.834806]  print_report+0x118/0x608
[   19.834869]  kasan_report+0xdc/0x128
[   19.834923]  __asan_report_load8_noabort+0x20/0x30
[   19.835456]  kasan_atomics_helper+0x3f04/0x4858
[   19.835577]  kasan_atomics+0x198/0x2e0
[   19.835685]  kunit_try_run_case+0x170/0x3f0
[   19.835920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.837015]  kthread+0x328/0x630
[   19.837201]  ret_from_fork+0x10/0x20
[   19.837639] 
[   19.837696] Allocated by task 266:
[   19.837773]  kasan_save_stack+0x3c/0x68
[   19.837904]  kasan_save_track+0x20/0x40
[   19.838073]  kasan_save_alloc_info+0x40/0x58
[   19.838247]  __kasan_kmalloc+0xd4/0xd8
[   19.838295]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.838442]  kasan_atomics+0xb8/0x2e0
[   19.838870]  kunit_try_run_case+0x170/0x3f0
[   19.839108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.839156]  kthread+0x328/0x630
[   19.839189]  ret_from_fork+0x10/0x20
[   19.839225] 
[   19.839250] The buggy address belongs to the object at fff00000c57aa700
[   19.839250]  which belongs to the cache kmalloc-64 of size 64
[   19.839867] The buggy address is located 0 bytes to the right of
[   19.839867]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.839976] 
[   19.840006] The buggy address belongs to the physical page:
[   19.840051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.840251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.840306] page_type: f5(slab)
[   19.840351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.840727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.840778] page dumped because: kasan: bad access detected
[   19.840813] 
[   19.840836] Memory state around the buggy address:
[   19.841276]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.842308]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.842388] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.842458]                                      ^
[   19.842497]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.842651]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.842693] ==================================================================
[   19.894346] ==================================================================
[   19.894421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.894473] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.894525] 
[   19.894902] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.895021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.895097] Hardware name: linux,dummy-virt (DT)
[   19.895133] Call trace:
[   19.895156]  show_stack+0x20/0x38 (C)
[   19.895373]  dump_stack_lvl+0x8c/0xd0
[   19.895615]  print_report+0x118/0x608
[   19.896422]  kasan_report+0xdc/0x128
[   19.896472]  __asan_report_load8_noabort+0x20/0x30
[   19.896521]  kasan_atomics_helper+0x3db0/0x4858
[   19.896584]  kasan_atomics+0x198/0x2e0
[   19.896630]  kunit_try_run_case+0x170/0x3f0
[   19.897383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.897475]  kthread+0x328/0x630
[   19.897519]  ret_from_fork+0x10/0x20
[   19.897585] 
[   19.897605] Allocated by task 266:
[   19.897635]  kasan_save_stack+0x3c/0x68
[   19.898056]  kasan_save_track+0x20/0x40
[   19.898133]  kasan_save_alloc_info+0x40/0x58
[   19.898174]  __kasan_kmalloc+0xd4/0xd8
[   19.898213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.898853]  kasan_atomics+0xb8/0x2e0
[   19.899198]  kunit_try_run_case+0x170/0x3f0
[   19.899274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.899322]  kthread+0x328/0x630
[   19.899872]  ret_from_fork+0x10/0x20
[   19.900323] 
[   19.900526] The buggy address belongs to the object at fff00000c57aa700
[   19.900526]  which belongs to the cache kmalloc-64 of size 64
[   19.900603] The buggy address is located 0 bytes to the right of
[   19.900603]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.900674] 
[   19.900697] The buggy address belongs to the physical page:
[   19.901127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.901214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.901756] page_type: f5(slab)
[   19.901870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.901923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.901969] page dumped because: kasan: bad access detected
[   19.902003] 
[   19.902024] Memory state around the buggy address:
[   19.902058]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.902106]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.902153] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.902194]                                      ^
[   19.902230]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.902275]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.902318] ==================================================================
[   19.619485] ==================================================================
[   19.619544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   19.619608] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.619660] 
[   19.619695] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.619779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.619810] Hardware name: linux,dummy-virt (DT)
[   19.619841] Call trace:
[   19.619865]  show_stack+0x20/0x38 (C)
[   19.619914]  dump_stack_lvl+0x8c/0xd0
[   19.619982]  print_report+0x118/0x608
[   19.620030]  kasan_report+0xdc/0x128
[   19.620078]  kasan_check_range+0x100/0x1a8
[   19.620127]  __kasan_check_write+0x20/0x30
[   19.620704]  kasan_atomics_helper+0xb70/0x4858
[   19.620764]  kasan_atomics+0x198/0x2e0
[   19.620953]  kunit_try_run_case+0x170/0x3f0
[   19.621003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.621058]  kthread+0x328/0x630
[   19.621103]  ret_from_fork+0x10/0x20
[   19.621153] 
[   19.621173] Allocated by task 266:
[   19.621203]  kasan_save_stack+0x3c/0x68
[   19.621247]  kasan_save_track+0x20/0x40
[   19.621295]  kasan_save_alloc_info+0x40/0x58
[   19.621381]  __kasan_kmalloc+0xd4/0xd8
[   19.621420]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.621462]  kasan_atomics+0xb8/0x2e0
[   19.621502]  kunit_try_run_case+0x170/0x3f0
[   19.621542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.622357] The buggy address belongs to the physical page:
[   19.623214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.623787] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.625158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.626411] Allocated by task 266:
[   19.627205]  kasan_atomics+0xb8/0x2e0
[   19.627388]  kunit_try_run_case+0x170/0x3f0
[   19.627541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.627932] The buggy address is located 0 bytes to the right of
[   19.627932]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.628617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.629389]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.631124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.632508]  kasan_atomics_helper+0xc08/0x4858
[   19.633917]  kasan_save_stack+0x3c/0x68
[   19.634393]  kunit_try_run_case+0x170/0x3f0
[   19.634696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.634752]  kthread+0x328/0x630
[   19.634787]  ret_from_fork+0x10/0x20
[   19.634823] 
[   19.634847] The buggy address belongs to the object at fff00000c57aa700
[   19.634847]  which belongs to the cache kmalloc-64 of size 64
[   19.636663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.637830] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.637953]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.640193] 
[   19.640351] Hardware name: linux,dummy-virt (DT)
[   19.640557]  kasan_report+0xdc/0x128
[   19.641008] 
[   19.642165]  __kasan_kmalloc+0xd4/0xd8
[   19.642776]  kthread+0x328/0x630
[   19.642826]  ret_from_fork+0x10/0x20
[   19.642864] 
[   19.642887] The buggy address belongs to the object at fff00000c57aa700
[   19.642887]  which belongs to the cache kmalloc-64 of size 64
[   19.644014] page_type: f5(slab)
[   19.644635]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.646103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   19.646422] Call trace:
[   19.646917]  __kasan_check_write+0x20/0x30
[   19.648598]  ret_from_fork+0x10/0x20
[   19.648647] 
[   19.648678] The buggy address belongs to the object at fff00000c57aa700
[   19.648678]  which belongs to the cache kmalloc-64 of size 64
[   19.648742] The buggy address is located 0 bytes to the right of
[   19.648742]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.648860] 
[   19.648891] The buggy address belongs to the physical page:
[   19.648926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.648990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.649971] page_type: f5(slab)
[   19.650022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.650076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.650169] page dumped because: kasan: bad access detected
[   19.650443] 
[   19.650466] Memory state around the buggy address:
[   19.650860]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.651392]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.651549] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.651627]                                      ^
[   19.651727]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.652364]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.652603] ==================================================================
[   19.865601] ==================================================================
[   19.865705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.865810] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.866155] 
[   19.866206] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.866396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.866424] Hardware name: linux,dummy-virt (DT)
[   19.866870] Call trace:
[   19.866920]  show_stack+0x20/0x38 (C)
[   19.866982]  dump_stack_lvl+0x8c/0xd0
[   19.867031]  print_report+0x118/0x608
[   19.867078]  kasan_report+0xdc/0x128
[   19.867125]  kasan_check_range+0x100/0x1a8
[   19.867531]  __kasan_check_write+0x20/0x30
[   19.867614]  kasan_atomics_helper+0x14e4/0x4858
[   19.867663]  kasan_atomics+0x198/0x2e0
[   19.867996]  kunit_try_run_case+0x170/0x3f0
[   19.868366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.868450]  kthread+0x328/0x630
[   19.868614]  ret_from_fork+0x10/0x20
[   19.868993] 
[   19.869020] Allocated by task 266:
[   19.869332]  kasan_save_stack+0x3c/0x68
[   19.869468]  kasan_save_track+0x20/0x40
[   19.869508]  kasan_save_alloc_info+0x40/0x58
[   19.869609]  __kasan_kmalloc+0xd4/0xd8
[   19.869669]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.870079]  kasan_atomics+0xb8/0x2e0
[   19.870159]  kunit_try_run_case+0x170/0x3f0
[   19.870470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.870524]  kthread+0x328/0x630
[   19.870599]  ret_from_fork+0x10/0x20
[   19.870639] 
[   19.870841] The buggy address belongs to the object at fff00000c57aa700
[   19.870841]  which belongs to the cache kmalloc-64 of size 64
[   19.870907] The buggy address is located 0 bytes to the right of
[   19.870907]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.871246] 
[   19.871273] The buggy address belongs to the physical page:
[   19.871321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.871383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.871725] page_type: f5(slab)
[   19.871779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.871834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.871987] page dumped because: kasan: bad access detected
[   19.872027] 
[   19.872078] Memory state around the buggy address:
[   19.872188]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.872772]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.872889] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.873046]                                      ^
[   19.873214]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.873647]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.873736] ==================================================================
[   19.595371] ==================================================================
[   19.595429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.595484] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.595539] 
[   19.595584] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.595671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.595702] Hardware name: linux,dummy-virt (DT)
[   19.595736] Call trace:
[   19.595761]  show_stack+0x20/0x38 (C)
[   19.595810]  dump_stack_lvl+0x8c/0xd0
[   19.595859]  print_report+0x118/0x608
[   19.595907]  kasan_report+0xdc/0x128
[   19.595955]  kasan_check_range+0x100/0x1a8
[   19.596006]  __kasan_check_write+0x20/0x30
[   19.596054]  kasan_atomics_helper+0xa6c/0x4858
[   19.596113]  kasan_atomics+0x198/0x2e0
[   19.596344]  kunit_try_run_case+0x170/0x3f0
[   19.596418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.596883]  kthread+0x328/0x630
[   19.597166]  ret_from_fork+0x10/0x20
[   19.597218] 
[   19.597239] Allocated by task 266:
[   19.597275]  kasan_save_stack+0x3c/0x68
[   19.597812]  kasan_save_track+0x20/0x40
[   19.597893]  kasan_save_alloc_info+0x40/0x58
[   19.597936]  __kasan_kmalloc+0xd4/0xd8
[   19.598266]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.598323]  kasan_atomics+0xb8/0x2e0
[   19.598360]  kunit_try_run_case+0x170/0x3f0
[   19.598399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.598457]  kthread+0x328/0x630
[   19.598492]  ret_from_fork+0x10/0x20
[   19.598756] 
[   19.598945] The buggy address belongs to the object at fff00000c57aa700
[   19.598945]  which belongs to the cache kmalloc-64 of size 64
[   19.599165] The buggy address is located 0 bytes to the right of
[   19.599165]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.599533] 
[   19.599597] The buggy address belongs to the physical page:
[   19.599632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.599699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.599751] page_type: f5(slab)
[   19.599953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.600099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.600151] page dumped because: kasan: bad access detected
[   19.600188] 
[   19.600384] Memory state around the buggy address:
[   19.600624]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.600677]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.600938] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.601114]                                      ^
[   19.601154]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.601201]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.601365] ==================================================================
[   19.612724] ==================================================================
[   19.612782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   19.612836] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.612888] 
[   19.612922] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.613006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.613034] Hardware name: linux,dummy-virt (DT)
[   19.613068] Call trace:
[   19.613092]  show_stack+0x20/0x38 (C)
[   19.613142]  dump_stack_lvl+0x8c/0xd0
[   19.613193]  print_report+0x118/0x608
[   19.613241]  kasan_report+0xdc/0x128
[   19.613297]  __asan_report_load4_noabort+0x20/0x30
[   19.614685]  kasan_atomics_helper+0x3dcc/0x4858
[   19.614737]  kasan_atomics+0x198/0x2e0
[   19.614785]  kunit_try_run_case+0x170/0x3f0
[   19.614836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.614891]  kthread+0x328/0x630
[   19.614935]  ret_from_fork+0x10/0x20
[   19.614986] 
[   19.615006] Allocated by task 266:
[   19.615038]  kasan_save_stack+0x3c/0x68
[   19.615083]  kasan_save_track+0x20/0x40
[   19.615123]  kasan_save_alloc_info+0x40/0x58
[   19.615182]  __kasan_kmalloc+0xd4/0xd8
[   19.615221]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.615264]  kasan_atomics+0xb8/0x2e0
[   19.615323]  kunit_try_run_case+0x170/0x3f0
[   19.615543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.615716]  kthread+0x328/0x630
[   19.615750]  ret_from_fork+0x10/0x20
[   19.615803] 
[   19.615826] The buggy address belongs to the object at fff00000c57aa700
[   19.615826]  which belongs to the cache kmalloc-64 of size 64
[   19.616053] The buggy address is located 0 bytes to the right of
[   19.616053]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.616203] 
[   19.616295] The buggy address belongs to the physical page:
[   19.616377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.616435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.616700] page_type: f5(slab)
[   19.616744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.616977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.617021] page dumped because: kasan: bad access detected
[   19.617074] 
[   19.617185] Memory state around the buggy address:
[   19.617721]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.617893]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.618166] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.618217]                                      ^
[   19.618254]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.618311]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.618493] ==================================================================
[   19.563753] ==================================================================
[   19.563913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.564408] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.564464] 
[   19.564650] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.565009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.565040] Hardware name: linux,dummy-virt (DT)
[   19.565074] Call trace:
[   19.565097]  show_stack+0x20/0x38 (C)
[   19.565528]  dump_stack_lvl+0x8c/0xd0
[   19.565614]  print_report+0x118/0x608
[   19.565669]  kasan_report+0xdc/0x128
[   19.565716]  __asan_report_load4_noabort+0x20/0x30
[   19.566007]  kasan_atomics_helper+0x42d8/0x4858
[   19.566062]  kasan_atomics+0x198/0x2e0
[   19.566122]  kunit_try_run_case+0x170/0x3f0
[   19.566215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.566300]  kthread+0x328/0x630
[   19.566343]  ret_from_fork+0x10/0x20
[   19.566597] 
[   19.566618] Allocated by task 266:
[   19.566647]  kasan_save_stack+0x3c/0x68
[   19.566991]  kasan_save_track+0x20/0x40
[   19.567187]  kasan_save_alloc_info+0x40/0x58
[   19.567981]  kthread+0x328/0x630
[   19.569873] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.571895] Call trace:
[   19.572019]  show_stack+0x20/0x38 (C)
[   19.572074]  dump_stack_lvl+0x8c/0xd0
[   19.572311]  print_report+0x118/0x608
[   19.572535]  kasan_report+0xdc/0x128
[   19.572615]  kasan_check_range+0x100/0x1a8
[   19.572666]  __kasan_check_write+0x20/0x30
[   19.572771]  kasan_atomics_helper+0x934/0x4858
[   19.573404]  kasan_atomics+0x198/0x2e0
[   19.573750]  kunit_try_run_case+0x170/0x3f0
[   19.573804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.573859]  kthread+0x328/0x630
[   19.573902]  ret_from_fork+0x10/0x20
[   19.574357] 
[   19.574479] Allocated by task 266:
[   19.574618]  kasan_save_stack+0x3c/0x68
[   19.575068]  kasan_save_track+0x20/0x40
[   19.575188]  kasan_save_alloc_info+0x40/0x58
[   19.575254]  __kasan_kmalloc+0xd4/0xd8
[   19.575342]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.575383]  kasan_atomics+0xb8/0x2e0
[   19.575459]  kunit_try_run_case+0x170/0x3f0
[   19.575501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.575546]  kthread+0x328/0x630
[   19.575735]  ret_from_fork+0x10/0x20
[   19.575782] 
[   19.575804] The buggy address belongs to the object at fff00000c57aa700
[   19.575804]  which belongs to the cache kmalloc-64 of size 64
[   19.576224] The buggy address is located 0 bytes to the right of
[   19.576224]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.576328] 
[   19.576352] The buggy address belongs to the physical page:
[   19.576386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.576445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.576496] page_type: f5(slab)
[   19.576549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.576823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.577211] page dumped because: kasan: bad access detected
[   19.577271] 
[   19.577293] Memory state around the buggy address:
[   19.577346]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.577394]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.577592] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.577887]                                      ^
[   19.577946]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.577994]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.578038] ==================================================================
[   19.854983] ==================================================================
[   19.855046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.855096] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.855149] 
[   19.855182] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.855410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.855676] Hardware name: linux,dummy-virt (DT)
[   19.855738] Call trace:
[   19.856250]  show_stack+0x20/0x38 (C)
[   19.856378]  dump_stack_lvl+0x8c/0xd0
[   19.856632]  print_report+0x118/0x608
[   19.856906]  kasan_report+0xdc/0x128
[   19.857104]  kasan_check_range+0x100/0x1a8
[   19.857153]  __kasan_check_write+0x20/0x30
[   19.857200]  kasan_atomics_helper+0x147c/0x4858
[   19.857249]  kasan_atomics+0x198/0x2e0
[   19.857301]  kunit_try_run_case+0x170/0x3f0
[   19.857357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.857411]  kthread+0x328/0x630
[   19.857452]  ret_from_fork+0x10/0x20
[   19.857499] 
[   19.857521] Allocated by task 266:
[   19.857977]  kasan_save_stack+0x3c/0x68
[   19.858041]  kasan_save_track+0x20/0x40
[   19.858360]  kasan_save_alloc_info+0x40/0x58
[   19.858410]  __kasan_kmalloc+0xd4/0xd8
[   19.858647]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.859015]  kasan_atomics+0xb8/0x2e0
[   19.859270]  kunit_try_run_case+0x170/0x3f0
[   19.859435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.859560]  kthread+0x328/0x630
[   19.859620]  ret_from_fork+0x10/0x20
[   19.861080] 
[   19.861273] The buggy address belongs to the object at fff00000c57aa700
[   19.861273]  which belongs to the cache kmalloc-64 of size 64
[   19.861378] The buggy address is located 0 bytes to the right of
[   19.861378]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.861654] 
[   19.861678] The buggy address belongs to the physical page:
[   19.861713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.861954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.862009] page_type: f5(slab)
[   19.862421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.862550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.863080] page dumped because: kasan: bad access detected
[   19.863200] 
[   19.863221] Memory state around the buggy address:
[   19.863257]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.863304]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.863957] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.864226]                                      ^
[   19.864271]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.864688]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.864825] ==================================================================
[   19.843599] ==================================================================
[   19.843853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.843916] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.844182] 
[   19.844317] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.844628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.844681] Hardware name: linux,dummy-virt (DT)
[   19.844724] Call trace:
[   19.844785]  show_stack+0x20/0x38 (C)
[   19.845153]  dump_stack_lvl+0x8c/0xd0
[   19.845361]  print_report+0x118/0x608
[   19.845655]  kasan_report+0xdc/0x128
[   19.845705]  kasan_check_range+0x100/0x1a8
[   19.845755]  __kasan_check_write+0x20/0x30
[   19.846231]  kasan_atomics_helper+0x1414/0x4858
[   19.846315]  kasan_atomics+0x198/0x2e0
[   19.846448]  kunit_try_run_case+0x170/0x3f0
[   19.846504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.846559]  kthread+0x328/0x630
[   19.846825]  ret_from_fork+0x10/0x20
[   19.847034] 
[   19.847317] Allocated by task 266:
[   19.847550]  kasan_save_stack+0x3c/0x68
[   19.847610]  kasan_save_track+0x20/0x40
[   19.847651]  kasan_save_alloc_info+0x40/0x58
[   19.847692]  __kasan_kmalloc+0xd4/0xd8
[   19.848418]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.849069]  kasan_atomics+0xb8/0x2e0
[   19.849171]  kunit_try_run_case+0x170/0x3f0
[   19.849777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.849903]  kthread+0x328/0x630
[   19.849939]  ret_from_fork+0x10/0x20
[   19.849998] 
[   19.850022] The buggy address belongs to the object at fff00000c57aa700
[   19.850022]  which belongs to the cache kmalloc-64 of size 64
[   19.850539] The buggy address is located 0 bytes to the right of
[   19.850539]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.850795] 
[   19.850820] The buggy address belongs to the physical page:
[   19.850853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.850911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.851356] page_type: f5(slab)
[   19.851405] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.851666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.851782] page dumped because: kasan: bad access detected
[   19.852253] 
[   19.852332] Memory state around the buggy address:
[   19.852370]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.852981]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.853065] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.853108]                                      ^
[   19.853542]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853603]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853897] ==================================================================
[   19.824235] ==================================================================
[   19.824291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.824341] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.825051] 
[   19.825106] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.825194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.825224] Hardware name: linux,dummy-virt (DT)
[   19.825256] Call trace:
[   19.825620]  show_stack+0x20/0x38 (C)
[   19.825741]  dump_stack_lvl+0x8c/0xd0
[   19.825844]  print_report+0x118/0x608
[   19.825901]  kasan_report+0xdc/0x128
[   19.825948]  kasan_check_range+0x100/0x1a8
[   19.826237]  __kasan_check_write+0x20/0x30
[   19.826310]  kasan_atomics_helper+0x1384/0x4858
[   19.826672]  kasan_atomics+0x198/0x2e0
[   19.826721]  kunit_try_run_case+0x170/0x3f0
[   19.827054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.827262]  kthread+0x328/0x630
[   19.827332]  ret_from_fork+0x10/0x20
[   19.827699] 
[   19.827737] Allocated by task 266:
[   19.827775]  kasan_save_stack+0x3c/0x68
[   19.827992]  kasan_save_track+0x20/0x40
[   19.828034]  kasan_save_alloc_info+0x40/0x58
[   19.828076]  __kasan_kmalloc+0xd4/0xd8
[   19.828670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.828721]  kasan_atomics+0xb8/0x2e0
[   19.828761]  kunit_try_run_case+0x170/0x3f0
[   19.828800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.828847]  kthread+0x328/0x630
[   19.828880]  ret_from_fork+0x10/0x20
[   19.828916] 
[   19.828939] The buggy address belongs to the object at fff00000c57aa700
[   19.828939]  which belongs to the cache kmalloc-64 of size 64
[   19.829001] The buggy address is located 0 bytes to the right of
[   19.829001]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.829068] 
[   19.829091] The buggy address belongs to the physical page:
[   19.829982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.830231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.830310] page_type: f5(slab)
[   19.830363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.830912] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.830961] page dumped because: kasan: bad access detected
[   19.831477] 
[   19.831510] Memory state around the buggy address:
[   19.831549]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.831828]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.831877] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.831922]                                      ^
[   19.832362]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.832426]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.832498] ==================================================================
[   19.875893] ==================================================================
[   19.875951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.876002] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.876055] 
[   19.876088] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.876815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.876864] Hardware name: linux,dummy-virt (DT)
[   19.876900] Call trace:
[   19.876923]  show_stack+0x20/0x38 (C)
[   19.876976]  dump_stack_lvl+0x8c/0xd0
[   19.877025]  print_report+0x118/0x608
[   19.877403]  kasan_report+0xdc/0x128
[   19.877540]  kasan_check_range+0x100/0x1a8
[   19.878204]  __kasan_check_write+0x20/0x30
[   19.878266]  kasan_atomics_helper+0x154c/0x4858
[   19.878315]  kasan_atomics+0x198/0x2e0
[   19.878362]  kunit_try_run_case+0x170/0x3f0
[   19.878901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.879007]  kthread+0x328/0x630
[   19.879050]  ret_from_fork+0x10/0x20
[   19.879401] 
[   19.879669] Allocated by task 266:
[   19.879990]  kasan_save_stack+0x3c/0x68
[   19.880224]  kasan_save_track+0x20/0x40
[   19.880277]  kasan_save_alloc_info+0x40/0x58
[   19.880322]  __kasan_kmalloc+0xd4/0xd8
[   19.880367]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.880653]  kasan_atomics+0xb8/0x2e0
[   19.880698]  kunit_try_run_case+0x170/0x3f0
[   19.880754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.880977]  kthread+0x328/0x630
[   19.881341]  ret_from_fork+0x10/0x20
[   19.881386] 
[   19.881573] The buggy address belongs to the object at fff00000c57aa700
[   19.881573]  which belongs to the cache kmalloc-64 of size 64
[   19.881844] The buggy address is located 0 bytes to the right of
[   19.881844]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.881922] 
[   19.882131] The buggy address belongs to the physical page:
[   19.882178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.882234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.882470] page_type: f5(slab)
[   19.882557] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.882908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.882958] page dumped because: kasan: bad access detected
[   19.883089] 
[   19.883155] Memory state around the buggy address:
[   19.883248]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.883588]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.883650] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.883693]                                      ^
[   19.883730]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.883773]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.884551] ==================================================================
[   19.746347] ==================================================================
[   19.746415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.746467] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.746519] 
[   19.746553] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.746970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.747073] Hardware name: linux,dummy-virt (DT)
[   19.747153] Call trace:
[   19.747201]  show_stack+0x20/0x38 (C)
[   19.747264]  dump_stack_lvl+0x8c/0xd0
[   19.747546]  print_report+0x118/0x608
[   19.747635]  kasan_report+0xdc/0x128
[   19.747732]  kasan_check_range+0x100/0x1a8
[   19.747804]  __kasan_check_write+0x20/0x30
[   19.747859]  kasan_atomics_helper+0xf88/0x4858
[   19.747920]  kasan_atomics+0x198/0x2e0
[   19.748010]  kunit_try_run_case+0x170/0x3f0
[   19.748062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.748116]  kthread+0x328/0x630
[   19.748376]  ret_from_fork+0x10/0x20
[   19.748443] 
[   19.748513] Allocated by task 266:
[   19.748546]  kasan_save_stack+0x3c/0x68
[   19.748825]  kasan_save_track+0x20/0x40
[   19.748903]  kasan_save_alloc_info+0x40/0x58
[   19.749012]  __kasan_kmalloc+0xd4/0xd8
[   19.749054]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.749109]  kasan_atomics+0xb8/0x2e0
[   19.749166]  kunit_try_run_case+0x170/0x3f0
[   19.749207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.749254]  kthread+0x328/0x630
[   19.749937]  ret_from_fork+0x10/0x20
[   19.750319] 
[   19.750347] The buggy address belongs to the object at fff00000c57aa700
[   19.750347]  which belongs to the cache kmalloc-64 of size 64
[   19.750442] The buggy address is located 0 bytes to the right of
[   19.750442]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.750554] 
[   19.750619] The buggy address belongs to the physical page:
[   19.750672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.751133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.751495] page_type: f5(slab)
[   19.751714] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.751846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.752199] page dumped because: kasan: bad access detected
[   19.752301] 
[   19.752360] Memory state around the buggy address:
[   19.752422]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.752478]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.752816] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.753153]                                      ^
[   19.753348]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753785]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753958] ==================================================================
[   19.798375] ==================================================================
[   19.798421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.798467] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.798517] 
[   19.798546] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.800046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.800194] Hardware name: linux,dummy-virt (DT)
[   19.800228] Call trace:
[   19.800993]  show_stack+0x20/0x38 (C)
[   19.801316]  dump_stack_lvl+0x8c/0xd0
[   19.801511]  print_report+0x118/0x608
[   19.802502]  kasan_report+0xdc/0x128
[   19.802653]  kasan_check_range+0x100/0x1a8
[   19.802714]  __kasan_check_write+0x20/0x30
[   19.803000]  kasan_atomics_helper+0x126c/0x4858
[   19.803363]  kasan_atomics+0x198/0x2e0
[   19.803413]  kunit_try_run_case+0x170/0x3f0
[   19.803826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.803911]  kthread+0x328/0x630
[   19.804291]  ret_from_fork+0x10/0x20
[   19.804553] 
[   19.804744] Allocated by task 266:
[   19.804782]  kasan_save_stack+0x3c/0x68
[   19.805297]  kasan_save_track+0x20/0x40
[   19.805588]  kasan_save_alloc_info+0x40/0x58
[   19.805792]  __kasan_kmalloc+0xd4/0xd8
[   19.806079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.806468]  kasan_atomics+0xb8/0x2e0
[   19.807007]  kunit_try_run_case+0x170/0x3f0
[   19.807362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.807413]  kthread+0x328/0x630
[   19.807769]  ret_from_fork+0x10/0x20
[   19.808041] 
[   19.808071] The buggy address belongs to the object at fff00000c57aa700
[   19.808071]  which belongs to the cache kmalloc-64 of size 64
[   19.808454] The buggy address is located 0 bytes to the right of
[   19.808454]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.809187] 
[   19.809221] The buggy address belongs to the physical page:
[   19.809268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.809782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.809844] page_type: f5(slab)
[   19.810100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.810601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.810653] page dumped because: kasan: bad access detected
[   19.811937] 
[   19.812176] Memory state around the buggy address:
[   19.812219]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.812398]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.812834] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.813053]                                      ^
[   19.813386]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.813585]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.813629] ==================================================================
[   19.738402] ==================================================================
[   19.738729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.738853] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.738912] 
[   19.738945] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.739226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.740267] Hardware name: linux,dummy-virt (DT)
[   19.740451] Call trace:
[   19.740504]  show_stack+0x20/0x38 (C)
[   19.740574]  dump_stack_lvl+0x8c/0xd0
[   19.740627]  print_report+0x118/0x608
[   19.740757]  kasan_report+0xdc/0x128
[   19.740809]  kasan_check_range+0x100/0x1a8
[   19.740861]  __kasan_check_write+0x20/0x30
[   19.741017]  kasan_atomics_helper+0xf20/0x4858
[   19.741079]  kasan_atomics+0x198/0x2e0
[   19.741125]  kunit_try_run_case+0x170/0x3f0
[   19.741175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.741268]  kthread+0x328/0x630
[   19.741312]  ret_from_fork+0x10/0x20
[   19.741370] 
[   19.741741] Allocated by task 266:
[   19.741813]  kasan_save_stack+0x3c/0x68
[   19.741864]  kasan_save_track+0x20/0x40
[   19.741905]  kasan_save_alloc_info+0x40/0x58
[   19.741948]  __kasan_kmalloc+0xd4/0xd8
[   19.742244]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.742512]  kasan_atomics+0xb8/0x2e0
[   19.742689]  kunit_try_run_case+0x170/0x3f0
[   19.742827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.742878]  kthread+0x328/0x630
[   19.742914]  ret_from_fork+0x10/0x20
[   19.743214] 
[   19.743274] The buggy address belongs to the object at fff00000c57aa700
[   19.743274]  which belongs to the cache kmalloc-64 of size 64
[   19.743607] The buggy address is located 0 bytes to the right of
[   19.743607]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.744111] 
[   19.744158] The buggy address belongs to the physical page:
[   19.744203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.744294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.744349] page_type: f5(slab)
[   19.744389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.744449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.744495] page dumped because: kasan: bad access detected
[   19.744530] 
[   19.744550] Memory state around the buggy address:
[   19.744625]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.744679]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.744737] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.744785]                                      ^
[   19.744825]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.744873]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.744917] ==================================================================
[   19.677016] ==================================================================
[   19.677275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.677496] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.677794] 
[   19.678036] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.678361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.678522] Hardware name: linux,dummy-virt (DT)
[   19.678755] Call trace:
[   19.678959]  show_stack+0x20/0x38 (C)
[   19.679065]  dump_stack_lvl+0x8c/0xd0
[   19.679119]  print_report+0x118/0x608
[   19.679683]  kasan_report+0xdc/0x128
[   19.679752]  __asan_report_load4_noabort+0x20/0x30
[   19.680109]  kasan_atomics_helper+0x3e04/0x4858
[   19.680342]  kasan_atomics+0x198/0x2e0
[   19.680862]  kunit_try_run_case+0x170/0x3f0
[   19.681268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.681460]  kthread+0x328/0x630
[   19.681662]  ret_from_fork+0x10/0x20
[   19.682232] 
[   19.682298] Allocated by task 266:
[   19.682333]  kasan_save_stack+0x3c/0x68
[   19.682383]  kasan_save_track+0x20/0x40
[   19.682775]  kasan_save_alloc_info+0x40/0x58
[   19.683056]  __kasan_kmalloc+0xd4/0xd8
[   19.683475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.683527]  kasan_atomics+0xb8/0x2e0
[   19.684004]  kunit_try_run_case+0x170/0x3f0
[   19.684249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.684551]  kthread+0x328/0x630
[   19.684925]  ret_from_fork+0x10/0x20
[   19.684972] 
[   19.684995] The buggy address belongs to the object at fff00000c57aa700
[   19.684995]  which belongs to the cache kmalloc-64 of size 64
[   19.685059] The buggy address is located 0 bytes to the right of
[   19.685059]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.685129] 
[   19.685747] The buggy address belongs to the physical page:
[   19.685789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.685859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.685914] page_type: f5(slab)
[   19.685957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.686229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.686386] page dumped because: kasan: bad access detected
[   19.686513] 
[   19.686534] Memory state around the buggy address:
[   19.686768]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.686825]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.687272] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.687548]                                      ^
[   19.687653]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688276]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688385] ==================================================================
[   19.964312] ==================================================================
[   19.964367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.964418] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.964470] 
[   19.964877] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.965001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.965191] Hardware name: linux,dummy-virt (DT)
[   19.965232] Call trace:
[   19.965255]  show_stack+0x20/0x38 (C)
[   19.965731]  dump_stack_lvl+0x8c/0xd0
[   19.965881]  print_report+0x118/0x608
[   19.965931]  kasan_report+0xdc/0x128
[   19.965977]  kasan_check_range+0x100/0x1a8
[   19.966455]  __kasan_check_write+0x20/0x30
[   19.966617]  kasan_atomics_helper+0x17ec/0x4858
[   19.967196]  kasan_atomics+0x198/0x2e0
[   19.967508]  kunit_try_run_case+0x170/0x3f0
[   19.967561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.967924]  kthread+0x328/0x630
[   19.968030]  ret_from_fork+0x10/0x20
[   19.968354] 
[   19.968493] Allocated by task 266:
[   19.968524]  kasan_save_stack+0x3c/0x68
[   19.968579]  kasan_save_track+0x20/0x40
[   19.968619]  kasan_save_alloc_info+0x40/0x58
[   19.969358]  __kasan_kmalloc+0xd4/0xd8
[   19.969967]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.970273]  kasan_atomics+0xb8/0x2e0
[   19.970453]  kunit_try_run_case+0x170/0x3f0
[   19.970499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.971062]  kthread+0x328/0x630
[   19.971527]  ret_from_fork+0x10/0x20
[   19.971581] 
[   19.971604] The buggy address belongs to the object at fff00000c57aa700
[   19.971604]  which belongs to the cache kmalloc-64 of size 64
[   19.971875] The buggy address is located 0 bytes to the right of
[   19.971875]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.972060] 
[   19.972369] The buggy address belongs to the physical page:
[   19.972414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.972804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.972882] page_type: f5(slab)
[   19.972974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.973027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.973509] page dumped because: kasan: bad access detected
[   19.973578] 
[   19.973600] Memory state around the buggy address:
[   19.973886]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.974149]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.974329] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.974381]                                      ^
[   19.974424]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.974574]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.974834] ==================================================================
[   19.760797] ==================================================================
[   19.761045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.761125] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.761179] 
[   19.761213] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.761707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.762113] Hardware name: linux,dummy-virt (DT)
[   19.762181] Call trace:
[   19.762243]  show_stack+0x20/0x38 (C)
[   19.762328]  dump_stack_lvl+0x8c/0xd0
[   19.762402]  print_report+0x118/0x608
[   19.762730]  kasan_report+0xdc/0x128
[   19.762853]  kasan_check_range+0x100/0x1a8
[   19.763022]  __kasan_check_write+0x20/0x30
[   19.763118]  kasan_atomics_helper+0x1058/0x4858
[   19.763685]  kasan_atomics+0x198/0x2e0
[   19.764010]  kunit_try_run_case+0x170/0x3f0
[   19.764108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.764256]  kthread+0x328/0x630
[   19.764334]  ret_from_fork+0x10/0x20
[   19.764462] 
[   19.764511] Allocated by task 266:
[   19.764540]  kasan_save_stack+0x3c/0x68
[   19.764880]  kasan_save_track+0x20/0x40
[   19.764959]  kasan_save_alloc_info+0x40/0x58
[   19.765221]  __kasan_kmalloc+0xd4/0xd8
[   19.765312]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.765390]  kasan_atomics+0xb8/0x2e0
[   19.765604]  kunit_try_run_case+0x170/0x3f0
[   19.765769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.765909]  kthread+0x328/0x630
[   19.766148]  ret_from_fork+0x10/0x20
[   19.766349] 
[   19.766610] The buggy address belongs to the object at fff00000c57aa700
[   19.766610]  which belongs to the cache kmalloc-64 of size 64
[   19.766825] The buggy address is located 0 bytes to the right of
[   19.766825]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.767298] 
[   19.767642] The buggy address belongs to the physical page:
[   19.767712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.768200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.768294] page_type: f5(slab)
[   19.768347] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.768410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.768463] page dumped because: kasan: bad access detected
[   19.768498] 
[   19.768526] Memory state around the buggy address:
[   19.768561]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.769050]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.769117] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.769189]                                      ^
[   19.769247]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.769523]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.769672] ==================================================================
[   19.711990] ==================================================================
[   19.712067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.712528] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.712603] 
[   19.712638] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.712723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.712750] Hardware name: linux,dummy-virt (DT)
[   19.712784] Call trace:
[   19.712807]  show_stack+0x20/0x38 (C)
[   19.712933]  dump_stack_lvl+0x8c/0xd0
[   19.713465]  print_report+0x118/0x608
[   19.714347]  kasan_report+0xdc/0x128
[   19.714590]  kasan_check_range+0x100/0x1a8
[   19.714647]  __kasan_check_write+0x20/0x30
[   19.714713]  kasan_atomics_helper+0xe44/0x4858
[   19.714818]  kasan_atomics+0x198/0x2e0
[   19.714889]  kunit_try_run_case+0x170/0x3f0
[   19.714939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.714993]  kthread+0x328/0x630
[   19.715037]  ret_from_fork+0x10/0x20
[   19.715085] 
[   19.715105] Allocated by task 266:
[   19.716638]  kasan_save_stack+0x3c/0x68
[   19.716701]  kasan_save_track+0x20/0x40
[   19.716744]  kasan_save_alloc_info+0x40/0x58
[   19.717070]  __kasan_kmalloc+0xd4/0xd8
[   19.717222]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.717425]  kasan_atomics+0xb8/0x2e0
[   19.717488]  kunit_try_run_case+0x170/0x3f0
[   19.717574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.717814]  kthread+0x328/0x630
[   19.717868]  ret_from_fork+0x10/0x20
[   19.717945] 
[   19.717976] The buggy address belongs to the object at fff00000c57aa700
[   19.717976]  which belongs to the cache kmalloc-64 of size 64
[   19.718230] The buggy address is located 0 bytes to the right of
[   19.718230]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.718754] 
[   19.718901] The buggy address belongs to the physical page:
[   19.718938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.718999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.719057] page_type: f5(slab)
[   19.719099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.719152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.719547] page dumped because: kasan: bad access detected
[   19.719611] 
[   19.719632] Memory state around the buggy address:
[   19.720144]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.720206]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.720420] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.720655]                                      ^
[   19.720850]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.720903]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.721300] ==================================================================
[   19.914002] ==================================================================
[   19.914094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.914251] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.914680] 
[   19.914842] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.914981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.915010] Hardware name: linux,dummy-virt (DT)
[   19.915460] Call trace:
[   19.915841]  show_stack+0x20/0x38 (C)
[   19.915958]  dump_stack_lvl+0x8c/0xd0
[   19.916012]  print_report+0x118/0x608
[   19.916069]  kasan_report+0xdc/0x128
[   19.916402]  __asan_report_load8_noabort+0x20/0x30
[   19.916783]  kasan_atomics_helper+0x3df4/0x4858
[   19.917084]  kasan_atomics+0x198/0x2e0
[   19.917143]  kunit_try_run_case+0x170/0x3f0
[   19.917238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.917415]  kthread+0x328/0x630
[   19.917800]  ret_from_fork+0x10/0x20
[   19.918141] 
[   19.918166] Allocated by task 266:
[   19.918207]  kasan_save_stack+0x3c/0x68
[   19.918280]  kasan_save_track+0x20/0x40
[   19.918327]  kasan_save_alloc_info+0x40/0x58
[   19.918732]  __kasan_kmalloc+0xd4/0xd8
[   19.918801]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.919153]  kasan_atomics+0xb8/0x2e0
[   19.919195]  kunit_try_run_case+0x170/0x3f0
[   19.919486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.920092]  kthread+0x328/0x630
[   19.920294]  ret_from_fork+0x10/0x20
[   19.920378] 
[   19.920399] The buggy address belongs to the object at fff00000c57aa700
[   19.920399]  which belongs to the cache kmalloc-64 of size 64
[   19.920666] The buggy address is located 0 bytes to the right of
[   19.920666]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.921067] 
[   19.921206] The buggy address belongs to the physical page:
[   19.921393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.921545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.921623] page_type: f5(slab)
[   19.921794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.921908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.922073] page dumped because: kasan: bad access detected
[   19.922121] 
[   19.922149] Memory state around the buggy address:
[   19.922190]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.922482]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.922668] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.922723]                                      ^
[   19.922760]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.923321]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.923373] ==================================================================
[   19.935506] ==================================================================
[   19.935559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.935619] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.936118] 
[   19.936276] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.936638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.936838] Hardware name: linux,dummy-virt (DT)
[   19.937026] Call trace:
[   19.937105]  show_stack+0x20/0x38 (C)
[   19.937418]  dump_stack_lvl+0x8c/0xd0
[   19.937586]  print_report+0x118/0x608
[   19.937643]  kasan_report+0xdc/0x128
[   19.937824]  __asan_report_load8_noabort+0x20/0x30
[   19.938143]  kasan_atomics_helper+0x3e10/0x4858
[   19.938439]  kasan_atomics+0x198/0x2e0
[   19.938730]  kunit_try_run_case+0x170/0x3f0
[   19.939058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.939122]  kthread+0x328/0x630
[   19.939166]  ret_from_fork+0x10/0x20
[   19.939216] 
[   19.939236] Allocated by task 266:
[   19.939267]  kasan_save_stack+0x3c/0x68
[   19.940052]  kasan_save_track+0x20/0x40
[   19.940108]  kasan_save_alloc_info+0x40/0x58
[   19.940182]  __kasan_kmalloc+0xd4/0xd8
[   19.940241]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.940683]  kasan_atomics+0xb8/0x2e0
[   19.940876]  kunit_try_run_case+0x170/0x3f0
[   19.941167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.941532]  kthread+0x328/0x630
[   19.941588]  ret_from_fork+0x10/0x20
[   19.941626] 
[   19.941648] The buggy address belongs to the object at fff00000c57aa700
[   19.941648]  which belongs to the cache kmalloc-64 of size 64
[   19.941710] The buggy address is located 0 bytes to the right of
[   19.941710]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.941780] 
[   19.941802] The buggy address belongs to the physical page:
[   19.941835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.941891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.942169] page_type: f5(slab)
[   19.942672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.942761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.943722] page dumped because: kasan: bad access detected
[   19.943762] 
[   19.943784] Memory state around the buggy address:
[   19.944386]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.944444]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.944499] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.945031]                                      ^
[   19.945122]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.945219]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.945337] ==================================================================
[   19.654641] ==================================================================
[   19.654700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.655826] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.656155] 
[   19.656213] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.656297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.656326] Hardware name: linux,dummy-virt (DT)
[   19.656361] Call trace:
[   19.656383]  show_stack+0x20/0x38 (C)
[   19.656434]  dump_stack_lvl+0x8c/0xd0
[   19.656488]  print_report+0x118/0x608
[   19.656535]  kasan_report+0xdc/0x128
[   19.656596]  __asan_report_load4_noabort+0x20/0x30
[   19.656645]  kasan_atomics_helper+0x3dd8/0x4858
[   19.656693]  kasan_atomics+0x198/0x2e0
[   19.656741]  kunit_try_run_case+0x170/0x3f0
[   19.656790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.658051]  kthread+0x328/0x630
[   19.658230]  ret_from_fork+0x10/0x20
[   19.658293] 
[   19.658527] Allocated by task 266:
[   19.658674]  kasan_save_stack+0x3c/0x68
[   19.658897]  kasan_save_track+0x20/0x40
[   19.659120]  kasan_save_alloc_info+0x40/0x58
[   19.659202]  __kasan_kmalloc+0xd4/0xd8
[   19.659359]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.659637]  kasan_atomics+0xb8/0x2e0
[   19.659988]  kunit_try_run_case+0x170/0x3f0
[   19.660292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.660532]  kthread+0x328/0x630
[   19.660760]  ret_from_fork+0x10/0x20
[   19.661113] 
[   19.661185] The buggy address belongs to the object at fff00000c57aa700
[   19.661185]  which belongs to the cache kmalloc-64 of size 64
[   19.661615] The buggy address is located 0 bytes to the right of
[   19.661615]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.661692] 
[   19.661947] The buggy address belongs to the physical page:
[   19.661988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.662056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.662108] page_type: f5(slab)
[   19.662485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.662935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.662990] page dumped because: kasan: bad access detected
[   19.663025] 
[   19.663610] Memory state around the buggy address:
[   19.663809]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.664196]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.664259] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.664719]                                      ^
[   19.664767]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.664964]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.665059] ==================================================================
[   19.723192] ==================================================================
[   19.723252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.723307] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.723359] 
[   19.723393] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.723718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.723762] Hardware name: linux,dummy-virt (DT)
[   19.723824] Call trace:
[   19.723846]  show_stack+0x20/0x38 (C)
[   19.724378]  dump_stack_lvl+0x8c/0xd0
[   19.725013]  print_report+0x118/0x608
[   19.725295]  kasan_report+0xdc/0x128
[   19.725348]  __asan_report_store8_noabort+0x20/0x30
[   19.725477]  kasan_atomics_helper+0x3e5c/0x4858
[   19.725703]  kasan_atomics+0x198/0x2e0
[   19.725838]  kunit_try_run_case+0x170/0x3f0
[   19.725916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.726109]  kthread+0x328/0x630
[   19.726459]  ret_from_fork+0x10/0x20
[   19.726963] 
[   19.726991] Allocated by task 266:
[   19.727193]  kasan_save_stack+0x3c/0x68
[   19.727497]  kasan_save_track+0x20/0x40
[   19.727642]  kasan_save_alloc_info+0x40/0x58
[   19.727750]  __kasan_kmalloc+0xd4/0xd8
[   19.727806]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.728074]  kasan_atomics+0xb8/0x2e0
[   19.728163]  kunit_try_run_case+0x170/0x3f0
[   19.728235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.728369]  kthread+0x328/0x630
[   19.728424]  ret_from_fork+0x10/0x20
[   19.728710] 
[   19.728771] The buggy address belongs to the object at fff00000c57aa700
[   19.728771]  which belongs to the cache kmalloc-64 of size 64
[   19.728857] The buggy address is located 0 bytes to the right of
[   19.728857]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.728927] 
[   19.728948] The buggy address belongs to the physical page:
[   19.729194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.729351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.729440] page_type: f5(slab)
[   19.729692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.729761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.729914] page dumped because: kasan: bad access detected
[   19.729952] 
[   19.729971] Memory state around the buggy address:
[   19.730051]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.730124]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.730254] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.730334]                                      ^
[   19.730436]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.730622]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.730683] ==================================================================
[   19.424171] ==================================================================
[   19.424237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   19.424303] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.424357] 
[   19.424396] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.424482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.424512] Hardware name: linux,dummy-virt (DT)
[   19.424546] Call trace:
[   19.424585]  show_stack+0x20/0x38 (C)
[   19.427612]  kasan_save_stack+0x3c/0x68
[   19.427668]  kasan_save_track+0x20/0x40
[   19.427709]  kasan_save_alloc_info+0x40/0x58
[   19.427753]  __kasan_kmalloc+0xd4/0xd8
[   19.427793]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.427836]  kasan_atomics+0xb8/0x2e0
[   19.427874]  kunit_try_run_case+0x170/0x3f0
[   19.427913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.427960]  kthread+0x328/0x630
[   19.428031] 
[   19.429802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.432502] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.435969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.437421] 
[   19.437764] 
[   19.437949]                                      ^
[   19.441653]  kasan_check_range+0x100/0x1a8
[   19.444636] 
[   19.445721]  kunit_try_run_case+0x170/0x3f0
[   19.446887] 
[   19.447424] page_type: f5(slab)
[   19.448015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.448112] page dumped because: kasan: bad access detected
[   19.448263] 
[   19.448499] Memory state around the buggy address:
[   19.448681]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.448932]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.448983] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.449027]                                      ^
[   19.449505]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.450674] ==================================================================
[   19.503085] ==================================================================
[   19.504325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   19.504887] Call trace:
[   19.505202]  __kasan_check_write+0x20/0x30
[   19.506088]  kasan_save_alloc_info+0x40/0x58
[   19.506409] 
[   19.506559] 
[   19.506621] The buggy address belongs to the physical page:
[   19.506663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.507166] page dumped because: kasan: bad access detected
[   19.507681]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.507838]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.508641] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.508844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.509165]  __kasan_check_write+0x20/0x30
[   19.509359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.509935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.510137] The buggy address is located 0 bytes to the right of
[   19.510137]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.510990] 
[   19.511154]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.511200] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.511242]                                      ^
[   19.511276]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.511962] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.512414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.512631] Hardware name: linux,dummy-virt (DT)
[   19.512770]  dump_stack_lvl+0x8c/0xd0
[   19.513622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.514685]  kunit_try_run_case+0x170/0x3f0
[   19.515466] 
[   19.515523] The buggy address belongs to the physical page:
[   19.515716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.516019] page_type: f5(slab)
[   19.516156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.516605] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.516890]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517862] ==================================================================
[   19.579387] ==================================================================
[   19.579449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.579748] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.579947] 
[   19.579982] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.580212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.580329] Hardware name: linux,dummy-virt (DT)
[   19.580362] Call trace:
[   19.580392]  show_stack+0x20/0x38 (C)
[   19.580445]  dump_stack_lvl+0x8c/0xd0
[   19.580494]  print_report+0x118/0x608
[   19.580790]  kasan_report+0xdc/0x128
[   19.581474]  kthread+0x328/0x630
[   19.581618]  ret_from_fork+0x10/0x20
[   19.581676] 
[   19.582066] Allocated by task 266:
[   19.582861]  ret_from_fork+0x10/0x20
[   19.583820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.584595]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.587525]  show_stack+0x20/0x38 (C)
[   19.590161]  ret_from_fork+0x10/0x20
[   19.590257] 
[   19.590424] Allocated by task 266:
[   19.590508]  kasan_save_stack+0x3c/0x68
[   19.590555]  kasan_save_track+0x20/0x40
[   19.590605]  kasan_save_alloc_info+0x40/0x58
[   19.590648]  __kasan_kmalloc+0xd4/0xd8
[   19.591031]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.591077]  kasan_atomics+0xb8/0x2e0
[   19.591115]  kunit_try_run_case+0x170/0x3f0
[   19.591166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.591325]  kthread+0x328/0x630
[   19.591427]  ret_from_fork+0x10/0x20
[   19.591494] 
[   19.591519] The buggy address belongs to the object at fff00000c57aa700
[   19.591519]  which belongs to the cache kmalloc-64 of size 64
[   19.591641] The buggy address is located 0 bytes to the right of
[   19.591641]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.591709] 
[   19.591731] The buggy address belongs to the physical page:
[   19.592111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.592172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.592324] page_type: f5(slab)
[   19.592604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.592684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.592728] page dumped because: kasan: bad access detected
[   19.592967] 
[   19.592993] Memory state around the buggy address:
[   19.593132]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.593310]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.593357] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.593477]                                      ^
[   19.593522]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.593585]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.593628] ==================================================================
[   19.904249] ==================================================================
[   19.904309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.904360] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.904421] 
[   19.904452] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.905471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.905519] Hardware name: linux,dummy-virt (DT)
[   19.905553] Call trace:
[   19.905594]  show_stack+0x20/0x38 (C)
[   19.905644]  dump_stack_lvl+0x8c/0xd0
[   19.905693]  print_report+0x118/0x608
[   19.906078]  kasan_report+0xdc/0x128
[   19.906137]  kasan_check_range+0x100/0x1a8
[   19.906415]  __kasan_check_write+0x20/0x30
[   19.906476]  kasan_atomics_helper+0x1644/0x4858
[   19.906595]  kasan_atomics+0x198/0x2e0
[   19.906836]  kunit_try_run_case+0x170/0x3f0
[   19.906885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.907151]  kthread+0x328/0x630
[   19.907220]  ret_from_fork+0x10/0x20
[   19.907934] 
[   19.908120] Allocated by task 266:
[   19.908153]  kasan_save_stack+0x3c/0x68
[   19.908778]  kasan_save_track+0x20/0x40
[   19.908890]  kasan_save_alloc_info+0x40/0x58
[   19.909288]  __kasan_kmalloc+0xd4/0xd8
[   19.909377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.909885]  kasan_atomics+0xb8/0x2e0
[   19.909934]  kunit_try_run_case+0x170/0x3f0
[   19.909998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.910047]  kthread+0x328/0x630
[   19.910080]  ret_from_fork+0x10/0x20
[   19.910117] 
[   19.910140] The buggy address belongs to the object at fff00000c57aa700
[   19.910140]  which belongs to the cache kmalloc-64 of size 64
[   19.910203] The buggy address is located 0 bytes to the right of
[   19.910203]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.910271] 
[   19.910829] The buggy address belongs to the physical page:
[   19.910879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.911256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.911492] page_type: f5(slab)
[   19.911614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.912003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.912098] page dumped because: kasan: bad access detected
[   19.912147] 
[   19.912168] Memory state around the buggy address:
[   19.912361]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.912613]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.912860] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.912920]                                      ^
[   19.913020]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.913193]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.913432] ==================================================================
[   19.770758] ==================================================================
[   19.770957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.771048] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266
[   19.771102] 
[   19.771686] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.771824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.771906] Hardware name: linux,dummy-virt (DT)
[   19.771983] Call trace:
[   19.772008]  show_stack+0x20/0x38 (C)
[   19.772062]  dump_stack_lvl+0x8c/0xd0
[   19.772161]  print_report+0x118/0x608
[   19.772213]  kasan_report+0xdc/0x128
[   19.772288]  kasan_check_range+0x100/0x1a8
[   19.772341]  __kasan_check_write+0x20/0x30
[   19.772387]  kasan_atomics_helper+0x10c0/0x4858
[   19.772580]  kasan_atomics+0x198/0x2e0
[   19.772730]  kunit_try_run_case+0x170/0x3f0
[   19.772789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.772877]  kthread+0x328/0x630
[   19.772925]  ret_from_fork+0x10/0x20
[   19.772973] 
[   19.772993] Allocated by task 266:
[   19.773023]  kasan_save_stack+0x3c/0x68
[   19.773067]  kasan_save_track+0x20/0x40
[   19.773107]  kasan_save_alloc_info+0x40/0x58
[   19.773148]  __kasan_kmalloc+0xd4/0xd8
[   19.773208]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.773249]  kasan_atomics+0xb8/0x2e0
[   19.773305]  kunit_try_run_case+0x170/0x3f0
[   19.773863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.773959]  kthread+0x328/0x630
[   19.774043]  ret_from_fork+0x10/0x20
[   19.774108] 
[   19.774201] The buggy address belongs to the object at fff00000c57aa700
[   19.774201]  which belongs to the cache kmalloc-64 of size 64
[   19.774302] The buggy address is located 0 bytes to the right of
[   19.774302]  allocated 48-byte region [fff00000c57aa700, fff00000c57aa730)
[   19.774371] 
[   19.774393] The buggy address belongs to the physical page:
[   19.774554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa
[   19.774740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.774866] page_type: f5(slab)
[   19.774942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.775021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.775380] page dumped because: kasan: bad access detected
[   19.775423] 
[   19.775997] Memory state around the buggy address:
[   19.776282]  fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.776552]  fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.776916] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.777093]                                      ^
[   19.777177]  fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.777227]  fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.777298] ==================================================================

[   14.902893] ==================================================================
[   14.903237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.903482] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.904107] 
[   14.904214] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.904261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.904285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.904309] Call Trace:
[   14.904330]  <TASK>
[   14.904362]  dump_stack_lvl+0x73/0xb0
[   14.904392]  print_report+0xd1/0x650
[   14.904416]  ? __virt_addr_valid+0x1db/0x2d0
[   14.904450]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.904474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.904496]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.904530]  kasan_report+0x141/0x180
[   14.904553]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.904579]  kasan_check_range+0x10c/0x1c0
[   14.904613]  __kasan_check_write+0x18/0x20
[   14.904633]  kasan_atomics_helper+0x16e7/0x5450
[   14.904665]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.904698]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.904725]  ? trace_hardirqs_on+0x37/0xe0
[   14.904749]  ? kasan_atomics+0x152/0x310
[   14.904777]  kasan_atomics+0x1dc/0x310
[   14.904800]  ? __pfx_kasan_atomics+0x10/0x10
[   14.904824]  ? __pfx_kasan_atomics+0x10/0x10
[   14.904851]  kunit_try_run_case+0x1a5/0x480
[   14.904877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.904899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.904925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.904948]  ? __kthread_parkme+0x82/0x180
[   14.904970]  ? preempt_count_sub+0x50/0x80
[   14.904995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.905019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.905054]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.905077]  kthread+0x337/0x6f0
[   14.905098]  ? trace_preempt_on+0x20/0xc0
[   14.905120]  ? __pfx_kthread+0x10/0x10
[   14.905142]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.905164]  ? calculate_sigpending+0x7b/0xa0
[   14.905189]  ? __pfx_kthread+0x10/0x10
[   14.905211]  ret_from_fork+0x116/0x1d0
[   14.905240]  ? __pfx_kthread+0x10/0x10
[   14.905262]  ret_from_fork_asm+0x1a/0x30
[   14.905294]  </TASK>
[   14.905318] 
[   14.912497] Allocated by task 282:
[   14.912631]  kasan_save_stack+0x45/0x70
[   14.912834]  kasan_save_track+0x18/0x40
[   14.913047]  kasan_save_alloc_info+0x3b/0x50
[   14.913272]  __kasan_kmalloc+0xb7/0xc0
[   14.913469]  __kmalloc_cache_noprof+0x189/0x420
[   14.913717]  kasan_atomics+0x95/0x310
[   14.913937]  kunit_try_run_case+0x1a5/0x480
[   14.914170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.914427]  kthread+0x337/0x6f0
[   14.914623]  ret_from_fork+0x116/0x1d0
[   14.914826]  ret_from_fork_asm+0x1a/0x30
[   14.915050] 
[   14.915155] The buggy address belongs to the object at ffff8881033c5500
[   14.915155]  which belongs to the cache kmalloc-64 of size 64
[   14.915543] The buggy address is located 0 bytes to the right of
[   14.915543]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.915910] 
[   14.915984] The buggy address belongs to the physical page:
[   14.916230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.916583] flags: 0x200000000000000(node=0|zone=2)
[   14.916991] page_type: f5(slab)
[   14.917189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.917490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.917772] page dumped because: kasan: bad access detected
[   14.918030] 
[   14.918124] Memory state around the buggy address:
[   14.918313]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.918530]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.919013] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.919341]                                      ^
[   14.919594]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.919873]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.920137] ==================================================================
[   14.123606] ==================================================================
[   14.124377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.124705] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.124971] 
[   14.125111] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.125167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.125180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.125202] Call Trace:
[   14.125220]  <TASK>
[   14.125238]  dump_stack_lvl+0x73/0xb0
[   14.125276]  print_report+0xd1/0x650
[   14.125300]  ? __virt_addr_valid+0x1db/0x2d0
[   14.125324]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.125357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.125380]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.125403]  kasan_report+0x141/0x180
[   14.125425]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.125451]  __asan_report_store4_noabort+0x1b/0x30
[   14.125473]  kasan_atomics_helper+0x4b6e/0x5450
[   14.125496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.125518]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.125544]  ? trace_hardirqs_on+0x37/0xe0
[   14.125567]  ? kasan_atomics+0x152/0x310
[   14.125595]  kasan_atomics+0x1dc/0x310
[   14.125618]  ? __pfx_kasan_atomics+0x10/0x10
[   14.125652]  ? __pfx_kasan_atomics+0x10/0x10
[   14.125688]  kunit_try_run_case+0x1a5/0x480
[   14.125713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.125737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.125773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.125796]  ? __kthread_parkme+0x82/0x180
[   14.125818]  ? preempt_count_sub+0x50/0x80
[   14.125842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.125867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.125891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.125914]  kthread+0x337/0x6f0
[   14.125934]  ? trace_preempt_on+0x20/0xc0
[   14.125957]  ? __pfx_kthread+0x10/0x10
[   14.125978]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.126000]  ? calculate_sigpending+0x7b/0xa0
[   14.126033]  ? __pfx_kthread+0x10/0x10
[   14.126054]  ret_from_fork+0x116/0x1d0
[   14.126074]  ? __pfx_kthread+0x10/0x10
[   14.126095]  ret_from_fork_asm+0x1a/0x30
[   14.126126]  </TASK>
[   14.126139] 
[   14.133487] Allocated by task 282:
[   14.133768]  kasan_save_stack+0x45/0x70
[   14.134001]  kasan_save_track+0x18/0x40
[   14.134175]  kasan_save_alloc_info+0x3b/0x50
[   14.134388]  __kasan_kmalloc+0xb7/0xc0
[   14.134524]  __kmalloc_cache_noprof+0x189/0x420
[   14.134854]  kasan_atomics+0x95/0x310
[   14.135075]  kunit_try_run_case+0x1a5/0x480
[   14.135272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.135516]  kthread+0x337/0x6f0
[   14.135703]  ret_from_fork+0x116/0x1d0
[   14.135891]  ret_from_fork_asm+0x1a/0x30
[   14.136052] 
[   14.136174] The buggy address belongs to the object at ffff8881033c5500
[   14.136174]  which belongs to the cache kmalloc-64 of size 64
[   14.136640] The buggy address is located 0 bytes to the right of
[   14.136640]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.137075] 
[   14.137150] The buggy address belongs to the physical page:
[   14.137323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.137645] flags: 0x200000000000000(node=0|zone=2)
[   14.137877] page_type: f5(slab)
[   14.138054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.138395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.138824] page dumped because: kasan: bad access detected
[   14.139186] 
[   14.139258] Memory state around the buggy address:
[   14.139417]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.139634]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.139974] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.140331]                                      ^
[   14.140586]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.140944]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.141202] ==================================================================
[   14.258080] ==================================================================
[   14.258707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.259054] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.259344] 
[   14.259459] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.259516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.259530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.259553] Call Trace:
[   14.259573]  <TASK>
[   14.259594]  dump_stack_lvl+0x73/0xb0
[   14.259623]  print_report+0xd1/0x650
[   14.259659]  ? __virt_addr_valid+0x1db/0x2d0
[   14.259685]  ? kasan_atomics_helper+0x697/0x5450
[   14.259707]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.259730]  ? kasan_atomics_helper+0x697/0x5450
[   14.259754]  kasan_report+0x141/0x180
[   14.259776]  ? kasan_atomics_helper+0x697/0x5450
[   14.259803]  kasan_check_range+0x10c/0x1c0
[   14.259829]  __kasan_check_write+0x18/0x20
[   14.259859]  kasan_atomics_helper+0x697/0x5450
[   14.259883]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.259906]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.259944]  ? trace_hardirqs_on+0x37/0xe0
[   14.259968]  ? kasan_atomics+0x152/0x310
[   14.259995]  kasan_atomics+0x1dc/0x310
[   14.260018]  ? __pfx_kasan_atomics+0x10/0x10
[   14.260052]  ? __pfx_kasan_atomics+0x10/0x10
[   14.260078]  kunit_try_run_case+0x1a5/0x480
[   14.260102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.260125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.260153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.260176]  ? __kthread_parkme+0x82/0x180
[   14.260197]  ? preempt_count_sub+0x50/0x80
[   14.260222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.260246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.260269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.260292]  kthread+0x337/0x6f0
[   14.260312]  ? trace_preempt_on+0x20/0xc0
[   14.260335]  ? __pfx_kthread+0x10/0x10
[   14.260356]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.260378]  ? calculate_sigpending+0x7b/0xa0
[   14.260401]  ? __pfx_kthread+0x10/0x10
[   14.260423]  ret_from_fork+0x116/0x1d0
[   14.260442]  ? __pfx_kthread+0x10/0x10
[   14.260464]  ret_from_fork_asm+0x1a/0x30
[   14.260504]  </TASK>
[   14.260517] 
[   14.268064] Allocated by task 282:
[   14.268270]  kasan_save_stack+0x45/0x70
[   14.268485]  kasan_save_track+0x18/0x40
[   14.268696]  kasan_save_alloc_info+0x3b/0x50
[   14.269006]  __kasan_kmalloc+0xb7/0xc0
[   14.269165]  __kmalloc_cache_noprof+0x189/0x420
[   14.269389]  kasan_atomics+0x95/0x310
[   14.269603]  kunit_try_run_case+0x1a5/0x480
[   14.269805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.270074]  kthread+0x337/0x6f0
[   14.270253]  ret_from_fork+0x116/0x1d0
[   14.270430]  ret_from_fork_asm+0x1a/0x30
[   14.270572] 
[   14.270654] The buggy address belongs to the object at ffff8881033c5500
[   14.270654]  which belongs to the cache kmalloc-64 of size 64
[   14.271204] The buggy address is located 0 bytes to the right of
[   14.271204]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.271660] 
[   14.271772] The buggy address belongs to the physical page:
[   14.272052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.272401] flags: 0x200000000000000(node=0|zone=2)
[   14.272651] page_type: f5(slab)
[   14.272804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.273143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.273483] page dumped because: kasan: bad access detected
[   14.273736] 
[   14.273808] Memory state around the buggy address:
[   14.273964]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.274192]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.274409] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.274623]                                      ^
[   14.274796]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.275154]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.275469] ==================================================================
[   15.264906] ==================================================================
[   15.265284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.265675] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.266010] 
[   15.266138] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.266182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.266196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.266220] Call Trace:
[   15.266241]  <TASK>
[   15.266261]  dump_stack_lvl+0x73/0xb0
[   15.266292]  print_report+0xd1/0x650
[   15.266314]  ? __virt_addr_valid+0x1db/0x2d0
[   15.266340]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.266362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.266384]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.266407]  kasan_report+0x141/0x180
[   15.266429]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.266456]  kasan_check_range+0x10c/0x1c0
[   15.266481]  __kasan_check_write+0x18/0x20
[   15.266502]  kasan_atomics_helper+0x20c8/0x5450
[   15.266525]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.266547]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.266573]  ? trace_hardirqs_on+0x37/0xe0
[   15.266596]  ? kasan_atomics+0x152/0x310
[   15.266643]  kasan_atomics+0x1dc/0x310
[   15.266667]  ? __pfx_kasan_atomics+0x10/0x10
[   15.266691]  ? __pfx_kasan_atomics+0x10/0x10
[   15.266718]  kunit_try_run_case+0x1a5/0x480
[   15.266744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.266767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.266792]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.266815]  ? __kthread_parkme+0x82/0x180
[   15.266836]  ? preempt_count_sub+0x50/0x80
[   15.266861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.266885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.266909]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.266933]  kthread+0x337/0x6f0
[   15.266955]  ? trace_preempt_on+0x20/0xc0
[   15.266978]  ? __pfx_kthread+0x10/0x10
[   15.266998]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.267031]  ? calculate_sigpending+0x7b/0xa0
[   15.267056]  ? __pfx_kthread+0x10/0x10
[   15.267077]  ret_from_fork+0x116/0x1d0
[   15.267096]  ? __pfx_kthread+0x10/0x10
[   15.267117]  ret_from_fork_asm+0x1a/0x30
[   15.267147]  </TASK>
[   15.267160] 
[   15.274282] Allocated by task 282:
[   15.274412]  kasan_save_stack+0x45/0x70
[   15.274611]  kasan_save_track+0x18/0x40
[   15.274822]  kasan_save_alloc_info+0x3b/0x50
[   15.275041]  __kasan_kmalloc+0xb7/0xc0
[   15.275223]  __kmalloc_cache_noprof+0x189/0x420
[   15.275442]  kasan_atomics+0x95/0x310
[   15.275645]  kunit_try_run_case+0x1a5/0x480
[   15.275851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.276109]  kthread+0x337/0x6f0
[   15.276280]  ret_from_fork+0x116/0x1d0
[   15.276468]  ret_from_fork_asm+0x1a/0x30
[   15.276676] 
[   15.276752] The buggy address belongs to the object at ffff8881033c5500
[   15.276752]  which belongs to the cache kmalloc-64 of size 64
[   15.277200] The buggy address is located 0 bytes to the right of
[   15.277200]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.277564] 
[   15.277691] The buggy address belongs to the physical page:
[   15.277950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.278332] flags: 0x200000000000000(node=0|zone=2)
[   15.278572] page_type: f5(slab)
[   15.278720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.279069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.279378] page dumped because: kasan: bad access detected
[   15.279596] 
[   15.279709] Memory state around the buggy address:
[   15.279903]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.280188]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.280500] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.280781]                                      ^
[   15.281006]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.281297]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.281561] ==================================================================
[   14.796015] ==================================================================
[   14.796426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.796953] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.797275] 
[   14.797384] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.797429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.797442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.797464] Call Trace:
[   14.797482]  <TASK>
[   14.797498]  dump_stack_lvl+0x73/0xb0
[   14.797528]  print_report+0xd1/0x650
[   14.797553]  ? __virt_addr_valid+0x1db/0x2d0
[   14.797578]  ? kasan_atomics_helper+0x1467/0x5450
[   14.797600]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.797623]  ? kasan_atomics_helper+0x1467/0x5450
[   14.797646]  kasan_report+0x141/0x180
[   14.797670]  ? kasan_atomics_helper+0x1467/0x5450
[   14.797697]  kasan_check_range+0x10c/0x1c0
[   14.797721]  __kasan_check_write+0x18/0x20
[   14.797741]  kasan_atomics_helper+0x1467/0x5450
[   14.797764]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.797787]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.797813]  ? trace_hardirqs_on+0x37/0xe0
[   14.797838]  ? kasan_atomics+0x152/0x310
[   14.797865]  kasan_atomics+0x1dc/0x310
[   14.797890]  ? __pfx_kasan_atomics+0x10/0x10
[   14.797914]  ? __pfx_kasan_atomics+0x10/0x10
[   14.797942]  kunit_try_run_case+0x1a5/0x480
[   14.797967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.797990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.798015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.798048]  ? __kthread_parkme+0x82/0x180
[   14.798071]  ? preempt_count_sub+0x50/0x80
[   14.798096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.798120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.798143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.798167]  kthread+0x337/0x6f0
[   14.798187]  ? trace_preempt_on+0x20/0xc0
[   14.798208]  ? __pfx_kthread+0x10/0x10
[   14.798230]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.798251]  ? calculate_sigpending+0x7b/0xa0
[   14.798277]  ? __pfx_kthread+0x10/0x10
[   14.798298]  ret_from_fork+0x116/0x1d0
[   14.798317]  ? __pfx_kthread+0x10/0x10
[   14.798338]  ret_from_fork_asm+0x1a/0x30
[   14.798370]  </TASK>
[   14.798382] 
[   14.805882] Allocated by task 282:
[   14.806044]  kasan_save_stack+0x45/0x70
[   14.806773]  kasan_save_track+0x18/0x40
[   14.807178]  kasan_save_alloc_info+0x3b/0x50
[   14.807553]  __kasan_kmalloc+0xb7/0xc0
[   14.808014]  __kmalloc_cache_noprof+0x189/0x420
[   14.808489]  kasan_atomics+0x95/0x310
[   14.808914]  kunit_try_run_case+0x1a5/0x480
[   14.809360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.809899]  kthread+0x337/0x6f0
[   14.810226]  ret_from_fork+0x116/0x1d0
[   14.810580]  ret_from_fork_asm+0x1a/0x30
[   14.810948] 
[   14.811127] The buggy address belongs to the object at ffff8881033c5500
[   14.811127]  which belongs to the cache kmalloc-64 of size 64
[   14.812313] The buggy address is located 0 bytes to the right of
[   14.812313]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.813419] 
[   14.813606] The buggy address belongs to the physical page:
[   14.814125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.814854] flags: 0x200000000000000(node=0|zone=2)
[   14.815323] page_type: f5(slab)
[   14.815611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.816401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.817238] page dumped because: kasan: bad access detected
[   14.817761] 
[   14.817926] Memory state around the buggy address:
[   14.818193]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.818415]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.818631] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.819265]                                      ^
[   14.819687]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.820356]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.821007] ==================================================================
[   14.559868] ==================================================================
[   14.560288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.560777] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.561168] 
[   14.561292] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.561337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.561351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.561373] Call Trace:
[   14.561402]  <TASK>
[   14.561421]  dump_stack_lvl+0x73/0xb0
[   14.561450]  print_report+0xd1/0x650
[   14.561486]  ? __virt_addr_valid+0x1db/0x2d0
[   14.561512]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.561533]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.561555]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.561577]  kasan_report+0x141/0x180
[   14.561600]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.561626]  kasan_check_range+0x10c/0x1c0
[   14.561663]  __kasan_check_write+0x18/0x20
[   14.561683]  kasan_atomics_helper+0xfa9/0x5450
[   14.561706]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.561729]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.561754]  ? trace_hardirqs_on+0x37/0xe0
[   14.561778]  ? kasan_atomics+0x152/0x310
[   14.561806]  kasan_atomics+0x1dc/0x310
[   14.561829]  ? __pfx_kasan_atomics+0x10/0x10
[   14.561853]  ? __pfx_kasan_atomics+0x10/0x10
[   14.561879]  kunit_try_run_case+0x1a5/0x480
[   14.561905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.561938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.561963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.561986]  ? __kthread_parkme+0x82/0x180
[   14.562018]  ? preempt_count_sub+0x50/0x80
[   14.562051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.562076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.562099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.562123]  kthread+0x337/0x6f0
[   14.562143]  ? trace_preempt_on+0x20/0xc0
[   14.562165]  ? __pfx_kthread+0x10/0x10
[   14.562186]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.562208]  ? calculate_sigpending+0x7b/0xa0
[   14.562232]  ? __pfx_kthread+0x10/0x10
[   14.562255]  ret_from_fork+0x116/0x1d0
[   14.562275]  ? __pfx_kthread+0x10/0x10
[   14.562301]  ret_from_fork_asm+0x1a/0x30
[   14.562333]  </TASK>
[   14.562346] 
[   14.570050] Allocated by task 282:
[   14.570239]  kasan_save_stack+0x45/0x70
[   14.570416]  kasan_save_track+0x18/0x40
[   14.570633]  kasan_save_alloc_info+0x3b/0x50
[   14.570820]  __kasan_kmalloc+0xb7/0xc0
[   14.571035]  __kmalloc_cache_noprof+0x189/0x420
[   14.571256]  kasan_atomics+0x95/0x310
[   14.571441]  kunit_try_run_case+0x1a5/0x480
[   14.571648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.571965]  kthread+0x337/0x6f0
[   14.572166]  ret_from_fork+0x116/0x1d0
[   14.572305]  ret_from_fork_asm+0x1a/0x30
[   14.572448] 
[   14.572525] The buggy address belongs to the object at ffff8881033c5500
[   14.572525]  which belongs to the cache kmalloc-64 of size 64
[   14.573098] The buggy address is located 0 bytes to the right of
[   14.573098]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.573572] 
[   14.573693] The buggy address belongs to the physical page:
[   14.573954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.574303] flags: 0x200000000000000(node=0|zone=2)
[   14.574541] page_type: f5(slab)
[   14.574750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.575090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.575340] page dumped because: kasan: bad access detected
[   14.575512] 
[   14.575583] Memory state around the buggy address:
[   14.575738]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.575954]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.576443] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.576889]                                      ^
[   14.577124]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.577375]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.577587] ==================================================================
[   14.141861] ==================================================================
[   14.142217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.142510] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.143258] 
[   14.143397] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.143445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.143458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.143482] Call Trace:
[   14.143498]  <TASK>
[   14.143515]  dump_stack_lvl+0x73/0xb0
[   14.143546]  print_report+0xd1/0x650
[   14.143581]  ? __virt_addr_valid+0x1db/0x2d0
[   14.143605]  ? kasan_atomics_helper+0x3df/0x5450
[   14.143627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.143661]  ? kasan_atomics_helper+0x3df/0x5450
[   14.143684]  kasan_report+0x141/0x180
[   14.143706]  ? kasan_atomics_helper+0x3df/0x5450
[   14.143744]  kasan_check_range+0x10c/0x1c0
[   14.143768]  __kasan_check_read+0x15/0x20
[   14.143788]  kasan_atomics_helper+0x3df/0x5450
[   14.143821]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.143844]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.143870]  ? trace_hardirqs_on+0x37/0xe0
[   14.143893]  ? kasan_atomics+0x152/0x310
[   14.143920]  kasan_atomics+0x1dc/0x310
[   14.143952]  ? __pfx_kasan_atomics+0x10/0x10
[   14.143977]  ? __pfx_kasan_atomics+0x10/0x10
[   14.144003]  kunit_try_run_case+0x1a5/0x480
[   14.144049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.144073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.144098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.144122]  ? __kthread_parkme+0x82/0x180
[   14.144150]  ? preempt_count_sub+0x50/0x80
[   14.144175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.144199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.144223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.144246]  kthread+0x337/0x6f0
[   14.144267]  ? trace_preempt_on+0x20/0xc0
[   14.144289]  ? __pfx_kthread+0x10/0x10
[   14.144311]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.144333]  ? calculate_sigpending+0x7b/0xa0
[   14.144366]  ? __pfx_kthread+0x10/0x10
[   14.144389]  ret_from_fork+0x116/0x1d0
[   14.144409]  ? __pfx_kthread+0x10/0x10
[   14.144441]  ret_from_fork_asm+0x1a/0x30
[   14.144472]  </TASK>
[   14.144485] 
[   14.152378] Allocated by task 282:
[   14.152514]  kasan_save_stack+0x45/0x70
[   14.152679]  kasan_save_track+0x18/0x40
[   14.152902]  kasan_save_alloc_info+0x3b/0x50
[   14.153125]  __kasan_kmalloc+0xb7/0xc0
[   14.153316]  __kmalloc_cache_noprof+0x189/0x420
[   14.153556]  kasan_atomics+0x95/0x310
[   14.153784]  kunit_try_run_case+0x1a5/0x480
[   14.153932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.154120]  kthread+0x337/0x6f0
[   14.154242]  ret_from_fork+0x116/0x1d0
[   14.154375]  ret_from_fork_asm+0x1a/0x30
[   14.154556] 
[   14.154653] The buggy address belongs to the object at ffff8881033c5500
[   14.154653]  which belongs to the cache kmalloc-64 of size 64
[   14.155189] The buggy address is located 0 bytes to the right of
[   14.155189]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.155800] 
[   14.155904] The buggy address belongs to the physical page:
[   14.156197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.156552] flags: 0x200000000000000(node=0|zone=2)
[   14.156721] page_type: f5(slab)
[   14.156846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.157406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.157811] page dumped because: kasan: bad access detected
[   14.158040] 
[   14.158115] Memory state around the buggy address:
[   14.158343]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.158674]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.158969] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.159282]                                      ^
[   14.159509]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.159853]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.160177] ==================================================================
[   14.105047] ==================================================================
[   14.105422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.105823] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.106325] 
[   14.106456] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.106500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.106512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.106534] Call Trace:
[   14.106556]  <TASK>
[   14.106574]  dump_stack_lvl+0x73/0xb0
[   14.106604]  print_report+0xd1/0x650
[   14.106648]  ? __virt_addr_valid+0x1db/0x2d0
[   14.106671]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.106692]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.106712]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.106742]  kasan_report+0x141/0x180
[   14.106764]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.106789]  __asan_report_load4_noabort+0x18/0x20
[   14.106822]  kasan_atomics_helper+0x4b88/0x5450
[   14.106845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.106866]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.106889]  ? trace_hardirqs_on+0x37/0xe0
[   14.106912]  ? kasan_atomics+0x152/0x310
[   14.106938]  kasan_atomics+0x1dc/0x310
[   14.106961]  ? __pfx_kasan_atomics+0x10/0x10
[   14.106983]  ? __pfx_kasan_atomics+0x10/0x10
[   14.107009]  kunit_try_run_case+0x1a5/0x480
[   14.107046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.107068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.107091]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.107123]  ? __kthread_parkme+0x82/0x180
[   14.107143]  ? preempt_count_sub+0x50/0x80
[   14.107166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.107199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.107221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.107245]  kthread+0x337/0x6f0
[   14.107264]  ? trace_preempt_on+0x20/0xc0
[   14.107286]  ? __pfx_kthread+0x10/0x10
[   14.107306]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.107326]  ? calculate_sigpending+0x7b/0xa0
[   14.107349]  ? __pfx_kthread+0x10/0x10
[   14.107369]  ret_from_fork+0x116/0x1d0
[   14.107388]  ? __pfx_kthread+0x10/0x10
[   14.107408]  ret_from_fork_asm+0x1a/0x30
[   14.107439]  </TASK>
[   14.107450] 
[   14.114997] Allocated by task 282:
[   14.115186]  kasan_save_stack+0x45/0x70
[   14.115387]  kasan_save_track+0x18/0x40
[   14.115581]  kasan_save_alloc_info+0x3b/0x50
[   14.115822]  __kasan_kmalloc+0xb7/0xc0
[   14.116016]  __kmalloc_cache_noprof+0x189/0x420
[   14.116189]  kasan_atomics+0x95/0x310
[   14.116342]  kunit_try_run_case+0x1a5/0x480
[   14.116552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.116796]  kthread+0x337/0x6f0
[   14.117138]  ret_from_fork+0x116/0x1d0
[   14.117302]  ret_from_fork_asm+0x1a/0x30
[   14.117464] 
[   14.117580] The buggy address belongs to the object at ffff8881033c5500
[   14.117580]  which belongs to the cache kmalloc-64 of size 64
[   14.118126] The buggy address is located 0 bytes to the right of
[   14.118126]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.118605] 
[   14.118675] The buggy address belongs to the physical page:
[   14.118840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.119125] flags: 0x200000000000000(node=0|zone=2)
[   14.119392] page_type: f5(slab)
[   14.119554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.120151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.120371] page dumped because: kasan: bad access detected
[   14.120537] 
[   14.120649] Memory state around the buggy address:
[   14.120887]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.121397]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.121799] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.122163]                                      ^
[   14.122387]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.122729]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.122951] ==================================================================
[   14.315081] ==================================================================
[   14.315412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.315638] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.316356] 
[   14.316544] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.316619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.316632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.316667] Call Trace:
[   14.316684]  <TASK>
[   14.316702]  dump_stack_lvl+0x73/0xb0
[   14.316733]  print_report+0xd1/0x650
[   14.316756]  ? __virt_addr_valid+0x1db/0x2d0
[   14.316780]  ? kasan_atomics_helper+0x860/0x5450
[   14.316802]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.316825]  ? kasan_atomics_helper+0x860/0x5450
[   14.316847]  kasan_report+0x141/0x180
[   14.316870]  ? kasan_atomics_helper+0x860/0x5450
[   14.316897]  kasan_check_range+0x10c/0x1c0
[   14.316921]  __kasan_check_write+0x18/0x20
[   14.316941]  kasan_atomics_helper+0x860/0x5450
[   14.316964]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.316986]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.317013]  ? trace_hardirqs_on+0x37/0xe0
[   14.317047]  ? kasan_atomics+0x152/0x310
[   14.317075]  kasan_atomics+0x1dc/0x310
[   14.317098]  ? __pfx_kasan_atomics+0x10/0x10
[   14.317123]  ? __pfx_kasan_atomics+0x10/0x10
[   14.317150]  kunit_try_run_case+0x1a5/0x480
[   14.317175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.317199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.317224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.317247]  ? __kthread_parkme+0x82/0x180
[   14.317270]  ? preempt_count_sub+0x50/0x80
[   14.317294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.317319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.317342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.317366]  kthread+0x337/0x6f0
[   14.317385]  ? trace_preempt_on+0x20/0xc0
[   14.317407]  ? __pfx_kthread+0x10/0x10
[   14.317429]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.317480]  ? calculate_sigpending+0x7b/0xa0
[   14.317505]  ? __pfx_kthread+0x10/0x10
[   14.317554]  ret_from_fork+0x116/0x1d0
[   14.317588]  ? __pfx_kthread+0x10/0x10
[   14.317622]  ret_from_fork_asm+0x1a/0x30
[   14.317654]  </TASK>
[   14.317667] 
[   14.326099] Allocated by task 282:
[   14.326290]  kasan_save_stack+0x45/0x70
[   14.326524]  kasan_save_track+0x18/0x40
[   14.326787]  kasan_save_alloc_info+0x3b/0x50
[   14.327065]  __kasan_kmalloc+0xb7/0xc0
[   14.327257]  __kmalloc_cache_noprof+0x189/0x420
[   14.327514]  kasan_atomics+0x95/0x310
[   14.327659]  kunit_try_run_case+0x1a5/0x480
[   14.327942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.328250]  kthread+0x337/0x6f0
[   14.328442]  ret_from_fork+0x116/0x1d0
[   14.328644]  ret_from_fork_asm+0x1a/0x30
[   14.328859] 
[   14.328976] The buggy address belongs to the object at ffff8881033c5500
[   14.328976]  which belongs to the cache kmalloc-64 of size 64
[   14.329354] The buggy address is located 0 bytes to the right of
[   14.329354]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.329880] 
[   14.329992] The buggy address belongs to the physical page:
[   14.330244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.330628] flags: 0x200000000000000(node=0|zone=2)
[   14.330836] page_type: f5(slab)
[   14.330959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.331290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.331696] page dumped because: kasan: bad access detected
[   14.331980] 
[   14.332067] Memory state around the buggy address:
[   14.332228]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.332467]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.333087] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.333430]                                      ^
[   14.333653]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.333994]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.334315] ==================================================================
[   14.492844] ==================================================================
[   14.493256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.494102] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.494934] 
[   14.495099] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.495270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.495289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.495314] Call Trace:
[   14.495348]  <TASK>
[   14.495369]  dump_stack_lvl+0x73/0xb0
[   14.495438]  print_report+0xd1/0x650
[   14.495465]  ? __virt_addr_valid+0x1db/0x2d0
[   14.495491]  ? kasan_atomics_helper+0xde0/0x5450
[   14.495513]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.495536]  ? kasan_atomics_helper+0xde0/0x5450
[   14.495558]  kasan_report+0x141/0x180
[   14.495581]  ? kasan_atomics_helper+0xde0/0x5450
[   14.495609]  kasan_check_range+0x10c/0x1c0
[   14.495633]  __kasan_check_write+0x18/0x20
[   14.495654]  kasan_atomics_helper+0xde0/0x5450
[   14.495679]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.495705]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.495731]  ? trace_hardirqs_on+0x37/0xe0
[   14.495757]  ? kasan_atomics+0x152/0x310
[   14.495784]  kasan_atomics+0x1dc/0x310
[   14.495808]  ? __pfx_kasan_atomics+0x10/0x10
[   14.495832]  ? __pfx_kasan_atomics+0x10/0x10
[   14.495860]  kunit_try_run_case+0x1a5/0x480
[   14.495885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.495908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.495933]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.495957]  ? __kthread_parkme+0x82/0x180
[   14.495978]  ? preempt_count_sub+0x50/0x80
[   14.496003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.496038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.496064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.496088]  kthread+0x337/0x6f0
[   14.496108]  ? trace_preempt_on+0x20/0xc0
[   14.496130]  ? __pfx_kthread+0x10/0x10
[   14.496155]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.496178]  ? calculate_sigpending+0x7b/0xa0
[   14.496204]  ? __pfx_kthread+0x10/0x10
[   14.496226]  ret_from_fork+0x116/0x1d0
[   14.496246]  ? __pfx_kthread+0x10/0x10
[   14.496267]  ret_from_fork_asm+0x1a/0x30
[   14.496299]  </TASK>
[   14.496312] 
[   14.509008] Allocated by task 282:
[   14.509383]  kasan_save_stack+0x45/0x70
[   14.509742]  kasan_save_track+0x18/0x40
[   14.509934]  kasan_save_alloc_info+0x3b/0x50
[   14.510146]  __kasan_kmalloc+0xb7/0xc0
[   14.510323]  __kmalloc_cache_noprof+0x189/0x420
[   14.510529]  kasan_atomics+0x95/0x310
[   14.510987]  kunit_try_run_case+0x1a5/0x480
[   14.511393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.511829]  kthread+0x337/0x6f0
[   14.512133]  ret_from_fork+0x116/0x1d0
[   14.512479]  ret_from_fork_asm+0x1a/0x30
[   14.512869] 
[   14.512983] The buggy address belongs to the object at ffff8881033c5500
[   14.512983]  which belongs to the cache kmalloc-64 of size 64
[   14.513634] The buggy address is located 0 bytes to the right of
[   14.513634]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.514139] 
[   14.514234] The buggy address belongs to the physical page:
[   14.514467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.515242] flags: 0x200000000000000(node=0|zone=2)
[   14.515558] page_type: f5(slab)
[   14.515975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.516451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.517283] page dumped because: kasan: bad access detected
[   14.517738] 
[   14.517971] Memory state around the buggy address:
[   14.518406]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.519095]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.519598] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.520118]                                      ^
[   14.520336]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.520632]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.520920] ==================================================================
[   14.750682] ==================================================================
[   14.751166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.751448] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.751924] 
[   14.752039] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.752085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.752098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.752120] Call Trace:
[   14.752136]  <TASK>
[   14.752158]  dump_stack_lvl+0x73/0xb0
[   14.752187]  print_report+0xd1/0x650
[   14.752210]  ? __virt_addr_valid+0x1db/0x2d0
[   14.752235]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.752256]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.752279]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.752302]  kasan_report+0x141/0x180
[   14.752324]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.752350]  kasan_check_range+0x10c/0x1c0
[   14.752374]  __kasan_check_read+0x15/0x20
[   14.752395]  kasan_atomics_helper+0x13b5/0x5450
[   14.752418]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.752440]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.752464]  ? trace_hardirqs_on+0x37/0xe0
[   14.752488]  ? kasan_atomics+0x152/0x310
[   14.752514]  kasan_atomics+0x1dc/0x310
[   14.752537]  ? __pfx_kasan_atomics+0x10/0x10
[   14.752561]  ? __pfx_kasan_atomics+0x10/0x10
[   14.752588]  kunit_try_run_case+0x1a5/0x480
[   14.752612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752635]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.752670]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.752694]  ? __kthread_parkme+0x82/0x180
[   14.752714]  ? preempt_count_sub+0x50/0x80
[   14.752738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.752787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.752812]  kthread+0x337/0x6f0
[   14.752834]  ? trace_preempt_on+0x20/0xc0
[   14.752857]  ? __pfx_kthread+0x10/0x10
[   14.752879]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.752901]  ? calculate_sigpending+0x7b/0xa0
[   14.752925]  ? __pfx_kthread+0x10/0x10
[   14.752947]  ret_from_fork+0x116/0x1d0
[   14.752967]  ? __pfx_kthread+0x10/0x10
[   14.752989]  ret_from_fork_asm+0x1a/0x30
[   14.753030]  </TASK>
[   14.753044] 
[   14.760488] Allocated by task 282:
[   14.760652]  kasan_save_stack+0x45/0x70
[   14.760858]  kasan_save_track+0x18/0x40
[   14.761063]  kasan_save_alloc_info+0x3b/0x50
[   14.761277]  __kasan_kmalloc+0xb7/0xc0
[   14.761469]  __kmalloc_cache_noprof+0x189/0x420
[   14.761757]  kasan_atomics+0x95/0x310
[   14.761947]  kunit_try_run_case+0x1a5/0x480
[   14.762108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.762283]  kthread+0x337/0x6f0
[   14.762404]  ret_from_fork+0x116/0x1d0
[   14.762536]  ret_from_fork_asm+0x1a/0x30
[   14.762675] 
[   14.762746] The buggy address belongs to the object at ffff8881033c5500
[   14.762746]  which belongs to the cache kmalloc-64 of size 64
[   14.763271] The buggy address is located 0 bytes to the right of
[   14.763271]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.763813] 
[   14.763910] The buggy address belongs to the physical page:
[   14.764203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.764445] flags: 0x200000000000000(node=0|zone=2)
[   14.764612] page_type: f5(slab)
[   14.764966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.765327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.765654] page dumped because: kasan: bad access detected
[   14.765874] 
[   14.765952] Memory state around the buggy address:
[   14.766127]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.766343]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.766632] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.766960]                                      ^
[   14.767199]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.767531]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.767837] ==================================================================
[   14.920772] ==================================================================
[   14.921132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.921662] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.921934] 
[   14.922038] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.922083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.922096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.922118] Call Trace:
[   14.922135]  <TASK>
[   14.922153]  dump_stack_lvl+0x73/0xb0
[   14.922194]  print_report+0xd1/0x650
[   14.922216]  ? __virt_addr_valid+0x1db/0x2d0
[   14.922252]  ? kasan_atomics_helper+0x177f/0x5450
[   14.922274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.922297]  ? kasan_atomics_helper+0x177f/0x5450
[   14.922319]  kasan_report+0x141/0x180
[   14.922351]  ? kasan_atomics_helper+0x177f/0x5450
[   14.922379]  kasan_check_range+0x10c/0x1c0
[   14.922403]  __kasan_check_write+0x18/0x20
[   14.922433]  kasan_atomics_helper+0x177f/0x5450
[   14.922457]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.922479]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.922514]  ? trace_hardirqs_on+0x37/0xe0
[   14.922538]  ? kasan_atomics+0x152/0x310
[   14.922576]  kasan_atomics+0x1dc/0x310
[   14.922600]  ? __pfx_kasan_atomics+0x10/0x10
[   14.922624]  ? __pfx_kasan_atomics+0x10/0x10
[   14.922660]  kunit_try_run_case+0x1a5/0x480
[   14.922693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.922716]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.922740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.922775]  ? __kthread_parkme+0x82/0x180
[   14.922797]  ? preempt_count_sub+0x50/0x80
[   14.922821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.922855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.922879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.922903]  kthread+0x337/0x6f0
[   14.922934]  ? trace_preempt_on+0x20/0xc0
[   14.922957]  ? __pfx_kthread+0x10/0x10
[   14.922978]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.923007]  ? calculate_sigpending+0x7b/0xa0
[   14.923041]  ? __pfx_kthread+0x10/0x10
[   14.923063]  ret_from_fork+0x116/0x1d0
[   14.923093]  ? __pfx_kthread+0x10/0x10
[   14.923114]  ret_from_fork_asm+0x1a/0x30
[   14.923146]  </TASK>
[   14.923158] 
[   14.932413] Allocated by task 282:
[   14.932566]  kasan_save_stack+0x45/0x70
[   14.932935]  kasan_save_track+0x18/0x40
[   14.933338]  kasan_save_alloc_info+0x3b/0x50
[   14.933770]  __kasan_kmalloc+0xb7/0xc0
[   14.934172]  __kmalloc_cache_noprof+0x189/0x420
[   14.934595]  kasan_atomics+0x95/0x310
[   14.934998]  kunit_try_run_case+0x1a5/0x480
[   14.935402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.935922]  kthread+0x337/0x6f0
[   14.936091]  ret_from_fork+0x116/0x1d0
[   14.936470]  ret_from_fork_asm+0x1a/0x30
[   14.936824] 
[   14.936966] The buggy address belongs to the object at ffff8881033c5500
[   14.936966]  which belongs to the cache kmalloc-64 of size 64
[   14.937625] The buggy address is located 0 bytes to the right of
[   14.937625]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.938753] 
[   14.938947] The buggy address belongs to the physical page:
[   14.939291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.939534] flags: 0x200000000000000(node=0|zone=2)
[   14.939740] page_type: f5(slab)
[   14.940077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.940761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.941407] page dumped because: kasan: bad access detected
[   14.941894] 
[   14.942070] Memory state around the buggy address:
[   14.942513]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.943237]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.943623] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.944274]                                      ^
[   14.944722]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.945153]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.945368] ==================================================================
[   15.342863] ==================================================================
[   15.343551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.343938] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.344461] 
[   15.344704] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.344755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.344790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.344813] Call Trace:
[   15.344833]  <TASK>
[   15.344851]  dump_stack_lvl+0x73/0xb0
[   15.344882]  print_report+0xd1/0x650
[   15.344906]  ? __virt_addr_valid+0x1db/0x2d0
[   15.344931]  ? kasan_atomics_helper+0x224c/0x5450
[   15.344954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.344977]  ? kasan_atomics_helper+0x224c/0x5450
[   15.345000]  kasan_report+0x141/0x180
[   15.345034]  ? kasan_atomics_helper+0x224c/0x5450
[   15.345062]  kasan_check_range+0x10c/0x1c0
[   15.345086]  __kasan_check_write+0x18/0x20
[   15.345109]  kasan_atomics_helper+0x224c/0x5450
[   15.345134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.345157]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.345182]  ? trace_hardirqs_on+0x37/0xe0
[   15.345206]  ? kasan_atomics+0x152/0x310
[   15.345233]  kasan_atomics+0x1dc/0x310
[   15.345257]  ? __pfx_kasan_atomics+0x10/0x10
[   15.345280]  ? __pfx_kasan_atomics+0x10/0x10
[   15.345308]  kunit_try_run_case+0x1a5/0x480
[   15.345332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.345355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.345380]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.345405]  ? __kthread_parkme+0x82/0x180
[   15.345426]  ? preempt_count_sub+0x50/0x80
[   15.345451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.345476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.345500]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.345524]  kthread+0x337/0x6f0
[   15.345543]  ? trace_preempt_on+0x20/0xc0
[   15.345566]  ? __pfx_kthread+0x10/0x10
[   15.345587]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.345608]  ? calculate_sigpending+0x7b/0xa0
[   15.345640]  ? __pfx_kthread+0x10/0x10
[   15.345662]  ret_from_fork+0x116/0x1d0
[   15.345681]  ? __pfx_kthread+0x10/0x10
[   15.345703]  ret_from_fork_asm+0x1a/0x30
[   15.345734]  </TASK>
[   15.345746] 
[   15.353068] Allocated by task 282:
[   15.353203]  kasan_save_stack+0x45/0x70
[   15.353479]  kasan_save_track+0x18/0x40
[   15.353705]  kasan_save_alloc_info+0x3b/0x50
[   15.353920]  __kasan_kmalloc+0xb7/0xc0
[   15.354078]  __kmalloc_cache_noprof+0x189/0x420
[   15.354237]  kasan_atomics+0x95/0x310
[   15.354383]  kunit_try_run_case+0x1a5/0x480
[   15.354590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.355099]  kthread+0x337/0x6f0
[   15.355275]  ret_from_fork+0x116/0x1d0
[   15.355446]  ret_from_fork_asm+0x1a/0x30
[   15.355587] 
[   15.355658] The buggy address belongs to the object at ffff8881033c5500
[   15.355658]  which belongs to the cache kmalloc-64 of size 64
[   15.356074] The buggy address is located 0 bytes to the right of
[   15.356074]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.356625] 
[   15.356713] The buggy address belongs to the physical page:
[   15.356886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.357136] flags: 0x200000000000000(node=0|zone=2)
[   15.357394] page_type: f5(slab)
[   15.357565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.358065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.358413] page dumped because: kasan: bad access detected
[   15.358687] 
[   15.358784] Memory state around the buggy address:
[   15.358976]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.359243]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.359549] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.359933]                                      ^
[   15.360114]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.360447]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.360754] ==================================================================
[   14.396045] ==================================================================
[   14.396316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.396795] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.397073] 
[   14.397222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.397270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.397294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.397318] Call Trace:
[   14.397339]  <TASK>
[   14.397369]  dump_stack_lvl+0x73/0xb0
[   14.397400]  print_report+0xd1/0x650
[   14.397426]  ? __virt_addr_valid+0x1db/0x2d0
[   14.397451]  ? kasan_atomics_helper+0xac7/0x5450
[   14.397473]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.397495]  ? kasan_atomics_helper+0xac7/0x5450
[   14.397516]  kasan_report+0x141/0x180
[   14.397539]  ? kasan_atomics_helper+0xac7/0x5450
[   14.397565]  kasan_check_range+0x10c/0x1c0
[   14.397590]  __kasan_check_write+0x18/0x20
[   14.397610]  kasan_atomics_helper+0xac7/0x5450
[   14.397632]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.397665]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.397693]  ? trace_hardirqs_on+0x37/0xe0
[   14.397720]  ? kasan_atomics+0x152/0x310
[   14.397759]  kasan_atomics+0x1dc/0x310
[   14.397782]  ? __pfx_kasan_atomics+0x10/0x10
[   14.397817]  ? __pfx_kasan_atomics+0x10/0x10
[   14.397845]  kunit_try_run_case+0x1a5/0x480
[   14.397869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.397902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.397928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.397953]  ? __kthread_parkme+0x82/0x180
[   14.397975]  ? preempt_count_sub+0x50/0x80
[   14.397999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.398033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.398057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.398081]  kthread+0x337/0x6f0
[   14.398101]  ? trace_preempt_on+0x20/0xc0
[   14.398123]  ? __pfx_kthread+0x10/0x10
[   14.398144]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.398165]  ? calculate_sigpending+0x7b/0xa0
[   14.398202]  ? __pfx_kthread+0x10/0x10
[   14.398224]  ret_from_fork+0x116/0x1d0
[   14.398244]  ? __pfx_kthread+0x10/0x10
[   14.398276]  ret_from_fork_asm+0x1a/0x30
[   14.398308]  </TASK>
[   14.398320] 
[   14.405998] Allocated by task 282:
[   14.406140]  kasan_save_stack+0x45/0x70
[   14.406283]  kasan_save_track+0x18/0x40
[   14.406474]  kasan_save_alloc_info+0x3b/0x50
[   14.406689]  __kasan_kmalloc+0xb7/0xc0
[   14.406871]  __kmalloc_cache_noprof+0x189/0x420
[   14.407097]  kasan_atomics+0x95/0x310
[   14.407254]  kunit_try_run_case+0x1a5/0x480
[   14.407398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.407694]  kthread+0x337/0x6f0
[   14.407865]  ret_from_fork+0x116/0x1d0
[   14.408066]  ret_from_fork_asm+0x1a/0x30
[   14.408298] 
[   14.408408] The buggy address belongs to the object at ffff8881033c5500
[   14.408408]  which belongs to the cache kmalloc-64 of size 64
[   14.408906] The buggy address is located 0 bytes to the right of
[   14.408906]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.409455] 
[   14.409555] The buggy address belongs to the physical page:
[   14.409793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.410107] flags: 0x200000000000000(node=0|zone=2)
[   14.410343] page_type: f5(slab)
[   14.410494] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.410727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.410955] page dumped because: kasan: bad access detected
[   14.411149] 
[   14.411278] Memory state around the buggy address:
[   14.411503]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.412079]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.412316] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.412530]                                      ^
[   14.412713]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.413055]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.413413] ==================================================================
[   14.672888] ==================================================================
[   14.673357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.673874] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.674118] 
[   14.674238] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.674318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.674331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.674367] Call Trace:
[   14.674399]  <TASK>
[   14.674430]  dump_stack_lvl+0x73/0xb0
[   14.674474]  print_report+0xd1/0x650
[   14.674525]  ? __virt_addr_valid+0x1db/0x2d0
[   14.674563]  ? kasan_atomics_helper+0x1217/0x5450
[   14.674599]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.674635]  ? kasan_atomics_helper+0x1217/0x5450
[   14.674683]  kasan_report+0x141/0x180
[   14.674718]  ? kasan_atomics_helper+0x1217/0x5450
[   14.674758]  kasan_check_range+0x10c/0x1c0
[   14.674813]  __kasan_check_write+0x18/0x20
[   14.674833]  kasan_atomics_helper+0x1217/0x5450
[   14.674869]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.674904]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.674930]  ? trace_hardirqs_on+0x37/0xe0
[   14.674964]  ? kasan_atomics+0x152/0x310
[   14.674990]  kasan_atomics+0x1dc/0x310
[   14.675014]  ? __pfx_kasan_atomics+0x10/0x10
[   14.675048]  ? __pfx_kasan_atomics+0x10/0x10
[   14.675075]  kunit_try_run_case+0x1a5/0x480
[   14.675099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.675122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.675146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.675169]  ? __kthread_parkme+0x82/0x180
[   14.675190]  ? preempt_count_sub+0x50/0x80
[   14.675214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.675238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.675262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.675285]  kthread+0x337/0x6f0
[   14.675305]  ? trace_preempt_on+0x20/0xc0
[   14.675327]  ? __pfx_kthread+0x10/0x10
[   14.675349]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.675372]  ? calculate_sigpending+0x7b/0xa0
[   14.675395]  ? __pfx_kthread+0x10/0x10
[   14.675417]  ret_from_fork+0x116/0x1d0
[   14.675437]  ? __pfx_kthread+0x10/0x10
[   14.675457]  ret_from_fork_asm+0x1a/0x30
[   14.675488]  </TASK>
[   14.675500] 
[   14.686198] Allocated by task 282:
[   14.686408]  kasan_save_stack+0x45/0x70
[   14.686726]  kasan_save_track+0x18/0x40
[   14.686909]  kasan_save_alloc_info+0x3b/0x50
[   14.687122]  __kasan_kmalloc+0xb7/0xc0
[   14.687287]  __kmalloc_cache_noprof+0x189/0x420
[   14.687481]  kasan_atomics+0x95/0x310
[   14.687644]  kunit_try_run_case+0x1a5/0x480
[   14.687826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.688062]  kthread+0x337/0x6f0
[   14.688227]  ret_from_fork+0x116/0x1d0
[   14.688386]  ret_from_fork_asm+0x1a/0x30
[   14.688562] 
[   14.688646] The buggy address belongs to the object at ffff8881033c5500
[   14.688646]  which belongs to the cache kmalloc-64 of size 64
[   14.689595] The buggy address is located 0 bytes to the right of
[   14.689595]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.690301] 
[   14.690403] The buggy address belongs to the physical page:
[   14.690629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.691221] flags: 0x200000000000000(node=0|zone=2)
[   14.691515] page_type: f5(slab)
[   14.691760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.692161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.692522] page dumped because: kasan: bad access detected
[   14.692796] 
[   14.693064] Memory state around the buggy address:
[   14.693281]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.693676]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.694064] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.694436]                                      ^
[   14.694605]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.695067]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.695406] ==================================================================
[   14.768835] ==================================================================
[   14.769537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.770208] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.770442] 
[   14.770534] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.770589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.770603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.770626] Call Trace:
[   14.770646]  <TASK>
[   14.770664]  dump_stack_lvl+0x73/0xb0
[   14.770694]  print_report+0xd1/0x650
[   14.770716]  ? __virt_addr_valid+0x1db/0x2d0
[   14.770749]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.770771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.770793]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.770817]  kasan_report+0x141/0x180
[   14.770839]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.770866]  __asan_report_load8_noabort+0x18/0x20
[   14.770891]  kasan_atomics_helper+0x4eae/0x5450
[   14.770914]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.770937]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.770963]  ? trace_hardirqs_on+0x37/0xe0
[   14.770987]  ? kasan_atomics+0x152/0x310
[   14.771015]  kasan_atomics+0x1dc/0x310
[   14.771297]  ? __pfx_kasan_atomics+0x10/0x10
[   14.771324]  ? __pfx_kasan_atomics+0x10/0x10
[   14.771354]  kunit_try_run_case+0x1a5/0x480
[   14.771378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.771437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.771462]  ? __kthread_parkme+0x82/0x180
[   14.771484]  ? preempt_count_sub+0x50/0x80
[   14.771508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.771557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.771582]  kthread+0x337/0x6f0
[   14.771602]  ? trace_preempt_on+0x20/0xc0
[   14.771626]  ? __pfx_kthread+0x10/0x10
[   14.772086]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.772122]  ? calculate_sigpending+0x7b/0xa0
[   14.772154]  ? __pfx_kthread+0x10/0x10
[   14.772178]  ret_from_fork+0x116/0x1d0
[   14.772199]  ? __pfx_kthread+0x10/0x10
[   14.772220]  ret_from_fork_asm+0x1a/0x30
[   14.772252]  </TASK>
[   14.772266] 
[   14.783210] Allocated by task 282:
[   14.783386]  kasan_save_stack+0x45/0x70
[   14.783585]  kasan_save_track+0x18/0x40
[   14.783973]  kasan_save_alloc_info+0x3b/0x50
[   14.784383]  __kasan_kmalloc+0xb7/0xc0
[   14.784687]  __kmalloc_cache_noprof+0x189/0x420
[   14.784909]  kasan_atomics+0x95/0x310
[   14.785099]  kunit_try_run_case+0x1a5/0x480
[   14.785294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.785529]  kthread+0x337/0x6f0
[   14.785982]  ret_from_fork+0x116/0x1d0
[   14.786315]  ret_from_fork_asm+0x1a/0x30
[   14.786739] 
[   14.786963] The buggy address belongs to the object at ffff8881033c5500
[   14.786963]  which belongs to the cache kmalloc-64 of size 64
[   14.787860] The buggy address is located 0 bytes to the right of
[   14.787860]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.788402] 
[   14.788499] The buggy address belongs to the physical page:
[   14.788939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.789456] flags: 0x200000000000000(node=0|zone=2)
[   14.790059] page_type: f5(slab)
[   14.790238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.790557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.791091] page dumped because: kasan: bad access detected
[   14.791514] 
[   14.791609] Memory state around the buggy address:
[   14.791988]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.792298]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.792592] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.793182]                                      ^
[   14.793640]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.794102]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.794524] ==================================================================
[   15.361363] ==================================================================
[   15.361715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.362038] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.362309] 
[   15.362420] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.362465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.362478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.362502] Call Trace:
[   15.362521]  <TASK>
[   15.362540]  dump_stack_lvl+0x73/0xb0
[   15.362568]  print_report+0xd1/0x650
[   15.362591]  ? __virt_addr_valid+0x1db/0x2d0
[   15.362617]  ? kasan_atomics_helper+0x5115/0x5450
[   15.362639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.362673]  ? kasan_atomics_helper+0x5115/0x5450
[   15.362696]  kasan_report+0x141/0x180
[   15.362718]  ? kasan_atomics_helper+0x5115/0x5450
[   15.362745]  __asan_report_load8_noabort+0x18/0x20
[   15.362770]  kasan_atomics_helper+0x5115/0x5450
[   15.362793]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.362817]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.362843]  ? trace_hardirqs_on+0x37/0xe0
[   15.362866]  ? kasan_atomics+0x152/0x310
[   15.362893]  kasan_atomics+0x1dc/0x310
[   15.362917]  ? __pfx_kasan_atomics+0x10/0x10
[   15.362941]  ? __pfx_kasan_atomics+0x10/0x10
[   15.362969]  kunit_try_run_case+0x1a5/0x480
[   15.362994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363016]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.363052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.363077]  ? __kthread_parkme+0x82/0x180
[   15.363099]  ? preempt_count_sub+0x50/0x80
[   15.363124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.363149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.363172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.363197]  kthread+0x337/0x6f0
[   15.363216]  ? trace_preempt_on+0x20/0xc0
[   15.363239]  ? __pfx_kthread+0x10/0x10
[   15.363260]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.363281]  ? calculate_sigpending+0x7b/0xa0
[   15.363306]  ? __pfx_kthread+0x10/0x10
[   15.363329]  ret_from_fork+0x116/0x1d0
[   15.363349]  ? __pfx_kthread+0x10/0x10
[   15.363370]  ret_from_fork_asm+0x1a/0x30
[   15.363401]  </TASK>
[   15.363414] 
[   15.370585] Allocated by task 282:
[   15.370792]  kasan_save_stack+0x45/0x70
[   15.371046]  kasan_save_track+0x18/0x40
[   15.371239]  kasan_save_alloc_info+0x3b/0x50
[   15.371422]  __kasan_kmalloc+0xb7/0xc0
[   15.371612]  __kmalloc_cache_noprof+0x189/0x420
[   15.371816]  kasan_atomics+0x95/0x310
[   15.371991]  kunit_try_run_case+0x1a5/0x480
[   15.372184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.372393]  kthread+0x337/0x6f0
[   15.372563]  ret_from_fork+0x116/0x1d0
[   15.372751]  ret_from_fork_asm+0x1a/0x30
[   15.372987] 
[   15.373067] The buggy address belongs to the object at ffff8881033c5500
[   15.373067]  which belongs to the cache kmalloc-64 of size 64
[   15.373667] The buggy address is located 0 bytes to the right of
[   15.373667]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.374175] 
[   15.374273] The buggy address belongs to the physical page:
[   15.374499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.374817] flags: 0x200000000000000(node=0|zone=2)
[   15.374980] page_type: f5(slab)
[   15.375110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.375342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.375566] page dumped because: kasan: bad access detected
[   15.375735] 
[   15.375806] Memory state around the buggy address:
[   15.375959]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.376273]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.376598] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.376906]                                      ^
[   15.377136]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.377460]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.377837] ==================================================================
[   14.238260] ==================================================================
[   14.238623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.239437] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.239778] 
[   14.239914] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.239972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.239985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.240009] Call Trace:
[   14.240036]  <TASK>
[   14.240055]  dump_stack_lvl+0x73/0xb0
[   14.240084]  print_report+0xd1/0x650
[   14.240108]  ? __virt_addr_valid+0x1db/0x2d0
[   14.240132]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.240160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.240186]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.240208]  kasan_report+0x141/0x180
[   14.240231]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.240257]  kasan_check_range+0x10c/0x1c0
[   14.240293]  __kasan_check_write+0x18/0x20
[   14.240314]  kasan_atomics_helper+0x5fe/0x5450
[   14.240337]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.240370]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.240397]  ? trace_hardirqs_on+0x37/0xe0
[   14.240420]  ? kasan_atomics+0x152/0x310
[   14.240448]  kasan_atomics+0x1dc/0x310
[   14.240480]  ? __pfx_kasan_atomics+0x10/0x10
[   14.240504]  ? __pfx_kasan_atomics+0x10/0x10
[   14.240543]  kunit_try_run_case+0x1a5/0x480
[   14.240567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.240589]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.240624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.240656]  ? __kthread_parkme+0x82/0x180
[   14.240677]  ? preempt_count_sub+0x50/0x80
[   14.240712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.240736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.240760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.240785]  kthread+0x337/0x6f0
[   14.240804]  ? trace_preempt_on+0x20/0xc0
[   14.240836]  ? __pfx_kthread+0x10/0x10
[   14.240856]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.240879]  ? calculate_sigpending+0x7b/0xa0
[   14.240913]  ? __pfx_kthread+0x10/0x10
[   14.240935]  ret_from_fork+0x116/0x1d0
[   14.240955]  ? __pfx_kthread+0x10/0x10
[   14.240982]  ret_from_fork_asm+0x1a/0x30
[   14.241014]  </TASK>
[   14.241042] 
[   14.248810] Allocated by task 282:
[   14.249178]  kasan_save_stack+0x45/0x70
[   14.249332]  kasan_save_track+0x18/0x40
[   14.249554]  kasan_save_alloc_info+0x3b/0x50
[   14.249789]  __kasan_kmalloc+0xb7/0xc0
[   14.249996]  __kmalloc_cache_noprof+0x189/0x420
[   14.250173]  kasan_atomics+0x95/0x310
[   14.250363]  kunit_try_run_case+0x1a5/0x480
[   14.250601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.250835]  kthread+0x337/0x6f0
[   14.251032]  ret_from_fork+0x116/0x1d0
[   14.251175]  ret_from_fork_asm+0x1a/0x30
[   14.251390] 
[   14.251485] The buggy address belongs to the object at ffff8881033c5500
[   14.251485]  which belongs to the cache kmalloc-64 of size 64
[   14.251984] The buggy address is located 0 bytes to the right of
[   14.251984]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.252491] 
[   14.252570] The buggy address belongs to the physical page:
[   14.252880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.253252] flags: 0x200000000000000(node=0|zone=2)
[   14.253439] page_type: f5(slab)
[   14.253563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.253883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.254244] page dumped because: kasan: bad access detected
[   14.254417] 
[   14.254486] Memory state around the buggy address:
[   14.254643]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.255008]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.255353] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.255738]                                      ^
[   14.255928]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.256211]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.256553] ==================================================================
[   14.276518] ==================================================================
[   14.277101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.277511] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.277982] 
[   14.278097] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.278142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.278156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.278179] Call Trace:
[   14.278193]  <TASK>
[   14.278209]  dump_stack_lvl+0x73/0xb0
[   14.278237]  print_report+0xd1/0x650
[   14.278262]  ? __virt_addr_valid+0x1db/0x2d0
[   14.278286]  ? kasan_atomics_helper+0x72f/0x5450
[   14.278309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.278332]  ? kasan_atomics_helper+0x72f/0x5450
[   14.278366]  kasan_report+0x141/0x180
[   14.278389]  ? kasan_atomics_helper+0x72f/0x5450
[   14.278426]  kasan_check_range+0x10c/0x1c0
[   14.278451]  __kasan_check_write+0x18/0x20
[   14.278471]  kasan_atomics_helper+0x72f/0x5450
[   14.278494]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.278517]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.278542]  ? trace_hardirqs_on+0x37/0xe0
[   14.278566]  ? kasan_atomics+0x152/0x310
[   14.278594]  kasan_atomics+0x1dc/0x310
[   14.278617]  ? __pfx_kasan_atomics+0x10/0x10
[   14.278640]  ? __pfx_kasan_atomics+0x10/0x10
[   14.278667]  kunit_try_run_case+0x1a5/0x480
[   14.278692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.278714]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.278739]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.278762]  ? __kthread_parkme+0x82/0x180
[   14.278782]  ? preempt_count_sub+0x50/0x80
[   14.278808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.278831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.278854]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.278878]  kthread+0x337/0x6f0
[   14.278897]  ? trace_preempt_on+0x20/0xc0
[   14.278920]  ? __pfx_kthread+0x10/0x10
[   14.278942]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.278962]  ? calculate_sigpending+0x7b/0xa0
[   14.278987]  ? __pfx_kthread+0x10/0x10
[   14.279008]  ret_from_fork+0x116/0x1d0
[   14.279036]  ? __pfx_kthread+0x10/0x10
[   14.279057]  ret_from_fork_asm+0x1a/0x30
[   14.279088]  </TASK>
[   14.279100] 
[   14.286988] Allocated by task 282:
[   14.287179]  kasan_save_stack+0x45/0x70
[   14.287370]  kasan_save_track+0x18/0x40
[   14.287509]  kasan_save_alloc_info+0x3b/0x50
[   14.287789]  __kasan_kmalloc+0xb7/0xc0
[   14.287947]  __kmalloc_cache_noprof+0x189/0x420
[   14.288117]  kasan_atomics+0x95/0x310
[   14.288259]  kunit_try_run_case+0x1a5/0x480
[   14.288408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.288583]  kthread+0x337/0x6f0
[   14.288704]  ret_from_fork+0x116/0x1d0
[   14.288837]  ret_from_fork_asm+0x1a/0x30
[   14.289000] 
[   14.289139] The buggy address belongs to the object at ffff8881033c5500
[   14.289139]  which belongs to the cache kmalloc-64 of size 64
[   14.289664] The buggy address is located 0 bytes to the right of
[   14.289664]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.290213] 
[   14.290309] The buggy address belongs to the physical page:
[   14.290556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.291068] flags: 0x200000000000000(node=0|zone=2)
[   14.291234] page_type: f5(slab)
[   14.291360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.291591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.292125] page dumped because: kasan: bad access detected
[   14.292384] 
[   14.292490] Memory state around the buggy address:
[   14.292736]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.293157]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.293413] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.293761]                                      ^
[   14.294066]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.294323]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.294540] ==================================================================
[   14.733277] ==================================================================
[   14.733635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.733979] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.734302] 
[   14.734422] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.734468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.734481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.734503] Call Trace:
[   14.734521]  <TASK>
[   14.734539]  dump_stack_lvl+0x73/0xb0
[   14.734567]  print_report+0xd1/0x650
[   14.734590]  ? __virt_addr_valid+0x1db/0x2d0
[   14.734614]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.734635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.734658]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.734680]  kasan_report+0x141/0x180
[   14.734703]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.734729]  __asan_report_load4_noabort+0x18/0x20
[   14.734754]  kasan_atomics_helper+0x49ce/0x5450
[   14.734776]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.734798]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.734823]  ? trace_hardirqs_on+0x37/0xe0
[   14.734846]  ? kasan_atomics+0x152/0x310
[   14.734873]  kasan_atomics+0x1dc/0x310
[   14.734895]  ? __pfx_kasan_atomics+0x10/0x10
[   14.734919]  ? __pfx_kasan_atomics+0x10/0x10
[   14.734945]  kunit_try_run_case+0x1a5/0x480
[   14.734970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.734992]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.735017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.735051]  ? __kthread_parkme+0x82/0x180
[   14.735074]  ? preempt_count_sub+0x50/0x80
[   14.735098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.735123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.735146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.735170]  kthread+0x337/0x6f0
[   14.735189]  ? trace_preempt_on+0x20/0xc0
[   14.735211]  ? __pfx_kthread+0x10/0x10
[   14.735232]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.735255]  ? calculate_sigpending+0x7b/0xa0
[   14.735279]  ? __pfx_kthread+0x10/0x10
[   14.735301]  ret_from_fork+0x116/0x1d0
[   14.735321]  ? __pfx_kthread+0x10/0x10
[   14.735343]  ret_from_fork_asm+0x1a/0x30
[   14.735373]  </TASK>
[   14.735386] 
[   14.742552] Allocated by task 282:
[   14.742843]  kasan_save_stack+0x45/0x70
[   14.743054]  kasan_save_track+0x18/0x40
[   14.743248]  kasan_save_alloc_info+0x3b/0x50
[   14.743463]  __kasan_kmalloc+0xb7/0xc0
[   14.743627]  __kmalloc_cache_noprof+0x189/0x420
[   14.743840]  kasan_atomics+0x95/0x310
[   14.743997]  kunit_try_run_case+0x1a5/0x480
[   14.744159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.744360]  kthread+0x337/0x6f0
[   14.744524]  ret_from_fork+0x116/0x1d0
[   14.744719]  ret_from_fork_asm+0x1a/0x30
[   14.745110] 
[   14.745198] The buggy address belongs to the object at ffff8881033c5500
[   14.745198]  which belongs to the cache kmalloc-64 of size 64
[   14.745663] The buggy address is located 0 bytes to the right of
[   14.745663]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.746096] 
[   14.746194] The buggy address belongs to the physical page:
[   14.746448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.746797] flags: 0x200000000000000(node=0|zone=2)
[   14.747006] page_type: f5(slab)
[   14.747191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.747495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.747958] page dumped because: kasan: bad access detected
[   14.748204] 
[   14.748281] Memory state around the buggy address:
[   14.748473]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.748803]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.749113] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.749377]                                      ^
[   14.749571]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749787]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749999] ==================================================================
[   14.615314] ==================================================================
[   14.615947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.616301] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.616605] 
[   14.617607] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.617664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.617678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.617701] Call Trace:
[   14.617719]  <TASK>
[   14.617737]  dump_stack_lvl+0x73/0xb0
[   14.617769]  print_report+0xd1/0x650
[   14.617794]  ? __virt_addr_valid+0x1db/0x2d0
[   14.617818]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.617841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.617863]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.617885]  kasan_report+0x141/0x180
[   14.617908]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.617934]  __asan_report_load4_noabort+0x18/0x20
[   14.617959]  kasan_atomics_helper+0x4a1c/0x5450
[   14.617982]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.618004]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.618044]  ? trace_hardirqs_on+0x37/0xe0
[   14.618067]  ? kasan_atomics+0x152/0x310
[   14.618094]  kasan_atomics+0x1dc/0x310
[   14.618118]  ? __pfx_kasan_atomics+0x10/0x10
[   14.618142]  ? __pfx_kasan_atomics+0x10/0x10
[   14.618170]  kunit_try_run_case+0x1a5/0x480
[   14.618195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.618217]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.618241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.618265]  ? __kthread_parkme+0x82/0x180
[   14.618287]  ? preempt_count_sub+0x50/0x80
[   14.618311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.618336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.618359]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.618383]  kthread+0x337/0x6f0
[   14.618403]  ? trace_preempt_on+0x20/0xc0
[   14.618425]  ? __pfx_kthread+0x10/0x10
[   14.618446]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.618468]  ? calculate_sigpending+0x7b/0xa0
[   14.618492]  ? __pfx_kthread+0x10/0x10
[   14.618514]  ret_from_fork+0x116/0x1d0
[   14.618534]  ? __pfx_kthread+0x10/0x10
[   14.618555]  ret_from_fork_asm+0x1a/0x30
[   14.618585]  </TASK>
[   14.618598] 
[   14.626124] Allocated by task 282:
[   14.626309]  kasan_save_stack+0x45/0x70
[   14.626513]  kasan_save_track+0x18/0x40
[   14.626702]  kasan_save_alloc_info+0x3b/0x50
[   14.626910]  __kasan_kmalloc+0xb7/0xc0
[   14.627166]  __kmalloc_cache_noprof+0x189/0x420
[   14.627323]  kasan_atomics+0x95/0x310
[   14.627456]  kunit_try_run_case+0x1a5/0x480
[   14.627600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.627768]  kthread+0x337/0x6f0
[   14.628010]  ret_from_fork+0x116/0x1d0
[   14.628218]  ret_from_fork_asm+0x1a/0x30
[   14.628440] 
[   14.628558] The buggy address belongs to the object at ffff8881033c5500
[   14.628558]  which belongs to the cache kmalloc-64 of size 64
[   14.629454] The buggy address is located 0 bytes to the right of
[   14.629454]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.630051] 
[   14.630169] The buggy address belongs to the physical page:
[   14.630428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.630929] flags: 0x200000000000000(node=0|zone=2)
[   14.631113] page_type: f5(slab)
[   14.631235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.631462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.631841] page dumped because: kasan: bad access detected
[   14.632105] 
[   14.632208] Memory state around the buggy address:
[   14.632453]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.632796]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.633216] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.633575]                                      ^
[   14.633826]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634157]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634501] ==================================================================
[   14.039214] ==================================================================
[   14.040470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.041017] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.041255] 
[   14.041354] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.041409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.041421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.041445] Call Trace:
[   14.041459]  <TASK>
[   14.041480]  dump_stack_lvl+0x73/0xb0
[   14.041512]  print_report+0xd1/0x650
[   14.041536]  ? __virt_addr_valid+0x1db/0x2d0
[   14.041560]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.041581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.041602]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.041623]  kasan_report+0x141/0x180
[   14.041643]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.041668]  __asan_report_load4_noabort+0x18/0x20
[   14.041692]  kasan_atomics_helper+0x4bbc/0x5450
[   14.041713]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.041734]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.041758]  ? trace_hardirqs_on+0x37/0xe0
[   14.041781]  ? kasan_atomics+0x152/0x310
[   14.041806]  kasan_atomics+0x1dc/0x310
[   14.041828]  ? __pfx_kasan_atomics+0x10/0x10
[   14.041851]  ? __pfx_kasan_atomics+0x10/0x10
[   14.041878]  kunit_try_run_case+0x1a5/0x480
[   14.041904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.041925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.041949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.041971]  ? __kthread_parkme+0x82/0x180
[   14.041992]  ? preempt_count_sub+0x50/0x80
[   14.042016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.042050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.042072]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.042094]  kthread+0x337/0x6f0
[   14.042113]  ? trace_preempt_on+0x20/0xc0
[   14.042134]  ? __pfx_kthread+0x10/0x10
[   14.042154]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.042175]  ? calculate_sigpending+0x7b/0xa0
[   14.042200]  ? __pfx_kthread+0x10/0x10
[   14.042221]  ret_from_fork+0x116/0x1d0
[   14.042240]  ? __pfx_kthread+0x10/0x10
[   14.042260]  ret_from_fork_asm+0x1a/0x30
[   14.042290]  </TASK>
[   14.042302] 
[   14.058589] Allocated by task 282:
[   14.059172]  kasan_save_stack+0x45/0x70
[   14.059552]  kasan_save_track+0x18/0x40
[   14.060088]  kasan_save_alloc_info+0x3b/0x50
[   14.060648]  __kasan_kmalloc+0xb7/0xc0
[   14.061149]  __kmalloc_cache_noprof+0x189/0x420
[   14.061356]  kasan_atomics+0x95/0x310
[   14.061495]  kunit_try_run_case+0x1a5/0x480
[   14.061715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.062430]  kthread+0x337/0x6f0
[   14.062859]  ret_from_fork+0x116/0x1d0
[   14.063328]  ret_from_fork_asm+0x1a/0x30
[   14.063792] 
[   14.063973] The buggy address belongs to the object at ffff8881033c5500
[   14.063973]  which belongs to the cache kmalloc-64 of size 64
[   14.065205] The buggy address is located 0 bytes to the right of
[   14.065205]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.065578] 
[   14.065680] The buggy address belongs to the physical page:
[   14.066604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.067395] flags: 0x200000000000000(node=0|zone=2)
[   14.067939] page_type: f5(slab)
[   14.068391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.069193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.069981] page dumped because: kasan: bad access detected
[   14.070467] 
[   14.070557] Memory state around the buggy address:
[   14.071042]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.071390]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.071612] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.072328]                                      ^
[   14.072854]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.073476]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.074200] ==================================================================
[   14.847147] ==================================================================
[   14.847514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.847868] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.848287] 
[   14.848409] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.848464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.848478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.848501] Call Trace:
[   14.848532]  <TASK>
[   14.848552]  dump_stack_lvl+0x73/0xb0
[   14.848582]  print_report+0xd1/0x650
[   14.848607]  ? __virt_addr_valid+0x1db/0x2d0
[   14.848646]  ? kasan_atomics_helper+0x151d/0x5450
[   14.848668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.848713]  ? kasan_atomics_helper+0x151d/0x5450
[   14.848737]  kasan_report+0x141/0x180
[   14.848762]  ? kasan_atomics_helper+0x151d/0x5450
[   14.848789]  kasan_check_range+0x10c/0x1c0
[   14.848814]  __kasan_check_write+0x18/0x20
[   14.848835]  kasan_atomics_helper+0x151d/0x5450
[   14.848859]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.848883]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.848908]  ? trace_hardirqs_on+0x37/0xe0
[   14.848932]  ? kasan_atomics+0x152/0x310
[   14.848959]  kasan_atomics+0x1dc/0x310
[   14.848990]  ? __pfx_kasan_atomics+0x10/0x10
[   14.849014]  ? __pfx_kasan_atomics+0x10/0x10
[   14.849057]  kunit_try_run_case+0x1a5/0x480
[   14.849082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.849105]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.849130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.849154]  ? __kthread_parkme+0x82/0x180
[   14.849175]  ? preempt_count_sub+0x50/0x80
[   14.849200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.849223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.849247]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.849271]  kthread+0x337/0x6f0
[   14.849291]  ? trace_preempt_on+0x20/0xc0
[   14.849322]  ? __pfx_kthread+0x10/0x10
[   14.849343]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.849365]  ? calculate_sigpending+0x7b/0xa0
[   14.849400]  ? __pfx_kthread+0x10/0x10
[   14.849422]  ret_from_fork+0x116/0x1d0
[   14.849442]  ? __pfx_kthread+0x10/0x10
[   14.849472]  ret_from_fork_asm+0x1a/0x30
[   14.849504]  </TASK>
[   14.849516] 
[   14.857076] Allocated by task 282:
[   14.857259]  kasan_save_stack+0x45/0x70
[   14.857457]  kasan_save_track+0x18/0x40
[   14.857649]  kasan_save_alloc_info+0x3b/0x50
[   14.857820]  __kasan_kmalloc+0xb7/0xc0
[   14.858028]  __kmalloc_cache_noprof+0x189/0x420
[   14.858187]  kasan_atomics+0x95/0x310
[   14.858368]  kunit_try_run_case+0x1a5/0x480
[   14.858607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.858871]  kthread+0x337/0x6f0
[   14.859047]  ret_from_fork+0x116/0x1d0
[   14.859218]  ret_from_fork_asm+0x1a/0x30
[   14.859422] 
[   14.859516] The buggy address belongs to the object at ffff8881033c5500
[   14.859516]  which belongs to the cache kmalloc-64 of size 64
[   14.860097] The buggy address is located 0 bytes to the right of
[   14.860097]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.860619] 
[   14.860712] The buggy address belongs to the physical page:
[   14.860946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.861289] flags: 0x200000000000000(node=0|zone=2)
[   14.861526] page_type: f5(slab)
[   14.861677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.862005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.862337] page dumped because: kasan: bad access detected
[   14.862582] 
[   14.862694] Memory state around the buggy address:
[   14.862880]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.863107]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.863323] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.863612]                                      ^
[   14.863857]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.864202]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.864457] ==================================================================
[   14.696344] ==================================================================
[   14.696647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.697380] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.697743] 
[   14.697869] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.697916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.697929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.697951] Call Trace:
[   14.697970]  <TASK>
[   14.697988]  dump_stack_lvl+0x73/0xb0
[   14.698032]  print_report+0xd1/0x650
[   14.698056]  ? __virt_addr_valid+0x1db/0x2d0
[   14.698082]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.698104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.698126]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.698149]  kasan_report+0x141/0x180
[   14.698171]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.698198]  __asan_report_load4_noabort+0x18/0x20
[   14.698223]  kasan_atomics_helper+0x49e8/0x5450
[   14.698247]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.698269]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.698295]  ? trace_hardirqs_on+0x37/0xe0
[   14.698318]  ? kasan_atomics+0x152/0x310
[   14.698345]  kasan_atomics+0x1dc/0x310
[   14.698368]  ? __pfx_kasan_atomics+0x10/0x10
[   14.698392]  ? __pfx_kasan_atomics+0x10/0x10
[   14.698419]  kunit_try_run_case+0x1a5/0x480
[   14.698444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.698466]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.698491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.698514]  ? __kthread_parkme+0x82/0x180
[   14.698535]  ? preempt_count_sub+0x50/0x80
[   14.698560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.698583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.698607]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.698631]  kthread+0x337/0x6f0
[   14.698662]  ? trace_preempt_on+0x20/0xc0
[   14.698684]  ? __pfx_kthread+0x10/0x10
[   14.698706]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.698728]  ? calculate_sigpending+0x7b/0xa0
[   14.698752]  ? __pfx_kthread+0x10/0x10
[   14.698774]  ret_from_fork+0x116/0x1d0
[   14.698795]  ? __pfx_kthread+0x10/0x10
[   14.698816]  ret_from_fork_asm+0x1a/0x30
[   14.698848]  </TASK>
[   14.698860] 
[   14.707315] Allocated by task 282:
[   14.707450]  kasan_save_stack+0x45/0x70
[   14.707599]  kasan_save_track+0x18/0x40
[   14.707776]  kasan_save_alloc_info+0x3b/0x50
[   14.707999]  __kasan_kmalloc+0xb7/0xc0
[   14.708198]  __kmalloc_cache_noprof+0x189/0x420
[   14.708418]  kasan_atomics+0x95/0x310
[   14.708603]  kunit_try_run_case+0x1a5/0x480
[   14.708797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.708973]  kthread+0x337/0x6f0
[   14.709585]  ret_from_fork+0x116/0x1d0
[   14.709809]  ret_from_fork_asm+0x1a/0x30
[   14.710009] 
[   14.710115] The buggy address belongs to the object at ffff8881033c5500
[   14.710115]  which belongs to the cache kmalloc-64 of size 64
[   14.710573] The buggy address is located 0 bytes to the right of
[   14.710573]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.711139] 
[   14.711216] The buggy address belongs to the physical page:
[   14.711438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.711817] flags: 0x200000000000000(node=0|zone=2)
[   14.712041] page_type: f5(slab)
[   14.712186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.712422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.712758] page dumped because: kasan: bad access detected
[   14.713030] 
[   14.713127] Memory state around the buggy address:
[   14.713309]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.713526]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.714105] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.714388]                                      ^
[   14.714600]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.714916]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.715150] ==================================================================
[   15.320042] ==================================================================
[   15.320607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.321044] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.321412] 
[   15.321509] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.321555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.321569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.321592] Call Trace:
[   15.321609]  <TASK>
[   15.321833]  dump_stack_lvl+0x73/0xb0
[   15.321872]  print_report+0xd1/0x650
[   15.321896]  ? __virt_addr_valid+0x1db/0x2d0
[   15.321922]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.321944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.321968]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.321991]  kasan_report+0x141/0x180
[   15.322013]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.322053]  __asan_report_load8_noabort+0x18/0x20
[   15.322079]  kasan_atomics_helper+0x4fa5/0x5450
[   15.322103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.322126]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.322152]  ? trace_hardirqs_on+0x37/0xe0
[   15.322175]  ? kasan_atomics+0x152/0x310
[   15.322203]  kasan_atomics+0x1dc/0x310
[   15.322226]  ? __pfx_kasan_atomics+0x10/0x10
[   15.322249]  ? __pfx_kasan_atomics+0x10/0x10
[   15.322277]  kunit_try_run_case+0x1a5/0x480
[   15.322302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.322325]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.322350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.322374]  ? __kthread_parkme+0x82/0x180
[   15.322396]  ? preempt_count_sub+0x50/0x80
[   15.322421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.322446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.322470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.322494]  kthread+0x337/0x6f0
[   15.322514]  ? trace_preempt_on+0x20/0xc0
[   15.322537]  ? __pfx_kthread+0x10/0x10
[   15.322558]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.322580]  ? calculate_sigpending+0x7b/0xa0
[   15.322603]  ? __pfx_kthread+0x10/0x10
[   15.322649]  ret_from_fork+0x116/0x1d0
[   15.322669]  ? __pfx_kthread+0x10/0x10
[   15.322690]  ret_from_fork_asm+0x1a/0x30
[   15.322721]  </TASK>
[   15.322734] 
[   15.332335] Allocated by task 282:
[   15.332524]  kasan_save_stack+0x45/0x70
[   15.332872]  kasan_save_track+0x18/0x40
[   15.333083]  kasan_save_alloc_info+0x3b/0x50
[   15.333283]  __kasan_kmalloc+0xb7/0xc0
[   15.333452]  __kmalloc_cache_noprof+0x189/0x420
[   15.333907]  kasan_atomics+0x95/0x310
[   15.334090]  kunit_try_run_case+0x1a5/0x480
[   15.334390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.334824]  kthread+0x337/0x6f0
[   15.334991]  ret_from_fork+0x116/0x1d0
[   15.335319]  ret_from_fork_asm+0x1a/0x30
[   15.335505] 
[   15.335585] The buggy address belongs to the object at ffff8881033c5500
[   15.335585]  which belongs to the cache kmalloc-64 of size 64
[   15.336265] The buggy address is located 0 bytes to the right of
[   15.336265]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.336939] 
[   15.337050] The buggy address belongs to the physical page:
[   15.337394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.337851] flags: 0x200000000000000(node=0|zone=2)
[   15.338165] page_type: f5(slab)
[   15.338338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.338789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.339181] page dumped because: kasan: bad access detected
[   15.339382] 
[   15.339553] Memory state around the buggy address:
[   15.339903]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.340238]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.340547] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.341013]                                      ^
[   15.341316]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.341580]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.342004] ==================================================================
[   15.061425] ==================================================================
[   15.062126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.062554] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.063004] 
[   15.063303] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.063354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.063367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.063390] Call Trace:
[   15.063407]  <TASK>
[   15.063424]  dump_stack_lvl+0x73/0xb0
[   15.063454]  print_report+0xd1/0x650
[   15.063478]  ? __virt_addr_valid+0x1db/0x2d0
[   15.063503]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.063525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.063547]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.063766]  kasan_report+0x141/0x180
[   15.063795]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.063823]  kasan_check_range+0x10c/0x1c0
[   15.063849]  __kasan_check_write+0x18/0x20
[   15.063869]  kasan_atomics_helper+0x1c18/0x5450
[   15.063893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.063915]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.063942]  ? trace_hardirqs_on+0x37/0xe0
[   15.063965]  ? kasan_atomics+0x152/0x310
[   15.063993]  kasan_atomics+0x1dc/0x310
[   15.064016]  ? __pfx_kasan_atomics+0x10/0x10
[   15.064052]  ? __pfx_kasan_atomics+0x10/0x10
[   15.064079]  kunit_try_run_case+0x1a5/0x480
[   15.064103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.064126]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.064155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.064179]  ? __kthread_parkme+0x82/0x180
[   15.064201]  ? preempt_count_sub+0x50/0x80
[   15.064225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.064249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.064272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.064296]  kthread+0x337/0x6f0
[   15.064317]  ? trace_preempt_on+0x20/0xc0
[   15.064339]  ? __pfx_kthread+0x10/0x10
[   15.064359]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.064382]  ? calculate_sigpending+0x7b/0xa0
[   15.064407]  ? __pfx_kthread+0x10/0x10
[   15.064429]  ret_from_fork+0x116/0x1d0
[   15.064448]  ? __pfx_kthread+0x10/0x10
[   15.064469]  ret_from_fork_asm+0x1a/0x30
[   15.064500]  </TASK>
[   15.064513] 
[   15.075007] Allocated by task 282:
[   15.075308]  kasan_save_stack+0x45/0x70
[   15.075479]  kasan_save_track+0x18/0x40
[   15.075681]  kasan_save_alloc_info+0x3b/0x50
[   15.076160]  __kasan_kmalloc+0xb7/0xc0
[   15.076480]  __kmalloc_cache_noprof+0x189/0x420
[   15.076705]  kasan_atomics+0x95/0x310
[   15.077070]  kunit_try_run_case+0x1a5/0x480
[   15.077274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.077627]  kthread+0x337/0x6f0
[   15.077776]  ret_from_fork+0x116/0x1d0
[   15.078097]  ret_from_fork_asm+0x1a/0x30
[   15.078390] 
[   15.078476] The buggy address belongs to the object at ffff8881033c5500
[   15.078476]  which belongs to the cache kmalloc-64 of size 64
[   15.079144] The buggy address is located 0 bytes to the right of
[   15.079144]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.079936] 
[   15.080039] The buggy address belongs to the physical page:
[   15.080302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.080800] flags: 0x200000000000000(node=0|zone=2)
[   15.081118] page_type: f5(slab)
[   15.081429] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.081795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.082193] page dumped because: kasan: bad access detected
[   15.082448] 
[   15.082528] Memory state around the buggy address:
[   15.082986]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.083302]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.083730] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.084122]                                      ^
[   15.084316]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.084787]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.085163] ==================================================================
[   14.075517] ==================================================================
[   14.076459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.077038] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.078070] 
[   14.078273] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.078320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.078333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.078365] Call Trace:
[   14.078378]  <TASK>
[   14.078396]  dump_stack_lvl+0x73/0xb0
[   14.078438]  print_report+0xd1/0x650
[   14.078461]  ? __virt_addr_valid+0x1db/0x2d0
[   14.078484]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.078505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.078526]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.078547]  kasan_report+0x141/0x180
[   14.078568]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.078592]  __asan_report_store4_noabort+0x1b/0x30
[   14.078613]  kasan_atomics_helper+0x4ba2/0x5450
[   14.078634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.078665]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.078690]  ? trace_hardirqs_on+0x37/0xe0
[   14.078711]  ? kasan_atomics+0x152/0x310
[   14.078737]  kasan_atomics+0x1dc/0x310
[   14.078760]  ? __pfx_kasan_atomics+0x10/0x10
[   14.078782]  ? __pfx_kasan_atomics+0x10/0x10
[   14.078808]  kunit_try_run_case+0x1a5/0x480
[   14.078831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.078853]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.078876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.078899]  ? __kthread_parkme+0x82/0x180
[   14.078919]  ? preempt_count_sub+0x50/0x80
[   14.078942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.078965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.078987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.079009]  kthread+0x337/0x6f0
[   14.079038]  ? trace_preempt_on+0x20/0xc0
[   14.079059]  ? __pfx_kthread+0x10/0x10
[   14.079079]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.079100]  ? calculate_sigpending+0x7b/0xa0
[   14.079123]  ? __pfx_kthread+0x10/0x10
[   14.079144]  ret_from_fork+0x116/0x1d0
[   14.079163]  ? __pfx_kthread+0x10/0x10
[   14.079182]  ret_from_fork_asm+0x1a/0x30
[   14.079212]  </TASK>
[   14.079224] 
[   14.092476] Allocated by task 282:
[   14.092917]  kasan_save_stack+0x45/0x70
[   14.093320]  kasan_save_track+0x18/0x40
[   14.093685]  kasan_save_alloc_info+0x3b/0x50
[   14.094174]  __kasan_kmalloc+0xb7/0xc0
[   14.094309]  __kmalloc_cache_noprof+0x189/0x420
[   14.094695]  kasan_atomics+0x95/0x310
[   14.095060]  kunit_try_run_case+0x1a5/0x480
[   14.095448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.095912]  kthread+0x337/0x6f0
[   14.096315]  ret_from_fork+0x116/0x1d0
[   14.096456]  ret_from_fork_asm+0x1a/0x30
[   14.096595] 
[   14.096785] The buggy address belongs to the object at ffff8881033c5500
[   14.096785]  which belongs to the cache kmalloc-64 of size 64
[   14.097902] The buggy address is located 0 bytes to the right of
[   14.097902]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.099157] 
[   14.099344] The buggy address belongs to the physical page:
[   14.099760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.100184] flags: 0x200000000000000(node=0|zone=2)
[   14.100354] page_type: f5(slab)
[   14.100475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.100724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.101162] page dumped because: kasan: bad access detected
[   14.101367] 
[   14.101461] Memory state around the buggy address:
[   14.101733]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.102036]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.102473] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.102770]                                      ^
[   14.103239]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.103535]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.103878] ==================================================================
[   14.201379] ==================================================================
[   14.202172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.202519] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.202867] 
[   14.203070] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.203119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.203133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.203156] Call Trace:
[   14.203175]  <TASK>
[   14.203194]  dump_stack_lvl+0x73/0xb0
[   14.203236]  print_report+0xd1/0x650
[   14.203261]  ? __virt_addr_valid+0x1db/0x2d0
[   14.203287]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.203321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.203344]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.203366]  kasan_report+0x141/0x180
[   14.203388]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.203414]  __asan_report_store4_noabort+0x1b/0x30
[   14.203444]  kasan_atomics_helper+0x4b3a/0x5450
[   14.203467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.203490]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.203526]  ? trace_hardirqs_on+0x37/0xe0
[   14.203549]  ? kasan_atomics+0x152/0x310
[   14.203577]  kasan_atomics+0x1dc/0x310
[   14.203600]  ? __pfx_kasan_atomics+0x10/0x10
[   14.203624]  ? __pfx_kasan_atomics+0x10/0x10
[   14.203671]  kunit_try_run_case+0x1a5/0x480
[   14.203696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.203718]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.203754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.203778]  ? __kthread_parkme+0x82/0x180
[   14.203799]  ? preempt_count_sub+0x50/0x80
[   14.203823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.203847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.203871]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.203894]  kthread+0x337/0x6f0
[   14.203914]  ? trace_preempt_on+0x20/0xc0
[   14.203936]  ? __pfx_kthread+0x10/0x10
[   14.203957]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.203978]  ? calculate_sigpending+0x7b/0xa0
[   14.204003]  ? __pfx_kthread+0x10/0x10
[   14.204033]  ret_from_fork+0x116/0x1d0
[   14.204053]  ? __pfx_kthread+0x10/0x10
[   14.204074]  ret_from_fork_asm+0x1a/0x30
[   14.204107]  </TASK>
[   14.204119] 
[   14.211462] Allocated by task 282:
[   14.211660]  kasan_save_stack+0x45/0x70
[   14.211861]  kasan_save_track+0x18/0x40
[   14.212102]  kasan_save_alloc_info+0x3b/0x50
[   14.212311]  __kasan_kmalloc+0xb7/0xc0
[   14.212447]  __kmalloc_cache_noprof+0x189/0x420
[   14.212604]  kasan_atomics+0x95/0x310
[   14.212973]  kunit_try_run_case+0x1a5/0x480
[   14.213191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.213517]  kthread+0x337/0x6f0
[   14.213770]  ret_from_fork+0x116/0x1d0
[   14.213940]  ret_from_fork_asm+0x1a/0x30
[   14.214093] 
[   14.214191] The buggy address belongs to the object at ffff8881033c5500
[   14.214191]  which belongs to the cache kmalloc-64 of size 64
[   14.214768] The buggy address is located 0 bytes to the right of
[   14.214768]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.215284] 
[   14.215395] The buggy address belongs to the physical page:
[   14.215580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.215982] flags: 0x200000000000000(node=0|zone=2)
[   14.216192] page_type: f5(slab)
[   14.216314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.216627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.217002] page dumped because: kasan: bad access detected
[   14.217246] 
[   14.217344] Memory state around the buggy address:
[   14.217576]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.217906]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.218219] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.218508]                                      ^
[   14.218769]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.218988]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.219321] ==================================================================
[   14.295532] ==================================================================
[   14.296212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.296459] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.296715] 
[   14.296923] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.296968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.296981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.297004] Call Trace:
[   14.297035]  <TASK>
[   14.297054]  dump_stack_lvl+0x73/0xb0
[   14.297083]  print_report+0xd1/0x650
[   14.297108]  ? __virt_addr_valid+0x1db/0x2d0
[   14.297133]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.297166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.297189]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.297213]  kasan_report+0x141/0x180
[   14.297248]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.297274]  kasan_check_range+0x10c/0x1c0
[   14.297299]  __kasan_check_write+0x18/0x20
[   14.297319]  kasan_atomics_helper+0x7c7/0x5450
[   14.297342]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.297365]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.297391]  ? trace_hardirqs_on+0x37/0xe0
[   14.297415]  ? kasan_atomics+0x152/0x310
[   14.297442]  kasan_atomics+0x1dc/0x310
[   14.297466]  ? __pfx_kasan_atomics+0x10/0x10
[   14.297490]  ? __pfx_kasan_atomics+0x10/0x10
[   14.297517]  kunit_try_run_case+0x1a5/0x480
[   14.297542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.297565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.297591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.297613]  ? __kthread_parkme+0x82/0x180
[   14.297635]  ? preempt_count_sub+0x50/0x80
[   14.297660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.297683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.297707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.297740]  kthread+0x337/0x6f0
[   14.297759]  ? trace_preempt_on+0x20/0xc0
[   14.297782]  ? __pfx_kthread+0x10/0x10
[   14.297813]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.297835]  ? calculate_sigpending+0x7b/0xa0
[   14.297859]  ? __pfx_kthread+0x10/0x10
[   14.297881]  ret_from_fork+0x116/0x1d0
[   14.297900]  ? __pfx_kthread+0x10/0x10
[   14.297921]  ret_from_fork_asm+0x1a/0x30
[   14.297952]  </TASK>
[   14.297965] 
[   14.305268] Allocated by task 282:
[   14.305495]  kasan_save_stack+0x45/0x70
[   14.305758]  kasan_save_track+0x18/0x40
[   14.305974]  kasan_save_alloc_info+0x3b/0x50
[   14.306205]  __kasan_kmalloc+0xb7/0xc0
[   14.306412]  __kmalloc_cache_noprof+0x189/0x420
[   14.306707]  kasan_atomics+0x95/0x310
[   14.306902]  kunit_try_run_case+0x1a5/0x480
[   14.307109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.307406]  kthread+0x337/0x6f0
[   14.307600]  ret_from_fork+0x116/0x1d0
[   14.307838]  ret_from_fork_asm+0x1a/0x30
[   14.307976] 
[   14.308065] The buggy address belongs to the object at ffff8881033c5500
[   14.308065]  which belongs to the cache kmalloc-64 of size 64
[   14.308771] The buggy address is located 0 bytes to the right of
[   14.308771]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.309298] 
[   14.309400] The buggy address belongs to the physical page:
[   14.309761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.310123] flags: 0x200000000000000(node=0|zone=2)
[   14.310403] page_type: f5(slab)
[   14.310571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.311012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.311360] page dumped because: kasan: bad access detected
[   14.311615] 
[   14.311785] Memory state around the buggy address:
[   14.312014]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.312360]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.312693] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.312971]                                      ^
[   14.313247]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.313609]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.313906] ==================================================================
[   14.433531] ==================================================================
[   14.433900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.434401] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.434862] 
[   14.435095] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.435142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.435168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.435190] Call Trace:
[   14.435211]  <TASK>
[   14.435230]  dump_stack_lvl+0x73/0xb0
[   14.435271]  print_report+0xd1/0x650
[   14.435295]  ? __virt_addr_valid+0x1db/0x2d0
[   14.435320]  ? kasan_atomics_helper+0xc70/0x5450
[   14.435341]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.435364]  ? kasan_atomics_helper+0xc70/0x5450
[   14.435388]  kasan_report+0x141/0x180
[   14.435410]  ? kasan_atomics_helper+0xc70/0x5450
[   14.435436]  kasan_check_range+0x10c/0x1c0
[   14.435460]  __kasan_check_write+0x18/0x20
[   14.435479]  kasan_atomics_helper+0xc70/0x5450
[   14.435502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.435525]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.435550]  ? trace_hardirqs_on+0x37/0xe0
[   14.435573]  ? kasan_atomics+0x152/0x310
[   14.435600]  kasan_atomics+0x1dc/0x310
[   14.435623]  ? __pfx_kasan_atomics+0x10/0x10
[   14.435647]  ? __pfx_kasan_atomics+0x10/0x10
[   14.435674]  kunit_try_run_case+0x1a5/0x480
[   14.435699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.435721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.435745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.435769]  ? __kthread_parkme+0x82/0x180
[   14.435790]  ? preempt_count_sub+0x50/0x80
[   14.435814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.435838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.435862]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.435885]  kthread+0x337/0x6f0
[   14.435907]  ? trace_preempt_on+0x20/0xc0
[   14.435929]  ? __pfx_kthread+0x10/0x10
[   14.435950]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.435971]  ? calculate_sigpending+0x7b/0xa0
[   14.435995]  ? __pfx_kthread+0x10/0x10
[   14.436018]  ret_from_fork+0x116/0x1d0
[   14.436046]  ? __pfx_kthread+0x10/0x10
[   14.436068]  ret_from_fork_asm+0x1a/0x30
[   14.436099]  </TASK>
[   14.436112] 
[   14.443727] Allocated by task 282:
[   14.443896]  kasan_save_stack+0x45/0x70
[   14.444052]  kasan_save_track+0x18/0x40
[   14.444196]  kasan_save_alloc_info+0x3b/0x50
[   14.444547]  __kasan_kmalloc+0xb7/0xc0
[   14.444850]  __kmalloc_cache_noprof+0x189/0x420
[   14.445109]  kasan_atomics+0x95/0x310
[   14.445270]  kunit_try_run_case+0x1a5/0x480
[   14.445458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.445717]  kthread+0x337/0x6f0
[   14.445882]  ret_from_fork+0x116/0x1d0
[   14.446015]  ret_from_fork_asm+0x1a/0x30
[   14.446226] 
[   14.446322] The buggy address belongs to the object at ffff8881033c5500
[   14.446322]  which belongs to the cache kmalloc-64 of size 64
[   14.446848] The buggy address is located 0 bytes to the right of
[   14.446848]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.447372] 
[   14.447470] The buggy address belongs to the physical page:
[   14.447733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.448082] flags: 0x200000000000000(node=0|zone=2)
[   14.448320] page_type: f5(slab)
[   14.448477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.448810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.449051] page dumped because: kasan: bad access detected
[   14.449224] 
[   14.449293] Memory state around the buggy address:
[   14.449448]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.449770]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.450094] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.450670]                                      ^
[   14.450827]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.451059]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.451282] ==================================================================
[   14.219887] ==================================================================
[   14.220438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.220824] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.221169] 
[   14.221289] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.221335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.221360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.221382] Call Trace:
[   14.221397]  <TASK>
[   14.221413]  dump_stack_lvl+0x73/0xb0
[   14.221442]  print_report+0xd1/0x650
[   14.221465]  ? __virt_addr_valid+0x1db/0x2d0
[   14.221499]  ? kasan_atomics_helper+0x565/0x5450
[   14.221521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.221545]  ? kasan_atomics_helper+0x565/0x5450
[   14.221578]  kasan_report+0x141/0x180
[   14.221602]  ? kasan_atomics_helper+0x565/0x5450
[   14.221628]  kasan_check_range+0x10c/0x1c0
[   14.221665]  __kasan_check_write+0x18/0x20
[   14.221685]  kasan_atomics_helper+0x565/0x5450
[   14.221709]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.221734]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.221760]  ? trace_hardirqs_on+0x37/0xe0
[   14.221785]  ? kasan_atomics+0x152/0x310
[   14.221812]  kasan_atomics+0x1dc/0x310
[   14.221836]  ? __pfx_kasan_atomics+0x10/0x10
[   14.221860]  ? __pfx_kasan_atomics+0x10/0x10
[   14.221886]  kunit_try_run_case+0x1a5/0x480
[   14.221911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.221933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.221959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.221982]  ? __kthread_parkme+0x82/0x180
[   14.222003]  ? preempt_count_sub+0x50/0x80
[   14.222037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.222061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.222094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.222118]  kthread+0x337/0x6f0
[   14.222138]  ? trace_preempt_on+0x20/0xc0
[   14.222170]  ? __pfx_kthread+0x10/0x10
[   14.222192]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.222215]  ? calculate_sigpending+0x7b/0xa0
[   14.222238]  ? __pfx_kthread+0x10/0x10
[   14.222261]  ret_from_fork+0x116/0x1d0
[   14.222280]  ? __pfx_kthread+0x10/0x10
[   14.222301]  ret_from_fork_asm+0x1a/0x30
[   14.222332]  </TASK>
[   14.222346] 
[   14.230088] Allocated by task 282:
[   14.230302]  kasan_save_stack+0x45/0x70
[   14.230512]  kasan_save_track+0x18/0x40
[   14.230699]  kasan_save_alloc_info+0x3b/0x50
[   14.230948]  __kasan_kmalloc+0xb7/0xc0
[   14.231129]  __kmalloc_cache_noprof+0x189/0x420
[   14.231352]  kasan_atomics+0x95/0x310
[   14.231542]  kunit_try_run_case+0x1a5/0x480
[   14.231741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.232003]  kthread+0x337/0x6f0
[   14.232138]  ret_from_fork+0x116/0x1d0
[   14.232276]  ret_from_fork_asm+0x1a/0x30
[   14.232496] 
[   14.232591] The buggy address belongs to the object at ffff8881033c5500
[   14.232591]  which belongs to the cache kmalloc-64 of size 64
[   14.233010] The buggy address is located 0 bytes to the right of
[   14.233010]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.233546] 
[   14.233664] The buggy address belongs to the physical page:
[   14.233902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.234244] flags: 0x200000000000000(node=0|zone=2)
[   14.234427] page_type: f5(slab)
[   14.234551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.234784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.235012] page dumped because: kasan: bad access detected
[   14.235333] 
[   14.235466] Memory state around the buggy address:
[   14.235749]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.236077]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.236353] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.236568]                                      ^
[   14.236938]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.237288]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.237630] ==================================================================
[   15.151396] ==================================================================
[   15.151708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.151986] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.152392] 
[   15.152510] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.152877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.152891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.152914] Call Trace:
[   15.152931]  <TASK>
[   15.152947]  dump_stack_lvl+0x73/0xb0
[   15.152977]  print_report+0xd1/0x650
[   15.153000]  ? __virt_addr_valid+0x1db/0x2d0
[   15.153036]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.153058]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.153081]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.153104]  kasan_report+0x141/0x180
[   15.153126]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.153153]  kasan_check_range+0x10c/0x1c0
[   15.153178]  __kasan_check_write+0x18/0x20
[   15.153197]  kasan_atomics_helper+0x1e12/0x5450
[   15.153221]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.153266]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.153291]  ? trace_hardirqs_on+0x37/0xe0
[   15.153314]  ? kasan_atomics+0x152/0x310
[   15.153341]  kasan_atomics+0x1dc/0x310
[   15.153365]  ? __pfx_kasan_atomics+0x10/0x10
[   15.153389]  ? __pfx_kasan_atomics+0x10/0x10
[   15.153416]  kunit_try_run_case+0x1a5/0x480
[   15.153440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.153462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.153508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.153532]  ? __kthread_parkme+0x82/0x180
[   15.153553]  ? preempt_count_sub+0x50/0x80
[   15.153577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.153601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.153624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.153658]  kthread+0x337/0x6f0
[   15.153679]  ? trace_preempt_on+0x20/0xc0
[   15.153701]  ? __pfx_kthread+0x10/0x10
[   15.153722]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.153744]  ? calculate_sigpending+0x7b/0xa0
[   15.153768]  ? __pfx_kthread+0x10/0x10
[   15.153790]  ret_from_fork+0x116/0x1d0
[   15.153809]  ? __pfx_kthread+0x10/0x10
[   15.153830]  ret_from_fork_asm+0x1a/0x30
[   15.153861]  </TASK>
[   15.153873] 
[   15.162346] Allocated by task 282:
[   15.162562]  kasan_save_stack+0x45/0x70
[   15.162770]  kasan_save_track+0x18/0x40
[   15.163135]  kasan_save_alloc_info+0x3b/0x50
[   15.163372]  __kasan_kmalloc+0xb7/0xc0
[   15.163507]  __kmalloc_cache_noprof+0x189/0x420
[   15.163664]  kasan_atomics+0x95/0x310
[   15.163798]  kunit_try_run_case+0x1a5/0x480
[   15.164001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.164275]  kthread+0x337/0x6f0
[   15.164449]  ret_from_fork+0x116/0x1d0
[   15.164637]  ret_from_fork_asm+0x1a/0x30
[   15.165013] 
[   15.165102] The buggy address belongs to the object at ffff8881033c5500
[   15.165102]  which belongs to the cache kmalloc-64 of size 64
[   15.165542] The buggy address is located 0 bytes to the right of
[   15.165542]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.166071] 
[   15.166206] The buggy address belongs to the physical page:
[   15.166465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.166869] flags: 0x200000000000000(node=0|zone=2)
[   15.167144] page_type: f5(slab)
[   15.167267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.167491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.167755] page dumped because: kasan: bad access detected
[   15.168077] 
[   15.168207] Memory state around the buggy address:
[   15.168557]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.169089]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.169393] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.169703]                                      ^
[   15.169895]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.170240]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.170448] ==================================================================
[   14.355184] ==================================================================
[   14.355521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.356031] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.356265] 
[   14.356353] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.356396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.356410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.356464] Call Trace:
[   14.356484]  <TASK>
[   14.356517]  dump_stack_lvl+0x73/0xb0
[   14.356592]  print_report+0xd1/0x650
[   14.356617]  ? __virt_addr_valid+0x1db/0x2d0
[   14.356661]  ? kasan_atomics_helper+0x992/0x5450
[   14.356709]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.356732]  ? kasan_atomics_helper+0x992/0x5450
[   14.356753]  kasan_report+0x141/0x180
[   14.356788]  ? kasan_atomics_helper+0x992/0x5450
[   14.356814]  kasan_check_range+0x10c/0x1c0
[   14.356838]  __kasan_check_write+0x18/0x20
[   14.356858]  kasan_atomics_helper+0x992/0x5450
[   14.356881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.356904]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.356929]  ? trace_hardirqs_on+0x37/0xe0
[   14.356976]  ? kasan_atomics+0x152/0x310
[   14.357002]  kasan_atomics+0x1dc/0x310
[   14.357042]  ? __pfx_kasan_atomics+0x10/0x10
[   14.357066]  ? __pfx_kasan_atomics+0x10/0x10
[   14.357093]  kunit_try_run_case+0x1a5/0x480
[   14.357143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.357166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.357191]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.357225]  ? __kthread_parkme+0x82/0x180
[   14.357247]  ? preempt_count_sub+0x50/0x80
[   14.357297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.357321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.357346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.357380]  kthread+0x337/0x6f0
[   14.357417]  ? trace_preempt_on+0x20/0xc0
[   14.357449]  ? __pfx_kthread+0x10/0x10
[   14.357471]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.357492]  ? calculate_sigpending+0x7b/0xa0
[   14.357528]  ? __pfx_kthread+0x10/0x10
[   14.357575]  ret_from_fork+0x116/0x1d0
[   14.357595]  ? __pfx_kthread+0x10/0x10
[   14.357616]  ret_from_fork_asm+0x1a/0x30
[   14.357658]  </TASK>
[   14.357670] 
[   14.365707] Allocated by task 282:
[   14.365945]  kasan_save_stack+0x45/0x70
[   14.366351]  kasan_save_track+0x18/0x40
[   14.366629]  kasan_save_alloc_info+0x3b/0x50
[   14.366897]  __kasan_kmalloc+0xb7/0xc0
[   14.367044]  __kmalloc_cache_noprof+0x189/0x420
[   14.367198]  kasan_atomics+0x95/0x310
[   14.367430]  kunit_try_run_case+0x1a5/0x480
[   14.367712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.367962]  kthread+0x337/0x6f0
[   14.368150]  ret_from_fork+0x116/0x1d0
[   14.368373]  ret_from_fork_asm+0x1a/0x30
[   14.368575] 
[   14.368719] The buggy address belongs to the object at ffff8881033c5500
[   14.368719]  which belongs to the cache kmalloc-64 of size 64
[   14.369240] The buggy address is located 0 bytes to the right of
[   14.369240]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.369845] 
[   14.369950] The buggy address belongs to the physical page:
[   14.370215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.370612] flags: 0x200000000000000(node=0|zone=2)
[   14.370895] page_type: f5(slab)
[   14.371083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.371465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.371825] page dumped because: kasan: bad access detected
[   14.372132] 
[   14.372230] Memory state around the buggy address:
[   14.372453]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.372765]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.373115] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.373322]                                      ^
[   14.373470]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.374101]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.374419] ==================================================================
[   14.964445] ==================================================================
[   14.964833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.965176] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.965497] 
[   14.965618] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.965664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.965678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.965700] Call Trace:
[   14.965718]  <TASK>
[   14.965747]  dump_stack_lvl+0x73/0xb0
[   14.965776]  print_report+0xd1/0x650
[   14.965811]  ? __virt_addr_valid+0x1db/0x2d0
[   14.965836]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.965858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.965881]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.965911]  kasan_report+0x141/0x180
[   14.965934]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.965960]  kasan_check_range+0x10c/0x1c0
[   14.965995]  __kasan_check_write+0x18/0x20
[   14.966015]  kasan_atomics_helper+0x18b1/0x5450
[   14.966047]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.966070]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.966095]  ? trace_hardirqs_on+0x37/0xe0
[   14.966117]  ? kasan_atomics+0x152/0x310
[   14.966145]  kasan_atomics+0x1dc/0x310
[   14.966168]  ? __pfx_kasan_atomics+0x10/0x10
[   14.966191]  ? __pfx_kasan_atomics+0x10/0x10
[   14.966219]  kunit_try_run_case+0x1a5/0x480
[   14.966244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.966266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.966292]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.966325]  ? __kthread_parkme+0x82/0x180
[   14.966348]  ? preempt_count_sub+0x50/0x80
[   14.966383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.966407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.966431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.966454]  kthread+0x337/0x6f0
[   14.966475]  ? trace_preempt_on+0x20/0xc0
[   14.966499]  ? __pfx_kthread+0x10/0x10
[   14.966520]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.966542]  ? calculate_sigpending+0x7b/0xa0
[   14.966567]  ? __pfx_kthread+0x10/0x10
[   14.966589]  ret_from_fork+0x116/0x1d0
[   14.966609]  ? __pfx_kthread+0x10/0x10
[   14.966630]  ret_from_fork_asm+0x1a/0x30
[   14.966675]  </TASK>
[   14.966687] 
[   14.974298] Allocated by task 282:
[   14.974445]  kasan_save_stack+0x45/0x70
[   14.974592]  kasan_save_track+0x18/0x40
[   14.974728]  kasan_save_alloc_info+0x3b/0x50
[   14.974876]  __kasan_kmalloc+0xb7/0xc0
[   14.975087]  __kmalloc_cache_noprof+0x189/0x420
[   14.975311]  kasan_atomics+0x95/0x310
[   14.975497]  kunit_try_run_case+0x1a5/0x480
[   14.975706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.976087]  kthread+0x337/0x6f0
[   14.976214]  ret_from_fork+0x116/0x1d0
[   14.976346]  ret_from_fork_asm+0x1a/0x30
[   14.976495] 
[   14.976591] The buggy address belongs to the object at ffff8881033c5500
[   14.976591]  which belongs to the cache kmalloc-64 of size 64
[   14.977546] The buggy address is located 0 bytes to the right of
[   14.977546]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.977971] 
[   14.978057] The buggy address belongs to the physical page:
[   14.978231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.978602] flags: 0x200000000000000(node=0|zone=2)
[   14.979112] page_type: f5(slab)
[   14.979281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.979571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.980065] page dumped because: kasan: bad access detected
[   14.980243] 
[   14.980314] Memory state around the buggy address:
[   14.980470]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.980849]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.981179] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.981520]                                      ^
[   14.981915]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.982238]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.982525] ==================================================================
[   15.039874] ==================================================================
[   15.040240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.040475] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.041016] 
[   15.041122] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.041167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.041180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.041203] Call Trace:
[   15.041220]  <TASK>
[   15.041238]  dump_stack_lvl+0x73/0xb0
[   15.041266]  print_report+0xd1/0x650
[   15.041290]  ? __virt_addr_valid+0x1db/0x2d0
[   15.041314]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.041336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.041359]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.041382]  kasan_report+0x141/0x180
[   15.041404]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.041430]  kasan_check_range+0x10c/0x1c0
[   15.041454]  __kasan_check_write+0x18/0x20
[   15.041474]  kasan_atomics_helper+0x1b22/0x5450
[   15.041498]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.041520]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.041546]  ? trace_hardirqs_on+0x37/0xe0
[   15.041570]  ? kasan_atomics+0x152/0x310
[   15.041597]  kasan_atomics+0x1dc/0x310
[   15.041620]  ? __pfx_kasan_atomics+0x10/0x10
[   15.041644]  ? __pfx_kasan_atomics+0x10/0x10
[   15.041697]  kunit_try_run_case+0x1a5/0x480
[   15.041728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.041763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.041789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.041812]  ? __kthread_parkme+0x82/0x180
[   15.041834]  ? preempt_count_sub+0x50/0x80
[   15.041859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.041883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.041907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.041941]  kthread+0x337/0x6f0
[   15.041962]  ? trace_preempt_on+0x20/0xc0
[   15.041985]  ? __pfx_kthread+0x10/0x10
[   15.042016]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.042048]  ? calculate_sigpending+0x7b/0xa0
[   15.042073]  ? __pfx_kthread+0x10/0x10
[   15.042095]  ret_from_fork+0x116/0x1d0
[   15.042114]  ? __pfx_kthread+0x10/0x10
[   15.042135]  ret_from_fork_asm+0x1a/0x30
[   15.042166]  </TASK>
[   15.042178] 
[   15.050256] Allocated by task 282:
[   15.050459]  kasan_save_stack+0x45/0x70
[   15.050724]  kasan_save_track+0x18/0x40
[   15.050906]  kasan_save_alloc_info+0x3b/0x50
[   15.051079]  __kasan_kmalloc+0xb7/0xc0
[   15.051214]  __kmalloc_cache_noprof+0x189/0x420
[   15.051371]  kasan_atomics+0x95/0x310
[   15.051505]  kunit_try_run_case+0x1a5/0x480
[   15.051774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.052044]  kthread+0x337/0x6f0
[   15.052381]  ret_from_fork+0x116/0x1d0
[   15.052601]  ret_from_fork_asm+0x1a/0x30
[   15.052873] 
[   15.052945] The buggy address belongs to the object at ffff8881033c5500
[   15.052945]  which belongs to the cache kmalloc-64 of size 64
[   15.053595] The buggy address is located 0 bytes to the right of
[   15.053595]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.054104] 
[   15.054177] The buggy address belongs to the physical page:
[   15.054350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.054697] flags: 0x200000000000000(node=0|zone=2)
[   15.054964] page_type: f5(slab)
[   15.055162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.055505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.056317] page dumped because: kasan: bad access detected
[   15.057029] 
[   15.057219] Memory state around the buggy address:
[   15.057410]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.058592]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.058923] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.059378]                                      ^
[   15.059784]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060096]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060485] ==================================================================
[   14.180074] ==================================================================
[   14.180434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.181006] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.181247] 
[   14.181335] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.181378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.181390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.181413] Call Trace:
[   14.181431]  <TASK>
[   14.181450]  dump_stack_lvl+0x73/0xb0
[   14.181478]  print_report+0xd1/0x650
[   14.181501]  ? __virt_addr_valid+0x1db/0x2d0
[   14.181525]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.181547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.181570]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.181592]  kasan_report+0x141/0x180
[   14.181615]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.181641]  kasan_check_range+0x10c/0x1c0
[   14.181665]  __kasan_check_write+0x18/0x20
[   14.181684]  kasan_atomics_helper+0x4a0/0x5450
[   14.181708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.181731]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.181756]  ? trace_hardirqs_on+0x37/0xe0
[   14.181778]  ? kasan_atomics+0x152/0x310
[   14.181805]  kasan_atomics+0x1dc/0x310
[   14.181828]  ? __pfx_kasan_atomics+0x10/0x10
[   14.181852]  ? __pfx_kasan_atomics+0x10/0x10
[   14.181880]  kunit_try_run_case+0x1a5/0x480
[   14.181925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.181948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.181973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.182008]  ? __kthread_parkme+0x82/0x180
[   14.182039]  ? preempt_count_sub+0x50/0x80
[   14.182063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.182087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.182110]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.182133]  kthread+0x337/0x6f0
[   14.182154]  ? trace_preempt_on+0x20/0xc0
[   14.182176]  ? __pfx_kthread+0x10/0x10
[   14.182198]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.182219]  ? calculate_sigpending+0x7b/0xa0
[   14.182243]  ? __pfx_kthread+0x10/0x10
[   14.182265]  ret_from_fork+0x116/0x1d0
[   14.182285]  ? __pfx_kthread+0x10/0x10
[   14.182305]  ret_from_fork_asm+0x1a/0x30
[   14.182337]  </TASK>
[   14.182350] 
[   14.190552] Allocated by task 282:
[   14.190779]  kasan_save_stack+0x45/0x70
[   14.190980]  kasan_save_track+0x18/0x40
[   14.191187]  kasan_save_alloc_info+0x3b/0x50
[   14.191358]  __kasan_kmalloc+0xb7/0xc0
[   14.191494]  __kmalloc_cache_noprof+0x189/0x420
[   14.191842]  kasan_atomics+0x95/0x310
[   14.192043]  kunit_try_run_case+0x1a5/0x480
[   14.192194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.192400]  kthread+0x337/0x6f0
[   14.192599]  ret_from_fork+0x116/0x1d0
[   14.192994]  ret_from_fork_asm+0x1a/0x30
[   14.193324] 
[   14.193403] The buggy address belongs to the object at ffff8881033c5500
[   14.193403]  which belongs to the cache kmalloc-64 of size 64
[   14.195788] The buggy address is located 0 bytes to the right of
[   14.195788]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.196267] 
[   14.196374] The buggy address belongs to the physical page:
[   14.196661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.196935] flags: 0x200000000000000(node=0|zone=2)
[   14.197215] page_type: f5(slab)
[   14.197385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.197716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.198054] page dumped because: kasan: bad access detected
[   14.198318] 
[   14.198410] Memory state around the buggy address:
[   14.198630]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.198948]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.199279] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.199592]                                      ^
[   14.199823]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.200136]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.200456] ==================================================================
[   14.715807] ==================================================================
[   14.716392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.716720] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.717012] 
[   14.717115] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.717160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.717173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.717195] Call Trace:
[   14.717212]  <TASK>
[   14.717229]  dump_stack_lvl+0x73/0xb0
[   14.717257]  print_report+0xd1/0x650
[   14.717281]  ? __virt_addr_valid+0x1db/0x2d0
[   14.717305]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.717327]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.717349]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.717371]  kasan_report+0x141/0x180
[   14.717394]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.717421]  kasan_check_range+0x10c/0x1c0
[   14.717444]  __kasan_check_write+0x18/0x20
[   14.717464]  kasan_atomics_helper+0x12e6/0x5450
[   14.717487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.717509]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.717536]  ? trace_hardirqs_on+0x37/0xe0
[   14.717558]  ? kasan_atomics+0x152/0x310
[   14.717585]  kasan_atomics+0x1dc/0x310
[   14.717608]  ? __pfx_kasan_atomics+0x10/0x10
[   14.717631]  ? __pfx_kasan_atomics+0x10/0x10
[   14.717658]  kunit_try_run_case+0x1a5/0x480
[   14.717682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.717708]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.717734]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.717758]  ? __kthread_parkme+0x82/0x180
[   14.717780]  ? preempt_count_sub+0x50/0x80
[   14.717804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.717828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.717852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.717876]  kthread+0x337/0x6f0
[   14.717895]  ? trace_preempt_on+0x20/0xc0
[   14.717918]  ? __pfx_kthread+0x10/0x10
[   14.717939]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.717961]  ? calculate_sigpending+0x7b/0xa0
[   14.717985]  ? __pfx_kthread+0x10/0x10
[   14.718007]  ret_from_fork+0x116/0x1d0
[   14.718036]  ? __pfx_kthread+0x10/0x10
[   14.718058]  ret_from_fork_asm+0x1a/0x30
[   14.718088]  </TASK>
[   14.718102] 
[   14.725248] Allocated by task 282:
[   14.725442]  kasan_save_stack+0x45/0x70
[   14.725653]  kasan_save_track+0x18/0x40
[   14.725843]  kasan_save_alloc_info+0x3b/0x50
[   14.726067]  __kasan_kmalloc+0xb7/0xc0
[   14.726258]  __kmalloc_cache_noprof+0x189/0x420
[   14.726483]  kasan_atomics+0x95/0x310
[   14.726653]  kunit_try_run_case+0x1a5/0x480
[   14.726833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.727045]  kthread+0x337/0x6f0
[   14.727212]  ret_from_fork+0x116/0x1d0
[   14.727383]  ret_from_fork_asm+0x1a/0x30
[   14.727555] 
[   14.727658] The buggy address belongs to the object at ffff8881033c5500
[   14.727658]  which belongs to the cache kmalloc-64 of size 64
[   14.728102] The buggy address is located 0 bytes to the right of
[   14.728102]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.728472] 
[   14.728546] The buggy address belongs to the physical page:
[   14.728816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.729177] flags: 0x200000000000000(node=0|zone=2)
[   14.729414] page_type: f5(slab)
[   14.729583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.730037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.730300] page dumped because: kasan: bad access detected
[   14.730473] 
[   14.730546] Memory state around the buggy address:
[   14.730705]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.730989]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.731317] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.731635]                                      ^
[   14.731860]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.732377]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.732592] ==================================================================
[   14.452231] ==================================================================
[   14.452589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.453241] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.453617] 
[   14.453740] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.453785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.453809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.453832] Call Trace:
[   14.453848]  <TASK>
[   14.453866]  dump_stack_lvl+0x73/0xb0
[   14.453907]  print_report+0xd1/0x650
[   14.453929]  ? __virt_addr_valid+0x1db/0x2d0
[   14.453954]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.453976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.453999]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.454032]  kasan_report+0x141/0x180
[   14.454055]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.454081]  __asan_report_load4_noabort+0x18/0x20
[   14.454105]  kasan_atomics_helper+0x4a84/0x5450
[   14.454127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.454150]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.454184]  ? trace_hardirqs_on+0x37/0xe0
[   14.454208]  ? kasan_atomics+0x152/0x310
[   14.454245]  kasan_atomics+0x1dc/0x310
[   14.454269]  ? __pfx_kasan_atomics+0x10/0x10
[   14.454293]  ? __pfx_kasan_atomics+0x10/0x10
[   14.454329]  kunit_try_run_case+0x1a5/0x480
[   14.454353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.454376]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.454411]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.454434]  ? __kthread_parkme+0x82/0x180
[   14.454457]  ? preempt_count_sub+0x50/0x80
[   14.454492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.454518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.454544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.454577]  kthread+0x337/0x6f0
[   14.454598]  ? trace_preempt_on+0x20/0xc0
[   14.454620]  ? __pfx_kthread+0x10/0x10
[   14.454651]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.454672]  ? calculate_sigpending+0x7b/0xa0
[   14.454697]  ? __pfx_kthread+0x10/0x10
[   14.454730]  ret_from_fork+0x116/0x1d0
[   14.454762]  ? __pfx_kthread+0x10/0x10
[   14.454784]  ret_from_fork_asm+0x1a/0x30
[   14.454815]  </TASK>
[   14.454827] 
[   14.462555] Allocated by task 282:
[   14.462769]  kasan_save_stack+0x45/0x70
[   14.462986]  kasan_save_track+0x18/0x40
[   14.463174]  kasan_save_alloc_info+0x3b/0x50
[   14.463402]  __kasan_kmalloc+0xb7/0xc0
[   14.463553]  __kmalloc_cache_noprof+0x189/0x420
[   14.463852]  kasan_atomics+0x95/0x310
[   14.464000]  kunit_try_run_case+0x1a5/0x480
[   14.464237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.464414]  kthread+0x337/0x6f0
[   14.464537]  ret_from_fork+0x116/0x1d0
[   14.464671]  ret_from_fork_asm+0x1a/0x30
[   14.464811] 
[   14.464882] The buggy address belongs to the object at ffff8881033c5500
[   14.464882]  which belongs to the cache kmalloc-64 of size 64
[   14.465359] The buggy address is located 0 bytes to the right of
[   14.465359]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.466169] 
[   14.466269] The buggy address belongs to the physical page:
[   14.466469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.466708] flags: 0x200000000000000(node=0|zone=2)
[   14.466872] page_type: f5(slab)
[   14.466994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.467233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.467586] page dumped because: kasan: bad access detected
[   14.468089] 
[   14.468205] Memory state around the buggy address:
[   14.468455]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.468986]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.469333] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.469630]                                      ^
[   14.469864]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.470173]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.470389] ==================================================================
[   14.983196] ==================================================================
[   14.983598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.983904] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.984264] 
[   14.984381] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.984427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.984441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.984462] Call Trace:
[   14.984478]  <TASK>
[   14.984494]  dump_stack_lvl+0x73/0xb0
[   14.984522]  print_report+0xd1/0x650
[   14.984545]  ? __virt_addr_valid+0x1db/0x2d0
[   14.984568]  ? kasan_atomics_helper+0x194a/0x5450
[   14.984590]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.984613]  ? kasan_atomics_helper+0x194a/0x5450
[   14.984636]  kasan_report+0x141/0x180
[   14.984671]  ? kasan_atomics_helper+0x194a/0x5450
[   14.984708]  kasan_check_range+0x10c/0x1c0
[   14.984732]  __kasan_check_write+0x18/0x20
[   14.984763]  kasan_atomics_helper+0x194a/0x5450
[   14.984787]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.984809]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.984834]  ? trace_hardirqs_on+0x37/0xe0
[   14.984867]  ? kasan_atomics+0x152/0x310
[   14.984897]  kasan_atomics+0x1dc/0x310
[   14.984924]  ? __pfx_kasan_atomics+0x10/0x10
[   14.984960]  ? __pfx_kasan_atomics+0x10/0x10
[   14.984988]  kunit_try_run_case+0x1a5/0x480
[   14.985019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.985050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.985076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.985112]  ? __kthread_parkme+0x82/0x180
[   14.985133]  ? preempt_count_sub+0x50/0x80
[   14.985159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.985194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.985218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.985243]  kthread+0x337/0x6f0
[   14.985263]  ? trace_preempt_on+0x20/0xc0
[   14.985285]  ? __pfx_kthread+0x10/0x10
[   14.985306]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.985327]  ? calculate_sigpending+0x7b/0xa0
[   14.985352]  ? __pfx_kthread+0x10/0x10
[   14.985374]  ret_from_fork+0x116/0x1d0
[   14.985395]  ? __pfx_kthread+0x10/0x10
[   14.985425]  ret_from_fork_asm+0x1a/0x30
[   14.985456]  </TASK>
[   14.985469] 
[   14.993335] Allocated by task 282:
[   14.993529]  kasan_save_stack+0x45/0x70
[   14.993696]  kasan_save_track+0x18/0x40
[   14.993875]  kasan_save_alloc_info+0x3b/0x50
[   14.994076]  __kasan_kmalloc+0xb7/0xc0
[   14.994244]  __kmalloc_cache_noprof+0x189/0x420
[   14.994444]  kasan_atomics+0x95/0x310
[   14.994619]  kunit_try_run_case+0x1a5/0x480
[   14.994826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.995070]  kthread+0x337/0x6f0
[   14.995195]  ret_from_fork+0x116/0x1d0
[   14.995330]  ret_from_fork_asm+0x1a/0x30
[   14.995486] 
[   14.995620] The buggy address belongs to the object at ffff8881033c5500
[   14.995620]  which belongs to the cache kmalloc-64 of size 64
[   14.996153] The buggy address is located 0 bytes to the right of
[   14.996153]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.996574] 
[   14.996649] The buggy address belongs to the physical page:
[   14.996915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.997311] flags: 0x200000000000000(node=0|zone=2)
[   14.997540] page_type: f5(slab)
[   14.997665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.997898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.998137] page dumped because: kasan: bad access detected
[   14.998421] 
[   14.998530] Memory state around the buggy address:
[   14.998759]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.999104]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.999465] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.999920]                                      ^
[   15.000109]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.000404]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.000616] ==================================================================
[   14.375158] ==================================================================
[   14.375564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.375934] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.376293] 
[   14.376454] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.376499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.376512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.376560] Call Trace:
[   14.376580]  <TASK>
[   14.376599]  dump_stack_lvl+0x73/0xb0
[   14.376640]  print_report+0xd1/0x650
[   14.376664]  ? __virt_addr_valid+0x1db/0x2d0
[   14.376688]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.376736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.376759]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.376781]  kasan_report+0x141/0x180
[   14.376814]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.376841]  kasan_check_range+0x10c/0x1c0
[   14.376867]  __kasan_check_write+0x18/0x20
[   14.376912]  kasan_atomics_helper+0xa2b/0x5450
[   14.376936]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.376958]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.376994]  ? trace_hardirqs_on+0x37/0xe0
[   14.377018]  ? kasan_atomics+0x152/0x310
[   14.377083]  kasan_atomics+0x1dc/0x310
[   14.377106]  ? __pfx_kasan_atomics+0x10/0x10
[   14.377141]  ? __pfx_kasan_atomics+0x10/0x10
[   14.377169]  kunit_try_run_case+0x1a5/0x480
[   14.377220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.377256]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.377293]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.377318]  ? __kthread_parkme+0x82/0x180
[   14.377341]  ? preempt_count_sub+0x50/0x80
[   14.377378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.377402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.377427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.377463]  kthread+0x337/0x6f0
[   14.377484]  ? trace_preempt_on+0x20/0xc0
[   14.377506]  ? __pfx_kthread+0x10/0x10
[   14.377528]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.377566]  ? calculate_sigpending+0x7b/0xa0
[   14.377604]  ? __pfx_kthread+0x10/0x10
[   14.377626]  ret_from_fork+0x116/0x1d0
[   14.377667]  ? __pfx_kthread+0x10/0x10
[   14.377689]  ret_from_fork_asm+0x1a/0x30
[   14.377721]  </TASK>
[   14.377745] 
[   14.385696] Allocated by task 282:
[   14.385888]  kasan_save_stack+0x45/0x70
[   14.386095]  kasan_save_track+0x18/0x40
[   14.386284]  kasan_save_alloc_info+0x3b/0x50
[   14.386453]  __kasan_kmalloc+0xb7/0xc0
[   14.386584]  __kmalloc_cache_noprof+0x189/0x420
[   14.387001]  kasan_atomics+0x95/0x310
[   14.387194]  kunit_try_run_case+0x1a5/0x480
[   14.387396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.387703]  kthread+0x337/0x6f0
[   14.387873]  ret_from_fork+0x116/0x1d0
[   14.388073]  ret_from_fork_asm+0x1a/0x30
[   14.388217] 
[   14.388288] The buggy address belongs to the object at ffff8881033c5500
[   14.388288]  which belongs to the cache kmalloc-64 of size 64
[   14.389049] The buggy address is located 0 bytes to the right of
[   14.389049]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.389581] 
[   14.389681] The buggy address belongs to the physical page:
[   14.389936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.390298] flags: 0x200000000000000(node=0|zone=2)
[   14.390551] page_type: f5(slab)
[   14.390779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.391123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.391469] page dumped because: kasan: bad access detected
[   14.391749] 
[   14.391878] Memory state around the buggy address:
[   14.392149]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.392541]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.392952] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.393270]                                      ^
[   14.393654]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.393920]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.394725] ==================================================================
[   15.085959] ==================================================================
[   15.086549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.087064] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.087653] 
[   15.087777] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.087825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.087852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.087874] Call Trace:
[   15.087893]  <TASK>
[   15.087992]  dump_stack_lvl+0x73/0xb0
[   15.088039]  print_report+0xd1/0x650
[   15.088064]  ? __virt_addr_valid+0x1db/0x2d0
[   15.088089]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.088111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.088135]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.088161]  kasan_report+0x141/0x180
[   15.088183]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.088210]  __asan_report_load8_noabort+0x18/0x20
[   15.088234]  kasan_atomics_helper+0x4f30/0x5450
[   15.088258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.088280]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.088305]  ? trace_hardirqs_on+0x37/0xe0
[   15.088328]  ? kasan_atomics+0x152/0x310
[   15.088357]  kasan_atomics+0x1dc/0x310
[   15.088380]  ? __pfx_kasan_atomics+0x10/0x10
[   15.088405]  ? __pfx_kasan_atomics+0x10/0x10
[   15.088432]  kunit_try_run_case+0x1a5/0x480
[   15.088456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.088479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.088503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.088527]  ? __kthread_parkme+0x82/0x180
[   15.088549]  ? preempt_count_sub+0x50/0x80
[   15.088573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.088599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.088622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.088645]  kthread+0x337/0x6f0
[   15.088667]  ? trace_preempt_on+0x20/0xc0
[   15.088688]  ? __pfx_kthread+0x10/0x10
[   15.088709]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.088730]  ? calculate_sigpending+0x7b/0xa0
[   15.088755]  ? __pfx_kthread+0x10/0x10
[   15.088776]  ret_from_fork+0x116/0x1d0
[   15.088795]  ? __pfx_kthread+0x10/0x10
[   15.088816]  ret_from_fork_asm+0x1a/0x30
[   15.088849]  </TASK>
[   15.088861] 
[   15.099075] Allocated by task 282:
[   15.099277]  kasan_save_stack+0x45/0x70
[   15.099484]  kasan_save_track+0x18/0x40
[   15.100081]  kasan_save_alloc_info+0x3b/0x50
[   15.100302]  __kasan_kmalloc+0xb7/0xc0
[   15.100462]  __kmalloc_cache_noprof+0x189/0x420
[   15.100909]  kasan_atomics+0x95/0x310
[   15.101208]  kunit_try_run_case+0x1a5/0x480
[   15.101513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.101986]  kthread+0x337/0x6f0
[   15.102196]  ret_from_fork+0x116/0x1d0
[   15.102494]  ret_from_fork_asm+0x1a/0x30
[   15.102849] 
[   15.102977] The buggy address belongs to the object at ffff8881033c5500
[   15.102977]  which belongs to the cache kmalloc-64 of size 64
[   15.103799] The buggy address is located 0 bytes to the right of
[   15.103799]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.104425] 
[   15.104537] The buggy address belongs to the physical page:
[   15.104954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.105325] flags: 0x200000000000000(node=0|zone=2)
[   15.105549] page_type: f5(slab)
[   15.105988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.106299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.106801] page dumped because: kasan: bad access detected
[   15.107156] 
[   15.107261] Memory state around the buggy address:
[   15.107631]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.108158]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.108493] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.109065]                                      ^
[   15.109300]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.109907]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.110318] ==================================================================
[   15.171059] ==================================================================
[   15.171493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.172174] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.172486] 
[   15.172591] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.172674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.172689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.172713] Call Trace:
[   15.172733]  <TASK>
[   15.172754]  dump_stack_lvl+0x73/0xb0
[   15.172784]  print_report+0xd1/0x650
[   15.172807]  ? __virt_addr_valid+0x1db/0x2d0
[   15.172866]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.172889]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.172911]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.172933]  kasan_report+0x141/0x180
[   15.172957]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.173013]  kasan_check_range+0x10c/0x1c0
[   15.173049]  __kasan_check_write+0x18/0x20
[   15.173069]  kasan_atomics_helper+0x1eaa/0x5450
[   15.173091]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.173114]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.173140]  ? trace_hardirqs_on+0x37/0xe0
[   15.173197]  ? kasan_atomics+0x152/0x310
[   15.173225]  kasan_atomics+0x1dc/0x310
[   15.173248]  ? __pfx_kasan_atomics+0x10/0x10
[   15.173272]  ? __pfx_kasan_atomics+0x10/0x10
[   15.173299]  kunit_try_run_case+0x1a5/0x480
[   15.173354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.173377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.173402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.173425]  ? __kthread_parkme+0x82/0x180
[   15.173446]  ? preempt_count_sub+0x50/0x80
[   15.173500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.173525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.173548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.173572]  kthread+0x337/0x6f0
[   15.173592]  ? trace_preempt_on+0x20/0xc0
[   15.173641]  ? __pfx_kthread+0x10/0x10
[   15.173663]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.173684]  ? calculate_sigpending+0x7b/0xa0
[   15.173708]  ? __pfx_kthread+0x10/0x10
[   15.173730]  ret_from_fork+0x116/0x1d0
[   15.173750]  ? __pfx_kthread+0x10/0x10
[   15.173770]  ret_from_fork_asm+0x1a/0x30
[   15.173801]  </TASK>
[   15.173840] 
[   15.181927] Allocated by task 282:
[   15.182204]  kasan_save_stack+0x45/0x70
[   15.182424]  kasan_save_track+0x18/0x40
[   15.182589]  kasan_save_alloc_info+0x3b/0x50
[   15.182962]  __kasan_kmalloc+0xb7/0xc0
[   15.183184]  __kmalloc_cache_noprof+0x189/0x420
[   15.183373]  kasan_atomics+0x95/0x310
[   15.183504]  kunit_try_run_case+0x1a5/0x480
[   15.183662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.183915]  kthread+0x337/0x6f0
[   15.184193]  ret_from_fork+0x116/0x1d0
[   15.184396]  ret_from_fork_asm+0x1a/0x30
[   15.184627] 
[   15.184719] The buggy address belongs to the object at ffff8881033c5500
[   15.184719]  which belongs to the cache kmalloc-64 of size 64
[   15.185234] The buggy address is located 0 bytes to the right of
[   15.185234]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.185778] 
[   15.185909] The buggy address belongs to the physical page:
[   15.186169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.186529] flags: 0x200000000000000(node=0|zone=2)
[   15.186846] page_type: f5(slab)
[   15.187012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.187381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.187633] page dumped because: kasan: bad access detected
[   15.187914] 
[   15.188053] Memory state around the buggy address:
[   15.188233]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.188578]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.188947] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.189250]                                      ^
[   15.189489]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.189842]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.190091] ==================================================================
[   15.248137] ==================================================================
[   15.248485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.248834] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.249130] 
[   15.249245] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.249291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.249304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.249326] Call Trace:
[   15.249343]  <TASK>
[   15.249360]  dump_stack_lvl+0x73/0xb0
[   15.249387]  print_report+0xd1/0x650
[   15.249410]  ? __virt_addr_valid+0x1db/0x2d0
[   15.249434]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.249455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.249478]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.249501]  kasan_report+0x141/0x180
[   15.249523]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.249550]  __asan_report_load8_noabort+0x18/0x20
[   15.249575]  kasan_atomics_helper+0x4f98/0x5450
[   15.249599]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.249621]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.249646]  ? trace_hardirqs_on+0x37/0xe0
[   15.249670]  ? kasan_atomics+0x152/0x310
[   15.249698]  kasan_atomics+0x1dc/0x310
[   15.249721]  ? __pfx_kasan_atomics+0x10/0x10
[   15.249745]  ? __pfx_kasan_atomics+0x10/0x10
[   15.249772]  kunit_try_run_case+0x1a5/0x480
[   15.249796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.249843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.249866]  ? __kthread_parkme+0x82/0x180
[   15.249887]  ? preempt_count_sub+0x50/0x80
[   15.249911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.249958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.249981]  kthread+0x337/0x6f0
[   15.250001]  ? trace_preempt_on+0x20/0xc0
[   15.250058]  ? __pfx_kthread+0x10/0x10
[   15.250080]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.250103]  ? calculate_sigpending+0x7b/0xa0
[   15.250128]  ? __pfx_kthread+0x10/0x10
[   15.250150]  ret_from_fork+0x116/0x1d0
[   15.250169]  ? __pfx_kthread+0x10/0x10
[   15.250190]  ret_from_fork_asm+0x1a/0x30
[   15.250221]  </TASK>
[   15.250234] 
[   15.257335] Allocated by task 282:
[   15.257515]  kasan_save_stack+0x45/0x70
[   15.257717]  kasan_save_track+0x18/0x40
[   15.257900]  kasan_save_alloc_info+0x3b/0x50
[   15.258101]  __kasan_kmalloc+0xb7/0xc0
[   15.258273]  __kmalloc_cache_noprof+0x189/0x420
[   15.258484]  kasan_atomics+0x95/0x310
[   15.258680]  kunit_try_run_case+0x1a5/0x480
[   15.258886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.259110]  kthread+0x337/0x6f0
[   15.259279]  ret_from_fork+0x116/0x1d0
[   15.259445]  ret_from_fork_asm+0x1a/0x30
[   15.259609] 
[   15.259701] The buggy address belongs to the object at ffff8881033c5500
[   15.259701]  which belongs to the cache kmalloc-64 of size 64
[   15.260227] The buggy address is located 0 bytes to the right of
[   15.260227]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.260671] 
[   15.260770] The buggy address belongs to the physical page:
[   15.261035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.261384] flags: 0x200000000000000(node=0|zone=2)
[   15.261614] page_type: f5(slab)
[   15.261799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.262042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.262270] page dumped because: kasan: bad access detected
[   15.262442] 
[   15.262511] Memory state around the buggy address:
[   15.262764]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.263100]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.263416] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.263702]                                      ^
[   15.263857]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.264081]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.264300] ==================================================================
[   15.190596] ==================================================================
[   15.191346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.191735] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.192145] 
[   15.192265] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.192312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.192325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.192348] Call Trace:
[   15.192367]  <TASK>
[   15.192385]  dump_stack_lvl+0x73/0xb0
[   15.192415]  print_report+0xd1/0x650
[   15.192439]  ? __virt_addr_valid+0x1db/0x2d0
[   15.192464]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.192486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.192508]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.192531]  kasan_report+0x141/0x180
[   15.192554]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.192580]  kasan_check_range+0x10c/0x1c0
[   15.192604]  __kasan_check_write+0x18/0x20
[   15.192624]  kasan_atomics_helper+0x1f43/0x5450
[   15.192647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.192670]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.192695]  ? trace_hardirqs_on+0x37/0xe0
[   15.192718]  ? kasan_atomics+0x152/0x310
[   15.192745]  kasan_atomics+0x1dc/0x310
[   15.192768]  ? __pfx_kasan_atomics+0x10/0x10
[   15.192791]  ? __pfx_kasan_atomics+0x10/0x10
[   15.192819]  kunit_try_run_case+0x1a5/0x480
[   15.192844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.192868]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.192893]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.192930]  ? __kthread_parkme+0x82/0x180
[   15.192952]  ? preempt_count_sub+0x50/0x80
[   15.192976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.193000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.193034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.193093]  kthread+0x337/0x6f0
[   15.193139]  ? trace_preempt_on+0x20/0xc0
[   15.193162]  ? __pfx_kthread+0x10/0x10
[   15.193182]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.193204]  ? calculate_sigpending+0x7b/0xa0
[   15.193228]  ? __pfx_kthread+0x10/0x10
[   15.193250]  ret_from_fork+0x116/0x1d0
[   15.193269]  ? __pfx_kthread+0x10/0x10
[   15.193290]  ret_from_fork_asm+0x1a/0x30
[   15.193321]  </TASK>
[   15.193333] 
[   15.201611] Allocated by task 282:
[   15.201817]  kasan_save_stack+0x45/0x70
[   15.202044]  kasan_save_track+0x18/0x40
[   15.202295]  kasan_save_alloc_info+0x3b/0x50
[   15.202487]  __kasan_kmalloc+0xb7/0xc0
[   15.202642]  __kmalloc_cache_noprof+0x189/0x420
[   15.202890]  kasan_atomics+0x95/0x310
[   15.203084]  kunit_try_run_case+0x1a5/0x480
[   15.203289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.203533]  kthread+0x337/0x6f0
[   15.203651]  ret_from_fork+0x116/0x1d0
[   15.203780]  ret_from_fork_asm+0x1a/0x30
[   15.203976] 
[   15.204086] The buggy address belongs to the object at ffff8881033c5500
[   15.204086]  which belongs to the cache kmalloc-64 of size 64
[   15.204758] The buggy address is located 0 bytes to the right of
[   15.204758]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.205262] 
[   15.205396] The buggy address belongs to the physical page:
[   15.205649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.206016] flags: 0x200000000000000(node=0|zone=2)
[   15.206277] page_type: f5(slab)
[   15.206442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.206846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.207203] page dumped because: kasan: bad access detected
[   15.207461] 
[   15.207550] Memory state around the buggy address:
[   15.207876]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.208207]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.208524] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.208858]                                      ^
[   15.209085]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.209383]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.209774] ==================================================================
[   14.414315] ==================================================================
[   14.414585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.415119] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.415451] 
[   14.415592] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.415637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.415662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.415686] Call Trace:
[   14.415705]  <TASK>
[   14.415723]  dump_stack_lvl+0x73/0xb0
[   14.415752]  print_report+0xd1/0x650
[   14.415776]  ? __virt_addr_valid+0x1db/0x2d0
[   14.415802]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.415824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.415846]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.415868]  kasan_report+0x141/0x180
[   14.415902]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.415928]  kasan_check_range+0x10c/0x1c0
[   14.415952]  __kasan_check_write+0x18/0x20
[   14.415985]  kasan_atomics_helper+0xb6a/0x5450
[   14.416007]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.416040]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.416065]  ? trace_hardirqs_on+0x37/0xe0
[   14.416088]  ? kasan_atomics+0x152/0x310
[   14.416115]  kasan_atomics+0x1dc/0x310
[   14.416138]  ? __pfx_kasan_atomics+0x10/0x10
[   14.416168]  ? __pfx_kasan_atomics+0x10/0x10
[   14.416196]  kunit_try_run_case+0x1a5/0x480
[   14.416219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.416242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.416267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.416290]  ? __kthread_parkme+0x82/0x180
[   14.416311]  ? preempt_count_sub+0x50/0x80
[   14.416335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.416359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.416382]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.416406]  kthread+0x337/0x6f0
[   14.416435]  ? trace_preempt_on+0x20/0xc0
[   14.416458]  ? __pfx_kthread+0x10/0x10
[   14.416480]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.416511]  ? calculate_sigpending+0x7b/0xa0
[   14.416536]  ? __pfx_kthread+0x10/0x10
[   14.416559]  ret_from_fork+0x116/0x1d0
[   14.416578]  ? __pfx_kthread+0x10/0x10
[   14.416609]  ret_from_fork_asm+0x1a/0x30
[   14.416639]  </TASK>
[   14.416652] 
[   14.424552] Allocated by task 282:
[   14.424785]  kasan_save_stack+0x45/0x70
[   14.424970]  kasan_save_track+0x18/0x40
[   14.425181]  kasan_save_alloc_info+0x3b/0x50
[   14.425333]  __kasan_kmalloc+0xb7/0xc0
[   14.425469]  __kmalloc_cache_noprof+0x189/0x420
[   14.425667]  kasan_atomics+0x95/0x310
[   14.425895]  kunit_try_run_case+0x1a5/0x480
[   14.426112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.426348]  kthread+0x337/0x6f0
[   14.426471]  ret_from_fork+0x116/0x1d0
[   14.426604]  ret_from_fork_asm+0x1a/0x30
[   14.426798] 
[   14.426893] The buggy address belongs to the object at ffff8881033c5500
[   14.426893]  which belongs to the cache kmalloc-64 of size 64
[   14.427630] The buggy address is located 0 bytes to the right of
[   14.427630]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.428101] 
[   14.428206] The buggy address belongs to the physical page:
[   14.428484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.428812] flags: 0x200000000000000(node=0|zone=2)
[   14.429061] page_type: f5(slab)
[   14.429235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.429568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.429946] page dumped because: kasan: bad access detected
[   14.430192] 
[   14.430288] Memory state around the buggy address:
[   14.430507]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.430804]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.431032] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.431249]                                      ^
[   14.431404]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.431744]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.432067] ==================================================================
[   14.471054] ==================================================================
[   14.471410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.471877] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.472208] 
[   14.472350] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.472398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.472412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.472434] Call Trace:
[   14.472463]  <TASK>
[   14.472480]  dump_stack_lvl+0x73/0xb0
[   14.472509]  print_report+0xd1/0x650
[   14.472545]  ? __virt_addr_valid+0x1db/0x2d0
[   14.472570]  ? kasan_atomics_helper+0xd47/0x5450
[   14.472591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.472615]  ? kasan_atomics_helper+0xd47/0x5450
[   14.472637]  kasan_report+0x141/0x180
[   14.472670]  ? kasan_atomics_helper+0xd47/0x5450
[   14.472706]  kasan_check_range+0x10c/0x1c0
[   14.472730]  __kasan_check_write+0x18/0x20
[   14.472760]  kasan_atomics_helper+0xd47/0x5450
[   14.472784]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.472807]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.472832]  ? trace_hardirqs_on+0x37/0xe0
[   14.472864]  ? kasan_atomics+0x152/0x310
[   14.472891]  kasan_atomics+0x1dc/0x310
[   14.472914]  ? __pfx_kasan_atomics+0x10/0x10
[   14.472949]  ? __pfx_kasan_atomics+0x10/0x10
[   14.472976]  kunit_try_run_case+0x1a5/0x480
[   14.473001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.473041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.473066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.473089]  ? __kthread_parkme+0x82/0x180
[   14.473122]  ? preempt_count_sub+0x50/0x80
[   14.473146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.473171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.473203]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.473226]  kthread+0x337/0x6f0
[   14.473246]  ? trace_preempt_on+0x20/0xc0
[   14.473277]  ? __pfx_kthread+0x10/0x10
[   14.473299]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.473320]  ? calculate_sigpending+0x7b/0xa0
[   14.473345]  ? __pfx_kthread+0x10/0x10
[   14.473366]  ret_from_fork+0x116/0x1d0
[   14.473386]  ? __pfx_kthread+0x10/0x10
[   14.473406]  ret_from_fork_asm+0x1a/0x30
[   14.473438]  </TASK>
[   14.473450] 
[   14.481223] Allocated by task 282:
[   14.481353]  kasan_save_stack+0x45/0x70
[   14.481502]  kasan_save_track+0x18/0x40
[   14.481643]  kasan_save_alloc_info+0x3b/0x50
[   14.481896]  __kasan_kmalloc+0xb7/0xc0
[   14.482097]  __kmalloc_cache_noprof+0x189/0x420
[   14.482319]  kasan_atomics+0x95/0x310
[   14.482536]  kunit_try_run_case+0x1a5/0x480
[   14.482868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.483133]  kthread+0x337/0x6f0
[   14.483322]  ret_from_fork+0x116/0x1d0
[   14.483518]  ret_from_fork_asm+0x1a/0x30
[   14.483659] 
[   14.483730] The buggy address belongs to the object at ffff8881033c5500
[   14.483730]  which belongs to the cache kmalloc-64 of size 64
[   14.484090] The buggy address is located 0 bytes to the right of
[   14.484090]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.484958] 
[   14.485069] The buggy address belongs to the physical page:
[   14.485352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.485758] flags: 0x200000000000000(node=0|zone=2)
[   14.486029] page_type: f5(slab)
[   14.486196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.486432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.486990] page dumped because: kasan: bad access detected
[   14.487237] 
[   14.487309] Memory state around the buggy address:
[   14.487464]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.488641]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.489013] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.489339]                                      ^
[   14.489563]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.490546]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.491166] ==================================================================
[   15.001609] ==================================================================
[   15.002340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.002831] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.003220] 
[   15.003340] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.003388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.003401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.003436] Call Trace:
[   15.003457]  <TASK>
[   15.003476]  dump_stack_lvl+0x73/0xb0
[   15.003507]  print_report+0xd1/0x650
[   15.003531]  ? __virt_addr_valid+0x1db/0x2d0
[   15.003556]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.003578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.003600]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.003623]  kasan_report+0x141/0x180
[   15.003653]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.003689]  kasan_check_range+0x10c/0x1c0
[   15.003714]  __kasan_check_write+0x18/0x20
[   15.003734]  kasan_atomics_helper+0x19e3/0x5450
[   15.003768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.003790]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.003815]  ? trace_hardirqs_on+0x37/0xe0
[   15.003838]  ? kasan_atomics+0x152/0x310
[   15.003865]  kasan_atomics+0x1dc/0x310
[   15.003888]  ? __pfx_kasan_atomics+0x10/0x10
[   15.003912]  ? __pfx_kasan_atomics+0x10/0x10
[   15.003949]  kunit_try_run_case+0x1a5/0x480
[   15.003973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.003995]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.004039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.004063]  ? __kthread_parkme+0x82/0x180
[   15.004084]  ? preempt_count_sub+0x50/0x80
[   15.004118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.004148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.004172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.004206]  kthread+0x337/0x6f0
[   15.004226]  ? trace_preempt_on+0x20/0xc0
[   15.004248]  ? __pfx_kthread+0x10/0x10
[   15.004270]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.004300]  ? calculate_sigpending+0x7b/0xa0
[   15.004325]  ? __pfx_kthread+0x10/0x10
[   15.004346]  ret_from_fork+0x116/0x1d0
[   15.004376]  ? __pfx_kthread+0x10/0x10
[   15.004397]  ret_from_fork_asm+0x1a/0x30
[   15.004430]  </TASK>
[   15.004443] 
[   15.012299] Allocated by task 282:
[   15.012481]  kasan_save_stack+0x45/0x70
[   15.012633]  kasan_save_track+0x18/0x40
[   15.012837]  kasan_save_alloc_info+0x3b/0x50
[   15.013065]  __kasan_kmalloc+0xb7/0xc0
[   15.013212]  __kmalloc_cache_noprof+0x189/0x420
[   15.013368]  kasan_atomics+0x95/0x310
[   15.013551]  kunit_try_run_case+0x1a5/0x480
[   15.013934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.014200]  kthread+0x337/0x6f0
[   15.014358]  ret_from_fork+0x116/0x1d0
[   15.014529]  ret_from_fork_asm+0x1a/0x30
[   15.014735] 
[   15.014857] The buggy address belongs to the object at ffff8881033c5500
[   15.014857]  which belongs to the cache kmalloc-64 of size 64
[   15.015373] The buggy address is located 0 bytes to the right of
[   15.015373]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.015905] 
[   15.016016] The buggy address belongs to the physical page:
[   15.016228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.016476] flags: 0x200000000000000(node=0|zone=2)
[   15.016649] page_type: f5(slab)
[   15.016774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.017461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.017797] page dumped because: kasan: bad access detected
[   15.018061] 
[   15.018189] Memory state around the buggy address:
[   15.018362]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.018581]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.019229] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.019546]                                      ^
[   15.019803]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.020091]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.020312] ==================================================================
[   14.335079] ==================================================================
[   14.335657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.336013] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.336350] 
[   14.336497] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.336558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.336585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.336620] Call Trace:
[   14.336638]  <TASK>
[   14.336669]  dump_stack_lvl+0x73/0xb0
[   14.336699]  print_report+0xd1/0x650
[   14.336733]  ? __virt_addr_valid+0x1db/0x2d0
[   14.336757]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.336779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.336814]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.336836]  kasan_report+0x141/0x180
[   14.336860]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.336888]  kasan_check_range+0x10c/0x1c0
[   14.336912]  __kasan_check_write+0x18/0x20
[   14.336960]  kasan_atomics_helper+0x8f9/0x5450
[   14.336983]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.337006]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.337053]  ? trace_hardirqs_on+0x37/0xe0
[   14.337106]  ? kasan_atomics+0x152/0x310
[   14.337134]  kasan_atomics+0x1dc/0x310
[   14.337159]  ? __pfx_kasan_atomics+0x10/0x10
[   14.337194]  ? __pfx_kasan_atomics+0x10/0x10
[   14.337249]  kunit_try_run_case+0x1a5/0x480
[   14.337274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.337297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.337334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.337357]  ? __kthread_parkme+0x82/0x180
[   14.337405]  ? preempt_count_sub+0x50/0x80
[   14.337430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.337454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.337490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.337539]  kthread+0x337/0x6f0
[   14.337559]  ? trace_preempt_on+0x20/0xc0
[   14.337582]  ? __pfx_kthread+0x10/0x10
[   14.337613]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.337634]  ? calculate_sigpending+0x7b/0xa0
[   14.337670]  ? __pfx_kthread+0x10/0x10
[   14.337691]  ret_from_fork+0x116/0x1d0
[   14.337737]  ? __pfx_kthread+0x10/0x10
[   14.337759]  ret_from_fork_asm+0x1a/0x30
[   14.337790]  </TASK>
[   14.337814] 
[   14.346034] Allocated by task 282:
[   14.346188]  kasan_save_stack+0x45/0x70
[   14.346428]  kasan_save_track+0x18/0x40
[   14.346634]  kasan_save_alloc_info+0x3b/0x50
[   14.346873]  __kasan_kmalloc+0xb7/0xc0
[   14.347066]  __kmalloc_cache_noprof+0x189/0x420
[   14.347328]  kasan_atomics+0x95/0x310
[   14.347571]  kunit_try_run_case+0x1a5/0x480
[   14.347802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.348092]  kthread+0x337/0x6f0
[   14.348263]  ret_from_fork+0x116/0x1d0
[   14.348451]  ret_from_fork_asm+0x1a/0x30
[   14.348637] 
[   14.348708] The buggy address belongs to the object at ffff8881033c5500
[   14.348708]  which belongs to the cache kmalloc-64 of size 64
[   14.349076] The buggy address is located 0 bytes to the right of
[   14.349076]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.349682] 
[   14.349818] The buggy address belongs to the physical page:
[   14.350085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.350461] flags: 0x200000000000000(node=0|zone=2)
[   14.350799] page_type: f5(slab)
[   14.350978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.351334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.351633] page dumped because: kasan: bad access detected
[   14.351900] 
[   14.352035] Memory state around the buggy address:
[   14.352250]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.352599]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.352944] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.353267]                                      ^
[   14.353498]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.354137]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.354479] ==================================================================
[   14.578769] ==================================================================
[   14.579120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.579361] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.579706] 
[   14.579859] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.579905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.579918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.579941] Call Trace:
[   14.579959]  <TASK>
[   14.579976]  dump_stack_lvl+0x73/0xb0
[   14.580004]  print_report+0xd1/0x650
[   14.580039]  ? __virt_addr_valid+0x1db/0x2d0
[   14.580064]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.580085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.580109]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.580132]  kasan_report+0x141/0x180
[   14.580158]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.580185]  __asan_report_load4_noabort+0x18/0x20
[   14.580209]  kasan_atomics_helper+0x4a36/0x5450
[   14.580233]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.580255]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.580280]  ? trace_hardirqs_on+0x37/0xe0
[   14.580304]  ? kasan_atomics+0x152/0x310
[   14.580331]  kasan_atomics+0x1dc/0x310
[   14.580355]  ? __pfx_kasan_atomics+0x10/0x10
[   14.580379]  ? __pfx_kasan_atomics+0x10/0x10
[   14.580406]  kunit_try_run_case+0x1a5/0x480
[   14.580431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.580453]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.580478]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.580501]  ? __kthread_parkme+0x82/0x180
[   14.580523]  ? preempt_count_sub+0x50/0x80
[   14.580548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.580572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.580596]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.580620]  kthread+0x337/0x6f0
[   14.580640]  ? trace_preempt_on+0x20/0xc0
[   14.580662]  ? __pfx_kthread+0x10/0x10
[   14.580684]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.580705]  ? calculate_sigpending+0x7b/0xa0
[   14.580729]  ? __pfx_kthread+0x10/0x10
[   14.580751]  ret_from_fork+0x116/0x1d0
[   14.580770]  ? __pfx_kthread+0x10/0x10
[   14.580791]  ret_from_fork_asm+0x1a/0x30
[   14.580822]  </TASK>
[   14.580835] 
[   14.588536] Allocated by task 282:
[   14.588742]  kasan_save_stack+0x45/0x70
[   14.588944]  kasan_save_track+0x18/0x40
[   14.589143]  kasan_save_alloc_info+0x3b/0x50
[   14.589351]  __kasan_kmalloc+0xb7/0xc0
[   14.589546]  __kmalloc_cache_noprof+0x189/0x420
[   14.589773]  kasan_atomics+0x95/0x310
[   14.589954]  kunit_try_run_case+0x1a5/0x480
[   14.590168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.590428]  kthread+0x337/0x6f0
[   14.590601]  ret_from_fork+0x116/0x1d0
[   14.590789]  ret_from_fork_asm+0x1a/0x30
[   14.590972] 
[   14.591056] The buggy address belongs to the object at ffff8881033c5500
[   14.591056]  which belongs to the cache kmalloc-64 of size 64
[   14.591553] The buggy address is located 0 bytes to the right of
[   14.591553]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.592072] 
[   14.592176] The buggy address belongs to the physical page:
[   14.592429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.592813] flags: 0x200000000000000(node=0|zone=2)
[   14.592982] page_type: f5(slab)
[   14.593158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.593522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.593866] page dumped because: kasan: bad access detected
[   14.594048] 
[   14.594143] Memory state around the buggy address:
[   14.594370]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.594802]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.595087] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.595381]                                      ^
[   14.595540]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.595753]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.595965] ==================================================================
[   14.653986] ==================================================================
[   14.654340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.655165] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.655505] 
[   14.655627] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.655672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.655705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.655742] Call Trace:
[   14.655761]  <TASK>
[   14.655791]  dump_stack_lvl+0x73/0xb0
[   14.655836]  print_report+0xd1/0x650
[   14.655859]  ? __virt_addr_valid+0x1db/0x2d0
[   14.655885]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.655921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.655957]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.655979]  kasan_report+0x141/0x180
[   14.656015]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.656066]  __asan_report_load4_noabort+0x18/0x20
[   14.656091]  kasan_atomics_helper+0x4a02/0x5450
[   14.656115]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.656137]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.656167]  ? trace_hardirqs_on+0x37/0xe0
[   14.656190]  ? kasan_atomics+0x152/0x310
[   14.656218]  kasan_atomics+0x1dc/0x310
[   14.656240]  ? __pfx_kasan_atomics+0x10/0x10
[   14.656265]  ? __pfx_kasan_atomics+0x10/0x10
[   14.656293]  kunit_try_run_case+0x1a5/0x480
[   14.656317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.656340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.656366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.656390]  ? __kthread_parkme+0x82/0x180
[   14.656411]  ? preempt_count_sub+0x50/0x80
[   14.656436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.656460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.656484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.656508]  kthread+0x337/0x6f0
[   14.656528]  ? trace_preempt_on+0x20/0xc0
[   14.656550]  ? __pfx_kthread+0x10/0x10
[   14.656571]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.656593]  ? calculate_sigpending+0x7b/0xa0
[   14.656618]  ? __pfx_kthread+0x10/0x10
[   14.656652]  ret_from_fork+0x116/0x1d0
[   14.656672]  ? __pfx_kthread+0x10/0x10
[   14.656694]  ret_from_fork_asm+0x1a/0x30
[   14.656725]  </TASK>
[   14.656738] 
[   14.664303] Allocated by task 282:
[   14.664473]  kasan_save_stack+0x45/0x70
[   14.664705]  kasan_save_track+0x18/0x40
[   14.664911]  kasan_save_alloc_info+0x3b/0x50
[   14.665092]  __kasan_kmalloc+0xb7/0xc0
[   14.665304]  __kmalloc_cache_noprof+0x189/0x420
[   14.665536]  kasan_atomics+0x95/0x310
[   14.665762]  kunit_try_run_case+0x1a5/0x480
[   14.665945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.666159]  kthread+0x337/0x6f0
[   14.666327]  ret_from_fork+0x116/0x1d0
[   14.666536]  ret_from_fork_asm+0x1a/0x30
[   14.666756] 
[   14.666871] The buggy address belongs to the object at ffff8881033c5500
[   14.666871]  which belongs to the cache kmalloc-64 of size 64
[   14.667357] The buggy address is located 0 bytes to the right of
[   14.667357]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.667952] 
[   14.668040] The buggy address belongs to the physical page:
[   14.668267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.668656] flags: 0x200000000000000(node=0|zone=2)
[   14.668888] page_type: f5(slab)
[   14.669036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.669398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.669746] page dumped because: kasan: bad access detected
[   14.669955] 
[   14.670079] Memory state around the buggy address:
[   14.670316]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.670570]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.671071] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.671358]                                      ^
[   14.671509]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.671943]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.672282] ==================================================================
[   14.865050] ==================================================================
[   14.865400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.866002] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.866376] 
[   14.866466] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.866510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.866524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.866547] Call Trace:
[   14.866574]  <TASK>
[   14.866592]  dump_stack_lvl+0x73/0xb0
[   14.866622]  print_report+0xd1/0x650
[   14.866657]  ? __virt_addr_valid+0x1db/0x2d0
[   14.866682]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.866703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.866726]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.866749]  kasan_report+0x141/0x180
[   14.866781]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.866808]  kasan_check_range+0x10c/0x1c0
[   14.866832]  __kasan_check_write+0x18/0x20
[   14.866863]  kasan_atomics_helper+0x15b6/0x5450
[   14.866885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.866909]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.866942]  ? trace_hardirqs_on+0x37/0xe0
[   14.866966]  ? kasan_atomics+0x152/0x310
[   14.866993]  kasan_atomics+0x1dc/0x310
[   14.867034]  ? __pfx_kasan_atomics+0x10/0x10
[   14.867058]  ? __pfx_kasan_atomics+0x10/0x10
[   14.867086]  kunit_try_run_case+0x1a5/0x480
[   14.867120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.867144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.867168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.867202]  ? __kthread_parkme+0x82/0x180
[   14.867224]  ? preempt_count_sub+0x50/0x80
[   14.867248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.867281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.867305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.867328]  kthread+0x337/0x6f0
[   14.867359]  ? trace_preempt_on+0x20/0xc0
[   14.867382]  ? __pfx_kthread+0x10/0x10
[   14.867404]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.867435]  ? calculate_sigpending+0x7b/0xa0
[   14.867460]  ? __pfx_kthread+0x10/0x10
[   14.867482]  ret_from_fork+0x116/0x1d0
[   14.867512]  ? __pfx_kthread+0x10/0x10
[   14.867533]  ret_from_fork_asm+0x1a/0x30
[   14.867565]  </TASK>
[   14.867578] 
[   14.875409] Allocated by task 282:
[   14.875592]  kasan_save_stack+0x45/0x70
[   14.875861]  kasan_save_track+0x18/0x40
[   14.876043]  kasan_save_alloc_info+0x3b/0x50
[   14.876202]  __kasan_kmalloc+0xb7/0xc0
[   14.876336]  __kmalloc_cache_noprof+0x189/0x420
[   14.876493]  kasan_atomics+0x95/0x310
[   14.876626]  kunit_try_run_case+0x1a5/0x480
[   14.876773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.876967]  kthread+0x337/0x6f0
[   14.877206]  ret_from_fork+0x116/0x1d0
[   14.877412]  ret_from_fork_asm+0x1a/0x30
[   14.877609] 
[   14.877706] The buggy address belongs to the object at ffff8881033c5500
[   14.877706]  which belongs to the cache kmalloc-64 of size 64
[   14.878243] The buggy address is located 0 bytes to the right of
[   14.878243]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.879173] 
[   14.879247] The buggy address belongs to the physical page:
[   14.879418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.879652] flags: 0x200000000000000(node=0|zone=2)
[   14.879822] page_type: f5(slab)
[   14.879991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.880378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.880823] page dumped because: kasan: bad access detected
[   14.881110] 
[   14.881216] Memory state around the buggy address:
[   14.881477]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.881965]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.882205] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.882427]                                      ^
[   14.882679]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.882999]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.883309] ==================================================================
[   14.884281] ==================================================================
[   14.884547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.885349] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.885662] 
[   14.885790] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.885836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.885860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.885882] Call Trace:
[   14.885900]  <TASK>
[   14.885916]  dump_stack_lvl+0x73/0xb0
[   14.885953]  print_report+0xd1/0x650
[   14.885978]  ? __virt_addr_valid+0x1db/0x2d0
[   14.886003]  ? kasan_atomics_helper+0x164f/0x5450
[   14.886041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.886064]  ? kasan_atomics_helper+0x164f/0x5450
[   14.886087]  kasan_report+0x141/0x180
[   14.886110]  ? kasan_atomics_helper+0x164f/0x5450
[   14.886146]  kasan_check_range+0x10c/0x1c0
[   14.886171]  __kasan_check_write+0x18/0x20
[   14.886192]  kasan_atomics_helper+0x164f/0x5450
[   14.886226]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.886249]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.886275]  ? trace_hardirqs_on+0x37/0xe0
[   14.886307]  ? kasan_atomics+0x152/0x310
[   14.886334]  kasan_atomics+0x1dc/0x310
[   14.886369]  ? __pfx_kasan_atomics+0x10/0x10
[   14.886393]  ? __pfx_kasan_atomics+0x10/0x10
[   14.886420]  kunit_try_run_case+0x1a5/0x480
[   14.886446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.886469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.886494]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.886518]  ? __kthread_parkme+0x82/0x180
[   14.886539]  ? preempt_count_sub+0x50/0x80
[   14.886563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.886587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.886611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.886636]  kthread+0x337/0x6f0
[   14.886665]  ? trace_preempt_on+0x20/0xc0
[   14.886697]  ? __pfx_kthread+0x10/0x10
[   14.886718]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.886740]  ? calculate_sigpending+0x7b/0xa0
[   14.886776]  ? __pfx_kthread+0x10/0x10
[   14.886798]  ret_from_fork+0x116/0x1d0
[   14.886817]  ? __pfx_kthread+0x10/0x10
[   14.886839]  ret_from_fork_asm+0x1a/0x30
[   14.886871]  </TASK>
[   14.886884] 
[   14.894265] Allocated by task 282:
[   14.894403]  kasan_save_stack+0x45/0x70
[   14.894549]  kasan_save_track+0x18/0x40
[   14.894816]  kasan_save_alloc_info+0x3b/0x50
[   14.895039]  __kasan_kmalloc+0xb7/0xc0
[   14.895260]  __kmalloc_cache_noprof+0x189/0x420
[   14.895531]  kasan_atomics+0x95/0x310
[   14.895756]  kunit_try_run_case+0x1a5/0x480
[   14.895992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.896280]  kthread+0x337/0x6f0
[   14.896477]  ret_from_fork+0x116/0x1d0
[   14.896696]  ret_from_fork_asm+0x1a/0x30
[   14.896893] 
[   14.896993] The buggy address belongs to the object at ffff8881033c5500
[   14.896993]  which belongs to the cache kmalloc-64 of size 64
[   14.897383] The buggy address is located 0 bytes to the right of
[   14.897383]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.898124] 
[   14.898235] The buggy address belongs to the physical page:
[   14.898467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.898775] flags: 0x200000000000000(node=0|zone=2)
[   14.898933] page_type: f5(slab)
[   14.899106] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.899457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.899783] page dumped because: kasan: bad access detected
[   14.899948] 
[   14.900085] Memory state around the buggy address:
[   14.900343]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.900652]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.900960] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.901212]                                      ^
[   14.901449]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901757]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.902073] ==================================================================
[   15.210342] ==================================================================
[   15.210661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.211142] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.211356] 
[   15.211490] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.211536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.211549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.211572] Call Trace:
[   15.211589]  <TASK>
[   15.211606]  dump_stack_lvl+0x73/0xb0
[   15.211634]  print_report+0xd1/0x650
[   15.211657]  ? __virt_addr_valid+0x1db/0x2d0
[   15.211682]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.211704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.211727]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.211750]  kasan_report+0x141/0x180
[   15.211772]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.211799]  __asan_report_load8_noabort+0x18/0x20
[   15.211823]  kasan_atomics_helper+0x4f71/0x5450
[   15.211846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.211870]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.211895]  ? trace_hardirqs_on+0x37/0xe0
[   15.211918]  ? kasan_atomics+0x152/0x310
[   15.211945]  kasan_atomics+0x1dc/0x310
[   15.211968]  ? __pfx_kasan_atomics+0x10/0x10
[   15.211992]  ? __pfx_kasan_atomics+0x10/0x10
[   15.212030]  kunit_try_run_case+0x1a5/0x480
[   15.212055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.212077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.212101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.212124]  ? __kthread_parkme+0x82/0x180
[   15.212151]  ? preempt_count_sub+0x50/0x80
[   15.212175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.212198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.212257]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.212306]  kthread+0x337/0x6f0
[   15.212327]  ? trace_preempt_on+0x20/0xc0
[   15.212377]  ? __pfx_kthread+0x10/0x10
[   15.212439]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.212462]  ? calculate_sigpending+0x7b/0xa0
[   15.212486]  ? __pfx_kthread+0x10/0x10
[   15.212509]  ret_from_fork+0x116/0x1d0
[   15.212530]  ? __pfx_kthread+0x10/0x10
[   15.212553]  ret_from_fork_asm+0x1a/0x30
[   15.212584]  </TASK>
[   15.212596] 
[   15.221059] Allocated by task 282:
[   15.221187]  kasan_save_stack+0x45/0x70
[   15.221428]  kasan_save_track+0x18/0x40
[   15.221656]  kasan_save_alloc_info+0x3b/0x50
[   15.221854]  __kasan_kmalloc+0xb7/0xc0
[   15.222041]  __kmalloc_cache_noprof+0x189/0x420
[   15.222273]  kasan_atomics+0x95/0x310
[   15.222466]  kunit_try_run_case+0x1a5/0x480
[   15.222709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.222911]  kthread+0x337/0x6f0
[   15.223042]  ret_from_fork+0x116/0x1d0
[   15.223232]  ret_from_fork_asm+0x1a/0x30
[   15.223434] 
[   15.223532] The buggy address belongs to the object at ffff8881033c5500
[   15.223532]  which belongs to the cache kmalloc-64 of size 64
[   15.223962] The buggy address is located 0 bytes to the right of
[   15.223962]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.224379] 
[   15.224508] The buggy address belongs to the physical page:
[   15.224913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.225278] flags: 0x200000000000000(node=0|zone=2)
[   15.225516] page_type: f5(slab)
[   15.225704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.226057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.226415] page dumped because: kasan: bad access detected
[   15.226682] 
[   15.226777] Memory state around the buggy address:
[   15.227012]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.227331]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.227662] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.227965]                                      ^
[   15.228187]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.228498]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.228895] ==================================================================
[   14.521492] ==================================================================
[   14.521888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.522370] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.522714] 
[   14.522825] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.522870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.522883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.522906] Call Trace:
[   14.522925]  <TASK>
[   14.522945]  dump_stack_lvl+0x73/0xb0
[   14.522973]  print_report+0xd1/0x650
[   14.522997]  ? __virt_addr_valid+0x1db/0x2d0
[   14.523042]  ? kasan_atomics_helper+0xe78/0x5450
[   14.523064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.523087]  ? kasan_atomics_helper+0xe78/0x5450
[   14.523109]  kasan_report+0x141/0x180
[   14.523141]  ? kasan_atomics_helper+0xe78/0x5450
[   14.523168]  kasan_check_range+0x10c/0x1c0
[   14.523192]  __kasan_check_write+0x18/0x20
[   14.523223]  kasan_atomics_helper+0xe78/0x5450
[   14.523246]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.523268]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.523294]  ? trace_hardirqs_on+0x37/0xe0
[   14.523317]  ? kasan_atomics+0x152/0x310
[   14.523345]  kasan_atomics+0x1dc/0x310
[   14.523368]  ? __pfx_kasan_atomics+0x10/0x10
[   14.523391]  ? __pfx_kasan_atomics+0x10/0x10
[   14.523418]  kunit_try_run_case+0x1a5/0x480
[   14.523442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.523465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.523499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.523523]  ? __kthread_parkme+0x82/0x180
[   14.523544]  ? preempt_count_sub+0x50/0x80
[   14.523580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.523604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.523627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.523663]  kthread+0x337/0x6f0
[   14.523683]  ? trace_preempt_on+0x20/0xc0
[   14.523706]  ? __pfx_kthread+0x10/0x10
[   14.523727]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.523749]  ? calculate_sigpending+0x7b/0xa0
[   14.523783]  ? __pfx_kthread+0x10/0x10
[   14.523805]  ret_from_fork+0x116/0x1d0
[   14.523824]  ? __pfx_kthread+0x10/0x10
[   14.523856]  ret_from_fork_asm+0x1a/0x30
[   14.523888]  </TASK>
[   14.523901] 
[   14.531546] Allocated by task 282:
[   14.531732]  kasan_save_stack+0x45/0x70
[   14.531935]  kasan_save_track+0x18/0x40
[   14.532161]  kasan_save_alloc_info+0x3b/0x50
[   14.532309]  __kasan_kmalloc+0xb7/0xc0
[   14.532440]  __kmalloc_cache_noprof+0x189/0x420
[   14.532924]  kasan_atomics+0x95/0x310
[   14.533126]  kunit_try_run_case+0x1a5/0x480
[   14.533359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.533658]  kthread+0x337/0x6f0
[   14.533831]  ret_from_fork+0x116/0x1d0
[   14.534011]  ret_from_fork_asm+0x1a/0x30
[   14.534162] 
[   14.534234] The buggy address belongs to the object at ffff8881033c5500
[   14.534234]  which belongs to the cache kmalloc-64 of size 64
[   14.534660] The buggy address is located 0 bytes to the right of
[   14.534660]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.535226] 
[   14.535336] The buggy address belongs to the physical page:
[   14.535591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.536042] flags: 0x200000000000000(node=0|zone=2)
[   14.536216] page_type: f5(slab)
[   14.536360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.536759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.537127] page dumped because: kasan: bad access detected
[   14.537377] 
[   14.537466] Memory state around the buggy address:
[   14.537675]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.537953]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.538178] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.538392]                                      ^
[   14.538623]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.538936]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.539257] ==================================================================
[   14.541173] ==================================================================
[   14.541545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.541986] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.542321] 
[   14.542430] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.542472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.542497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.542518] Call Trace:
[   14.542534]  <TASK>
[   14.542549]  dump_stack_lvl+0x73/0xb0
[   14.542642]  print_report+0xd1/0x650
[   14.542665]  ? __virt_addr_valid+0x1db/0x2d0
[   14.542690]  ? kasan_atomics_helper+0xf10/0x5450
[   14.542723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.542746]  ? kasan_atomics_helper+0xf10/0x5450
[   14.542768]  kasan_report+0x141/0x180
[   14.542791]  ? kasan_atomics_helper+0xf10/0x5450
[   14.542817]  kasan_check_range+0x10c/0x1c0
[   14.542850]  __kasan_check_write+0x18/0x20
[   14.542870]  kasan_atomics_helper+0xf10/0x5450
[   14.542893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.542926]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.542951]  ? trace_hardirqs_on+0x37/0xe0
[   14.542975]  ? kasan_atomics+0x152/0x310
[   14.543001]  kasan_atomics+0x1dc/0x310
[   14.543033]  ? __pfx_kasan_atomics+0x10/0x10
[   14.543057]  ? __pfx_kasan_atomics+0x10/0x10
[   14.543084]  kunit_try_run_case+0x1a5/0x480
[   14.543108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.543130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.543155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.543179]  ? __kthread_parkme+0x82/0x180
[   14.543209]  ? preempt_count_sub+0x50/0x80
[   14.543233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.543258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.543291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.543315]  kthread+0x337/0x6f0
[   14.543336]  ? trace_preempt_on+0x20/0xc0
[   14.543358]  ? __pfx_kthread+0x10/0x10
[   14.543379]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.543400]  ? calculate_sigpending+0x7b/0xa0
[   14.543424]  ? __pfx_kthread+0x10/0x10
[   14.543446]  ret_from_fork+0x116/0x1d0
[   14.543465]  ? __pfx_kthread+0x10/0x10
[   14.543486]  ret_from_fork_asm+0x1a/0x30
[   14.543527]  </TASK>
[   14.543541] 
[   14.551418] Allocated by task 282:
[   14.551624]  kasan_save_stack+0x45/0x70
[   14.551868]  kasan_save_track+0x18/0x40
[   14.552088]  kasan_save_alloc_info+0x3b/0x50
[   14.552299]  __kasan_kmalloc+0xb7/0xc0
[   14.552457]  __kmalloc_cache_noprof+0x189/0x420
[   14.552659]  kasan_atomics+0x95/0x310
[   14.552863]  kunit_try_run_case+0x1a5/0x480
[   14.553092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.553326]  kthread+0x337/0x6f0
[   14.553496]  ret_from_fork+0x116/0x1d0
[   14.553679]  ret_from_fork_asm+0x1a/0x30
[   14.553879] 
[   14.553970] The buggy address belongs to the object at ffff8881033c5500
[   14.553970]  which belongs to the cache kmalloc-64 of size 64
[   14.554458] The buggy address is located 0 bytes to the right of
[   14.554458]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.555064] 
[   14.555150] The buggy address belongs to the physical page:
[   14.555391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.555753] flags: 0x200000000000000(node=0|zone=2)
[   14.555987] page_type: f5(slab)
[   14.556151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.556428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.556657] page dumped because: kasan: bad access detected
[   14.556830] 
[   14.556900] Memory state around the buggy address:
[   14.557199]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.557526]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.558124] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.558448]                                      ^
[   14.558636]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.558961]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.559206] ==================================================================
[   14.821989] ==================================================================
[   14.822599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.823057] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.823655] 
[   14.823868] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.823916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.823938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.823962] Call Trace:
[   14.823981]  <TASK>
[   14.824000]  dump_stack_lvl+0x73/0xb0
[   14.824051]  print_report+0xd1/0x650
[   14.824075]  ? __virt_addr_valid+0x1db/0x2d0
[   14.824100]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.824122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.824148]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.824171]  kasan_report+0x141/0x180
[   14.824194]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.824220]  __asan_report_store8_noabort+0x1b/0x30
[   14.824242]  kasan_atomics_helper+0x50d4/0x5450
[   14.824265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.824289]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.824325]  ? trace_hardirqs_on+0x37/0xe0
[   14.824348]  ? kasan_atomics+0x152/0x310
[   14.824386]  kasan_atomics+0x1dc/0x310
[   14.824410]  ? __pfx_kasan_atomics+0x10/0x10
[   14.824434]  ? __pfx_kasan_atomics+0x10/0x10
[   14.824461]  kunit_try_run_case+0x1a5/0x480
[   14.824486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.824518]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.824544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.824567]  ? __kthread_parkme+0x82/0x180
[   14.824600]  ? preempt_count_sub+0x50/0x80
[   14.824623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.824659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.824683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.824706]  kthread+0x337/0x6f0
[   14.824726]  ? trace_preempt_on+0x20/0xc0
[   14.824748]  ? __pfx_kthread+0x10/0x10
[   14.824769]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.824791]  ? calculate_sigpending+0x7b/0xa0
[   14.824816]  ? __pfx_kthread+0x10/0x10
[   14.824837]  ret_from_fork+0x116/0x1d0
[   14.824858]  ? __pfx_kthread+0x10/0x10
[   14.824878]  ret_from_fork_asm+0x1a/0x30
[   14.824910]  </TASK>
[   14.824922] 
[   14.836863] Allocated by task 282:
[   14.837209]  kasan_save_stack+0x45/0x70
[   14.837584]  kasan_save_track+0x18/0x40
[   14.838017]  kasan_save_alloc_info+0x3b/0x50
[   14.838363]  __kasan_kmalloc+0xb7/0xc0
[   14.838498]  __kmalloc_cache_noprof+0x189/0x420
[   14.838675]  kasan_atomics+0x95/0x310
[   14.839053]  kunit_try_run_case+0x1a5/0x480
[   14.839455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.839940]  kthread+0x337/0x6f0
[   14.840281]  ret_from_fork+0x116/0x1d0
[   14.840649]  ret_from_fork_asm+0x1a/0x30
[   14.840925] 
[   14.840998] The buggy address belongs to the object at ffff8881033c5500
[   14.840998]  which belongs to the cache kmalloc-64 of size 64
[   14.841346] The buggy address is located 0 bytes to the right of
[   14.841346]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.841734] 
[   14.841901] The buggy address belongs to the physical page:
[   14.842531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.843037] flags: 0x200000000000000(node=0|zone=2)
[   14.843203] page_type: f5(slab)
[   14.843323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.843547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.843812] page dumped because: kasan: bad access detected
[   14.844127] 
[   14.844218] Memory state around the buggy address:
[   14.844438]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.844707]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.845032] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.845343]                                      ^
[   14.845497]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.845957]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.846281] ==================================================================
[   14.946132] ==================================================================
[   14.946466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.946821] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.947136] 
[   14.947255] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.947312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.947325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.947361] Call Trace:
[   14.947380]  <TASK>
[   14.947399]  dump_stack_lvl+0x73/0xb0
[   14.947440]  print_report+0xd1/0x650
[   14.947465]  ? __virt_addr_valid+0x1db/0x2d0
[   14.947489]  ? kasan_atomics_helper+0x1818/0x5450
[   14.947511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.947534]  ? kasan_atomics_helper+0x1818/0x5450
[   14.947556]  kasan_report+0x141/0x180
[   14.947588]  ? kasan_atomics_helper+0x1818/0x5450
[   14.947614]  kasan_check_range+0x10c/0x1c0
[   14.947639]  __kasan_check_write+0x18/0x20
[   14.947678]  kasan_atomics_helper+0x1818/0x5450
[   14.947701]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.947724]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.947749]  ? trace_hardirqs_on+0x37/0xe0
[   14.947781]  ? kasan_atomics+0x152/0x310
[   14.947808]  kasan_atomics+0x1dc/0x310
[   14.947843]  ? __pfx_kasan_atomics+0x10/0x10
[   14.947867]  ? __pfx_kasan_atomics+0x10/0x10
[   14.947894]  kunit_try_run_case+0x1a5/0x480
[   14.947918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.947941]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.947965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.947989]  ? __kthread_parkme+0x82/0x180
[   14.948010]  ? preempt_count_sub+0x50/0x80
[   14.948053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.948077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.948101]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.948134]  kthread+0x337/0x6f0
[   14.948157]  ? trace_preempt_on+0x20/0xc0
[   14.948180]  ? __pfx_kthread+0x10/0x10
[   14.948201]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.948223]  ? calculate_sigpending+0x7b/0xa0
[   14.948256]  ? __pfx_kthread+0x10/0x10
[   14.948278]  ret_from_fork+0x116/0x1d0
[   14.948297]  ? __pfx_kthread+0x10/0x10
[   14.948318]  ret_from_fork_asm+0x1a/0x30
[   14.948360]  </TASK>
[   14.948373] 
[   14.956213] Allocated by task 282:
[   14.956407]  kasan_save_stack+0x45/0x70
[   14.956625]  kasan_save_track+0x18/0x40
[   14.956853]  kasan_save_alloc_info+0x3b/0x50
[   14.957062]  __kasan_kmalloc+0xb7/0xc0
[   14.957230]  __kmalloc_cache_noprof+0x189/0x420
[   14.957449]  kasan_atomics+0x95/0x310
[   14.957629]  kunit_try_run_case+0x1a5/0x480
[   14.957875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.958144]  kthread+0x337/0x6f0
[   14.958324]  ret_from_fork+0x116/0x1d0
[   14.958497]  ret_from_fork_asm+0x1a/0x30
[   14.958638] 
[   14.958771] The buggy address belongs to the object at ffff8881033c5500
[   14.958771]  which belongs to the cache kmalloc-64 of size 64
[   14.959300] The buggy address is located 0 bytes to the right of
[   14.959300]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.959874] 
[   14.959996] The buggy address belongs to the physical page:
[   14.960241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.960582] flags: 0x200000000000000(node=0|zone=2)
[   14.960856] page_type: f5(slab)
[   14.961040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.961281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.961511] page dumped because: kasan: bad access detected
[   14.961704] 
[   14.961828] Memory state around the buggy address:
[   14.962060]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.962376]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.962654] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.962936]                                      ^
[   14.963101]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.963317]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.963615] ==================================================================
[   14.596783] ==================================================================
[   14.597478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.598085] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.598363] 
[   14.598456] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.598499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.598513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.598535] Call Trace:
[   14.598556]  <TASK>
[   14.598574]  dump_stack_lvl+0x73/0xb0
[   14.598603]  print_report+0xd1/0x650
[   14.598625]  ? __virt_addr_valid+0x1db/0x2d0
[   14.598660]  ? kasan_atomics_helper+0x1079/0x5450
[   14.598681]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.598716]  ? kasan_atomics_helper+0x1079/0x5450
[   14.598737]  kasan_report+0x141/0x180
[   14.598760]  ? kasan_atomics_helper+0x1079/0x5450
[   14.598798]  kasan_check_range+0x10c/0x1c0
[   14.598822]  __kasan_check_write+0x18/0x20
[   14.598842]  kasan_atomics_helper+0x1079/0x5450
[   14.598865]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.598897]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.598921]  ? trace_hardirqs_on+0x37/0xe0
[   14.598945]  ? kasan_atomics+0x152/0x310
[   14.598982]  kasan_atomics+0x1dc/0x310
[   14.599006]  ? __pfx_kasan_atomics+0x10/0x10
[   14.599039]  ? __pfx_kasan_atomics+0x10/0x10
[   14.599075]  kunit_try_run_case+0x1a5/0x480
[   14.599099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.599132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.599158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.599181]  ? __kthread_parkme+0x82/0x180
[   14.599203]  ? preempt_count_sub+0x50/0x80
[   14.599236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.599260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.599284]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.599318]  kthread+0x337/0x6f0
[   14.599339]  ? trace_preempt_on+0x20/0xc0
[   14.599361]  ? __pfx_kthread+0x10/0x10
[   14.599391]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.599413]  ? calculate_sigpending+0x7b/0xa0
[   14.599436]  ? __pfx_kthread+0x10/0x10
[   14.599469]  ret_from_fork+0x116/0x1d0
[   14.599489]  ? __pfx_kthread+0x10/0x10
[   14.599510]  ret_from_fork_asm+0x1a/0x30
[   14.599550]  </TASK>
[   14.599562] 
[   14.607363] Allocated by task 282:
[   14.607489]  kasan_save_stack+0x45/0x70
[   14.607632]  kasan_save_track+0x18/0x40
[   14.607854]  kasan_save_alloc_info+0x3b/0x50
[   14.608076]  __kasan_kmalloc+0xb7/0xc0
[   14.608270]  __kmalloc_cache_noprof+0x189/0x420
[   14.608435]  kasan_atomics+0x95/0x310
[   14.608655]  kunit_try_run_case+0x1a5/0x480
[   14.608811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.608979]  kthread+0x337/0x6f0
[   14.609107]  ret_from_fork+0x116/0x1d0
[   14.609235]  ret_from_fork_asm+0x1a/0x30
[   14.609370] 
[   14.609439] The buggy address belongs to the object at ffff8881033c5500
[   14.609439]  which belongs to the cache kmalloc-64 of size 64
[   14.609868] The buggy address is located 0 bytes to the right of
[   14.609868]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.610506] 
[   14.610617] The buggy address belongs to the physical page:
[   14.610886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.611161] flags: 0x200000000000000(node=0|zone=2)
[   14.611319] page_type: f5(slab)
[   14.611436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.611660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.612237] page dumped because: kasan: bad access detected
[   14.612490] 
[   14.612608] Memory state around the buggy address:
[   14.613076]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.613426]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.613899] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.614134]                                      ^
[   14.614359]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.614672]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.614916] ==================================================================
[   15.298786] ==================================================================
[   15.299146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.299795] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.300118] 
[   15.300223] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.300266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.300279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.300302] Call Trace:
[   15.300319]  <TASK>
[   15.300335]  dump_stack_lvl+0x73/0xb0
[   15.300364]  print_report+0xd1/0x650
[   15.300387]  ? __virt_addr_valid+0x1db/0x2d0
[   15.300412]  ? kasan_atomics_helper+0x218a/0x5450
[   15.300434]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.300457]  ? kasan_atomics_helper+0x218a/0x5450
[   15.300479]  kasan_report+0x141/0x180
[   15.300502]  ? kasan_atomics_helper+0x218a/0x5450
[   15.300528]  kasan_check_range+0x10c/0x1c0
[   15.300552]  __kasan_check_write+0x18/0x20
[   15.300572]  kasan_atomics_helper+0x218a/0x5450
[   15.300595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.300618]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.300667]  ? trace_hardirqs_on+0x37/0xe0
[   15.300690]  ? kasan_atomics+0x152/0x310
[   15.300718]  kasan_atomics+0x1dc/0x310
[   15.300741]  ? __pfx_kasan_atomics+0x10/0x10
[   15.300765]  ? __pfx_kasan_atomics+0x10/0x10
[   15.300792]  kunit_try_run_case+0x1a5/0x480
[   15.300816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.300839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.300864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.300888]  ? __kthread_parkme+0x82/0x180
[   15.300910]  ? preempt_count_sub+0x50/0x80
[   15.300935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.300960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.300984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.301008]  kthread+0x337/0x6f0
[   15.301037]  ? trace_preempt_on+0x20/0xc0
[   15.301060]  ? __pfx_kthread+0x10/0x10
[   15.301081]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.301102]  ? calculate_sigpending+0x7b/0xa0
[   15.301126]  ? __pfx_kthread+0x10/0x10
[   15.301149]  ret_from_fork+0x116/0x1d0
[   15.301168]  ? __pfx_kthread+0x10/0x10
[   15.301190]  ret_from_fork_asm+0x1a/0x30
[   15.301221]  </TASK>
[   15.301233] 
[   15.308788] Allocated by task 282:
[   15.308915]  kasan_save_stack+0x45/0x70
[   15.309730]  kasan_save_track+0x18/0x40
[   15.309934]  kasan_save_alloc_info+0x3b/0x50
[   15.310158]  __kasan_kmalloc+0xb7/0xc0
[   15.310321]  __kmalloc_cache_noprof+0x189/0x420
[   15.310542]  kasan_atomics+0x95/0x310
[   15.311751]  kunit_try_run_case+0x1a5/0x480
[   15.311933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.312202]  kthread+0x337/0x6f0
[   15.312360]  ret_from_fork+0x116/0x1d0
[   15.312528]  ret_from_fork_asm+0x1a/0x30
[   15.312981] 
[   15.313087] The buggy address belongs to the object at ffff8881033c5500
[   15.313087]  which belongs to the cache kmalloc-64 of size 64
[   15.313783] The buggy address is located 0 bytes to the right of
[   15.313783]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.314335] 
[   15.314559] The buggy address belongs to the physical page:
[   15.314813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.315279] flags: 0x200000000000000(node=0|zone=2)
[   15.315525] page_type: f5(slab)
[   15.315820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.316150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.316466] page dumped because: kasan: bad access detected
[   15.316857] 
[   15.316962] Memory state around the buggy address:
[   15.317342]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.317672]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.317923] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.318367]                                      ^
[   15.318692]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.318964]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.319287] ==================================================================
[   15.021171] ==================================================================
[   15.021532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.022102] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.022445] 
[   15.022563] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.022618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.022632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.022654] Call Trace:
[   15.022686]  <TASK>
[   15.022716]  dump_stack_lvl+0x73/0xb0
[   15.022746]  print_report+0xd1/0x650
[   15.022770]  ? __virt_addr_valid+0x1db/0x2d0
[   15.022805]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.022827]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.022849]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.022882]  kasan_report+0x141/0x180
[   15.022905]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.022931]  kasan_check_range+0x10c/0x1c0
[   15.022963]  __kasan_check_write+0x18/0x20
[   15.022983]  kasan_atomics_helper+0x1a7f/0x5450
[   15.023006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.023044]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.023069]  ? trace_hardirqs_on+0x37/0xe0
[   15.023093]  ? kasan_atomics+0x152/0x310
[   15.023121]  kasan_atomics+0x1dc/0x310
[   15.023154]  ? __pfx_kasan_atomics+0x10/0x10
[   15.023178]  ? __pfx_kasan_atomics+0x10/0x10
[   15.023205]  kunit_try_run_case+0x1a5/0x480
[   15.023239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023263]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.023287]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.023311]  ? __kthread_parkme+0x82/0x180
[   15.023333]  ? preempt_count_sub+0x50/0x80
[   15.023357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.023405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.023430]  kthread+0x337/0x6f0
[   15.023449]  ? trace_preempt_on+0x20/0xc0
[   15.023480]  ? __pfx_kthread+0x10/0x10
[   15.023502]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.023523]  ? calculate_sigpending+0x7b/0xa0
[   15.023558]  ? __pfx_kthread+0x10/0x10
[   15.023580]  ret_from_fork+0x116/0x1d0
[   15.023600]  ? __pfx_kthread+0x10/0x10
[   15.023620]  ret_from_fork_asm+0x1a/0x30
[   15.023653]  </TASK>
[   15.023666] 
[   15.031281] Allocated by task 282:
[   15.031413]  kasan_save_stack+0x45/0x70
[   15.031616]  kasan_save_track+0x18/0x40
[   15.031848]  kasan_save_alloc_info+0x3b/0x50
[   15.032059]  __kasan_kmalloc+0xb7/0xc0
[   15.032257]  __kmalloc_cache_noprof+0x189/0x420
[   15.032476]  kasan_atomics+0x95/0x310
[   15.032674]  kunit_try_run_case+0x1a5/0x480
[   15.032874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.033130]  kthread+0x337/0x6f0
[   15.033311]  ret_from_fork+0x116/0x1d0
[   15.033494]  ret_from_fork_asm+0x1a/0x30
[   15.033740] 
[   15.033826] The buggy address belongs to the object at ffff8881033c5500
[   15.033826]  which belongs to the cache kmalloc-64 of size 64
[   15.034341] The buggy address is located 0 bytes to the right of
[   15.034341]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.034885] 
[   15.035003] The buggy address belongs to the physical page:
[   15.035250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.035560] flags: 0x200000000000000(node=0|zone=2)
[   15.035867] page_type: f5(slab)
[   15.036032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.036370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.036730] page dumped because: kasan: bad access detected
[   15.036974] 
[   15.037103] Memory state around the buggy address:
[   15.037310]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.037528]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.037743] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.037955]                                      ^
[   15.038123]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.038703]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039041] ==================================================================
[   15.281982] ==================================================================
[   15.282227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.282456] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.282792] 
[   15.282901] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.282942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.282954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.282976] Call Trace:
[   15.282992]  <TASK>
[   15.283007]  dump_stack_lvl+0x73/0xb0
[   15.283045]  print_report+0xd1/0x650
[   15.283068]  ? __virt_addr_valid+0x1db/0x2d0
[   15.283092]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.283115]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.283137]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.283159]  kasan_report+0x141/0x180
[   15.283182]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.283208]  __asan_report_load8_noabort+0x18/0x20
[   15.283233]  kasan_atomics_helper+0x4fb2/0x5450
[   15.283256]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.283279]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.283302]  ? trace_hardirqs_on+0x37/0xe0
[   15.283325]  ? kasan_atomics+0x152/0x310
[   15.283351]  kasan_atomics+0x1dc/0x310
[   15.283375]  ? __pfx_kasan_atomics+0x10/0x10
[   15.283399]  ? __pfx_kasan_atomics+0x10/0x10
[   15.283426]  kunit_try_run_case+0x1a5/0x480
[   15.283451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.283473]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.283498]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.283522]  ? __kthread_parkme+0x82/0x180
[   15.283542]  ? preempt_count_sub+0x50/0x80
[   15.283567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.283591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.283614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.283659]  kthread+0x337/0x6f0
[   15.283680]  ? trace_preempt_on+0x20/0xc0
[   15.283702]  ? __pfx_kthread+0x10/0x10
[   15.283724]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.283745]  ? calculate_sigpending+0x7b/0xa0
[   15.283769]  ? __pfx_kthread+0x10/0x10
[   15.283792]  ret_from_fork+0x116/0x1d0
[   15.283811]  ? __pfx_kthread+0x10/0x10
[   15.283831]  ret_from_fork_asm+0x1a/0x30
[   15.283862]  </TASK>
[   15.283874] 
[   15.290933] Allocated by task 282:
[   15.291083]  kasan_save_stack+0x45/0x70
[   15.291285]  kasan_save_track+0x18/0x40
[   15.291476]  kasan_save_alloc_info+0x3b/0x50
[   15.291713]  __kasan_kmalloc+0xb7/0xc0
[   15.291900]  __kmalloc_cache_noprof+0x189/0x420
[   15.292133]  kasan_atomics+0x95/0x310
[   15.292326]  kunit_try_run_case+0x1a5/0x480
[   15.292534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.292809]  kthread+0x337/0x6f0
[   15.292977]  ret_from_fork+0x116/0x1d0
[   15.293158]  ret_from_fork_asm+0x1a/0x30
[   15.293342] 
[   15.293426] The buggy address belongs to the object at ffff8881033c5500
[   15.293426]  which belongs to the cache kmalloc-64 of size 64
[   15.293870] The buggy address is located 0 bytes to the right of
[   15.293870]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.294366] 
[   15.294462] The buggy address belongs to the physical page:
[   15.294743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.295029] flags: 0x200000000000000(node=0|zone=2)
[   15.295252] page_type: f5(slab)
[   15.295423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.295773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.296102] page dumped because: kasan: bad access detected
[   15.296359] 
[   15.296443] Memory state around the buggy address:
[   15.296685]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.296989]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.297286] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.297534]                                      ^
[   15.297706]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.297921]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.298143] ==================================================================
[   15.111050] ==================================================================
[   15.111294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.111580] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.111987] 
[   15.112627] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.112679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.112692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.112715] Call Trace:
[   15.112925]  <TASK>
[   15.112952]  dump_stack_lvl+0x73/0xb0
[   15.112986]  print_report+0xd1/0x650
[   15.113010]  ? __virt_addr_valid+0x1db/0x2d0
[   15.113048]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.113072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.113095]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.113117]  kasan_report+0x141/0x180
[   15.113139]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.113166]  kasan_check_range+0x10c/0x1c0
[   15.113190]  __kasan_check_write+0x18/0x20
[   15.113210]  kasan_atomics_helper+0x1ce1/0x5450
[   15.113232]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.113255]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.113281]  ? trace_hardirqs_on+0x37/0xe0
[   15.113305]  ? kasan_atomics+0x152/0x310
[   15.113331]  kasan_atomics+0x1dc/0x310
[   15.113355]  ? __pfx_kasan_atomics+0x10/0x10
[   15.113378]  ? __pfx_kasan_atomics+0x10/0x10
[   15.113405]  kunit_try_run_case+0x1a5/0x480
[   15.113429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.113452]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.113476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.113499]  ? __kthread_parkme+0x82/0x180
[   15.113521]  ? preempt_count_sub+0x50/0x80
[   15.113546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.113569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.113593]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.113616]  kthread+0x337/0x6f0
[   15.113636]  ? trace_preempt_on+0x20/0xc0
[   15.113658]  ? __pfx_kthread+0x10/0x10
[   15.113679]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.113701]  ? calculate_sigpending+0x7b/0xa0
[   15.113725]  ? __pfx_kthread+0x10/0x10
[   15.113746]  ret_from_fork+0x116/0x1d0
[   15.113767]  ? __pfx_kthread+0x10/0x10
[   15.113788]  ret_from_fork_asm+0x1a/0x30
[   15.113819]  </TASK>
[   15.113831] 
[   15.124824] Allocated by task 282:
[   15.125003]  kasan_save_stack+0x45/0x70
[   15.125215]  kasan_save_track+0x18/0x40
[   15.125397]  kasan_save_alloc_info+0x3b/0x50
[   15.125604]  __kasan_kmalloc+0xb7/0xc0
[   15.125829]  __kmalloc_cache_noprof+0x189/0x420
[   15.126038]  kasan_atomics+0x95/0x310
[   15.126224]  kunit_try_run_case+0x1a5/0x480
[   15.126424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.126677]  kthread+0x337/0x6f0
[   15.126851]  ret_from_fork+0x116/0x1d0
[   15.127049]  ret_from_fork_asm+0x1a/0x30
[   15.127250] 
[   15.127342] The buggy address belongs to the object at ffff8881033c5500
[   15.127342]  which belongs to the cache kmalloc-64 of size 64
[   15.127858] The buggy address is located 0 bytes to the right of
[   15.127858]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.128246] 
[   15.128322] The buggy address belongs to the physical page:
[   15.128491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.128782] flags: 0x200000000000000(node=0|zone=2)
[   15.129035] page_type: f5(slab)
[   15.129209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.129560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.129944] page dumped because: kasan: bad access detected
[   15.130207] 
[   15.130307] Memory state around the buggy address:
[   15.130505]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.130827]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.131123] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.131333]                                      ^
[   15.131483]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.131724]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.132054] ==================================================================
[   15.132752] ==================================================================
[   15.133272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.133589] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.133910] 
[   15.134003] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.134061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.134075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.134098] Call Trace:
[   15.134118]  <TASK>
[   15.134137]  dump_stack_lvl+0x73/0xb0
[   15.134167]  print_report+0xd1/0x650
[   15.134192]  ? __virt_addr_valid+0x1db/0x2d0
[   15.134216]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.134237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.134260]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.134306]  kasan_report+0x141/0x180
[   15.134332]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.134359]  kasan_check_range+0x10c/0x1c0
[   15.134382]  __kasan_check_write+0x18/0x20
[   15.134403]  kasan_atomics_helper+0x1d7a/0x5450
[   15.134426]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.134448]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.134493]  ? trace_hardirqs_on+0x37/0xe0
[   15.134517]  ? kasan_atomics+0x152/0x310
[   15.134544]  kasan_atomics+0x1dc/0x310
[   15.134567]  ? __pfx_kasan_atomics+0x10/0x10
[   15.134592]  ? __pfx_kasan_atomics+0x10/0x10
[   15.134618]  kunit_try_run_case+0x1a5/0x480
[   15.134654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.134676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.134701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.134725]  ? __kthread_parkme+0x82/0x180
[   15.134746]  ? preempt_count_sub+0x50/0x80
[   15.134770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.134794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.134838]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.134862]  kthread+0x337/0x6f0
[   15.134882]  ? trace_preempt_on+0x20/0xc0
[   15.134905]  ? __pfx_kthread+0x10/0x10
[   15.134925]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.134947]  ? calculate_sigpending+0x7b/0xa0
[   15.134971]  ? __pfx_kthread+0x10/0x10
[   15.134993]  ret_from_fork+0x116/0x1d0
[   15.135012]  ? __pfx_kthread+0x10/0x10
[   15.135044]  ret_from_fork_asm+0x1a/0x30
[   15.135079]  </TASK>
[   15.135092] 
[   15.142860] Allocated by task 282:
[   15.143030]  kasan_save_stack+0x45/0x70
[   15.143230]  kasan_save_track+0x18/0x40
[   15.143423]  kasan_save_alloc_info+0x3b/0x50
[   15.143589]  __kasan_kmalloc+0xb7/0xc0
[   15.143919]  __kmalloc_cache_noprof+0x189/0x420
[   15.144092]  kasan_atomics+0x95/0x310
[   15.144233]  kunit_try_run_case+0x1a5/0x480
[   15.144381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.144634]  kthread+0x337/0x6f0
[   15.144802]  ret_from_fork+0x116/0x1d0
[   15.145056]  ret_from_fork_asm+0x1a/0x30
[   15.145259] 
[   15.145355] The buggy address belongs to the object at ffff8881033c5500
[   15.145355]  which belongs to the cache kmalloc-64 of size 64
[   15.145761] The buggy address is located 0 bytes to the right of
[   15.145761]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.146334] 
[   15.146430] The buggy address belongs to the physical page:
[   15.146695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.146936] flags: 0x200000000000000(node=0|zone=2)
[   15.147113] page_type: f5(slab)
[   15.147270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.147637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.147980] page dumped because: kasan: bad access detected
[   15.148290] 
[   15.148365] Memory state around the buggy address:
[   15.148558]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.148777]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.149092] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.149607]                                      ^
[   15.149851]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.150074]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.150578] ==================================================================
[   15.229843] ==================================================================
[   15.230190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.230424] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282
[   15.230745] 
[   15.230982] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.231066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.231079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.231103] Call Trace:
[   15.231124]  <TASK>
[   15.231143]  dump_stack_lvl+0x73/0xb0
[   15.231173]  print_report+0xd1/0x650
[   15.231197]  ? __virt_addr_valid+0x1db/0x2d0
[   15.231222]  ? kasan_atomics_helper+0x2006/0x5450
[   15.231244]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.231267]  ? kasan_atomics_helper+0x2006/0x5450
[   15.231289]  kasan_report+0x141/0x180
[   15.231312]  ? kasan_atomics_helper+0x2006/0x5450
[   15.231338]  kasan_check_range+0x10c/0x1c0
[   15.231362]  __kasan_check_write+0x18/0x20
[   15.231383]  kasan_atomics_helper+0x2006/0x5450
[   15.231406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.231430]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.231455]  ? trace_hardirqs_on+0x37/0xe0
[   15.231479]  ? kasan_atomics+0x152/0x310
[   15.231505]  kasan_atomics+0x1dc/0x310
[   15.231528]  ? __pfx_kasan_atomics+0x10/0x10
[   15.231552]  ? __pfx_kasan_atomics+0x10/0x10
[   15.231579]  kunit_try_run_case+0x1a5/0x480
[   15.231604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.231627]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.231663]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.231685]  ? __kthread_parkme+0x82/0x180
[   15.231706]  ? preempt_count_sub+0x50/0x80
[   15.231731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.231754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.231778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.231801]  kthread+0x337/0x6f0
[   15.231820]  ? trace_preempt_on+0x20/0xc0
[   15.231843]  ? __pfx_kthread+0x10/0x10
[   15.231863]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.231886]  ? calculate_sigpending+0x7b/0xa0
[   15.231910]  ? __pfx_kthread+0x10/0x10
[   15.231932]  ret_from_fork+0x116/0x1d0
[   15.231951]  ? __pfx_kthread+0x10/0x10
[   15.231972]  ret_from_fork_asm+0x1a/0x30
[   15.232004]  </TASK>
[   15.232017] 
[   15.239494] Allocated by task 282:
[   15.239666]  kasan_save_stack+0x45/0x70
[   15.239866]  kasan_save_track+0x18/0x40
[   15.240063]  kasan_save_alloc_info+0x3b/0x50
[   15.240274]  __kasan_kmalloc+0xb7/0xc0
[   15.240481]  __kmalloc_cache_noprof+0x189/0x420
[   15.240938]  kasan_atomics+0x95/0x310
[   15.241133]  kunit_try_run_case+0x1a5/0x480
[   15.241288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.241458]  kthread+0x337/0x6f0
[   15.241575]  ret_from_fork+0x116/0x1d0
[   15.241882]  ret_from_fork_asm+0x1a/0x30
[   15.242098] 
[   15.242218] The buggy address belongs to the object at ffff8881033c5500
[   15.242218]  which belongs to the cache kmalloc-64 of size 64
[   15.242820] The buggy address is located 0 bytes to the right of
[   15.242820]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   15.243279] 
[   15.243351] The buggy address belongs to the physical page:
[   15.243518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   15.243825] flags: 0x200000000000000(node=0|zone=2)
[   15.244074] page_type: f5(slab)
[   15.244250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.244736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.244959] page dumped because: kasan: bad access detected
[   15.245136] 
[   15.245206] Memory state around the buggy address:
[   15.245452]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.245763]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.246244] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.246448]                                      ^
[   15.246596]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246801]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.247005] ==================================================================
[   14.635843] ==================================================================
[   14.636229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.636557] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.637005] 
[   14.637154] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.637200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.637214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.637235] Call Trace:
[   14.637273]  <TASK>
[   14.637292]  dump_stack_lvl+0x73/0xb0
[   14.637336]  print_report+0xd1/0x650
[   14.637374]  ? __virt_addr_valid+0x1db/0x2d0
[   14.637411]  ? kasan_atomics_helper+0x1148/0x5450
[   14.637433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.637469]  ? kasan_atomics_helper+0x1148/0x5450
[   14.637491]  kasan_report+0x141/0x180
[   14.637528]  ? kasan_atomics_helper+0x1148/0x5450
[   14.637555]  kasan_check_range+0x10c/0x1c0
[   14.637591]  __kasan_check_write+0x18/0x20
[   14.637624]  kasan_atomics_helper+0x1148/0x5450
[   14.637660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.637683]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.637709]  ? trace_hardirqs_on+0x37/0xe0
[   14.637732]  ? kasan_atomics+0x152/0x310
[   14.637759]  kasan_atomics+0x1dc/0x310
[   14.637782]  ? __pfx_kasan_atomics+0x10/0x10
[   14.637805]  ? __pfx_kasan_atomics+0x10/0x10
[   14.637833]  kunit_try_run_case+0x1a5/0x480
[   14.637858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.637880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.637905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.637928]  ? __kthread_parkme+0x82/0x180
[   14.637950]  ? preempt_count_sub+0x50/0x80
[   14.637974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.637999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.638032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.638056]  kthread+0x337/0x6f0
[   14.638075]  ? trace_preempt_on+0x20/0xc0
[   14.638097]  ? __pfx_kthread+0x10/0x10
[   14.638118]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.638141]  ? calculate_sigpending+0x7b/0xa0
[   14.638165]  ? __pfx_kthread+0x10/0x10
[   14.638187]  ret_from_fork+0x116/0x1d0
[   14.638207]  ? __pfx_kthread+0x10/0x10
[   14.638228]  ret_from_fork_asm+0x1a/0x30
[   14.638260]  </TASK>
[   14.638273] 
[   14.645917] Allocated by task 282:
[   14.646222]  kasan_save_stack+0x45/0x70
[   14.646369]  kasan_save_track+0x18/0x40
[   14.646501]  kasan_save_alloc_info+0x3b/0x50
[   14.646739]  __kasan_kmalloc+0xb7/0xc0
[   14.646951]  __kmalloc_cache_noprof+0x189/0x420
[   14.647209]  kasan_atomics+0x95/0x310
[   14.647399]  kunit_try_run_case+0x1a5/0x480
[   14.647610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647845]  kthread+0x337/0x6f0
[   14.647969]  ret_from_fork+0x116/0x1d0
[   14.648192]  ret_from_fork_asm+0x1a/0x30
[   14.648390] 
[   14.648487] The buggy address belongs to the object at ffff8881033c5500
[   14.648487]  which belongs to the cache kmalloc-64 of size 64
[   14.648988] The buggy address is located 0 bytes to the right of
[   14.648988]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.649493] 
[   14.649592] The buggy address belongs to the physical page:
[   14.649859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.650215] flags: 0x200000000000000(node=0|zone=2)
[   14.650419] page_type: f5(slab)
[   14.650570] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.650930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.651326] page dumped because: kasan: bad access detected
[   14.651597] 
[   14.651669] Memory state around the buggy address:
[   14.651906]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.652228]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.652536] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.652816]                                      ^
[   14.652968]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.653184]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.653393] ==================================================================
[   14.161299] ==================================================================
[   14.161824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.162195] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282
[   14.162465] 
[   14.162557] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.162603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.162616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.162639] Call Trace:
[   14.162658]  <TASK>
[   14.162676]  dump_stack_lvl+0x73/0xb0
[   14.162716]  print_report+0xd1/0x650
[   14.162740]  ? __virt_addr_valid+0x1db/0x2d0
[   14.162765]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.162799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.162821]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.162844]  kasan_report+0x141/0x180
[   14.162867]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.162893]  __asan_report_load4_noabort+0x18/0x20
[   14.162918]  kasan_atomics_helper+0x4b54/0x5450
[   14.162941]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.162963]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.162989]  ? trace_hardirqs_on+0x37/0xe0
[   14.163012]  ? kasan_atomics+0x152/0x310
[   14.163048]  kasan_atomics+0x1dc/0x310
[   14.163072]  ? __pfx_kasan_atomics+0x10/0x10
[   14.163095]  ? __pfx_kasan_atomics+0x10/0x10
[   14.163135]  kunit_try_run_case+0x1a5/0x480
[   14.163160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.163183]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.163209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.163232]  ? __kthread_parkme+0x82/0x180
[   14.163253]  ? preempt_count_sub+0x50/0x80
[   14.163287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.163311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.163335]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.163371]  kthread+0x337/0x6f0
[   14.163390]  ? trace_preempt_on+0x20/0xc0
[   14.163413]  ? __pfx_kthread+0x10/0x10
[   14.163434]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.163456]  ? calculate_sigpending+0x7b/0xa0
[   14.163480]  ? __pfx_kthread+0x10/0x10
[   14.163503]  ret_from_fork+0x116/0x1d0
[   14.163523]  ? __pfx_kthread+0x10/0x10
[   14.163544]  ret_from_fork_asm+0x1a/0x30
[   14.163575]  </TASK>
[   14.163587] 
[   14.171756] Allocated by task 282:
[   14.171894]  kasan_save_stack+0x45/0x70
[   14.172049]  kasan_save_track+0x18/0x40
[   14.172246]  kasan_save_alloc_info+0x3b/0x50
[   14.172493]  __kasan_kmalloc+0xb7/0xc0
[   14.172708]  __kmalloc_cache_noprof+0x189/0x420
[   14.172929]  kasan_atomics+0x95/0x310
[   14.173093]  kunit_try_run_case+0x1a5/0x480
[   14.173243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.173433]  kthread+0x337/0x6f0
[   14.173615]  ret_from_fork+0x116/0x1d0
[   14.173825]  ret_from_fork_asm+0x1a/0x30
[   14.174034] 
[   14.174145] The buggy address belongs to the object at ffff8881033c5500
[   14.174145]  which belongs to the cache kmalloc-64 of size 64
[   14.174656] The buggy address is located 0 bytes to the right of
[   14.174656]  allocated 48-byte region [ffff8881033c5500, ffff8881033c5530)
[   14.175175] 
[   14.175296] The buggy address belongs to the physical page:
[   14.175519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5
[   14.175894] flags: 0x200000000000000(node=0|zone=2)
[   14.176135] page_type: f5(slab)
[   14.176327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.176654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.176978] page dumped because: kasan: bad access detected
[   14.177236] 
[   14.177330] Memory state around the buggy address:
[   14.177509]  ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.177905]  ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.178134] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.178349]                                      ^
[   14.178504]  ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.178794]  ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.179130] ==================================================================