Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.752182] ==================================================================
[   19.752247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.752297] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.752571] 
[   19.752841] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.753059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.753124] Hardware name: linux,dummy-virt (DT)
[   19.753195] Call trace:
[   19.753294]  show_stack+0x20/0x38 (C)
[   19.753392]  dump_stack_lvl+0x8c/0xd0
[   19.753455]  print_report+0x118/0x608
[   19.753504]  kasan_report+0xdc/0x128
[   19.753921]  kasan_check_range+0x100/0x1a8
[   19.754153]  __kasan_check_write+0x20/0x30
[   19.754382]  kasan_atomics_helper+0x147c/0x4858
[   19.754460]  kasan_atomics+0x198/0x2e0
[   19.754629]  kunit_try_run_case+0x170/0x3f0
[   19.754735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.755135]  kthread+0x328/0x630
[   19.755619]  ret_from_fork+0x10/0x20
[   19.755772] 
[   19.755829] Allocated by task 265:
[   19.755992]  kasan_save_stack+0x3c/0x68
[   19.756126]  kasan_save_track+0x20/0x40
[   19.756733]  kasan_save_alloc_info+0x40/0x58
[   19.756956]  __kasan_kmalloc+0xd4/0xd8
[   19.757153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.757228]  kasan_atomics+0xb8/0x2e0
[   19.757559]  kunit_try_run_case+0x170/0x3f0
[   19.757610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.757749]  kthread+0x328/0x630
[   19.758059]  ret_from_fork+0x10/0x20
[   19.758212] 
[   19.758392] The buggy address belongs to the object at fff00000c65c5b80
[   19.758392]  which belongs to the cache kmalloc-64 of size 64
[   19.758642] The buggy address is located 0 bytes to the right of
[   19.758642]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.758715] 
[   19.758737] The buggy address belongs to the physical page:
[   19.758771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.759529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.759642] page_type: f5(slab)
[   19.759687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.760102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.760390] page dumped because: kasan: bad access detected
[   19.760547] 
[   19.760569] Memory state around the buggy address:
[   19.760606]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.760664]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.760982] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.761057]                                      ^
[   19.761179]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.761281]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.761425] ==================================================================
[   19.778562] ==================================================================
[   19.778680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.778788] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.778840] 
[   19.778890] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.779064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.779096] Hardware name: linux,dummy-virt (DT)
[   19.779149] Call trace:
[   19.779493]  show_stack+0x20/0x38 (C)
[   19.779870]  dump_stack_lvl+0x8c/0xd0
[   19.779947]  print_report+0x118/0x608
[   19.780042]  kasan_report+0xdc/0x128
[   19.780095]  kasan_check_range+0x100/0x1a8
[   19.780391]  __kasan_check_write+0x20/0x30
[   19.780549]  kasan_atomics_helper+0x15b4/0x4858
[   19.780666]  kasan_atomics+0x198/0x2e0
[   19.780857]  kunit_try_run_case+0x170/0x3f0
[   19.781090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.781217]  kthread+0x328/0x630
[   19.781348]  ret_from_fork+0x10/0x20
[   19.781430] 
[   19.781588] Allocated by task 265:
[   19.781660]  kasan_save_stack+0x3c/0x68
[   19.781827]  kasan_save_track+0x20/0x40
[   19.781945]  kasan_save_alloc_info+0x40/0x58
[   19.782069]  __kasan_kmalloc+0xd4/0xd8
[   19.782244]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.782540]  kasan_atomics+0xb8/0x2e0
[   19.782587]  kunit_try_run_case+0x170/0x3f0
[   19.782629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.782695]  kthread+0x328/0x630
[   19.782729]  ret_from_fork+0x10/0x20
[   19.782767] 
[   19.782788] The buggy address belongs to the object at fff00000c65c5b80
[   19.782788]  which belongs to the cache kmalloc-64 of size 64
[   19.782850] The buggy address is located 0 bytes to the right of
[   19.782850]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.782922] 
[   19.782943] The buggy address belongs to the physical page:
[   19.782988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.783063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.783120] page_type: f5(slab)
[   19.783179] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.783239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.783283] page dumped because: kasan: bad access detected
[   19.783316] 
[   19.783345] Memory state around the buggy address:
[   19.783379]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.783437]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.783493] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.783551]                                      ^
[   19.783588]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.783641]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.783686] ==================================================================
[   19.662373] ==================================================================
[   19.662509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.662735] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.663020] 
[   19.663083] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.663465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.663644] Hardware name: linux,dummy-virt (DT)
[   19.663681] Call trace:
[   19.663963]  show_stack+0x20/0x38 (C)
[   19.664126]  dump_stack_lvl+0x8c/0xd0
[   19.664219]  print_report+0x118/0x608
[   19.664298]  kasan_report+0xdc/0x128
[   19.664434]  kasan_check_range+0x100/0x1a8
[   19.664540]  __kasan_check_write+0x20/0x30
[   19.664591]  kasan_atomics_helper+0xf88/0x4858
[   19.664639]  kasan_atomics+0x198/0x2e0
[   19.664978]  kunit_try_run_case+0x170/0x3f0
[   19.665089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.665545]  kthread+0x328/0x630
[   19.665688]  ret_from_fork+0x10/0x20
[   19.665902] 
[   19.665999] Allocated by task 265:
[   19.666044]  kasan_save_stack+0x3c/0x68
[   19.666427]  kasan_save_track+0x20/0x40
[   19.666511]  kasan_save_alloc_info+0x40/0x58
[   19.666584]  __kasan_kmalloc+0xd4/0xd8
[   19.667107]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.667199]  kasan_atomics+0xb8/0x2e0
[   19.667322]  kunit_try_run_case+0x170/0x3f0
[   19.667364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.667859]  kthread+0x328/0x630
[   19.668039]  ret_from_fork+0x10/0x20
[   19.668104] 
[   19.668147] The buggy address belongs to the object at fff00000c65c5b80
[   19.668147]  which belongs to the cache kmalloc-64 of size 64
[   19.668208] The buggy address is located 0 bytes to the right of
[   19.668208]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.668361] 
[   19.668389] The buggy address belongs to the physical page:
[   19.668447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.668500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.668869] page_type: f5(slab)
[   19.668999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.669276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.669330] page dumped because: kasan: bad access detected
[   19.669364] 
[   19.669491] Memory state around the buggy address:
[   19.669541]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.669659]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.669779] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.669864]                                      ^
[   19.670294]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.670473]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.670546] ==================================================================
[   19.685818] ==================================================================
[   19.685870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.685917] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.685968] 
[   19.685997] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.686126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.687076] Hardware name: linux,dummy-virt (DT)
[   19.687119] Call trace:
[   19.687144]  show_stack+0x20/0x38 (C)
[   19.687207]  dump_stack_lvl+0x8c/0xd0
[   19.687255]  print_report+0x118/0x608
[   19.687328]  kasan_report+0xdc/0x128
[   19.687651]  kasan_check_range+0x100/0x1a8
[   19.688131]  __kasan_check_write+0x20/0x30
[   19.688243]  kasan_atomics_helper+0x10c0/0x4858
[   19.688330]  kasan_atomics+0x198/0x2e0
[   19.688543]  kunit_try_run_case+0x170/0x3f0
[   19.688596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.688685]  kthread+0x328/0x630
[   19.688729]  ret_from_fork+0x10/0x20
[   19.689088] 
[   19.689400] Allocated by task 265:
[   19.689473]  kasan_save_stack+0x3c/0x68
[   19.689610]  kasan_save_track+0x20/0x40
[   19.689739]  kasan_save_alloc_info+0x40/0x58
[   19.689820]  __kasan_kmalloc+0xd4/0xd8
[   19.689999]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.690510]  kasan_atomics+0xb8/0x2e0
[   19.690759]  kunit_try_run_case+0x170/0x3f0
[   19.690851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.691163]  kthread+0x328/0x630
[   19.691377]  ret_from_fork+0x10/0x20
[   19.691450] 
[   19.691552] The buggy address belongs to the object at fff00000c65c5b80
[   19.691552]  which belongs to the cache kmalloc-64 of size 64
[   19.691735] The buggy address is located 0 bytes to the right of
[   19.691735]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.691853] 
[   19.692248] The buggy address belongs to the physical page:
[   19.692330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.692409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.692837] page_type: f5(slab)
[   19.692893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.692981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.693182] page dumped because: kasan: bad access detected
[   19.693281] 
[   19.693311] Memory state around the buggy address:
[   19.693354]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.693400]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.693443] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.693787]                                      ^
[   19.694252]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.694656]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.694733] ==================================================================
[   19.625943] ==================================================================
[   19.626618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.626691] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.626751] 
[   19.627127] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.627519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.627588] Hardware name: linux,dummy-virt (DT)
[   19.627624] Call trace:
[   19.627650]  show_stack+0x20/0x38 (C)
[   19.627705]  dump_stack_lvl+0x8c/0xd0
[   19.627839]  print_report+0x118/0x608
[   19.627894]  kasan_report+0xdc/0x128
[   19.627942]  kasan_check_range+0x100/0x1a8
[   19.628277]  __kasan_check_write+0x20/0x30
[   19.628365]  kasan_atomics_helper+0xe44/0x4858
[   19.628424]  kasan_atomics+0x198/0x2e0
[   19.628735]  kunit_try_run_case+0x170/0x3f0
[   19.628901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.629090]  kthread+0x328/0x630
[   19.629221]  ret_from_fork+0x10/0x20
[   19.629304] 
[   19.629326] Allocated by task 265:
[   19.629363]  kasan_save_stack+0x3c/0x68
[   19.629404]  kasan_save_track+0x20/0x40
[   19.629762]  kasan_save_alloc_info+0x40/0x58
[   19.629835]  __kasan_kmalloc+0xd4/0xd8
[   19.630311]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.630374]  kasan_atomics+0xb8/0x2e0
[   19.630414]  kunit_try_run_case+0x170/0x3f0
[   19.630564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.630654]  kthread+0x328/0x630
[   19.631176]  ret_from_fork+0x10/0x20
[   19.631606] 
[   19.631718] The buggy address belongs to the object at fff00000c65c5b80
[   19.631718]  which belongs to the cache kmalloc-64 of size 64
[   19.632271] The buggy address is located 0 bytes to the right of
[   19.632271]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.632707] 
[   19.632759] The buggy address belongs to the physical page:
[   19.633153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.633220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.633291] page_type: f5(slab)
[   19.633332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.633658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.633756] page dumped because: kasan: bad access detected
[   19.634088] 
[   19.634150] Memory state around the buggy address:
[   19.634203]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.634408]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.634452] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.635098]                                      ^
[   19.635163]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.635244]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.635612] ==================================================================
[   19.783889] ==================================================================
[   19.783956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.784014] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.784755] 
[   19.784863] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.785258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.785809] Hardware name: linux,dummy-virt (DT)
[   19.786118] Call trace:
[   19.786177]  show_stack+0x20/0x38 (C)
[   19.786236]  dump_stack_lvl+0x8c/0xd0
[   19.786609]  print_report+0x118/0x608
[   19.787075]  kasan_report+0xdc/0x128
[   19.787242]  __asan_report_load8_noabort+0x20/0x30
[   19.787403]  kasan_atomics_helper+0x3db0/0x4858
[   19.787485]  kasan_atomics+0x198/0x2e0
[   19.787910]  kunit_try_run_case+0x170/0x3f0
[   19.788319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.788475]  kthread+0x328/0x630
[   19.788693]  ret_from_fork+0x10/0x20
[   19.788951] 
[   19.789060] Allocated by task 265:
[   19.789137]  kasan_save_stack+0x3c/0x68
[   19.789320]  kasan_save_track+0x20/0x40
[   19.789520]  kasan_save_alloc_info+0x40/0x58
[   19.789605]  __kasan_kmalloc+0xd4/0xd8
[   19.789767]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.789865]  kasan_atomics+0xb8/0x2e0
[   19.790006]  kunit_try_run_case+0x170/0x3f0
[   19.790058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.790259]  kthread+0x328/0x630
[   19.790478]  ret_from_fork+0x10/0x20
[   19.790542] 
[   19.790956] The buggy address belongs to the object at fff00000c65c5b80
[   19.790956]  which belongs to the cache kmalloc-64 of size 64
[   19.791065] The buggy address is located 0 bytes to the right of
[   19.791065]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.791247] 
[   19.791311] The buggy address belongs to the physical page:
[   19.791463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.791574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.791629] page_type: f5(slab)
[   19.791669] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.792042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.792136] page dumped because: kasan: bad access detected
[   19.792215] 
[   19.792510] Memory state around the buggy address:
[   19.792556]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.792627]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.792674] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.793116]                                      ^
[   19.793340]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.793547]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.793721] ==================================================================
[   19.762710] ==================================================================
[   19.762908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.763006] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.763185] 
[   19.763279] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.763366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.763395] Hardware name: linux,dummy-virt (DT)
[   19.763454] Call trace:
[   19.763479]  show_stack+0x20/0x38 (C)
[   19.763550]  dump_stack_lvl+0x8c/0xd0
[   19.763599]  print_report+0x118/0x608
[   19.763656]  kasan_report+0xdc/0x128
[   19.763703]  kasan_check_range+0x100/0x1a8
[   19.763754]  __kasan_check_write+0x20/0x30
[   19.763805]  kasan_atomics_helper+0x14e4/0x4858
[   19.763863]  kasan_atomics+0x198/0x2e0
[   19.763910]  kunit_try_run_case+0x170/0x3f0
[   19.763967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.764019]  kthread+0x328/0x630
[   19.764073]  ret_from_fork+0x10/0x20
[   19.764119] 
[   19.764150] Allocated by task 265:
[   19.764179]  kasan_save_stack+0x3c/0x68
[   19.764221]  kasan_save_track+0x20/0x40
[   19.764258]  kasan_save_alloc_info+0x40/0x58
[   19.764299]  __kasan_kmalloc+0xd4/0xd8
[   19.764336]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.764385]  kasan_atomics+0xb8/0x2e0
[   19.764422]  kunit_try_run_case+0x170/0x3f0
[   19.764470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.764652]  kthread+0x328/0x630
[   19.764833]  ret_from_fork+0x10/0x20
[   19.765537] 
[   19.765681] The buggy address belongs to the object at fff00000c65c5b80
[   19.765681]  which belongs to the cache kmalloc-64 of size 64
[   19.765879] The buggy address is located 0 bytes to the right of
[   19.765879]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.766155] 
[   19.766403] The buggy address belongs to the physical page:
[   19.766451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.766542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.766884] page_type: f5(slab)
[   19.766957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.767302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.767506] page dumped because: kasan: bad access detected
[   19.767621] 
[   19.767773] Memory state around the buggy address:
[   19.767959]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.768102]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.768198] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.768368]                                      ^
[   19.768439]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.768628]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.768670] ==================================================================
[   19.729334] ==================================================================
[   19.729601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.729670] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.729721] 
[   19.729940] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.730057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.730088] Hardware name: linux,dummy-virt (DT)
[   19.730119] Call trace:
[   19.730143]  show_stack+0x20/0x38 (C)
[   19.730192]  dump_stack_lvl+0x8c/0xd0
[   19.730243]  print_report+0x118/0x608
[   19.730290]  kasan_report+0xdc/0x128
[   19.730348]  kasan_check_range+0x100/0x1a8
[   19.730398]  __kasan_check_write+0x20/0x30
[   19.730452]  kasan_atomics_helper+0x1384/0x4858
[   19.730510]  kasan_atomics+0x198/0x2e0
[   19.730564]  kunit_try_run_case+0x170/0x3f0
[   19.730630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.730686]  kthread+0x328/0x630
[   19.730729]  ret_from_fork+0x10/0x20
[   19.730793] 
[   19.730814] Allocated by task 265:
[   19.730844]  kasan_save_stack+0x3c/0x68
[   19.730884]  kasan_save_track+0x20/0x40
[   19.730923]  kasan_save_alloc_info+0x40/0x58
[   19.730963]  __kasan_kmalloc+0xd4/0xd8
[   19.731001]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.731603]  kasan_atomics+0xb8/0x2e0
[   19.731664]  kunit_try_run_case+0x170/0x3f0
[   19.731714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.731771]  kthread+0x328/0x630
[   19.731805]  ret_from_fork+0x10/0x20
[   19.731841] 
[   19.732012] The buggy address belongs to the object at fff00000c65c5b80
[   19.732012]  which belongs to the cache kmalloc-64 of size 64
[   19.732239] The buggy address is located 0 bytes to the right of
[   19.732239]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.732320] 
[   19.732545] The buggy address belongs to the physical page:
[   19.732691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.732768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.733055] page_type: f5(slab)
[   19.733162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.733319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.733689] page dumped because: kasan: bad access detected
[   19.733740] 
[   19.733760] Memory state around the buggy address:
[   19.733805]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.734115]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.734435] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.734661]                                      ^
[   19.734705]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.735373]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.735484] ==================================================================
[   19.746214] ==================================================================
[   19.746661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.746731] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.746807] 
[   19.746885] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.747057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.747170] Hardware name: linux,dummy-virt (DT)
[   19.747205] Call trace:
[   19.747245]  show_stack+0x20/0x38 (C)
[   19.747490]  dump_stack_lvl+0x8c/0xd0
[   19.747696]  print_report+0x118/0x608
[   19.747772]  kasan_report+0xdc/0x128
[   19.747824]  kasan_check_range+0x100/0x1a8
[   19.748127]  __kasan_check_write+0x20/0x30
[   19.748191]  kasan_atomics_helper+0x1414/0x4858
[   19.748273]  kasan_atomics+0x198/0x2e0
[   19.748323]  kunit_try_run_case+0x170/0x3f0
[   19.748698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.748776]  kthread+0x328/0x630
[   19.748819]  ret_from_fork+0x10/0x20
[   19.748883] 
[   19.748904] Allocated by task 265:
[   19.748935]  kasan_save_stack+0x3c/0x68
[   19.748984]  kasan_save_track+0x20/0x40
[   19.749025]  kasan_save_alloc_info+0x40/0x58
[   19.749078]  __kasan_kmalloc+0xd4/0xd8
[   19.749116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.749165]  kasan_atomics+0xb8/0x2e0
[   19.749206]  kunit_try_run_case+0x170/0x3f0
[   19.749244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.749291]  kthread+0x328/0x630
[   19.749325]  ret_from_fork+0x10/0x20
[   19.749362] 
[   19.749399] The buggy address belongs to the object at fff00000c65c5b80
[   19.749399]  which belongs to the cache kmalloc-64 of size 64
[   19.749459] The buggy address is located 0 bytes to the right of
[   19.749459]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.749529] 
[   19.749571] The buggy address belongs to the physical page:
[   19.749605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.749657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.749704] page_type: f5(slab)
[   19.749741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.749794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.749837] page dumped because: kasan: bad access detected
[   19.749870] 
[   19.749898] Memory state around the buggy address:
[   19.749935]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.749980]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.750024] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.750088]                                      ^
[   19.750137]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.750208]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.751011] ==================================================================
[   19.819226] ==================================================================
[   19.819285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.819337] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.819388] 
[   19.819420] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.819960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.820046] Hardware name: linux,dummy-virt (DT)
[   19.820216] Call trace:
[   19.820253]  show_stack+0x20/0x38 (C)
[   19.820550]  dump_stack_lvl+0x8c/0xd0
[   19.820743]  print_report+0x118/0x608
[   19.820832]  kasan_report+0xdc/0x128
[   19.820967]  __asan_report_load8_noabort+0x20/0x30
[   19.821093]  kasan_atomics_helper+0x3e10/0x4858
[   19.821153]  kasan_atomics+0x198/0x2e0
[   19.821200]  kunit_try_run_case+0x170/0x3f0
[   19.821250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.821305]  kthread+0x328/0x630
[   19.821348]  ret_from_fork+0x10/0x20
[   19.822142] 
[   19.822242] Allocated by task 265:
[   19.822331]  kasan_save_stack+0x3c/0x68
[   19.822499]  kasan_save_track+0x20/0x40
[   19.822588]  kasan_save_alloc_info+0x40/0x58
[   19.823063]  __kasan_kmalloc+0xd4/0xd8
[   19.823116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.823157]  kasan_atomics+0xb8/0x2e0
[   19.823205]  kunit_try_run_case+0x170/0x3f0
[   19.823243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.823289]  kthread+0x328/0x630
[   19.823332]  ret_from_fork+0x10/0x20
[   19.823372] 
[   19.823402] The buggy address belongs to the object at fff00000c65c5b80
[   19.823402]  which belongs to the cache kmalloc-64 of size 64
[   19.823462] The buggy address is located 0 bytes to the right of
[   19.823462]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.823530] 
[   19.823562] The buggy address belongs to the physical page:
[   19.823604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.823660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.823709] page_type: f5(slab)
[   19.823759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.823812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.823856] page dumped because: kasan: bad access detected
[   19.823890] 
[   19.823927] Memory state around the buggy address:
[   19.823962]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.824008]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.824072] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.824290]                                      ^
[   19.824638]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.825416]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.825471] ==================================================================
[   19.769770] ==================================================================
[   19.769866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.770215] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.770294] 
[   19.770563] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.770727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.770759] Hardware name: linux,dummy-virt (DT)
[   19.770821] Call trace:
[   19.770851]  show_stack+0x20/0x38 (C)
[   19.771199]  dump_stack_lvl+0x8c/0xd0
[   19.771277]  print_report+0x118/0x608
[   19.771508]  kasan_report+0xdc/0x128
[   19.771744]  kasan_check_range+0x100/0x1a8
[   19.771841]  __kasan_check_write+0x20/0x30
[   19.771892]  kasan_atomics_helper+0x154c/0x4858
[   19.771970]  kasan_atomics+0x198/0x2e0
[   19.772159]  kunit_try_run_case+0x170/0x3f0
[   19.772209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.772573]  kthread+0x328/0x630
[   19.772706]  ret_from_fork+0x10/0x20
[   19.772886] 
[   19.772921] Allocated by task 265:
[   19.772952]  kasan_save_stack+0x3c/0x68
[   19.773044]  kasan_save_track+0x20/0x40
[   19.773084]  kasan_save_alloc_info+0x40/0x58
[   19.773495]  __kasan_kmalloc+0xd4/0xd8
[   19.773868]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.773984]  kasan_atomics+0xb8/0x2e0
[   19.774184]  kunit_try_run_case+0x170/0x3f0
[   19.774291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.774386]  kthread+0x328/0x630
[   19.774422]  ret_from_fork+0x10/0x20
[   19.774586] 
[   19.774800] The buggy address belongs to the object at fff00000c65c5b80
[   19.774800]  which belongs to the cache kmalloc-64 of size 64
[   19.774900] The buggy address is located 0 bytes to the right of
[   19.774900]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.775355] 
[   19.775387] The buggy address belongs to the physical page:
[   19.775422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.775587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.775659] page_type: f5(slab)
[   19.775708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.775767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.775820] page dumped because: kasan: bad access detected
[   19.775860] 
[   19.775881] Memory state around the buggy address:
[   19.775915]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.775960]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.776013] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.776458]                                      ^
[   19.776531]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.776779]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.776826] ==================================================================
[   19.593385] ==================================================================
[   19.593435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.593484] Read of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.593533] 
[   19.593565] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.593644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.593673] Hardware name: linux,dummy-virt (DT)
[   19.593704] Call trace:
[   19.593728]  show_stack+0x20/0x38 (C)
[   19.593775]  dump_stack_lvl+0x8c/0xd0
[   19.593824]  print_report+0x118/0x608
[   19.593870]  kasan_report+0xdc/0x128
[   19.593917]  __asan_report_load4_noabort+0x20/0x30
[   19.593966]  kasan_atomics_helper+0x3dd8/0x4858
[   19.594016]  kasan_atomics+0x198/0x2e0
[   19.594079]  kunit_try_run_case+0x170/0x3f0
[   19.594125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.594179]  kthread+0x328/0x630
[   19.594222]  ret_from_fork+0x10/0x20
[   19.594271] 
[   19.594292] Allocated by task 265:
[   19.594321]  kasan_save_stack+0x3c/0x68
[   19.594362]  kasan_save_track+0x20/0x40
[   19.594402]  kasan_save_alloc_info+0x40/0x58
[   19.594444]  __kasan_kmalloc+0xd4/0xd8
[   19.594480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.594520]  kasan_atomics+0xb8/0x2e0
[   19.594556]  kunit_try_run_case+0x170/0x3f0
[   19.594595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.594639]  kthread+0x328/0x630
[   19.594672]  ret_from_fork+0x10/0x20
[   19.594709] 
[   19.594730] The buggy address belongs to the object at fff00000c65c5b80
[   19.594730]  which belongs to the cache kmalloc-64 of size 64
[   19.594788] The buggy address is located 0 bytes to the right of
[   19.594788]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.594853] 
[   19.594874] The buggy address belongs to the physical page:
[   19.594907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.594958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.595007] page_type: f5(slab)
[   19.595082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.595168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.595212] page dumped because: kasan: bad access detected
[   19.595243] 
[   19.595264] Memory state around the buggy address:
[   19.595296]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.595340]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.595385] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.595425]                                      ^
[   19.595489]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.595533]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.595611] ==================================================================
[   19.702599] ==================================================================
[   19.702647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.702695] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.702745] 
[   19.702774] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.702856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.702883] Hardware name: linux,dummy-virt (DT)
[   19.702915] Call trace:
[   19.702938]  show_stack+0x20/0x38 (C)
[   19.702987]  dump_stack_lvl+0x8c/0xd0
[   19.703048]  print_report+0x118/0x608
[   19.703098]  kasan_report+0xdc/0x128
[   19.703143]  kasan_check_range+0x100/0x1a8
[   19.703310]  __kasan_check_write+0x20/0x30
[   19.703500]  kasan_atomics_helper+0x1190/0x4858
[   19.703598]  kasan_atomics+0x198/0x2e0
[   19.703646]  kunit_try_run_case+0x170/0x3f0
[   19.703730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.703980]  kthread+0x328/0x630
[   19.704039]  ret_from_fork+0x10/0x20
[   19.704086] 
[   19.704108] Allocated by task 265:
[   19.704136]  kasan_save_stack+0x3c/0x68
[   19.704178]  kasan_save_track+0x20/0x40
[   19.704316]  kasan_save_alloc_info+0x40/0x58
[   19.704378]  __kasan_kmalloc+0xd4/0xd8
[   19.704415]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.704495]  kasan_atomics+0xb8/0x2e0
[   19.704558]  kunit_try_run_case+0x170/0x3f0
[   19.704605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.704650]  kthread+0x328/0x630
[   19.704719]  ret_from_fork+0x10/0x20
[   19.704806] 
[   19.704946] The buggy address belongs to the object at fff00000c65c5b80
[   19.704946]  which belongs to the cache kmalloc-64 of size 64
[   19.705023] The buggy address is located 0 bytes to the right of
[   19.705023]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.705098] 
[   19.705168] The buggy address belongs to the physical page:
[   19.705201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.705253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.705301] page_type: f5(slab)
[   19.705338] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.705390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.705433] page dumped because: kasan: bad access detected
[   19.705465] 
[   19.705486] Memory state around the buggy address:
[   19.705519]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.705564]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.705811] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.705996]                                      ^
[   19.706103]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.706191]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.706241] ==================================================================
[   19.810253] ==================================================================
[   19.810598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.810851] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.810917] 
[   19.811130] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.811220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.811257] Hardware name: linux,dummy-virt (DT)
[   19.811290] Call trace:
[   19.811316]  show_stack+0x20/0x38 (C)
[   19.811749]  dump_stack_lvl+0x8c/0xd0
[   19.812143]  print_report+0x118/0x608
[   19.812223]  kasan_report+0xdc/0x128
[   19.812488]  kasan_check_range+0x100/0x1a8
[   19.812608]  __kasan_check_write+0x20/0x30
[   19.812803]  kasan_atomics_helper+0x16d0/0x4858
[   19.813103]  kasan_atomics+0x198/0x2e0
[   19.813269]  kunit_try_run_case+0x170/0x3f0
[   19.813409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.813744]  kthread+0x328/0x630
[   19.813806]  ret_from_fork+0x10/0x20
[   19.814062] 
[   19.814114] Allocated by task 265:
[   19.814190]  kasan_save_stack+0x3c/0x68
[   19.814295]  kasan_save_track+0x20/0x40
[   19.814631]  kasan_save_alloc_info+0x40/0x58
[   19.814862]  __kasan_kmalloc+0xd4/0xd8
[   19.814928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.815116]  kasan_atomics+0xb8/0x2e0
[   19.815179]  kunit_try_run_case+0x170/0x3f0
[   19.815240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.815288]  kthread+0x328/0x630
[   19.815333]  ret_from_fork+0x10/0x20
[   19.815370] 
[   19.815407] The buggy address belongs to the object at fff00000c65c5b80
[   19.815407]  which belongs to the cache kmalloc-64 of size 64
[   19.815469] The buggy address is located 0 bytes to the right of
[   19.815469]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.815545] 
[   19.815582] The buggy address belongs to the physical page:
[   19.815630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.815687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.815753] page_type: f5(slab)
[   19.815803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.815857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.815902] page dumped because: kasan: bad access detected
[   19.815942] 
[   19.815964] Memory state around the buggy address:
[   19.816003]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.816069]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.816503] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.816594]                                      ^
[   19.817012]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817265]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817383] ==================================================================
[   19.595751] ==================================================================
[   19.595794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.596296] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.596358] 
[   19.596418] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.596592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.596673] Hardware name: linux,dummy-virt (DT)
[   19.596873] Call trace:
[   19.596998]  show_stack+0x20/0x38 (C)
[   19.597125]  dump_stack_lvl+0x8c/0xd0
[   19.597173]  print_report+0x118/0x608
[   19.597241]  kasan_report+0xdc/0x128
[   19.597635]  kasan_check_range+0x100/0x1a8
[   19.597984]  __kasan_check_write+0x20/0x30
[   19.598149]  kasan_atomics_helper+0xd3c/0x4858
[   19.598224]  kasan_atomics+0x198/0x2e0
[   19.598348]  kunit_try_run_case+0x170/0x3f0
[   19.598445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.598594]  kthread+0x328/0x630
[   19.598721]  ret_from_fork+0x10/0x20
[   19.599220] 
[   19.599517] Allocated by task 265:
[   19.599578]  kasan_save_stack+0x3c/0x68
[   19.599700]  kasan_save_track+0x20/0x40
[   19.599740]  kasan_save_alloc_info+0x40/0x58
[   19.600163]  __kasan_kmalloc+0xd4/0xd8
[   19.600289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.600580]  kasan_atomics+0xb8/0x2e0
[   19.600715]  kunit_try_run_case+0x170/0x3f0
[   19.600826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.600877]  kthread+0x328/0x630
[   19.600912]  ret_from_fork+0x10/0x20
[   19.601334] 
[   19.601398] The buggy address belongs to the object at fff00000c65c5b80
[   19.601398]  which belongs to the cache kmalloc-64 of size 64
[   19.601509] The buggy address is located 0 bytes to the right of
[   19.601509]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.601795] 
[   19.601952] The buggy address belongs to the physical page:
[   19.601990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.602075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.602270] page_type: f5(slab)
[   19.602494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.602731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.602991] page dumped because: kasan: bad access detected
[   19.603045] 
[   19.603065] Memory state around the buggy address:
[   19.603218]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.603511]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.603758] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.603805]                                      ^
[   19.603841]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.603886]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.604065] ==================================================================
[   19.554522] ==================================================================
[   19.554576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   19.554628] Read of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.554762] 
[   19.554799] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.554952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.555010] Hardware name: linux,dummy-virt (DT)
[   19.555275] Call trace:
[   19.555402]  show_stack+0x20/0x38 (C)
[   19.555456]  dump_stack_lvl+0x8c/0xd0
[   19.555533]  print_report+0x118/0x608
[   19.555624]  kasan_report+0xdc/0x128
[   19.555672]  __asan_report_load4_noabort+0x20/0x30
[   19.555722]  kasan_atomics_helper+0x3dcc/0x4858
[   19.555900]  kasan_atomics+0x198/0x2e0
[   19.555976]  kunit_try_run_case+0x170/0x3f0
[   19.556121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.556197]  kthread+0x328/0x630
[   19.556318]  ret_from_fork+0x10/0x20
[   19.556395] 
[   19.556422] Allocated by task 265:
[   19.556587]  kasan_save_stack+0x3c/0x68
[   19.556678]  kasan_save_track+0x20/0x40
[   19.556746]  kasan_save_alloc_info+0x40/0x58
[   19.556870]  __kasan_kmalloc+0xd4/0xd8
[   19.556991]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.557126]  kasan_atomics+0xb8/0x2e0
[   19.557296]  kunit_try_run_case+0x170/0x3f0
[   19.557387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.557461]  kthread+0x328/0x630
[   19.557758]  ret_from_fork+0x10/0x20
[   19.557835] 
[   19.558003] The buggy address belongs to the object at fff00000c65c5b80
[   19.558003]  which belongs to the cache kmalloc-64 of size 64
[   19.558276] The buggy address is located 0 bytes to the right of
[   19.558276]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.558478] 
[   19.558545] The buggy address belongs to the physical page:
[   19.558615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.558740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.558789] page_type: f5(slab)
[   19.558848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.558902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.559253] page dumped because: kasan: bad access detected
[   19.559362] 
[   19.559468] Memory state around the buggy address:
[   19.559576]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.559640]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.559984] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.560123]                                      ^
[   19.560276]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.560371]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.560560] ==================================================================
[   19.605360] ==================================================================
[   19.605564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.605633] Read of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.605684] 
[   19.605886] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.606068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.606158] Hardware name: linux,dummy-virt (DT)
[   19.606490] Call trace:
[   19.606535]  show_stack+0x20/0x38 (C)
[   19.606680]  dump_stack_lvl+0x8c/0xd0
[   19.606934]  print_report+0x118/0x608
[   19.607008]  kasan_report+0xdc/0x128
[   19.607072]  __asan_report_load4_noabort+0x20/0x30
[   19.607120]  kasan_atomics_helper+0x3e04/0x4858
[   19.607499]  kasan_atomics+0x198/0x2e0
[   19.607610]  kunit_try_run_case+0x170/0x3f0
[   19.607693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.607872]  kthread+0x328/0x630
[   19.607939]  ret_from_fork+0x10/0x20
[   19.608026] 
[   19.608199] Allocated by task 265:
[   19.608298]  kasan_save_stack+0x3c/0x68
[   19.608473]  kasan_save_track+0x20/0x40
[   19.608612]  kasan_save_alloc_info+0x40/0x58
[   19.608658]  __kasan_kmalloc+0xd4/0xd8
[   19.608731]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.608795]  kasan_atomics+0xb8/0x2e0
[   19.609264]  kunit_try_run_case+0x170/0x3f0
[   19.609619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.609687]  kthread+0x328/0x630
[   19.609721]  ret_from_fork+0x10/0x20
[   19.609871] 
[   19.609898] The buggy address belongs to the object at fff00000c65c5b80
[   19.609898]  which belongs to the cache kmalloc-64 of size 64
[   19.609958] The buggy address is located 0 bytes to the right of
[   19.609958]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.610094] 
[   19.610194] The buggy address belongs to the physical page:
[   19.610284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.610636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.610712] page_type: f5(slab)
[   19.610901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.611094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.611140] page dumped because: kasan: bad access detected
[   19.611172] 
[   19.611193] Memory state around the buggy address:
[   19.611288]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.611335]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.611400] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.611448]                                      ^
[   19.611501]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.611547]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.611599] ==================================================================
[   19.671903] ==================================================================
[   19.671956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.672394] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.672601] 
[   19.672983] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.673120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.673263] Hardware name: linux,dummy-virt (DT)
[   19.673432] Call trace:
[   19.673468]  show_stack+0x20/0x38 (C)
[   19.673881]  dump_stack_lvl+0x8c/0xd0
[   19.674006]  print_report+0x118/0x608
[   19.674390]  kasan_report+0xdc/0x128
[   19.674595]  kasan_check_range+0x100/0x1a8
[   19.674714]  __kasan_check_write+0x20/0x30
[   19.674990]  kasan_atomics_helper+0xff0/0x4858
[   19.675190]  kasan_atomics+0x198/0x2e0
[   19.675266]  kunit_try_run_case+0x170/0x3f0
[   19.675396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.675463]  kthread+0x328/0x630
[   19.675516]  ret_from_fork+0x10/0x20
[   19.675575] 
[   19.675605] Allocated by task 265:
[   19.675645]  kasan_save_stack+0x3c/0x68
[   19.675686]  kasan_save_track+0x20/0x40
[   19.675736]  kasan_save_alloc_info+0x40/0x58
[   19.675811]  __kasan_kmalloc+0xd4/0xd8
[   19.675848]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.675906]  kasan_atomics+0xb8/0x2e0
[   19.675943]  kunit_try_run_case+0x170/0x3f0
[   19.675993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.676081]  kthread+0x328/0x630
[   19.676569]  ret_from_fork+0x10/0x20
[   19.676651] 
[   19.676823] The buggy address belongs to the object at fff00000c65c5b80
[   19.676823]  which belongs to the cache kmalloc-64 of size 64
[   19.677049] The buggy address is located 0 bytes to the right of
[   19.677049]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.677134] 
[   19.677366] The buggy address belongs to the physical page:
[   19.677720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.677825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.677878] page_type: f5(slab)
[   19.678220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.678311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.678553] page dumped because: kasan: bad access detected
[   19.678797] 
[   19.678855] Memory state around the buggy address:
[   19.678931]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.679291]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.679349] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.679697]                                      ^
[   19.679846]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.679968]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.680409] ==================================================================
[   19.681451] ==================================================================
[   19.681770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.681841] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.682217] 
[   19.682288] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.682375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.682402] Hardware name: linux,dummy-virt (DT)
[   19.682513] Call trace:
[   19.682539]  show_stack+0x20/0x38 (C)
[   19.682638]  dump_stack_lvl+0x8c/0xd0
[   19.682990]  print_report+0x118/0x608
[   19.683104]  kasan_report+0xdc/0x128
[   19.683433]  kasan_check_range+0x100/0x1a8
[   19.683616]  __kasan_check_write+0x20/0x30
[   19.683671]  kasan_atomics_helper+0x1058/0x4858
[   19.683750]  kasan_atomics+0x198/0x2e0
[   19.683846]  kunit_try_run_case+0x170/0x3f0
[   19.684015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.684087]  kthread+0x328/0x630
[   19.684147]  ret_from_fork+0x10/0x20
[   19.684205] 
[   19.684363] Allocated by task 265:
[   19.684404]  kasan_save_stack+0x3c/0x68
[   19.684476]  kasan_save_track+0x20/0x40
[   19.684526]  kasan_save_alloc_info+0x40/0x58
[   19.684567]  __kasan_kmalloc+0xd4/0xd8
[   19.684607]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.684646]  kasan_atomics+0xb8/0x2e0
[   19.684693]  kunit_try_run_case+0x170/0x3f0
[   19.684740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.684784]  kthread+0x328/0x630
[   19.684819]  ret_from_fork+0x10/0x20
[   19.684856] 
[   19.684877] The buggy address belongs to the object at fff00000c65c5b80
[   19.684877]  which belongs to the cache kmalloc-64 of size 64
[   19.684937] The buggy address is located 0 bytes to the right of
[   19.684937]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.685002] 
[   19.685044] The buggy address belongs to the physical page:
[   19.685077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.685143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.685195] page_type: f5(slab)
[   19.685235] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.685288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.685330] page dumped because: kasan: bad access detected
[   19.685372] 
[   19.685393] Memory state around the buggy address:
[   19.685426]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.685478]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.685523] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.685564]                                      ^
[   19.685606]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.685652]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.685700] ==================================================================
[   19.547311] ==================================================================
[   19.547533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.547626] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.547688] 
[   19.547785] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.547899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.547991] Hardware name: linux,dummy-virt (DT)
[   19.548038] Call trace:
[   19.548099]  show_stack+0x20/0x38 (C)
[   19.548266]  dump_stack_lvl+0x8c/0xd0
[   19.548534]  print_report+0x118/0x608
[   19.548921]  kasan_report+0xdc/0x128
[   19.549670]  kasan_check_range+0x100/0x1a8
[   19.549760]  __kasan_check_write+0x20/0x30
[   19.549920]  kasan_atomics_helper+0xad4/0x4858
[   19.550075]  kasan_atomics+0x198/0x2e0
[   19.550128]  kunit_try_run_case+0x170/0x3f0
[   19.550296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.550481]  kthread+0x328/0x630
[   19.550590]  ret_from_fork+0x10/0x20
[   19.550800] 
[   19.550824] Allocated by task 265:
[   19.550883]  kasan_save_stack+0x3c/0x68
[   19.551124]  kasan_save_track+0x20/0x40
[   19.551182]  kasan_save_alloc_info+0x40/0x58
[   19.551317]  __kasan_kmalloc+0xd4/0xd8
[   19.551369]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.551411]  kasan_atomics+0xb8/0x2e0
[   19.551456]  kunit_try_run_case+0x170/0x3f0
[   19.551497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.551543]  kthread+0x328/0x630
[   19.551602]  ret_from_fork+0x10/0x20
[   19.551651] 
[   19.551673] The buggy address belongs to the object at fff00000c65c5b80
[   19.551673]  which belongs to the cache kmalloc-64 of size 64
[   19.551734] The buggy address is located 0 bytes to the right of
[   19.551734]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.551812] 
[   19.551842] The buggy address belongs to the physical page:
[   19.551894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.551956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.552005] page_type: f5(slab)
[   19.552393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.552627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.552735] page dumped because: kasan: bad access detected
[   19.552821] 
[   19.552847] Memory state around the buggy address:
[   19.552886]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.552933]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.553235] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.553303]                                      ^
[   19.553473]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.553558]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.553607] ==================================================================
[   19.712090] ==================================================================
[   19.712141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.712190] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.712467] 
[   19.712513] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.713003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.713049] Hardware name: linux,dummy-virt (DT)
[   19.713109] Call trace:
[   19.713135]  show_stack+0x20/0x38 (C)
[   19.713185]  dump_stack_lvl+0x8c/0xd0
[   19.713235]  print_report+0x118/0x608
[   19.713323]  kasan_report+0xdc/0x128
[   19.713485]  kasan_check_range+0x100/0x1a8
[   19.713705]  __kasan_check_write+0x20/0x30
[   19.713833]  kasan_atomics_helper+0x126c/0x4858
[   19.714191]  kasan_atomics+0x198/0x2e0
[   19.714344]  kunit_try_run_case+0x170/0x3f0
[   19.714534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.714676]  kthread+0x328/0x630
[   19.714860]  ret_from_fork+0x10/0x20
[   19.715022] 
[   19.715055] Allocated by task 265:
[   19.715087]  kasan_save_stack+0x3c/0x68
[   19.715339]  kasan_save_track+0x20/0x40
[   19.715586]  kasan_save_alloc_info+0x40/0x58
[   19.715703]  __kasan_kmalloc+0xd4/0xd8
[   19.715800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.716152]  kasan_atomics+0xb8/0x2e0
[   19.716329]  kunit_try_run_case+0x170/0x3f0
[   19.716428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.716654]  kthread+0x328/0x630
[   19.716735]  ret_from_fork+0x10/0x20
[   19.716794] 
[   19.716918] The buggy address belongs to the object at fff00000c65c5b80
[   19.716918]  which belongs to the cache kmalloc-64 of size 64
[   19.717007] The buggy address is located 0 bytes to the right of
[   19.717007]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.717081] 
[   19.717129] The buggy address belongs to the physical page:
[   19.717162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.717215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.717264] page_type: f5(slab)
[   19.717303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.717355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.717438] page dumped because: kasan: bad access detected
[   19.717472] 
[   19.717493] Memory state around the buggy address:
[   19.717527]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.717677]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.717726] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.717795]                                      ^
[   19.717880]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.718150]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.718195] ==================================================================
[   19.827125] ==================================================================
[   19.827187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.827242] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.827498] 
[   19.827673] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.827793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.827854] Hardware name: linux,dummy-virt (DT)
[   19.827889] Call trace:
[   19.827915]  show_stack+0x20/0x38 (C)
[   19.828122]  dump_stack_lvl+0x8c/0xd0
[   19.828237]  print_report+0x118/0x608
[   19.828379]  kasan_report+0xdc/0x128
[   19.828438]  kasan_check_range+0x100/0x1a8
[   19.828671]  __kasan_check_write+0x20/0x30
[   19.828976]  kasan_atomics_helper+0x175c/0x4858
[   19.829124]  kasan_atomics+0x198/0x2e0
[   19.829175]  kunit_try_run_case+0x170/0x3f0
[   19.829379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.829446]  kthread+0x328/0x630
[   19.829597]  ret_from_fork+0x10/0x20
[   19.829773] 
[   19.829995] Allocated by task 265:
[   19.830381]  kasan_save_stack+0x3c/0x68
[   19.830448]  kasan_save_track+0x20/0x40
[   19.830558]  kasan_save_alloc_info+0x40/0x58
[   19.830750]  __kasan_kmalloc+0xd4/0xd8
[   19.830795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.831456]  kasan_atomics+0xb8/0x2e0
[   19.831534]  kunit_try_run_case+0x170/0x3f0
[   19.831641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.831776]  kthread+0x328/0x630
[   19.832176]  ret_from_fork+0x10/0x20
[   19.832476] 
[   19.832524] The buggy address belongs to the object at fff00000c65c5b80
[   19.832524]  which belongs to the cache kmalloc-64 of size 64
[   19.832607] The buggy address is located 0 bytes to the right of
[   19.832607]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.832688] 
[   19.832712] The buggy address belongs to the physical page:
[   19.832768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.832824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.833235] page_type: f5(slab)
[   19.833300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.833701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.833803] page dumped because: kasan: bad access detected
[   19.833839] 
[   19.834148] Memory state around the buggy address:
[   19.834218]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.834481]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.834535] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.834577]                                      ^
[   19.834621]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.834669]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.834727] ==================================================================
[   19.513811] ==================================================================
[   19.514046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.514274] Read of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.514330] 
[   19.514418] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.514868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.514928] Hardware name: linux,dummy-virt (DT)
[   19.514963] Call trace:
[   19.515093]  show_stack+0x20/0x38 (C)
[   19.515158]  dump_stack_lvl+0x8c/0xd0
[   19.515280]  print_report+0x118/0x608
[   19.515335]  kasan_report+0xdc/0x128
[   19.515431]  __asan_report_load4_noabort+0x20/0x30
[   19.515484]  kasan_atomics_helper+0x42d8/0x4858
[   19.515839]  kasan_atomics+0x198/0x2e0
[   19.516580] 
[   19.517398]  kasan_save_alloc_info+0x40/0x58
[   19.517686]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.518851] The buggy address is located 0 bytes to the right of
[   19.518851]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.520469] Memory state around the buggy address:
[   19.521906] ==================================================================
[   19.839847] ==================================================================
[   19.839912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.839960] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.840011] 
[   19.840087] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.840649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.841189] Hardware name: linux,dummy-virt (DT)
[   19.841233] Call trace:
[   19.841257]  show_stack+0x20/0x38 (C)
[   19.841310]  dump_stack_lvl+0x8c/0xd0
[   19.841415]  print_report+0x118/0x608
[   19.841488]  kasan_report+0xdc/0x128
[   19.841569]  kasan_check_range+0x100/0x1a8
[   19.841827]  __kasan_check_write+0x20/0x30
[   19.842252]  kasan_atomics_helper+0x17ec/0x4858
[   19.842433]  kasan_atomics+0x198/0x2e0
[   19.842487]  kunit_try_run_case+0x170/0x3f0
[   19.842764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.843359]  kthread+0x328/0x630
[   19.843495]  ret_from_fork+0x10/0x20
[   19.843613] 
[   19.843703] Allocated by task 265:
[   19.843821]  kasan_save_stack+0x3c/0x68
[   19.843866]  kasan_save_track+0x20/0x40
[   19.844083]  kasan_save_alloc_info+0x40/0x58
[   19.844246]  __kasan_kmalloc+0xd4/0xd8
[   19.844628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.844735]  kasan_atomics+0xb8/0x2e0
[   19.844985]  kunit_try_run_case+0x170/0x3f0
[   19.845135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.845328]  kthread+0x328/0x630
[   19.845373]  ret_from_fork+0x10/0x20
[   19.845436] 
[   19.845480] The buggy address belongs to the object at fff00000c65c5b80
[   19.845480]  which belongs to the cache kmalloc-64 of size 64
[   19.846057] The buggy address is located 0 bytes to the right of
[   19.846057]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.846461] 
[   19.846518] The buggy address belongs to the physical page:
[   19.846589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.846658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.846742] page_type: f5(slab)
[   19.847005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.847227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.847428] page dumped because: kasan: bad access detected
[   19.847613] 
[   19.847796] Memory state around the buggy address:
[   19.848093]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.848186]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.848353] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.848712]                                      ^
[   19.848795]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.848844]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.848989] ==================================================================
[   19.529272] ==================================================================
[   19.529325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.529374] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.529764] 
[   19.529816] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.530048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.530085] Hardware name: linux,dummy-virt (DT)
[   19.530119] Call trace:
[   19.530143]  show_stack+0x20/0x38 (C)
[   19.530255]  dump_stack_lvl+0x8c/0xd0
[   19.530319]  print_report+0x118/0x608
[   19.530366]  kasan_report+0xdc/0x128
[   19.530411]  kasan_check_range+0x100/0x1a8
[   19.530475]  __kasan_check_write+0x20/0x30
[   19.530521]  kasan_atomics_helper+0x99c/0x4858
[   19.530585]  kasan_atomics+0x198/0x2e0
[   19.530644]  kunit_try_run_case+0x170/0x3f0
[   19.530702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.530756]  kthread+0x328/0x630
[   19.530797]  ret_from_fork+0x10/0x20
[   19.530854] 
[   19.530883] Allocated by task 265:
[   19.530921]  kasan_save_stack+0x3c/0x68
[   19.530963]  kasan_save_track+0x20/0x40
[   19.531002]  kasan_save_alloc_info+0x40/0x58
[   19.531051]  __kasan_kmalloc+0xd4/0xd8
[   19.531089]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.531135]  kasan_atomics+0xb8/0x2e0
[   19.531173]  kunit_try_run_case+0x170/0x3f0
[   19.531212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.531255]  kthread+0x328/0x630
[   19.531294]  ret_from_fork+0x10/0x20
[   19.531330] 
[   19.531352] The buggy address belongs to the object at fff00000c65c5b80
[   19.531352]  which belongs to the cache kmalloc-64 of size 64
[   19.531413] The buggy address is located 0 bytes to the right of
[   19.531413]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.531485] 
[   19.531507] The buggy address belongs to the physical page:
[   19.531538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.531589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.531638] page_type: f5(slab)
[   19.531675] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.531728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.531913]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.534917]  kasan_atomics_helper+0xa04/0x4858
[   19.535419]  ret_from_fork+0x10/0x20
[   19.535533] 
[   19.535558] Allocated by task 265:
[   19.535642]  kasan_save_stack+0x3c/0x68
[   19.535719]  kasan_save_track+0x20/0x40
[   19.535799]  kasan_save_alloc_info+0x40/0x58
[   19.535848]  __kasan_kmalloc+0xd4/0xd8
[   19.535904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.535992]  kasan_atomics+0xb8/0x2e0
[   19.536081]  kunit_try_run_case+0x170/0x3f0
[   19.536140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.536233]  kthread+0x328/0x630
[   19.536271]  ret_from_fork+0x10/0x20
[   19.536338] 
[   19.536376] The buggy address belongs to the object at fff00000c65c5b80
[   19.536376]  which belongs to the cache kmalloc-64 of size 64
[   19.536477] The buggy address is located 0 bytes to the right of
[   19.536477]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.536847] 
[   19.536918] The buggy address belongs to the physical page:
[   19.537060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.537174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.537231] page_type: f5(slab)
[   19.537405] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.537613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.537723] page dumped because: kasan: bad access detected
[   19.537835] 
[   19.537891] Memory state around the buggy address:
[   19.538000]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.538058]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.538262] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.538449]                                      ^
[   19.538487]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.538813]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.538930] ==================================================================
[   19.613575] ==================================================================
[   19.613831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.614013] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.614081] 
[   19.614113] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.614373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.614498] Hardware name: linux,dummy-virt (DT)
[   19.614534] Call trace:
[   19.614574]  show_stack+0x20/0x38 (C)
[   19.614824]  dump_stack_lvl+0x8c/0xd0
[   19.615010]  print_report+0x118/0x608
[   19.615095]  kasan_report+0xdc/0x128
[   19.615147]  kasan_check_range+0x100/0x1a8
[   19.615234]  __kasan_check_read+0x20/0x30
[   19.615343]  kasan_atomics_helper+0xdd4/0x4858
[   19.615430]  kasan_atomics+0x198/0x2e0
[   19.615506]  kunit_try_run_case+0x170/0x3f0
[   19.615782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.615884]  kthread+0x328/0x630
[   19.616021]  ret_from_fork+0x10/0x20
[   19.616104] 
[   19.616359] Allocated by task 265:
[   19.616400]  kasan_save_stack+0x3c/0x68
[   19.616565]  kasan_save_track+0x20/0x40
[   19.616797]  kasan_save_alloc_info+0x40/0x58
[   19.616894]  __kasan_kmalloc+0xd4/0xd8
[   19.617222]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.617324]  kasan_atomics+0xb8/0x2e0
[   19.617453]  kunit_try_run_case+0x170/0x3f0
[   19.617497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.617541]  kthread+0x328/0x630
[   19.617575]  ret_from_fork+0x10/0x20
[   19.617613] 
[   19.617636] The buggy address belongs to the object at fff00000c65c5b80
[   19.617636]  which belongs to the cache kmalloc-64 of size 64
[   19.617695] The buggy address is located 0 bytes to the right of
[   19.617695]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.617761] 
[   19.618285] The buggy address belongs to the physical page:
[   19.618666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.618746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.619081] page_type: f5(slab)
[   19.619159] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.619349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.619445] page dumped because: kasan: bad access detected
[   19.619754] 
[   19.619817] Memory state around the buggy address:
[   19.619906]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.620334]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.620446] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.620590]                                      ^
[   19.620675]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.621086]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.621209] ==================================================================
[   19.561613] ==================================================================
[   19.561691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   19.561743] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.561878] 
[   19.561913] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.562050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.562323] Hardware name: linux,dummy-virt (DT)
[   19.562385] Call trace:
[   19.562410]  show_stack+0x20/0x38 (C)
[   19.562547]  dump_stack_lvl+0x8c/0xd0
[   19.562642]  print_report+0x118/0x608
[   19.562768]  kasan_report+0xdc/0x128
[   19.562824]  kasan_check_range+0x100/0x1a8
[   19.562941]  __kasan_check_write+0x20/0x30
[   19.563000]  kasan_atomics_helper+0xb70/0x4858
[   19.563062]  kasan_atomics+0x198/0x2e0
[   19.563115]  kunit_try_run_case+0x170/0x3f0
[   19.563164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.563218]  kthread+0x328/0x630
[   19.563260]  ret_from_fork+0x10/0x20
[   19.563317] 
[   19.563346] Allocated by task 265:
[   19.563377]  kasan_save_stack+0x3c/0x68
[   19.563421]  kasan_save_track+0x20/0x40
[   19.563461]  kasan_save_alloc_info+0x40/0x58
[   19.563501]  __kasan_kmalloc+0xd4/0xd8
[   19.563539]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.563581]  kasan_atomics+0xb8/0x2e0
[   19.563618]  kunit_try_run_case+0x170/0x3f0
[   19.563871] The buggy address is located 0 bytes to the right of
[   19.563871]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.565475]                                      ^
[   19.567040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.568599]  kasan_save_track+0x20/0x40
[   19.570415] 
[   19.572250]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.575338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.576222]  kthread+0x328/0x630
[   19.577791] 
[   19.579142]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.583531]  kasan_save_stack+0x3c/0x68
[   19.584712]  ret_from_fork+0x10/0x20
[   19.585942] page_type: f5(slab)
[   19.587244]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.589667]  kasan_report+0xdc/0x128
[   19.591175]  kthread+0x328/0x630
[   19.591218]  ret_from_fork+0x10/0x20
[   19.591255] 
[   19.591285] The buggy address belongs to the object at fff00000c65c5b80
[   19.591285]  which belongs to the cache kmalloc-64 of size 64
[   19.591343] The buggy address is located 0 bytes to the right of
[   19.591343]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.591418] 
[   19.591440] The buggy address belongs to the physical page:
[   19.591471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.591532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.591588] page_type: f5(slab)
[   19.591639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.591691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.591730] page dumped because: kasan: bad access detected
[   19.591764] 
[   19.591783] Memory state around the buggy address:
[   19.591816]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591867]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591914] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.591953]                                      ^
[   19.592004]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.592684]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.592739] ==================================================================
[   19.835767] ==================================================================
[   19.835817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.835873] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.835926] 
[   19.836221] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.836385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.836494] Hardware name: linux,dummy-virt (DT)
[   19.836543] Call trace:
[   19.836569]  show_stack+0x20/0x38 (C)
[   19.836621]  dump_stack_lvl+0x8c/0xd0
[   19.836891]  print_report+0x118/0x608
[   19.837134]  kasan_report+0xdc/0x128
[   19.837239]  __asan_report_load8_noabort+0x20/0x30
[   19.837588]  kasan_atomics_helper+0x3e20/0x4858
[   19.837676]  kasan_atomics+0x198/0x2e0
[   19.837807]  kunit_try_run_case+0x170/0x3f0
[   19.837859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.838054]  kthread+0x328/0x630
[   19.838137]  ret_from_fork+0x10/0x20
[   19.838192] 
[   19.838237] Allocated by task 265:
[   19.838273]  kasan_save_stack+0x3c/0x68
[   19.838335]  kasan_save_track+0x20/0x40
[   19.838374]  kasan_save_alloc_info+0x40/0x58
[   19.838416]  __kasan_kmalloc+0xd4/0xd8
[   19.838453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.838499]  kasan_atomics+0xb8/0x2e0
[   19.838537]  kunit_try_run_case+0x170/0x3f0
[   19.838587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.838633]  kthread+0x328/0x630
[   19.838665]  ret_from_fork+0x10/0x20
[   19.838724] 
[   19.838756] The buggy address belongs to the object at fff00000c65c5b80
[   19.838756]  which belongs to the cache kmalloc-64 of size 64
[   19.838822] The buggy address is located 0 bytes to the right of
[   19.838822]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.838888] 
[   19.838917] The buggy address belongs to the physical page:
[   19.838958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.839013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.839073] page_type: f5(slab)
[   19.839121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.839174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.839219] page dumped because: kasan: bad access detected
[   19.839252] 
[   19.839275] Memory state around the buggy address:
[   19.839313]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.839359]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.839414] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.839464]                                      ^
[   19.839500]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.839556]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.839598] ==================================================================
[   19.795064] ==================================================================
[   19.795133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.795188] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.795508] 
[   19.795812] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.795929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.796011] Hardware name: linux,dummy-virt (DT)
[   19.796104] Call trace:
[   19.796191]  show_stack+0x20/0x38 (C)
[   19.796245]  dump_stack_lvl+0x8c/0xd0
[   19.796349]  print_report+0x118/0x608
[   19.796397]  kasan_report+0xdc/0x128
[   19.796463]  kasan_check_range+0x100/0x1a8
[   19.796513]  __kasan_check_write+0x20/0x30
[   19.797216]  kasan_atomics_helper+0x1644/0x4858
[   19.797335]  kasan_atomics+0x198/0x2e0
[   19.797460]  kunit_try_run_case+0x170/0x3f0
[   19.797664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.797738]  kthread+0x328/0x630
[   19.797790]  ret_from_fork+0x10/0x20
[   19.797841] 
[   19.798145] Allocated by task 265:
[   19.798522]  kasan_save_stack+0x3c/0x68
[   19.798604]  kasan_save_track+0x20/0x40
[   19.798648]  kasan_save_alloc_info+0x40/0x58
[   19.798742]  __kasan_kmalloc+0xd4/0xd8
[   19.798795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.798853]  kasan_atomics+0xb8/0x2e0
[   19.798892]  kunit_try_run_case+0x170/0x3f0
[   19.798931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.798978]  kthread+0x328/0x630
[   19.799022]  ret_from_fork+0x10/0x20
[   19.799090] 
[   19.799114] The buggy address belongs to the object at fff00000c65c5b80
[   19.799114]  which belongs to the cache kmalloc-64 of size 64
[   19.799184] The buggy address is located 0 bytes to the right of
[   19.799184]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.799260] 
[   19.799296] The buggy address belongs to the physical page:
[   19.799362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.799425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.799476] page_type: f5(slab)
[   19.799524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.799587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.799640] page dumped because: kasan: bad access detected
[   19.799674] 
[   19.799696] Memory state around the buggy address:
[   19.799739]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.799785]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.799839] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.799897]                                      ^
[   19.799935]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.799988]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.800827] ==================================================================
[   19.706821] ==================================================================
[   19.706874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.706921] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.706971] 
[   19.706999] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.707178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.707285] Hardware name: linux,dummy-virt (DT)
[   19.707373] Call trace:
[   19.707513]  show_stack+0x20/0x38 (C)
[   19.707610]  dump_stack_lvl+0x8c/0xd0
[   19.707662]  print_report+0x118/0x608
[   19.707708]  kasan_report+0xdc/0x128
[   19.707783]  kasan_check_range+0x100/0x1a8
[   19.707859]  __kasan_check_write+0x20/0x30
[   19.707931]  kasan_atomics_helper+0x11f8/0x4858
[   19.707981]  kasan_atomics+0x198/0x2e0
[   19.708026]  kunit_try_run_case+0x170/0x3f0
[   19.708393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.708543]  kthread+0x328/0x630
[   19.708656]  ret_from_fork+0x10/0x20
[   19.708801] 
[   19.708871] Allocated by task 265:
[   19.709227]  kasan_save_stack+0x3c/0x68
[   19.709285]  kasan_save_track+0x20/0x40
[   19.709326]  kasan_save_alloc_info+0x40/0x58
[   19.709366]  __kasan_kmalloc+0xd4/0xd8
[   19.709404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.709598]  kasan_atomics+0xb8/0x2e0
[   19.709638]  kunit_try_run_case+0x170/0x3f0
[   19.709676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.709721]  kthread+0x328/0x630
[   19.709755]  ret_from_fork+0x10/0x20
[   19.709792] 
[   19.709815] The buggy address belongs to the object at fff00000c65c5b80
[   19.709815]  which belongs to the cache kmalloc-64 of size 64
[   19.709973] The buggy address is located 0 bytes to the right of
[   19.709973]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.710137] 
[   19.710217] The buggy address belongs to the physical page:
[   19.710282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.710361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.710449] page_type: f5(slab)
[   19.710737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.710879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.711044] page dumped because: kasan: bad access detected
[   19.711130] 
[   19.711155] Memory state around the buggy address:
[   19.711190]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.711237]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.711522] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.711579]                                      ^
[   19.711625]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.711676]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.711722] ==================================================================
[   19.622058] ==================================================================
[   19.622113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.622164] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.622226] 
[   19.622258] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.622355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.622394] Hardware name: linux,dummy-virt (DT)
[   19.622425] Call trace:
[   19.622454]  show_stack+0x20/0x38 (C)
[   19.622503]  dump_stack_lvl+0x8c/0xd0
[   19.622552]  print_report+0x118/0x608
[   19.622598]  kasan_report+0xdc/0x128
[   19.622645]  __asan_report_load8_noabort+0x20/0x30
[   19.622692]  kasan_atomics_helper+0x3f58/0x4858
[   19.622743]  kasan_atomics+0x198/0x2e0
[   19.622788]  kunit_try_run_case+0x170/0x3f0
[   19.622837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.622890]  kthread+0x328/0x630
[   19.622934]  ret_from_fork+0x10/0x20
[   19.622980] 
[   19.623000] Allocated by task 265:
[   19.623044]  kasan_save_stack+0x3c/0x68
[   19.623087]  kasan_save_track+0x20/0x40
[   19.623126]  kasan_save_alloc_info+0x40/0x58
[   19.623168]  __kasan_kmalloc+0xd4/0xd8
[   19.623206]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.623246]  kasan_atomics+0xb8/0x2e0
[   19.623283]  kunit_try_run_case+0x170/0x3f0
[   19.623321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.623371]  kthread+0x328/0x630
[   19.623407]  ret_from_fork+0x10/0x20
[   19.623443] 
[   19.623465] The buggy address belongs to the object at fff00000c65c5b80
[   19.623465]  which belongs to the cache kmalloc-64 of size 64
[   19.623522] The buggy address is located 0 bytes to the right of
[   19.623522]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.623588] 
[   19.623608] The buggy address belongs to the physical page:
[   19.623641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.623693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.623741] page_type: f5(slab)
[   19.623780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.623832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.623885] page dumped because: kasan: bad access detected
[   19.623919] 
[   19.623943] Memory state around the buggy address:
[   19.623974]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.624037]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.624656] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.625260]                                      ^
[   19.625314]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.625361]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.625402] ==================================================================
[   19.801241] ==================================================================
[   19.801689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.801761] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.801814] 
[   19.802183] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.802407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.802502] Hardware name: linux,dummy-virt (DT)
[   19.802537] Call trace:
[   19.802620]  show_stack+0x20/0x38 (C)
[   19.802675]  dump_stack_lvl+0x8c/0xd0
[   19.802850]  print_report+0x118/0x608
[   19.802913]  kasan_report+0xdc/0x128
[   19.803138]  __asan_report_load8_noabort+0x20/0x30
[   19.803321]  kasan_atomics_helper+0x3df4/0x4858
[   19.803386]  kasan_atomics+0x198/0x2e0
[   19.803685]  kunit_try_run_case+0x170/0x3f0
[   19.803767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.803970]  kthread+0x328/0x630
[   19.804045]  ret_from_fork+0x10/0x20
[   19.804264] 
[   19.804315] Allocated by task 265:
[   19.804349]  kasan_save_stack+0x3c/0x68
[   19.804396]  kasan_save_track+0x20/0x40
[   19.804543]  kasan_save_alloc_info+0x40/0x58
[   19.804595]  __kasan_kmalloc+0xd4/0xd8
[   19.804659]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.804709]  kasan_atomics+0xb8/0x2e0
[   19.805108]  kunit_try_run_case+0x170/0x3f0
[   19.805323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.805448]  kthread+0x328/0x630
[   19.805613]  ret_from_fork+0x10/0x20
[   19.805786] 
[   19.805855] The buggy address belongs to the object at fff00000c65c5b80
[   19.805855]  which belongs to the cache kmalloc-64 of size 64
[   19.805997] The buggy address is located 0 bytes to the right of
[   19.805997]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.806680] 
[   19.806842] The buggy address belongs to the physical page:
[   19.806895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.806960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.807318] page_type: f5(slab)
[   19.807405] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.807749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.807824] page dumped because: kasan: bad access detected
[   19.807861] 
[   19.807883] Memory state around the buggy address:
[   19.808231]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.808461]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.808649] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.808712]                                      ^
[   19.808874]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.808927]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.809198] ==================================================================
[   19.637622] ==================================================================
[   19.637680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.637741] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.637793] 
[   19.638104] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.638618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.638667] Hardware name: linux,dummy-virt (DT)
[   19.638748] Call trace:
[   19.638773]  show_stack+0x20/0x38 (C)
[   19.638828]  dump_stack_lvl+0x8c/0xd0
[   19.638902]  print_report+0x118/0x608
[   19.639070]  kasan_report+0xdc/0x128
[   19.639123]  __asan_report_store8_noabort+0x20/0x30
[   19.639214]  kasan_atomics_helper+0x3e5c/0x4858
[   19.639582]  kasan_atomics+0x198/0x2e0
[   19.639962]  kunit_try_run_case+0x170/0x3f0
[   19.640139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.640203]  kthread+0x328/0x630
[   19.640247]  ret_from_fork+0x10/0x20
[   19.640396] 
[   19.640420] Allocated by task 265:
[   19.640457]  kasan_save_stack+0x3c/0x68
[   19.640509]  kasan_save_track+0x20/0x40
[   19.640727]  kasan_save_alloc_info+0x40/0x58
[   19.640965]  __kasan_kmalloc+0xd4/0xd8
[   19.641038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.641495]  kasan_atomics+0xb8/0x2e0
[   19.641724]  kunit_try_run_case+0x170/0x3f0
[   19.641818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.641893]  kthread+0x328/0x630
[   19.642063]  ret_from_fork+0x10/0x20
[   19.642105] 
[   19.642127] The buggy address belongs to the object at fff00000c65c5b80
[   19.642127]  which belongs to the cache kmalloc-64 of size 64
[   19.642194] The buggy address is located 0 bytes to the right of
[   19.642194]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.642467] 
[   19.642660] The buggy address belongs to the physical page:
[   19.642978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.643479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.643624] page_type: f5(slab)
[   19.644300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.644386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.644452] page dumped because: kasan: bad access detected
[   19.644753] 
[   19.644922] Memory state around the buggy address:
[   19.644961]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.645008]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.645070] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.645110]                                      ^
[   19.645146]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.645191]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.645232] ==================================================================
[   19.646902] ==================================================================
[   19.647129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.647190] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.647355] 
[   19.647394] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.647590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.647623] Hardware name: linux,dummy-virt (DT)
[   19.647654] Call trace:
[   19.647932]  show_stack+0x20/0x38 (C)
[   19.648211]  dump_stack_lvl+0x8c/0xd0
[   19.648296]  print_report+0x118/0x608
[   19.648433]  kasan_report+0xdc/0x128
[   19.648581]  kasan_check_range+0x100/0x1a8
[   19.648677]  __kasan_check_write+0x20/0x30
[   19.648749]  kasan_atomics_helper+0xeb8/0x4858
[   19.648875]  kasan_atomics+0x198/0x2e0
[   19.648922]  kunit_try_run_case+0x170/0x3f0
[   19.648970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.649022]  kthread+0x328/0x630
[   19.649076]  ret_from_fork+0x10/0x20
[   19.649671] 
[   19.649799] Allocated by task 265:
[   19.649865]  kasan_save_stack+0x3c/0x68
[   19.649955]  kasan_save_track+0x20/0x40
[   19.650101]  kasan_save_alloc_info+0x40/0x58
[   19.650196]  __kasan_kmalloc+0xd4/0xd8
[   19.650264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.650305]  kasan_atomics+0xb8/0x2e0
[   19.650342]  kunit_try_run_case+0x170/0x3f0
[   19.650382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.650427]  kthread+0x328/0x630
[   19.650530]  ret_from_fork+0x10/0x20
[   19.650570] 
[   19.650601] The buggy address belongs to the object at fff00000c65c5b80
[   19.650601]  which belongs to the cache kmalloc-64 of size 64
[   19.650661] The buggy address is located 0 bytes to the right of
[   19.650661]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.650737] 
[   19.650777] The buggy address belongs to the physical page:
[   19.650811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.650866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.650931] page_type: f5(slab)
[   19.650970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.651051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.651095] page dumped because: kasan: bad access detected
[   19.651129] 
[   19.651148] Memory state around the buggy address:
[   19.651182]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.651228]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.651269] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.651310]                                      ^
[   19.651343]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.651417]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.651468] ==================================================================
[   19.651692] ==================================================================
[   19.651751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.651799] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.651854] 
[   19.651884] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.651967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.651994] Hardware name: linux,dummy-virt (DT)
[   19.652026] Call trace:
[   19.652642]  show_stack+0x20/0x38 (C)
[   19.653226]  dump_stack_lvl+0x8c/0xd0
[   19.653303]  print_report+0x118/0x608
[   19.653354]  kasan_report+0xdc/0x128
[   19.653427]  kasan_check_range+0x100/0x1a8
[   19.653478]  __kasan_check_write+0x20/0x30
[   19.654134]  kasan_atomics_helper+0xf20/0x4858
[   19.654239]  kasan_atomics+0x198/0x2e0
[   19.654315]  kunit_try_run_case+0x170/0x3f0
[   19.654466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.654679]  kthread+0x328/0x630
[   19.654759]  ret_from_fork+0x10/0x20
[   19.654807] 
[   19.654891] Allocated by task 265:
[   19.655162]  kasan_save_stack+0x3c/0x68
[   19.655365]  kasan_save_track+0x20/0x40
[   19.655447]  kasan_save_alloc_info+0x40/0x58
[   19.655870]  __kasan_kmalloc+0xd4/0xd8
[   19.655997]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.656386]  kasan_atomics+0xb8/0x2e0
[   19.656590]  kunit_try_run_case+0x170/0x3f0
[   19.656714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.657055]  kthread+0x328/0x630
[   19.657133]  ret_from_fork+0x10/0x20
[   19.657197] 
[   19.657218] The buggy address belongs to the object at fff00000c65c5b80
[   19.657218]  which belongs to the cache kmalloc-64 of size 64
[   19.657278] The buggy address is located 0 bytes to the right of
[   19.657278]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.657777] 
[   19.657897] The buggy address belongs to the physical page:
[   19.658102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.658208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.658285] page_type: f5(slab)
[   19.658931] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.659012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.659361] page dumped because: kasan: bad access detected
[   19.659445] 
[   19.659501] Memory state around the buggy address:
[   19.659616]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.659932]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.660154] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.660198]                                      ^
[   19.660243]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660590]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660663] ==================================================================
[   19.737264] ==================================================================
[   19.737325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.737780] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.737963] 
[   19.737999] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.738093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.738132] Hardware name: linux,dummy-virt (DT)
[   19.738166] Call trace:
[   19.738226]  show_stack+0x20/0x38 (C)
[   19.738805]  dump_stack_lvl+0x8c/0xd0
[   19.738886]  print_report+0x118/0x608
[   19.738938]  kasan_report+0xdc/0x128
[   19.738984]  __asan_report_load8_noabort+0x20/0x30
[   19.739419]  kasan_atomics_helper+0x3f04/0x4858
[   19.739539]  kasan_atomics+0x198/0x2e0
[   19.739606]  kunit_try_run_case+0x170/0x3f0
[   19.739658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.739713]  kthread+0x328/0x630
[   19.740047]  ret_from_fork+0x10/0x20
[   19.740230] 
[   19.740255] Allocated by task 265:
[   19.740301]  kasan_save_stack+0x3c/0x68
[   19.740345]  kasan_save_track+0x20/0x40
[   19.740414]  kasan_save_alloc_info+0x40/0x58
[   19.741175]  __kasan_kmalloc+0xd4/0xd8
[   19.741253]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.741383]  kasan_atomics+0xb8/0x2e0
[   19.741493]  kunit_try_run_case+0x170/0x3f0
[   19.741755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.741822]  kthread+0x328/0x630
[   19.742078]  ret_from_fork+0x10/0x20
[   19.742199] 
[   19.742461] The buggy address belongs to the object at fff00000c65c5b80
[   19.742461]  which belongs to the cache kmalloc-64 of size 64
[   19.742592] The buggy address is located 0 bytes to the right of
[   19.742592]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.742681] 
[   19.742736] The buggy address belongs to the physical page:
[   19.742786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.742842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.742961] page_type: f5(slab)
[   19.743020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.743233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.743494] page dumped because: kasan: bad access detected
[   19.743802] 
[   19.743836] Memory state around the buggy address:
[   19.744050]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.744142]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.744617] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.744687]                                      ^
[   19.744735]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.744778]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.744975] ==================================================================
[   19.540051] ==================================================================
[   19.540106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.540233] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.540289] 
[   19.540320] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.540673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.540746] Hardware name: linux,dummy-virt (DT)
[   19.540817] Call trace:
[   19.540912]  show_stack+0x20/0x38 (C)
[   19.540967]  dump_stack_lvl+0x8c/0xd0
[   19.541024]  print_report+0x118/0x608
[   19.541082]  kasan_report+0xdc/0x128
[   19.541130]  kasan_check_range+0x100/0x1a8
[   19.541348]  __kasan_check_write+0x20/0x30
[   19.541520]  kasan_atomics_helper+0xa6c/0x4858
[   19.541671]  kasan_atomics+0x198/0x2e0
[   19.541781]  kunit_try_run_case+0x170/0x3f0
[   19.541849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.542197]  kthread+0x328/0x630
[   19.542322]  ret_from_fork+0x10/0x20
[   19.542379] 
[   19.542402] Allocated by task 265:
[   19.542766]  kasan_save_stack+0x3c/0x68
[   19.542859]  kasan_save_track+0x20/0x40
[   19.542944]  kasan_save_alloc_info+0x40/0x58
[   19.543079]  __kasan_kmalloc+0xd4/0xd8
[   19.543123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.543189]  kasan_atomics+0xb8/0x2e0
[   19.543536]  kunit_try_run_case+0x170/0x3f0
[   19.543607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.543711]  kthread+0x328/0x630
[   19.543745]  ret_from_fork+0x10/0x20
[   19.544077] 
[   19.544122] The buggy address belongs to the object at fff00000c65c5b80
[   19.544122]  which belongs to the cache kmalloc-64 of size 64
[   19.544262] The buggy address is located 0 bytes to the right of
[   19.544262]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.544333] 
[   19.544354] The buggy address belongs to the physical page:
[   19.544573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.544671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.544789] page_type: f5(slab)
[   19.544938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.545100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.545161] page dumped because: kasan: bad access detected
[   19.545195] 
[   19.545215] Memory state around the buggy address:
[   19.545597]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.545652]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.545800] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.545872]                                      ^
[   19.545923]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.546321]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.546463] ==================================================================
[   19.718952] ==================================================================
[   19.719303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.719505] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.719560] 
[   19.719709] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.719817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.719855] Hardware name: linux,dummy-virt (DT)
[   19.719887] Call trace:
[   19.719912]  show_stack+0x20/0x38 (C)
[   19.719961]  dump_stack_lvl+0x8c/0xd0
[   19.720012]  print_report+0x118/0x608
[   19.720070]  kasan_report+0xdc/0x128
[   19.720117]  kasan_check_range+0x100/0x1a8
[   19.720178]  __kasan_check_write+0x20/0x30
[   19.720322]  kasan_atomics_helper+0x12d8/0x4858
[   19.720378]  kasan_atomics+0x198/0x2e0
[   19.720424]  kunit_try_run_case+0x170/0x3f0
[   19.720479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.720556]  kthread+0x328/0x630
[   19.720738]  ret_from_fork+0x10/0x20
[   19.721350] 
[   19.721384] Allocated by task 265:
[   19.721427]  kasan_save_stack+0x3c/0x68
[   19.721825]  kasan_save_track+0x20/0x40
[   19.721903]  kasan_save_alloc_info+0x40/0x58
[   19.722270]  __kasan_kmalloc+0xd4/0xd8
[   19.722362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.722630]  kasan_atomics+0xb8/0x2e0
[   19.723009]  kunit_try_run_case+0x170/0x3f0
[   19.723210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.723599]  kthread+0x328/0x630
[   19.723779]  ret_from_fork+0x10/0x20
[   19.723840] 
[   19.724004] The buggy address belongs to the object at fff00000c65c5b80
[   19.724004]  which belongs to the cache kmalloc-64 of size 64
[   19.724483] The buggy address is located 0 bytes to the right of
[   19.724483]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.724684] 
[   19.724999] The buggy address belongs to the physical page:
[   19.725147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.725219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.725277] page_type: f5(slab)
[   19.725512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.725696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.726178] page dumped because: kasan: bad access detected
[   19.726228] 
[   19.726290] Memory state around the buggy address:
[   19.726633]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.727008]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.727169] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.727389]                                      ^
[   19.727529]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.727611]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.727658] ==================================================================
[   19.696615] ==================================================================
[   19.696877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.697369] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265
[   19.697486] 
[   19.697571] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.697782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.697813] Hardware name: linux,dummy-virt (DT)
[   19.697846] Call trace:
[   19.698250]  show_stack+0x20/0x38 (C)
[   19.698336]  dump_stack_lvl+0x8c/0xd0
[   19.698856]  print_report+0x118/0x608
[   19.699178]  kasan_report+0xdc/0x128
[   19.699365]  kasan_check_range+0x100/0x1a8
[   19.699446]  __kasan_check_write+0x20/0x30
[   19.699784]  kasan_atomics_helper+0x1128/0x4858
[   19.700011]  kasan_atomics+0x198/0x2e0
[   19.700601]  kunit_try_run_case+0x170/0x3f0
[   19.700652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.700706]  kthread+0x328/0x630
[   19.700748]  ret_from_fork+0x10/0x20
[   19.700796] 
[   19.700817] Allocated by task 265:
[   19.700845]  kasan_save_stack+0x3c/0x68
[   19.700888]  kasan_save_track+0x20/0x40
[   19.700930]  kasan_save_alloc_info+0x40/0x58
[   19.700971]  __kasan_kmalloc+0xd4/0xd8
[   19.701010]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.701062]  kasan_atomics+0xb8/0x2e0
[   19.701099]  kunit_try_run_case+0x170/0x3f0
[   19.701137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.701182]  kthread+0x328/0x630
[   19.701214]  ret_from_fork+0x10/0x20
[   19.701253] 
[   19.701273] The buggy address belongs to the object at fff00000c65c5b80
[   19.701273]  which belongs to the cache kmalloc-64 of size 64
[   19.701332] The buggy address is located 0 bytes to the right of
[   19.701332]  allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0)
[   19.701396] 
[   19.701417] The buggy address belongs to the physical page:
[   19.701449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.701504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.701553] page_type: f5(slab)
[   19.701636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.701688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.701731] page dumped because: kasan: bad access detected
[   19.701764] 
[   19.701785] Memory state around the buggy address:
[   19.701857]  fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.702048]  fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.702135] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.702272]                                      ^
[   19.702309]  fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.702356]  fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.702394] ==================================================================

[   14.333663] ==================================================================
[   14.334035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.334461] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.334762] 
[   14.334872] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.334914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.334927] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.334949] Call Trace:
[   14.334964]  <TASK>
[   14.334978]  dump_stack_lvl+0x73/0xb0
[   14.335005]  print_report+0xd1/0x650
[   14.335028]  ? __virt_addr_valid+0x1db/0x2d0
[   14.335050]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.335072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.335108]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.335131]  kasan_report+0x141/0x180
[   14.335154]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.335180]  __asan_report_load4_noabort+0x18/0x20
[   14.335211]  kasan_atomics_helper+0x4a84/0x5450
[   14.335234]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.335256]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.335281]  ? kasan_atomics+0x152/0x310
[   14.335308]  kasan_atomics+0x1dc/0x310
[   14.335331]  ? __pfx_kasan_atomics+0x10/0x10
[   14.335355]  ? __pfx_read_tsc+0x10/0x10
[   14.335376]  ? ktime_get_ts64+0x86/0x230
[   14.335401]  kunit_try_run_case+0x1a5/0x480
[   14.335425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.335448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.335471]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.335495]  ? __kthread_parkme+0x82/0x180
[   14.335517]  ? preempt_count_sub+0x50/0x80
[   14.335565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.335589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.335613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.335636]  kthread+0x337/0x6f0
[   14.335656]  ? trace_preempt_on+0x20/0xc0
[   14.335680]  ? __pfx_kthread+0x10/0x10
[   14.335701]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.335722]  ? calculate_sigpending+0x7b/0xa0
[   14.335745]  ? __pfx_kthread+0x10/0x10
[   14.335767]  ret_from_fork+0x116/0x1d0
[   14.335786]  ? __pfx_kthread+0x10/0x10
[   14.335807]  ret_from_fork_asm+0x1a/0x30
[   14.335838]  </TASK>
[   14.335850] 
[   14.344930] Allocated by task 283:
[   14.345063]  kasan_save_stack+0x45/0x70
[   14.345395]  kasan_save_track+0x18/0x40
[   14.345813]  kasan_save_alloc_info+0x3b/0x50
[   14.346061]  __kasan_kmalloc+0xb7/0xc0
[   14.346297]  __kmalloc_cache_noprof+0x189/0x420
[   14.346547]  kasan_atomics+0x95/0x310
[   14.346775]  kunit_try_run_case+0x1a5/0x480
[   14.346983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.347265]  kthread+0x337/0x6f0
[   14.347444]  ret_from_fork+0x116/0x1d0
[   14.347632]  ret_from_fork_asm+0x1a/0x30
[   14.347830] 
[   14.347928] The buggy address belongs to the object at ffff8881038eb080
[   14.347928]  which belongs to the cache kmalloc-64 of size 64
[   14.348909] The buggy address is located 0 bytes to the right of
[   14.348909]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.349884] 
[   14.350132] The buggy address belongs to the physical page:
[   14.350871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.351623] flags: 0x200000000000000(node=0|zone=2)
[   14.351986] page_type: f5(slab)
[   14.352475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.352946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.353567] page dumped because: kasan: bad access detected
[   14.353817] 
[   14.353911] Memory state around the buggy address:
[   14.354442]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.354904]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.355677] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.356371]                                      ^
[   14.356598]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.356878]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.357636] ==================================================================
[   14.496469] ==================================================================
[   14.496792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.497120] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.498011] 
[   14.498322] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.498481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.498499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.498522] Call Trace:
[   14.498544]  <TASK>
[   14.498563]  dump_stack_lvl+0x73/0xb0
[   14.498594]  print_report+0xd1/0x650
[   14.498619]  ? __virt_addr_valid+0x1db/0x2d0
[   14.498643]  ? kasan_atomics_helper+0x1079/0x5450
[   14.498667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.498690]  ? kasan_atomics_helper+0x1079/0x5450
[   14.498712]  kasan_report+0x141/0x180
[   14.498735]  ? kasan_atomics_helper+0x1079/0x5450
[   14.498762]  kasan_check_range+0x10c/0x1c0
[   14.498786]  __kasan_check_write+0x18/0x20
[   14.498805]  kasan_atomics_helper+0x1079/0x5450
[   14.498828]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.498851]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.498875]  ? kasan_atomics+0x152/0x310
[   14.498903]  kasan_atomics+0x1dc/0x310
[   14.498926]  ? __pfx_kasan_atomics+0x10/0x10
[   14.498950]  ? __pfx_read_tsc+0x10/0x10
[   14.498972]  ? ktime_get_ts64+0x86/0x230
[   14.498997]  kunit_try_run_case+0x1a5/0x480
[   14.499022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.499044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.499069]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.499092]  ? __kthread_parkme+0x82/0x180
[   14.499129]  ? preempt_count_sub+0x50/0x80
[   14.499153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.499177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.499207]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.499231]  kthread+0x337/0x6f0
[   14.499251]  ? trace_preempt_on+0x20/0xc0
[   14.499275]  ? __pfx_kthread+0x10/0x10
[   14.499296]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.499318]  ? calculate_sigpending+0x7b/0xa0
[   14.499342]  ? __pfx_kthread+0x10/0x10
[   14.499364]  ret_from_fork+0x116/0x1d0
[   14.499383]  ? __pfx_kthread+0x10/0x10
[   14.499404]  ret_from_fork_asm+0x1a/0x30
[   14.499435]  </TASK>
[   14.499448] 
[   14.510497] Allocated by task 283:
[   14.510798]  kasan_save_stack+0x45/0x70
[   14.511090]  kasan_save_track+0x18/0x40
[   14.511457]  kasan_save_alloc_info+0x3b/0x50
[   14.511667]  __kasan_kmalloc+0xb7/0xc0
[   14.511846]  __kmalloc_cache_noprof+0x189/0x420
[   14.512069]  kasan_atomics+0x95/0x310
[   14.512256]  kunit_try_run_case+0x1a5/0x480
[   14.512804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.513129]  kthread+0x337/0x6f0
[   14.513389]  ret_from_fork+0x116/0x1d0
[   14.513655]  ret_from_fork_asm+0x1a/0x30
[   14.513945] 
[   14.514201] The buggy address belongs to the object at ffff8881038eb080
[   14.514201]  which belongs to the cache kmalloc-64 of size 64
[   14.514881] The buggy address is located 0 bytes to the right of
[   14.514881]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.515666] 
[   14.515776] The buggy address belongs to the physical page:
[   14.516184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.516628] flags: 0x200000000000000(node=0|zone=2)
[   14.516950] page_type: f5(slab)
[   14.517143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.517694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.518034] page dumped because: kasan: bad access detected
[   14.518407] 
[   14.518622] Memory state around the buggy address:
[   14.518889]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.519254]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.519770] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.520202]                                      ^
[   14.520604]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.521011]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.521327] ==================================================================
[   14.826900] ==================================================================
[   14.827587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.827897] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.828320] 
[   14.828472] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.828735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.828754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.828776] Call Trace:
[   14.828795]  <TASK>
[   14.828810]  dump_stack_lvl+0x73/0xb0
[   14.828839]  print_report+0xd1/0x650
[   14.828862]  ? __virt_addr_valid+0x1db/0x2d0
[   14.828885]  ? kasan_atomics_helper+0x177f/0x5450
[   14.828907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.828929]  ? kasan_atomics_helper+0x177f/0x5450
[   14.828952]  kasan_report+0x141/0x180
[   14.828974]  ? kasan_atomics_helper+0x177f/0x5450
[   14.829000]  kasan_check_range+0x10c/0x1c0
[   14.829025]  __kasan_check_write+0x18/0x20
[   14.829044]  kasan_atomics_helper+0x177f/0x5450
[   14.829067]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.829089]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.829126]  ? kasan_atomics+0x152/0x310
[   14.829154]  kasan_atomics+0x1dc/0x310
[   14.829176]  ? __pfx_kasan_atomics+0x10/0x10
[   14.829200]  ? __pfx_read_tsc+0x10/0x10
[   14.829221]  ? ktime_get_ts64+0x86/0x230
[   14.829246]  kunit_try_run_case+0x1a5/0x480
[   14.829269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829292]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.829315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.829352]  ? __kthread_parkme+0x82/0x180
[   14.829375]  ? preempt_count_sub+0x50/0x80
[   14.829400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.829471]  kthread+0x337/0x6f0
[   14.829491]  ? trace_preempt_on+0x20/0xc0
[   14.829515]  ? __pfx_kthread+0x10/0x10
[   14.829536]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.829557]  ? calculate_sigpending+0x7b/0xa0
[   14.829581]  ? __pfx_kthread+0x10/0x10
[   14.829603]  ret_from_fork+0x116/0x1d0
[   14.829622]  ? __pfx_kthread+0x10/0x10
[   14.829644]  ret_from_fork_asm+0x1a/0x30
[   14.829675]  </TASK>
[   14.829687] 
[   14.839932] Allocated by task 283:
[   14.840320]  kasan_save_stack+0x45/0x70
[   14.840531]  kasan_save_track+0x18/0x40
[   14.840866]  kasan_save_alloc_info+0x3b/0x50
[   14.841142]  __kasan_kmalloc+0xb7/0xc0
[   14.841462]  __kmalloc_cache_noprof+0x189/0x420
[   14.841663]  kasan_atomics+0x95/0x310
[   14.841966]  kunit_try_run_case+0x1a5/0x480
[   14.842192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.842614]  kthread+0x337/0x6f0
[   14.842818]  ret_from_fork+0x116/0x1d0
[   14.843079]  ret_from_fork_asm+0x1a/0x30
[   14.843413] 
[   14.843503] The buggy address belongs to the object at ffff8881038eb080
[   14.843503]  which belongs to the cache kmalloc-64 of size 64
[   14.844233] The buggy address is located 0 bytes to the right of
[   14.844233]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.844839] 
[   14.844947] The buggy address belongs to the physical page:
[   14.845199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.845757] flags: 0x200000000000000(node=0|zone=2)
[   14.846031] page_type: f5(slab)
[   14.846217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.846747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.847162] page dumped because: kasan: bad access detected
[   14.847442] 
[   14.847678] Memory state around the buggy address:
[   14.847989]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.848306]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.848719] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.849127]                                      ^
[   14.849471]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.849854]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.850272] ==================================================================
[   15.094558] ==================================================================
[   15.094961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.095205] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.095422] 
[   15.095624] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.095688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.095702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.095723] Call Trace:
[   15.095736]  <TASK>
[   15.095766]  dump_stack_lvl+0x73/0xb0
[   15.095807]  print_report+0xd1/0x650
[   15.095843]  ? __virt_addr_valid+0x1db/0x2d0
[   15.095867]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.095902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.095937]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.095973]  kasan_report+0x141/0x180
[   15.096010]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.096037]  kasan_check_range+0x10c/0x1c0
[   15.096060]  __kasan_check_write+0x18/0x20
[   15.096080]  kasan_atomics_helper+0x1eaa/0x5450
[   15.096117]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.096140]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.096166]  ? kasan_atomics+0x152/0x310
[   15.096193]  kasan_atomics+0x1dc/0x310
[   15.096216]  ? __pfx_kasan_atomics+0x10/0x10
[   15.096242]  ? __pfx_read_tsc+0x10/0x10
[   15.096263]  ? ktime_get_ts64+0x86/0x230
[   15.096287]  kunit_try_run_case+0x1a5/0x480
[   15.096311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.096345]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.096368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.096391]  ? __kthread_parkme+0x82/0x180
[   15.096412]  ? preempt_count_sub+0x50/0x80
[   15.096436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.096460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.096484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.096507]  kthread+0x337/0x6f0
[   15.096527]  ? trace_preempt_on+0x20/0xc0
[   15.096550]  ? __pfx_kthread+0x10/0x10
[   15.096590]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.096611]  ? calculate_sigpending+0x7b/0xa0
[   15.096636]  ? __pfx_kthread+0x10/0x10
[   15.096658]  ret_from_fork+0x116/0x1d0
[   15.096677]  ? __pfx_kthread+0x10/0x10
[   15.096697]  ret_from_fork_asm+0x1a/0x30
[   15.096728]  </TASK>
[   15.096739] 
[   15.104319] Allocated by task 283:
[   15.104495]  kasan_save_stack+0x45/0x70
[   15.104687]  kasan_save_track+0x18/0x40
[   15.104877]  kasan_save_alloc_info+0x3b/0x50
[   15.105071]  __kasan_kmalloc+0xb7/0xc0
[   15.105284]  __kmalloc_cache_noprof+0x189/0x420
[   15.105531]  kasan_atomics+0x95/0x310
[   15.105724]  kunit_try_run_case+0x1a5/0x480
[   15.105939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.106155]  kthread+0x337/0x6f0
[   15.106332]  ret_from_fork+0x116/0x1d0
[   15.106528]  ret_from_fork_asm+0x1a/0x30
[   15.106680] 
[   15.106775] The buggy address belongs to the object at ffff8881038eb080
[   15.106775]  which belongs to the cache kmalloc-64 of size 64
[   15.107307] The buggy address is located 0 bytes to the right of
[   15.107307]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.107806] 
[   15.107921] The buggy address belongs to the physical page:
[   15.108186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.108514] flags: 0x200000000000000(node=0|zone=2)
[   15.108675] page_type: f5(slab)
[   15.108792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.109150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.109597] page dumped because: kasan: bad access detected
[   15.109870] 
[   15.109987] Memory state around the buggy address:
[   15.110193]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.110406]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.110806] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.111106]                                      ^
[   15.111371]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111658]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111955] ==================================================================
[   15.130879] ==================================================================
[   15.131289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.131598] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.131923] 
[   15.132037] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.132117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.132130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.132151] Call Trace:
[   15.132166]  <TASK>
[   15.132180]  dump_stack_lvl+0x73/0xb0
[   15.132207]  print_report+0xd1/0x650
[   15.132230]  ? __virt_addr_valid+0x1db/0x2d0
[   15.132253]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.132274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.132299]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.132321]  kasan_report+0x141/0x180
[   15.132343]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.132370]  __asan_report_load8_noabort+0x18/0x20
[   15.132415]  kasan_atomics_helper+0x4f71/0x5450
[   15.132439]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.132461]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.132486]  ? kasan_atomics+0x152/0x310
[   15.132512]  kasan_atomics+0x1dc/0x310
[   15.132535]  ? __pfx_kasan_atomics+0x10/0x10
[   15.132577]  ? __pfx_read_tsc+0x10/0x10
[   15.132599]  ? ktime_get_ts64+0x86/0x230
[   15.132623]  kunit_try_run_case+0x1a5/0x480
[   15.132647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.132670]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.132693]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.132734]  ? __kthread_parkme+0x82/0x180
[   15.132756]  ? preempt_count_sub+0x50/0x80
[   15.132780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.132804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.132828]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.132852]  kthread+0x337/0x6f0
[   15.132872]  ? trace_preempt_on+0x20/0xc0
[   15.132895]  ? __pfx_kthread+0x10/0x10
[   15.132932]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.132968]  ? calculate_sigpending+0x7b/0xa0
[   15.133005]  ? __pfx_kthread+0x10/0x10
[   15.133040]  ret_from_fork+0x116/0x1d0
[   15.133072]  ? __pfx_kthread+0x10/0x10
[   15.133117]  ret_from_fork_asm+0x1a/0x30
[   15.133176]  </TASK>
[   15.133188] 
[   15.140955] Allocated by task 283:
[   15.141158]  kasan_save_stack+0x45/0x70
[   15.141367]  kasan_save_track+0x18/0x40
[   15.141558]  kasan_save_alloc_info+0x3b/0x50
[   15.141759]  __kasan_kmalloc+0xb7/0xc0
[   15.141927]  __kmalloc_cache_noprof+0x189/0x420
[   15.142195]  kasan_atomics+0x95/0x310
[   15.142407]  kunit_try_run_case+0x1a5/0x480
[   15.142598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.142825]  kthread+0x337/0x6f0
[   15.142948]  ret_from_fork+0x116/0x1d0
[   15.143076]  ret_from_fork_asm+0x1a/0x30
[   15.143318] 
[   15.143427] The buggy address belongs to the object at ffff8881038eb080
[   15.143427]  which belongs to the cache kmalloc-64 of size 64
[   15.143948] The buggy address is located 0 bytes to the right of
[   15.143948]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.144484] 
[   15.144578] The buggy address belongs to the physical page:
[   15.144822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.145201] flags: 0x200000000000000(node=0|zone=2)
[   15.145433] page_type: f5(slab)
[   15.145598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.145883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.146111] page dumped because: kasan: bad access detected
[   15.146276] 
[   15.146345] Memory state around the buggy address:
[   15.146494]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.146701]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.147041] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.147432]                                      ^
[   15.147677]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.148035]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.148392] ==================================================================
[   15.027658] ==================================================================
[   15.027922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.028201] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.028811] 
[   15.028920] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.028962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.028975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.028996] Call Trace:
[   15.029011]  <TASK>
[   15.029026]  dump_stack_lvl+0x73/0xb0
[   15.029052]  print_report+0xd1/0x650
[   15.029075]  ? __virt_addr_valid+0x1db/0x2d0
[   15.029109]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.029132]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.029155]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.029178]  kasan_report+0x141/0x180
[   15.029201]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.029229]  kasan_check_range+0x10c/0x1c0
[   15.029254]  __kasan_check_write+0x18/0x20
[   15.029276]  kasan_atomics_helper+0x1ce1/0x5450
[   15.029303]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.029326]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.029351]  ? kasan_atomics+0x152/0x310
[   15.029379]  kasan_atomics+0x1dc/0x310
[   15.029402]  ? __pfx_kasan_atomics+0x10/0x10
[   15.029426]  ? __pfx_read_tsc+0x10/0x10
[   15.029448]  ? ktime_get_ts64+0x86/0x230
[   15.029471]  kunit_try_run_case+0x1a5/0x480
[   15.029495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.029519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.029543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.029566]  ? __kthread_parkme+0x82/0x180
[   15.029588]  ? preempt_count_sub+0x50/0x80
[   15.029613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.029638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.029662]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.029685]  kthread+0x337/0x6f0
[   15.029705]  ? trace_preempt_on+0x20/0xc0
[   15.029729]  ? __pfx_kthread+0x10/0x10
[   15.029750]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.029773]  ? calculate_sigpending+0x7b/0xa0
[   15.029796]  ? __pfx_kthread+0x10/0x10
[   15.029819]  ret_from_fork+0x116/0x1d0
[   15.029837]  ? __pfx_kthread+0x10/0x10
[   15.029858]  ret_from_fork_asm+0x1a/0x30
[   15.029889]  </TASK>
[   15.029901] 
[   15.037210] Allocated by task 283:
[   15.037357]  kasan_save_stack+0x45/0x70
[   15.037559]  kasan_save_track+0x18/0x40
[   15.037757]  kasan_save_alloc_info+0x3b/0x50
[   15.037978]  __kasan_kmalloc+0xb7/0xc0
[   15.038178]  __kmalloc_cache_noprof+0x189/0x420
[   15.038477]  kasan_atomics+0x95/0x310
[   15.038655]  kunit_try_run_case+0x1a5/0x480
[   15.038819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.038996]  kthread+0x337/0x6f0
[   15.039128]  ret_from_fork+0x116/0x1d0
[   15.039274]  ret_from_fork_asm+0x1a/0x30
[   15.039417] 
[   15.039489] The buggy address belongs to the object at ffff8881038eb080
[   15.039489]  which belongs to the cache kmalloc-64 of size 64
[   15.039891] The buggy address is located 0 bytes to the right of
[   15.039891]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.040457] 
[   15.040556] The buggy address belongs to the physical page:
[   15.040823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.041431] flags: 0x200000000000000(node=0|zone=2)
[   15.041677] page_type: f5(slab)
[   15.041803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.042146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.042462] page dumped because: kasan: bad access detected
[   15.042689] 
[   15.042788] Memory state around the buggy address:
[   15.042960]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.043190]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.043474] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.043795]                                      ^
[   15.044024]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.045176]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.045639] ==================================================================
[   14.358541] ==================================================================
[   14.358882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.359215] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.359521] 
[   14.359625] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.359668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.359682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.359703] Call Trace:
[   14.359718]  <TASK>
[   14.359734]  dump_stack_lvl+0x73/0xb0
[   14.359760]  print_report+0xd1/0x650
[   14.359782]  ? __virt_addr_valid+0x1db/0x2d0
[   14.359806]  ? kasan_atomics_helper+0xd47/0x5450
[   14.359828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.359851]  ? kasan_atomics_helper+0xd47/0x5450
[   14.359874]  kasan_report+0x141/0x180
[   14.359897]  ? kasan_atomics_helper+0xd47/0x5450
[   14.359924]  kasan_check_range+0x10c/0x1c0
[   14.359948]  __kasan_check_write+0x18/0x20
[   14.359968]  kasan_atomics_helper+0xd47/0x5450
[   14.359991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.360013]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.360038]  ? kasan_atomics+0x152/0x310
[   14.360064]  kasan_atomics+0x1dc/0x310
[   14.360088]  ? __pfx_kasan_atomics+0x10/0x10
[   14.360195]  ? __pfx_read_tsc+0x10/0x10
[   14.360217]  ? ktime_get_ts64+0x86/0x230
[   14.360241]  kunit_try_run_case+0x1a5/0x480
[   14.360267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.360291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.360333]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.360357]  ? __kthread_parkme+0x82/0x180
[   14.360377]  ? preempt_count_sub+0x50/0x80
[   14.360401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.360426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.360449]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.360472]  kthread+0x337/0x6f0
[   14.360492]  ? trace_preempt_on+0x20/0xc0
[   14.360514]  ? __pfx_kthread+0x10/0x10
[   14.360536]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.360557]  ? calculate_sigpending+0x7b/0xa0
[   14.360582]  ? __pfx_kthread+0x10/0x10
[   14.360604]  ret_from_fork+0x116/0x1d0
[   14.360622]  ? __pfx_kthread+0x10/0x10
[   14.360644]  ret_from_fork_asm+0x1a/0x30
[   14.360674]  </TASK>
[   14.360687] 
[   14.368715] Allocated by task 283:
[   14.368901]  kasan_save_stack+0x45/0x70
[   14.369119]  kasan_save_track+0x18/0x40
[   14.369385]  kasan_save_alloc_info+0x3b/0x50
[   14.369563]  __kasan_kmalloc+0xb7/0xc0
[   14.369742]  __kmalloc_cache_noprof+0x189/0x420
[   14.369967]  kasan_atomics+0x95/0x310
[   14.370162]  kunit_try_run_case+0x1a5/0x480
[   14.370347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.370584]  kthread+0x337/0x6f0
[   14.370732]  ret_from_fork+0x116/0x1d0
[   14.370920]  ret_from_fork_asm+0x1a/0x30
[   14.371062] 
[   14.371152] The buggy address belongs to the object at ffff8881038eb080
[   14.371152]  which belongs to the cache kmalloc-64 of size 64
[   14.371796] The buggy address is located 0 bytes to the right of
[   14.371796]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.372456] 
[   14.372536] The buggy address belongs to the physical page:
[   14.372712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.372958] flags: 0x200000000000000(node=0|zone=2)
[   14.373262] page_type: f5(slab)
[   14.373465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.373817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.374242] page dumped because: kasan: bad access detected
[   14.374520] 
[   14.374617] Memory state around the buggy address:
[   14.374849]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.375247]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.375498] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.375805]                                      ^
[   14.376037]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.376642]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.376949] ==================================================================
[   13.908423] ==================================================================
[   13.908737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.909084] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   13.909473] 
[   13.909570] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.910193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.910206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.910228] Call Trace:
[   13.910240]  <TASK>
[   13.910256]  dump_stack_lvl+0x73/0xb0
[   13.910283]  print_report+0xd1/0x650
[   13.910306]  ? __virt_addr_valid+0x1db/0x2d0
[   13.910327]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.910348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.910369]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.910390]  kasan_report+0x141/0x180
[   13.910412]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.910437]  __asan_report_store4_noabort+0x1b/0x30
[   13.910456]  kasan_atomics_helper+0x4ba2/0x5450
[   13.910478]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.910501]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.910539]  ? kasan_atomics+0x152/0x310
[   13.910566]  kasan_atomics+0x1dc/0x310
[   13.910589]  ? __pfx_kasan_atomics+0x10/0x10
[   13.910612]  ? __pfx_read_tsc+0x10/0x10
[   13.910632]  ? ktime_get_ts64+0x86/0x230
[   13.910656]  kunit_try_run_case+0x1a5/0x480
[   13.910679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910701]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.910723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.910745]  ? __kthread_parkme+0x82/0x180
[   13.910765]  ? preempt_count_sub+0x50/0x80
[   13.910788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.910833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.910856]  kthread+0x337/0x6f0
[   13.910874]  ? trace_preempt_on+0x20/0xc0
[   13.910897]  ? __pfx_kthread+0x10/0x10
[   13.910917]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.910937]  ? calculate_sigpending+0x7b/0xa0
[   13.910959]  ? __pfx_kthread+0x10/0x10
[   13.910984]  ret_from_fork+0x116/0x1d0
[   13.911005]  ? __pfx_kthread+0x10/0x10
[   13.911026]  ret_from_fork_asm+0x1a/0x30
[   13.911057]  </TASK>
[   13.911070] 
[   13.924205] Allocated by task 283:
[   13.925858]  kasan_save_stack+0x45/0x70
[   13.926036]  kasan_save_track+0x18/0x40
[   13.926363]  kasan_save_alloc_info+0x3b/0x50
[   13.926800]  __kasan_kmalloc+0xb7/0xc0
[   13.927085]  __kmalloc_cache_noprof+0x189/0x420
[   13.927271]  kasan_atomics+0x95/0x310
[   13.927405]  kunit_try_run_case+0x1a5/0x480
[   13.927551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.927726]  kthread+0x337/0x6f0
[   13.928424]  ret_from_fork+0x116/0x1d0
[   13.928821]  ret_from_fork_asm+0x1a/0x30
[   13.929274] 
[   13.929501] The buggy address belongs to the object at ffff8881038eb080
[   13.929501]  which belongs to the cache kmalloc-64 of size 64
[   13.930211] The buggy address is located 0 bytes to the right of
[   13.930211]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   13.931390] 
[   13.931554] The buggy address belongs to the physical page:
[   13.931749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   13.932602] flags: 0x200000000000000(node=0|zone=2)
[   13.932779] page_type: f5(slab)
[   13.932903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.933242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.933585] page dumped because: kasan: bad access detected
[   13.933868] 
[   13.933967] Memory state around the buggy address:
[   13.934267]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.934608]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.934926] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.935300]                                      ^
[   13.935535]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.935825]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.936123] ==================================================================
[   14.522446] ==================================================================
[   14.522774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.523083] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.524199] 
[   14.524483] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.524534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.524549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.524573] Call Trace:
[   14.524593]  <TASK>
[   14.524612]  dump_stack_lvl+0x73/0xb0
[   14.524646]  print_report+0xd1/0x650
[   14.524670]  ? __virt_addr_valid+0x1db/0x2d0
[   14.524694]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.524716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.524739]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.524760]  kasan_report+0x141/0x180
[   14.524786]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.524813]  __asan_report_load4_noabort+0x18/0x20
[   14.524838]  kasan_atomics_helper+0x4a1c/0x5450
[   14.524861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.524884]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.524909]  ? kasan_atomics+0x152/0x310
[   14.524935]  kasan_atomics+0x1dc/0x310
[   14.524958]  ? __pfx_kasan_atomics+0x10/0x10
[   14.524984]  ? __pfx_read_tsc+0x10/0x10
[   14.525005]  ? ktime_get_ts64+0x86/0x230
[   14.525031]  kunit_try_run_case+0x1a5/0x480
[   14.525055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.525078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.525116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.525140]  ? __kthread_parkme+0x82/0x180
[   14.525161]  ? preempt_count_sub+0x50/0x80
[   14.525185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.525209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.525233]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.525257]  kthread+0x337/0x6f0
[   14.525277]  ? trace_preempt_on+0x20/0xc0
[   14.525301]  ? __pfx_kthread+0x10/0x10
[   14.525325]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.525347]  ? calculate_sigpending+0x7b/0xa0
[   14.525372]  ? __pfx_kthread+0x10/0x10
[   14.525394]  ret_from_fork+0x116/0x1d0
[   14.525414]  ? __pfx_kthread+0x10/0x10
[   14.525435]  ret_from_fork_asm+0x1a/0x30
[   14.525466]  </TASK>
[   14.525479] 
[   14.536432] Allocated by task 283:
[   14.536719]  kasan_save_stack+0x45/0x70
[   14.537005]  kasan_save_track+0x18/0x40
[   14.537324]  kasan_save_alloc_info+0x3b/0x50
[   14.537626]  __kasan_kmalloc+0xb7/0xc0
[   14.537774]  __kmalloc_cache_noprof+0x189/0x420
[   14.537985]  kasan_atomics+0x95/0x310
[   14.538378]  kunit_try_run_case+0x1a5/0x480
[   14.538671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.539013]  kthread+0x337/0x6f0
[   14.539287]  ret_from_fork+0x116/0x1d0
[   14.539593]  ret_from_fork_asm+0x1a/0x30
[   14.539895] 
[   14.540066] The buggy address belongs to the object at ffff8881038eb080
[   14.540066]  which belongs to the cache kmalloc-64 of size 64
[   14.540794] The buggy address is located 0 bytes to the right of
[   14.540794]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.541551] 
[   14.541665] The buggy address belongs to the physical page:
[   14.542071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.542623] flags: 0x200000000000000(node=0|zone=2)
[   14.542965] page_type: f5(slab)
[   14.543167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.543660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.544091] page dumped because: kasan: bad access detected
[   14.544488] 
[   14.544695] Memory state around the buggy address:
[   14.544972]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.545309]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.545703] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.545982]                                      ^
[   14.546238]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.546746]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.547154] ==================================================================
[   14.761193] ==================================================================
[   14.761424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.762168] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.762696] 
[   14.762804] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.762845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.762858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.762905] Call Trace:
[   14.762917]  <TASK>
[   14.762932]  dump_stack_lvl+0x73/0xb0
[   14.762977]  print_report+0xd1/0x650
[   14.763000]  ? __virt_addr_valid+0x1db/0x2d0
[   14.763041]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.763063]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.763113]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.763136]  kasan_report+0x141/0x180
[   14.763173]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.763232]  kasan_check_range+0x10c/0x1c0
[   14.763256]  __kasan_check_write+0x18/0x20
[   14.763276]  kasan_atomics_helper+0x15b6/0x5450
[   14.763299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.763332]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.763357]  ? kasan_atomics+0x152/0x310
[   14.763384]  kasan_atomics+0x1dc/0x310
[   14.763407]  ? __pfx_kasan_atomics+0x10/0x10
[   14.763431]  ? __pfx_read_tsc+0x10/0x10
[   14.763453]  ? ktime_get_ts64+0x86/0x230
[   14.763493]  kunit_try_run_case+0x1a5/0x480
[   14.763531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.763567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.763604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.763640]  ? __kthread_parkme+0x82/0x180
[   14.763675]  ? preempt_count_sub+0x50/0x80
[   14.763725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.763763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.763800]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.763826]  kthread+0x337/0x6f0
[   14.763846]  ? trace_preempt_on+0x20/0xc0
[   14.763869]  ? __pfx_kthread+0x10/0x10
[   14.763890]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.763913]  ? calculate_sigpending+0x7b/0xa0
[   14.763936]  ? __pfx_kthread+0x10/0x10
[   14.763958]  ret_from_fork+0x116/0x1d0
[   14.763978]  ? __pfx_kthread+0x10/0x10
[   14.763998]  ret_from_fork_asm+0x1a/0x30
[   14.764028]  </TASK>
[   14.764041] 
[   14.773448] Allocated by task 283:
[   14.773577]  kasan_save_stack+0x45/0x70
[   14.773776]  kasan_save_track+0x18/0x40
[   14.773966]  kasan_save_alloc_info+0x3b/0x50
[   14.774212]  __kasan_kmalloc+0xb7/0xc0
[   14.774398]  __kmalloc_cache_noprof+0x189/0x420
[   14.774662]  kasan_atomics+0x95/0x310
[   14.774830]  kunit_try_run_case+0x1a5/0x480
[   14.774973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.775152]  kthread+0x337/0x6f0
[   14.775278]  ret_from_fork+0x116/0x1d0
[   14.775484]  ret_from_fork_asm+0x1a/0x30
[   14.775705] 
[   14.775798] The buggy address belongs to the object at ffff8881038eb080
[   14.775798]  which belongs to the cache kmalloc-64 of size 64
[   14.776437] The buggy address is located 0 bytes to the right of
[   14.776437]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.776987] 
[   14.777081] The buggy address belongs to the physical page:
[   14.777273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.777769] flags: 0x200000000000000(node=0|zone=2)
[   14.778027] page_type: f5(slab)
[   14.778213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.778568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.778807] page dumped because: kasan: bad access detected
[   14.779061] 
[   14.779185] Memory state around the buggy address:
[   14.779439]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.779728]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.780043] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.780366]                                      ^
[   14.780530]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.780849]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.781177] ==================================================================
[   14.900679] ==================================================================
[   14.901018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.901466] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.901876] 
[   14.901970] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.902015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.902028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.902173] Call Trace:
[   14.902192]  <TASK>
[   14.902370]  dump_stack_lvl+0x73/0xb0
[   14.902405]  print_report+0xd1/0x650
[   14.902430]  ? __virt_addr_valid+0x1db/0x2d0
[   14.902453]  ? kasan_atomics_helper+0x194a/0x5450
[   14.902475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.902498]  ? kasan_atomics_helper+0x194a/0x5450
[   14.902523]  kasan_report+0x141/0x180
[   14.902546]  ? kasan_atomics_helper+0x194a/0x5450
[   14.902573]  kasan_check_range+0x10c/0x1c0
[   14.902596]  __kasan_check_write+0x18/0x20
[   14.902616]  kasan_atomics_helper+0x194a/0x5450
[   14.902639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.902662]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.902689]  ? kasan_atomics+0x152/0x310
[   14.902716]  kasan_atomics+0x1dc/0x310
[   14.902738]  ? __pfx_kasan_atomics+0x10/0x10
[   14.902762]  ? __pfx_read_tsc+0x10/0x10
[   14.902783]  ? ktime_get_ts64+0x86/0x230
[   14.902808]  kunit_try_run_case+0x1a5/0x480
[   14.902833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.902855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.902878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.902901]  ? __kthread_parkme+0x82/0x180
[   14.902921]  ? preempt_count_sub+0x50/0x80
[   14.902945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.902968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.902991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.903015]  kthread+0x337/0x6f0
[   14.903034]  ? trace_preempt_on+0x20/0xc0
[   14.903058]  ? __pfx_kthread+0x10/0x10
[   14.903079]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.903111]  ? calculate_sigpending+0x7b/0xa0
[   14.903135]  ? __pfx_kthread+0x10/0x10
[   14.903157]  ret_from_fork+0x116/0x1d0
[   14.903175]  ? __pfx_kthread+0x10/0x10
[   14.903196]  ret_from_fork_asm+0x1a/0x30
[   14.903231]  </TASK>
[   14.903244] 
[   14.913828] Allocated by task 283:
[   14.914000]  kasan_save_stack+0x45/0x70
[   14.914283]  kasan_save_track+0x18/0x40
[   14.914555]  kasan_save_alloc_info+0x3b/0x50
[   14.914830]  __kasan_kmalloc+0xb7/0xc0
[   14.915084]  __kmalloc_cache_noprof+0x189/0x420
[   14.915316]  kasan_atomics+0x95/0x310
[   14.915651]  kunit_try_run_case+0x1a5/0x480
[   14.915967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.916318]  kthread+0x337/0x6f0
[   14.916594]  ret_from_fork+0x116/0x1d0
[   14.916865]  ret_from_fork_asm+0x1a/0x30
[   14.917069] 
[   14.917175] The buggy address belongs to the object at ffff8881038eb080
[   14.917175]  which belongs to the cache kmalloc-64 of size 64
[   14.917969] The buggy address is located 0 bytes to the right of
[   14.917969]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.918754] 
[   14.919020] The buggy address belongs to the physical page:
[   14.919291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.919963] flags: 0x200000000000000(node=0|zone=2)
[   14.920145] page_type: f5(slab)
[   14.920267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.921115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.921892] page dumped because: kasan: bad access detected
[   14.922448] 
[   14.922527] Memory state around the buggy address:
[   14.922684]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.922897]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.923126] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.923366]                                      ^
[   14.923519]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.924458]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.924815] ==================================================================
[   15.190601] ==================================================================
[   15.190946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.191374] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.191873] 
[   15.191963] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.192013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.192026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.192050] Call Trace:
[   15.192064]  <TASK>
[   15.192079]  dump_stack_lvl+0x73/0xb0
[   15.192119]  print_report+0xd1/0x650
[   15.192141]  ? __virt_addr_valid+0x1db/0x2d0
[   15.192164]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.192186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.192208]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.192230]  kasan_report+0x141/0x180
[   15.192252]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.192279]  kasan_check_range+0x10c/0x1c0
[   15.192303]  __kasan_check_write+0x18/0x20
[   15.192322]  kasan_atomics_helper+0x20c8/0x5450
[   15.192345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.192378]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.192403]  ? kasan_atomics+0x152/0x310
[   15.192429]  kasan_atomics+0x1dc/0x310
[   15.192452]  ? __pfx_kasan_atomics+0x10/0x10
[   15.192476]  ? __pfx_read_tsc+0x10/0x10
[   15.192498]  ? ktime_get_ts64+0x86/0x230
[   15.192522]  kunit_try_run_case+0x1a5/0x480
[   15.192546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.192568]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.192592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.192615]  ? __kthread_parkme+0x82/0x180
[   15.192636]  ? preempt_count_sub+0x50/0x80
[   15.192659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.192683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.192707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.192730]  kthread+0x337/0x6f0
[   15.192749]  ? trace_preempt_on+0x20/0xc0
[   15.192772]  ? __pfx_kthread+0x10/0x10
[   15.192794]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.192815]  ? calculate_sigpending+0x7b/0xa0
[   15.192839]  ? __pfx_kthread+0x10/0x10
[   15.192862]  ret_from_fork+0x116/0x1d0
[   15.192881]  ? __pfx_kthread+0x10/0x10
[   15.192902]  ret_from_fork_asm+0x1a/0x30
[   15.192933]  </TASK>
[   15.192945] 
[   15.200112] Allocated by task 283:
[   15.200262]  kasan_save_stack+0x45/0x70
[   15.200533]  kasan_save_track+0x18/0x40
[   15.200668]  kasan_save_alloc_info+0x3b/0x50
[   15.200817]  __kasan_kmalloc+0xb7/0xc0
[   15.200953]  __kmalloc_cache_noprof+0x189/0x420
[   15.201187]  kasan_atomics+0x95/0x310
[   15.201424]  kunit_try_run_case+0x1a5/0x480
[   15.201624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.201876]  kthread+0x337/0x6f0
[   15.202033]  ret_from_fork+0x116/0x1d0
[   15.202222]  ret_from_fork_asm+0x1a/0x30
[   15.202448] 
[   15.202524] The buggy address belongs to the object at ffff8881038eb080
[   15.202524]  which belongs to the cache kmalloc-64 of size 64
[   15.202978] The buggy address is located 0 bytes to the right of
[   15.202978]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.203493] 
[   15.203590] The buggy address belongs to the physical page:
[   15.203806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.204124] flags: 0x200000000000000(node=0|zone=2)
[   15.204346] page_type: f5(slab)
[   15.204501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.204765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.204989] page dumped because: kasan: bad access detected
[   15.205170] 
[   15.205241] Memory state around the buggy address:
[   15.205431]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.205763]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.206069] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.206382]                                      ^
[   15.206548]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.206763]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.206975] ==================================================================
[   13.936725] ==================================================================
[   13.937043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.937603] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   13.937890] 
[   13.938004] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.938045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.938057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.938077] Call Trace:
[   13.938093]  <TASK>
[   13.938117]  dump_stack_lvl+0x73/0xb0
[   13.938146]  print_report+0xd1/0x650
[   13.938168]  ? __virt_addr_valid+0x1db/0x2d0
[   13.938191]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.938211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.938233]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.938254]  kasan_report+0x141/0x180
[   13.938275]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.938300]  __asan_report_load4_noabort+0x18/0x20
[   13.938324]  kasan_atomics_helper+0x4b88/0x5450
[   13.938346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.938367]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.938392]  ? kasan_atomics+0x152/0x310
[   13.938418]  kasan_atomics+0x1dc/0x310
[   13.938440]  ? __pfx_kasan_atomics+0x10/0x10
[   13.938463]  ? __pfx_read_tsc+0x10/0x10
[   13.938482]  ? ktime_get_ts64+0x86/0x230
[   13.938506]  kunit_try_run_case+0x1a5/0x480
[   13.938528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.938550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.938572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.938594]  ? __kthread_parkme+0x82/0x180
[   13.938614]  ? preempt_count_sub+0x50/0x80
[   13.938647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.938739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.938765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.938789]  kthread+0x337/0x6f0
[   13.938808]  ? trace_preempt_on+0x20/0xc0
[   13.938830]  ? __pfx_kthread+0x10/0x10
[   13.938865]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.938897]  ? calculate_sigpending+0x7b/0xa0
[   13.938921]  ? __pfx_kthread+0x10/0x10
[   13.938942]  ret_from_fork+0x116/0x1d0
[   13.938970]  ? __pfx_kthread+0x10/0x10
[   13.938992]  ret_from_fork_asm+0x1a/0x30
[   13.939021]  </TASK>
[   13.939032] 
[   13.947221] Allocated by task 283:
[   13.947356]  kasan_save_stack+0x45/0x70
[   13.947764]  kasan_save_track+0x18/0x40
[   13.947979]  kasan_save_alloc_info+0x3b/0x50
[   13.948462]  __kasan_kmalloc+0xb7/0xc0
[   13.948670]  __kmalloc_cache_noprof+0x189/0x420
[   13.948868]  kasan_atomics+0x95/0x310
[   13.949074]  kunit_try_run_case+0x1a5/0x480
[   13.949343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.949609]  kthread+0x337/0x6f0
[   13.949763]  ret_from_fork+0x116/0x1d0
[   13.949969]  ret_from_fork_asm+0x1a/0x30
[   13.950208] 
[   13.950308] The buggy address belongs to the object at ffff8881038eb080
[   13.950308]  which belongs to the cache kmalloc-64 of size 64
[   13.950723] The buggy address is located 0 bytes to the right of
[   13.950723]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   13.951262] 
[   13.951498] The buggy address belongs to the physical page:
[   13.951853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   13.952125] flags: 0x200000000000000(node=0|zone=2)
[   13.952887] page_type: f5(slab)
[   13.953326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.953679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.953993] page dumped because: kasan: bad access detected
[   13.954616] 
[   13.954705] Memory state around the buggy address:
[   13.954911]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.955336]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.955633] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.955917]                                      ^
[   13.956134]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.957062]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.957776] ==================================================================
[   14.587507] ==================================================================
[   14.587741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.587987] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.588816] 
[   14.588921] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.588965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.588979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.589000] Call Trace:
[   14.589014]  <TASK>
[   14.589027]  dump_stack_lvl+0x73/0xb0
[   14.589056]  print_report+0xd1/0x650
[   14.589079]  ? __virt_addr_valid+0x1db/0x2d0
[   14.589114]  ? kasan_atomics_helper+0x1217/0x5450
[   14.589137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.589159]  ? kasan_atomics_helper+0x1217/0x5450
[   14.589184]  kasan_report+0x141/0x180
[   14.589207]  ? kasan_atomics_helper+0x1217/0x5450
[   14.589234]  kasan_check_range+0x10c/0x1c0
[   14.589258]  __kasan_check_write+0x18/0x20
[   14.589279]  kasan_atomics_helper+0x1217/0x5450
[   14.589303]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.589324]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.589452]  ? kasan_atomics+0x152/0x310
[   14.589483]  kasan_atomics+0x1dc/0x310
[   14.589534]  ? __pfx_kasan_atomics+0x10/0x10
[   14.589589]  ? __pfx_read_tsc+0x10/0x10
[   14.589609]  ? ktime_get_ts64+0x86/0x230
[   14.589634]  kunit_try_run_case+0x1a5/0x480
[   14.589658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.589681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.589705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.589727]  ? __kthread_parkme+0x82/0x180
[   14.589749]  ? preempt_count_sub+0x50/0x80
[   14.589773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.589797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.589820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.589844]  kthread+0x337/0x6f0
[   14.589864]  ? trace_preempt_on+0x20/0xc0
[   14.589919]  ? __pfx_kthread+0x10/0x10
[   14.589941]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.589962]  ? calculate_sigpending+0x7b/0xa0
[   14.589986]  ? __pfx_kthread+0x10/0x10
[   14.590008]  ret_from_fork+0x116/0x1d0
[   14.590027]  ? __pfx_kthread+0x10/0x10
[   14.590079]  ret_from_fork_asm+0x1a/0x30
[   14.590119]  </TASK>
[   14.590131] 
[   14.598904] Allocated by task 283:
[   14.599108]  kasan_save_stack+0x45/0x70
[   14.599339]  kasan_save_track+0x18/0x40
[   14.599511]  kasan_save_alloc_info+0x3b/0x50
[   14.599664]  __kasan_kmalloc+0xb7/0xc0
[   14.599800]  __kmalloc_cache_noprof+0x189/0x420
[   14.600008]  kasan_atomics+0x95/0x310
[   14.600157]  kunit_try_run_case+0x1a5/0x480
[   14.600308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.600614]  kthread+0x337/0x6f0
[   14.600793]  ret_from_fork+0x116/0x1d0
[   14.601013]  ret_from_fork_asm+0x1a/0x30
[   14.601225] 
[   14.601323] The buggy address belongs to the object at ffff8881038eb080
[   14.601323]  which belongs to the cache kmalloc-64 of size 64
[   14.602050] The buggy address is located 0 bytes to the right of
[   14.602050]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.602610] 
[   14.602758] The buggy address belongs to the physical page:
[   14.602943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.603196] flags: 0x200000000000000(node=0|zone=2)
[   14.603370] page_type: f5(slab)
[   14.603492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.603732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.604140] page dumped because: kasan: bad access detected
[   14.604487] 
[   14.604637] Memory state around the buggy address:
[   14.604951]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.605441]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.605759] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.605982]                                      ^
[   14.606153]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.606627]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.606984] ==================================================================
[   14.441559] ==================================================================
[   14.441873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.443672] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.443921] 
[   14.444018] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.444062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.444076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.444112] Call Trace:
[   14.444132]  <TASK>
[   14.444151]  dump_stack_lvl+0x73/0xb0
[   14.444182]  print_report+0xd1/0x650
[   14.444207]  ? __virt_addr_valid+0x1db/0x2d0
[   14.444230]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.444252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.444277]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.444299]  kasan_report+0x141/0x180
[   14.444323]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.444349]  kasan_check_range+0x10c/0x1c0
[   14.444376]  __kasan_check_write+0x18/0x20
[   14.444396]  kasan_atomics_helper+0xfa9/0x5450
[   14.444419]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.444442]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.444467]  ? kasan_atomics+0x152/0x310
[   14.444494]  kasan_atomics+0x1dc/0x310
[   14.444517]  ? __pfx_kasan_atomics+0x10/0x10
[   14.444541]  ? __pfx_read_tsc+0x10/0x10
[   14.444564]  ? ktime_get_ts64+0x86/0x230
[   14.444592]  kunit_try_run_case+0x1a5/0x480
[   14.444617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.444640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.444664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.444687]  ? __kthread_parkme+0x82/0x180
[   14.444709]  ? preempt_count_sub+0x50/0x80
[   14.444733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.444757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.444781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.444804]  kthread+0x337/0x6f0
[   14.444824]  ? trace_preempt_on+0x20/0xc0
[   14.444848]  ? __pfx_kthread+0x10/0x10
[   14.444869]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.444891]  ? calculate_sigpending+0x7b/0xa0
[   14.444915]  ? __pfx_kthread+0x10/0x10
[   14.444938]  ret_from_fork+0x116/0x1d0
[   14.444957]  ? __pfx_kthread+0x10/0x10
[   14.444978]  ret_from_fork_asm+0x1a/0x30
[   14.445009]  </TASK>
[   14.445023] 
[   14.458776] Allocated by task 283:
[   14.458975]  kasan_save_stack+0x45/0x70
[   14.459183]  kasan_save_track+0x18/0x40
[   14.459572]  kasan_save_alloc_info+0x3b/0x50
[   14.459866]  __kasan_kmalloc+0xb7/0xc0
[   14.460186]  __kmalloc_cache_noprof+0x189/0x420
[   14.460582]  kasan_atomics+0x95/0x310
[   14.460889]  kunit_try_run_case+0x1a5/0x480
[   14.461179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.461579]  kthread+0x337/0x6f0
[   14.461879]  ret_from_fork+0x116/0x1d0
[   14.462035]  ret_from_fork_asm+0x1a/0x30
[   14.462252] 
[   14.462667] The buggy address belongs to the object at ffff8881038eb080
[   14.462667]  which belongs to the cache kmalloc-64 of size 64
[   14.463344] The buggy address is located 0 bytes to the right of
[   14.463344]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.463964] 
[   14.464057] The buggy address belongs to the physical page:
[   14.464328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.464910] flags: 0x200000000000000(node=0|zone=2)
[   14.465247] page_type: f5(slab)
[   14.465578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.466004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.466546] page dumped because: kasan: bad access detected
[   14.466890] 
[   14.467112] Memory state around the buggy address:
[   14.467358]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.467741]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.468044] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.468553]                                      ^
[   14.468845]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.469224]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.469626] ==================================================================
[   13.999534] ==================================================================
[   13.999886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.000360] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.000653] 
[   14.000765] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.000806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.000818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.000839] Call Trace:
[   14.000853]  <TASK>
[   14.000866]  dump_stack_lvl+0x73/0xb0
[   14.000895]  print_report+0xd1/0x650
[   14.000918]  ? __virt_addr_valid+0x1db/0x2d0
[   14.000940]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.000962]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.000984]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.001006]  kasan_report+0x141/0x180
[   14.001029]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.001055]  __asan_report_load4_noabort+0x18/0x20
[   14.001081]  kasan_atomics_helper+0x4b54/0x5450
[   14.001116]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.001139]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.001266]  ? kasan_atomics+0x152/0x310
[   14.001294]  kasan_atomics+0x1dc/0x310
[   14.001318]  ? __pfx_kasan_atomics+0x10/0x10
[   14.001365]  ? __pfx_read_tsc+0x10/0x10
[   14.001387]  ? ktime_get_ts64+0x86/0x230
[   14.001411]  kunit_try_run_case+0x1a5/0x480
[   14.001435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.001467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.001490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.001514]  ? __kthread_parkme+0x82/0x180
[   14.001546]  ? preempt_count_sub+0x50/0x80
[   14.001570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.001595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.001619]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.001652]  kthread+0x337/0x6f0
[   14.001672]  ? trace_preempt_on+0x20/0xc0
[   14.001696]  ? __pfx_kthread+0x10/0x10
[   14.001728]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.001749]  ? calculate_sigpending+0x7b/0xa0
[   14.001774]  ? __pfx_kthread+0x10/0x10
[   14.001796]  ret_from_fork+0x116/0x1d0
[   14.001815]  ? __pfx_kthread+0x10/0x10
[   14.001836]  ret_from_fork_asm+0x1a/0x30
[   14.001868]  </TASK>
[   14.001880] 
[   14.009842] Allocated by task 283:
[   14.009988]  kasan_save_stack+0x45/0x70
[   14.010298]  kasan_save_track+0x18/0x40
[   14.010525]  kasan_save_alloc_info+0x3b/0x50
[   14.010720]  __kasan_kmalloc+0xb7/0xc0
[   14.010857]  __kmalloc_cache_noprof+0x189/0x420
[   14.011068]  kasan_atomics+0x95/0x310
[   14.011283]  kunit_try_run_case+0x1a5/0x480
[   14.011795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.012048]  kthread+0x337/0x6f0
[   14.012301]  ret_from_fork+0x116/0x1d0
[   14.012547]  ret_from_fork_asm+0x1a/0x30
[   14.012727] 
[   14.012827] The buggy address belongs to the object at ffff8881038eb080
[   14.012827]  which belongs to the cache kmalloc-64 of size 64
[   14.013441] The buggy address is located 0 bytes to the right of
[   14.013441]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.013960] 
[   14.014071] The buggy address belongs to the physical page:
[   14.014401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.014746] flags: 0x200000000000000(node=0|zone=2)
[   14.014972] page_type: f5(slab)
[   14.015106] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.015592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.015847] page dumped because: kasan: bad access detected
[   14.016316] 
[   14.016504] Memory state around the buggy address:
[   14.016742]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.017020]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.017304] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.017749]                                      ^
[   14.018007]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.018488]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.018842] ==================================================================
[   14.081149] ==================================================================
[   14.081915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.082178] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.082768] 
[   14.082897] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.082940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.082953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.082974] Call Trace:
[   14.082989]  <TASK>
[   14.083002]  dump_stack_lvl+0x73/0xb0
[   14.083034]  print_report+0xd1/0x650
[   14.083088]  ? __virt_addr_valid+0x1db/0x2d0
[   14.083122]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.083145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.083260]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.083284]  kasan_report+0x141/0x180
[   14.083308]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.083346]  kasan_check_range+0x10c/0x1c0
[   14.083370]  __kasan_check_write+0x18/0x20
[   14.083417]  kasan_atomics_helper+0x5fe/0x5450
[   14.083440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.083464]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.083500]  ? kasan_atomics+0x152/0x310
[   14.083526]  kasan_atomics+0x1dc/0x310
[   14.083549]  ? __pfx_kasan_atomics+0x10/0x10
[   14.083574]  ? __pfx_read_tsc+0x10/0x10
[   14.083594]  ? ktime_get_ts64+0x86/0x230
[   14.083618]  kunit_try_run_case+0x1a5/0x480
[   14.083642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.083665]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.083688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.083711]  ? __kthread_parkme+0x82/0x180
[   14.083733]  ? preempt_count_sub+0x50/0x80
[   14.083757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.083781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.083803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.083827]  kthread+0x337/0x6f0
[   14.083848]  ? trace_preempt_on+0x20/0xc0
[   14.083872]  ? __pfx_kthread+0x10/0x10
[   14.083919]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.083941]  ? calculate_sigpending+0x7b/0xa0
[   14.083965]  ? __pfx_kthread+0x10/0x10
[   14.084024]  ret_from_fork+0x116/0x1d0
[   14.084042]  ? __pfx_kthread+0x10/0x10
[   14.084090]  ret_from_fork_asm+0x1a/0x30
[   14.084129]  </TASK>
[   14.084141] 
[   14.093556] Allocated by task 283:
[   14.093758]  kasan_save_stack+0x45/0x70
[   14.093963]  kasan_save_track+0x18/0x40
[   14.094272]  kasan_save_alloc_info+0x3b/0x50
[   14.094488]  __kasan_kmalloc+0xb7/0xc0
[   14.094677]  __kmalloc_cache_noprof+0x189/0x420
[   14.094952]  kasan_atomics+0x95/0x310
[   14.095160]  kunit_try_run_case+0x1a5/0x480
[   14.095371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.095830]  kthread+0x337/0x6f0
[   14.095988]  ret_from_fork+0x116/0x1d0
[   14.096251]  ret_from_fork_asm+0x1a/0x30
[   14.096545] 
[   14.096622] The buggy address belongs to the object at ffff8881038eb080
[   14.096622]  which belongs to the cache kmalloc-64 of size 64
[   14.097071] The buggy address is located 0 bytes to the right of
[   14.097071]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.098113] 
[   14.098317] The buggy address belongs to the physical page:
[   14.098532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.098945] flags: 0x200000000000000(node=0|zone=2)
[   14.099151] page_type: f5(slab)
[   14.099425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.099823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.100217] page dumped because: kasan: bad access detected
[   14.100570] 
[   14.100689] Memory state around the buggy address:
[   14.100908]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.101429]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.101752] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.102055]                                      ^
[   14.102291]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.102649]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.103308] ==================================================================
[   14.310042] ==================================================================
[   14.310405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.311140] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.311642] 
[   14.311732] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.311775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.311788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.311811] Call Trace:
[   14.311825]  <TASK>
[   14.311841]  dump_stack_lvl+0x73/0xb0
[   14.311868]  print_report+0xd1/0x650
[   14.311894]  ? __virt_addr_valid+0x1db/0x2d0
[   14.311950]  ? kasan_atomics_helper+0xc70/0x5450
[   14.311972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.312025]  ? kasan_atomics_helper+0xc70/0x5450
[   14.312047]  kasan_report+0x141/0x180
[   14.312070]  ? kasan_atomics_helper+0xc70/0x5450
[   14.312104]  kasan_check_range+0x10c/0x1c0
[   14.312128]  __kasan_check_write+0x18/0x20
[   14.312149]  kasan_atomics_helper+0xc70/0x5450
[   14.312215]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.312269]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.312300]  ? kasan_atomics+0x152/0x310
[   14.312352]  kasan_atomics+0x1dc/0x310
[   14.312376]  ? __pfx_kasan_atomics+0x10/0x10
[   14.312401]  ? __pfx_read_tsc+0x10/0x10
[   14.312449]  ? ktime_get_ts64+0x86/0x230
[   14.312474]  kunit_try_run_case+0x1a5/0x480
[   14.312498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.312531]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.312554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.312578]  ? __kthread_parkme+0x82/0x180
[   14.312599]  ? preempt_count_sub+0x50/0x80
[   14.312624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.312648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.312672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.312695]  kthread+0x337/0x6f0
[   14.312716]  ? trace_preempt_on+0x20/0xc0
[   14.312739]  ? __pfx_kthread+0x10/0x10
[   14.312761]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.312782]  ? calculate_sigpending+0x7b/0xa0
[   14.312806]  ? __pfx_kthread+0x10/0x10
[   14.312829]  ret_from_fork+0x116/0x1d0
[   14.312848]  ? __pfx_kthread+0x10/0x10
[   14.312869]  ret_from_fork_asm+0x1a/0x30
[   14.312899]  </TASK>
[   14.312912] 
[   14.323054] Allocated by task 283:
[   14.323354]  kasan_save_stack+0x45/0x70
[   14.323587]  kasan_save_track+0x18/0x40
[   14.323830]  kasan_save_alloc_info+0x3b/0x50
[   14.324050]  __kasan_kmalloc+0xb7/0xc0
[   14.324381]  __kmalloc_cache_noprof+0x189/0x420
[   14.324647]  kasan_atomics+0x95/0x310
[   14.324860]  kunit_try_run_case+0x1a5/0x480
[   14.325048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.325378]  kthread+0x337/0x6f0
[   14.325834]  ret_from_fork+0x116/0x1d0
[   14.325985]  ret_from_fork_asm+0x1a/0x30
[   14.326260] 
[   14.326375] The buggy address belongs to the object at ffff8881038eb080
[   14.326375]  which belongs to the cache kmalloc-64 of size 64
[   14.327091] The buggy address is located 0 bytes to the right of
[   14.327091]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.327770] 
[   14.327904] The buggy address belongs to the physical page:
[   14.328354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.328732] flags: 0x200000000000000(node=0|zone=2)
[   14.329010] page_type: f5(slab)
[   14.329220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.329727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.329989] page dumped because: kasan: bad access detected
[   14.330177] 
[   14.330252] Memory state around the buggy address:
[   14.330516]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.330965]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.331312] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.331849]                                      ^
[   14.332025]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.332696]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.333037] ==================================================================
[   14.662533] ==================================================================
[   14.663311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.663691] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.664021] 
[   14.664145] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.664185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.664198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.664219] Call Trace:
[   14.664232]  <TASK>
[   14.664247]  dump_stack_lvl+0x73/0xb0
[   14.664274]  print_report+0xd1/0x650
[   14.664297]  ? __virt_addr_valid+0x1db/0x2d0
[   14.664319]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.664341]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.664364]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.664385]  kasan_report+0x141/0x180
[   14.664408]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.664434]  kasan_check_range+0x10c/0x1c0
[   14.664458]  __kasan_check_read+0x15/0x20
[   14.664478]  kasan_atomics_helper+0x13b5/0x5450
[   14.664501]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.664524]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.664549]  ? kasan_atomics+0x152/0x310
[   14.664575]  kasan_atomics+0x1dc/0x310
[   14.664598]  ? __pfx_kasan_atomics+0x10/0x10
[   14.664621]  ? __pfx_read_tsc+0x10/0x10
[   14.664643]  ? ktime_get_ts64+0x86/0x230
[   14.664667]  kunit_try_run_case+0x1a5/0x480
[   14.664691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.664713]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.664735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.664758]  ? __kthread_parkme+0x82/0x180
[   14.664778]  ? preempt_count_sub+0x50/0x80
[   14.664802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.664826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.664848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.664872]  kthread+0x337/0x6f0
[   14.664893]  ? trace_preempt_on+0x20/0xc0
[   14.664915]  ? __pfx_kthread+0x10/0x10
[   14.664936]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.664957]  ? calculate_sigpending+0x7b/0xa0
[   14.664982]  ? __pfx_kthread+0x10/0x10
[   14.665003]  ret_from_fork+0x116/0x1d0
[   14.665021]  ? __pfx_kthread+0x10/0x10
[   14.665043]  ret_from_fork_asm+0x1a/0x30
[   14.665073]  </TASK>
[   14.665085] 
[   14.672547] Allocated by task 283:
[   14.672723]  kasan_save_stack+0x45/0x70
[   14.672922]  kasan_save_track+0x18/0x40
[   14.673125]  kasan_save_alloc_info+0x3b/0x50
[   14.673353]  __kasan_kmalloc+0xb7/0xc0
[   14.673540]  __kmalloc_cache_noprof+0x189/0x420
[   14.673743]  kasan_atomics+0x95/0x310
[   14.673897]  kunit_try_run_case+0x1a5/0x480
[   14.674047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.674235]  kthread+0x337/0x6f0
[   14.674361]  ret_from_fork+0x116/0x1d0
[   14.674494]  ret_from_fork_asm+0x1a/0x30
[   14.674735] 
[   14.674834] The buggy address belongs to the object at ffff8881038eb080
[   14.674834]  which belongs to the cache kmalloc-64 of size 64
[   14.675389] The buggy address is located 0 bytes to the right of
[   14.675389]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.675955] 
[   14.676053] The buggy address belongs to the physical page:
[   14.676278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.676653] flags: 0x200000000000000(node=0|zone=2)
[   14.676838] page_type: f5(slab)
[   14.676961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.677274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.677730] page dumped because: kasan: bad access detected
[   14.677924] 
[   14.677995] Memory state around the buggy address:
[   14.678162]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.678440]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.678760] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.679071]                                      ^
[   14.679312]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.679652]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.679871] ==================================================================
[   14.723910] ==================================================================
[   14.724404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.724720] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.725093] 
[   14.725206] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.725251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.725285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.725308] Call Trace:
[   14.725324]  <TASK>
[   14.725341]  dump_stack_lvl+0x73/0xb0
[   14.725367]  print_report+0xd1/0x650
[   14.725391]  ? __virt_addr_valid+0x1db/0x2d0
[   14.725413]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.725435]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.725457]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.725480]  kasan_report+0x141/0x180
[   14.725502]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.725546]  __asan_report_store8_noabort+0x1b/0x30
[   14.725583]  kasan_atomics_helper+0x50d4/0x5450
[   14.725606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.725643]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.725682]  ? kasan_atomics+0x152/0x310
[   14.725708]  kasan_atomics+0x1dc/0x310
[   14.725745]  ? __pfx_kasan_atomics+0x10/0x10
[   14.725782]  ? __pfx_read_tsc+0x10/0x10
[   14.725804]  ? ktime_get_ts64+0x86/0x230
[   14.725828]  kunit_try_run_case+0x1a5/0x480
[   14.725865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.725901]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.725924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.725948]  ? __kthread_parkme+0x82/0x180
[   14.725968]  ? preempt_count_sub+0x50/0x80
[   14.725991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.726016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.726039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.726064]  kthread+0x337/0x6f0
[   14.726084]  ? trace_preempt_on+0x20/0xc0
[   14.726118]  ? __pfx_kthread+0x10/0x10
[   14.726139]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.726161]  ? calculate_sigpending+0x7b/0xa0
[   14.726184]  ? __pfx_kthread+0x10/0x10
[   14.726207]  ret_from_fork+0x116/0x1d0
[   14.726225]  ? __pfx_kthread+0x10/0x10
[   14.726247]  ret_from_fork_asm+0x1a/0x30
[   14.726276]  </TASK>
[   14.726289] 
[   14.734032] Allocated by task 283:
[   14.734226]  kasan_save_stack+0x45/0x70
[   14.734423]  kasan_save_track+0x18/0x40
[   14.734746]  kasan_save_alloc_info+0x3b/0x50
[   14.734958]  __kasan_kmalloc+0xb7/0xc0
[   14.735152]  __kmalloc_cache_noprof+0x189/0x420
[   14.735349]  kasan_atomics+0x95/0x310
[   14.735553]  kunit_try_run_case+0x1a5/0x480
[   14.735776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.736019]  kthread+0x337/0x6f0
[   14.736180]  ret_from_fork+0x116/0x1d0
[   14.736311]  ret_from_fork_asm+0x1a/0x30
[   14.736449] 
[   14.736520] The buggy address belongs to the object at ffff8881038eb080
[   14.736520]  which belongs to the cache kmalloc-64 of size 64
[   14.737375] The buggy address is located 0 bytes to the right of
[   14.737375]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.737921] 
[   14.738050] The buggy address belongs to the physical page:
[   14.738335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.738692] flags: 0x200000000000000(node=0|zone=2)
[   14.738922] page_type: f5(slab)
[   14.739091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.739542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.739863] page dumped because: kasan: bad access detected
[   14.740073] 
[   14.740153] Memory state around the buggy address:
[   14.740305]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.740516]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.740853] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.741197]                                      ^
[   14.741458]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.741786]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.742198] ==================================================================
[   14.149891] ==================================================================
[   14.150284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.150643] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.150915] 
[   14.151033] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.151076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.151091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.151148] Call Trace:
[   14.151166]  <TASK>
[   14.151183]  dump_stack_lvl+0x73/0xb0
[   14.151226]  print_report+0xd1/0x650
[   14.151249]  ? __virt_addr_valid+0x1db/0x2d0
[   14.151337]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.151362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.151405]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.151428]  kasan_report+0x141/0x180
[   14.151466]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.151504]  kasan_check_range+0x10c/0x1c0
[   14.151528]  __kasan_check_write+0x18/0x20
[   14.151549]  kasan_atomics_helper+0x7c7/0x5450
[   14.151584]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.151607]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.151633]  ? kasan_atomics+0x152/0x310
[   14.151660]  kasan_atomics+0x1dc/0x310
[   14.151683]  ? __pfx_kasan_atomics+0x10/0x10
[   14.151707]  ? __pfx_read_tsc+0x10/0x10
[   14.151729]  ? ktime_get_ts64+0x86/0x230
[   14.151753]  kunit_try_run_case+0x1a5/0x480
[   14.151777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.151799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.151823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.151845]  ? __kthread_parkme+0x82/0x180
[   14.151866]  ? preempt_count_sub+0x50/0x80
[   14.151890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.151914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.151938]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.151961]  kthread+0x337/0x6f0
[   14.151981]  ? trace_preempt_on+0x20/0xc0
[   14.152004]  ? __pfx_kthread+0x10/0x10
[   14.152025]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.152047]  ? calculate_sigpending+0x7b/0xa0
[   14.152071]  ? __pfx_kthread+0x10/0x10
[   14.152093]  ret_from_fork+0x116/0x1d0
[   14.152125]  ? __pfx_kthread+0x10/0x10
[   14.152145]  ret_from_fork_asm+0x1a/0x30
[   14.152215]  </TASK>
[   14.152227] 
[   14.161689] Allocated by task 283:
[   14.161917]  kasan_save_stack+0x45/0x70
[   14.162142]  kasan_save_track+0x18/0x40
[   14.162415]  kasan_save_alloc_info+0x3b/0x50
[   14.162643]  __kasan_kmalloc+0xb7/0xc0
[   14.162860]  __kmalloc_cache_noprof+0x189/0x420
[   14.163090]  kasan_atomics+0x95/0x310
[   14.163375]  kunit_try_run_case+0x1a5/0x480
[   14.163606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.163820]  kthread+0x337/0x6f0
[   14.163971]  ret_from_fork+0x116/0x1d0
[   14.164116]  ret_from_fork_asm+0x1a/0x30
[   14.164508] 
[   14.164584] The buggy address belongs to the object at ffff8881038eb080
[   14.164584]  which belongs to the cache kmalloc-64 of size 64
[   14.165156] The buggy address is located 0 bytes to the right of
[   14.165156]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.165897] 
[   14.166078] The buggy address belongs to the physical page:
[   14.166505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.166917] flags: 0x200000000000000(node=0|zone=2)
[   14.167196] page_type: f5(slab)
[   14.167503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.167816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.168224] page dumped because: kasan: bad access detected
[   14.168583] 
[   14.168698] Memory state around the buggy address:
[   14.168885]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.169312]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.169760] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.170125]                                      ^
[   14.170605]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.170945]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.171309] ==================================================================
[   15.074504] ==================================================================
[   15.075230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.075905] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.076575] 
[   15.076767] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.076811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.076842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.076865] Call Trace:
[   15.076882]  <TASK>
[   15.076897]  dump_stack_lvl+0x73/0xb0
[   15.076924]  print_report+0xd1/0x650
[   15.076947]  ? __virt_addr_valid+0x1db/0x2d0
[   15.076970]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.076993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.077016]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.077038]  kasan_report+0x141/0x180
[   15.077061]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.077088]  kasan_check_range+0x10c/0x1c0
[   15.077125]  __kasan_check_write+0x18/0x20
[   15.077145]  kasan_atomics_helper+0x1e12/0x5450
[   15.077168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.077192]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.077217]  ? kasan_atomics+0x152/0x310
[   15.077245]  kasan_atomics+0x1dc/0x310
[   15.077268]  ? __pfx_kasan_atomics+0x10/0x10
[   15.077293]  ? __pfx_read_tsc+0x10/0x10
[   15.077314]  ? ktime_get_ts64+0x86/0x230
[   15.077347]  kunit_try_run_case+0x1a5/0x480
[   15.077371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.077393]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.077416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.077440]  ? __kthread_parkme+0x82/0x180
[   15.077461]  ? preempt_count_sub+0x50/0x80
[   15.077485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.077509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.077532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.077556]  kthread+0x337/0x6f0
[   15.077575]  ? trace_preempt_on+0x20/0xc0
[   15.077599]  ? __pfx_kthread+0x10/0x10
[   15.077619]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.077641]  ? calculate_sigpending+0x7b/0xa0
[   15.077665]  ? __pfx_kthread+0x10/0x10
[   15.077687]  ret_from_fork+0x116/0x1d0
[   15.077705]  ? __pfx_kthread+0x10/0x10
[   15.077727]  ret_from_fork_asm+0x1a/0x30
[   15.077756]  </TASK>
[   15.077768] 
[   15.085881] Allocated by task 283:
[   15.086078]  kasan_save_stack+0x45/0x70
[   15.086314]  kasan_save_track+0x18/0x40
[   15.086537]  kasan_save_alloc_info+0x3b/0x50
[   15.086742]  __kasan_kmalloc+0xb7/0xc0
[   15.086934]  __kmalloc_cache_noprof+0x189/0x420
[   15.087140]  kasan_atomics+0x95/0x310
[   15.087359]  kunit_try_run_case+0x1a5/0x480
[   15.087599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.087847]  kthread+0x337/0x6f0
[   15.088079]  ret_from_fork+0x116/0x1d0
[   15.088280]  ret_from_fork_asm+0x1a/0x30
[   15.088581] 
[   15.088670] The buggy address belongs to the object at ffff8881038eb080
[   15.088670]  which belongs to the cache kmalloc-64 of size 64
[   15.089037] The buggy address is located 0 bytes to the right of
[   15.089037]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.089797] 
[   15.089896] The buggy address belongs to the physical page:
[   15.090164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.090435] flags: 0x200000000000000(node=0|zone=2)
[   15.090679] page_type: f5(slab)
[   15.090861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.091163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.091562] page dumped because: kasan: bad access detected
[   15.091826] 
[   15.091941] Memory state around the buggy address:
[   15.092106]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.092409]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.092706] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.093013]                                      ^
[   15.093231]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.093622]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.093924] ==================================================================
[   13.958245] ==================================================================
[   13.958688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.959025] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   13.959404] 
[   13.959581] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.959625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.959637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.959655] Call Trace:
[   13.959670]  <TASK>
[   13.959694]  dump_stack_lvl+0x73/0xb0
[   13.959721]  print_report+0xd1/0x650
[   13.959741]  ? __virt_addr_valid+0x1db/0x2d0
[   13.959775]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.959805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.959826]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.959847]  kasan_report+0x141/0x180
[   13.959880]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.959905]  __asan_report_store4_noabort+0x1b/0x30
[   13.959926]  kasan_atomics_helper+0x4b6e/0x5450
[   13.959947]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.959969]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.959993]  ? kasan_atomics+0x152/0x310
[   13.960019]  kasan_atomics+0x1dc/0x310
[   13.960041]  ? __pfx_kasan_atomics+0x10/0x10
[   13.960065]  ? __pfx_read_tsc+0x10/0x10
[   13.960085]  ? ktime_get_ts64+0x86/0x230
[   13.960119]  kunit_try_run_case+0x1a5/0x480
[   13.960142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.960164]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.960185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.960208]  ? __kthread_parkme+0x82/0x180
[   13.960228]  ? preempt_count_sub+0x50/0x80
[   13.960374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.960415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.960527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.960553]  kthread+0x337/0x6f0
[   13.960573]  ? trace_preempt_on+0x20/0xc0
[   13.960596]  ? __pfx_kthread+0x10/0x10
[   13.960618]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.960640]  ? calculate_sigpending+0x7b/0xa0
[   13.960664]  ? __pfx_kthread+0x10/0x10
[   13.960686]  ret_from_fork+0x116/0x1d0
[   13.960704]  ? __pfx_kthread+0x10/0x10
[   13.960726]  ret_from_fork_asm+0x1a/0x30
[   13.960757]  </TASK>
[   13.960768] 
[   13.969868] Allocated by task 283:
[   13.970078]  kasan_save_stack+0x45/0x70
[   13.970359]  kasan_save_track+0x18/0x40
[   13.970530]  kasan_save_alloc_info+0x3b/0x50
[   13.970683]  __kasan_kmalloc+0xb7/0xc0
[   13.970819]  __kmalloc_cache_noprof+0x189/0x420
[   13.971043]  kasan_atomics+0x95/0x310
[   13.971261]  kunit_try_run_case+0x1a5/0x480
[   13.971520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.971882]  kthread+0x337/0x6f0
[   13.972011]  ret_from_fork+0x116/0x1d0
[   13.972418]  ret_from_fork_asm+0x1a/0x30
[   13.972646] 
[   13.972746] The buggy address belongs to the object at ffff8881038eb080
[   13.972746]  which belongs to the cache kmalloc-64 of size 64
[   13.973236] The buggy address is located 0 bytes to the right of
[   13.973236]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   13.973879] 
[   13.973988] The buggy address belongs to the physical page:
[   13.974389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   13.974723] flags: 0x200000000000000(node=0|zone=2)
[   13.974965] page_type: f5(slab)
[   13.975107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.975363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.975974] page dumped because: kasan: bad access detected
[   13.976365] 
[   13.976440] Memory state around the buggy address:
[   13.976598]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.976917]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.977450] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.977786]                                      ^
[   13.978231]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.978598]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.978978] ==================================================================
[   14.742789] ==================================================================
[   14.743066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.743673] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.743966] 
[   14.744055] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.744109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.744122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.744162] Call Trace:
[   14.744192]  <TASK>
[   14.744207]  dump_stack_lvl+0x73/0xb0
[   14.744248]  print_report+0xd1/0x650
[   14.744285]  ? __virt_addr_valid+0x1db/0x2d0
[   14.744321]  ? kasan_atomics_helper+0x151d/0x5450
[   14.744356]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.744379]  ? kasan_atomics_helper+0x151d/0x5450
[   14.744401]  kasan_report+0x141/0x180
[   14.744424]  ? kasan_atomics_helper+0x151d/0x5450
[   14.744451]  kasan_check_range+0x10c/0x1c0
[   14.744475]  __kasan_check_write+0x18/0x20
[   14.744495]  kasan_atomics_helper+0x151d/0x5450
[   14.744518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.744541]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.744567]  ? kasan_atomics+0x152/0x310
[   14.744594]  kasan_atomics+0x1dc/0x310
[   14.744617]  ? __pfx_kasan_atomics+0x10/0x10
[   14.744642]  ? __pfx_read_tsc+0x10/0x10
[   14.744663]  ? ktime_get_ts64+0x86/0x230
[   14.744688]  kunit_try_run_case+0x1a5/0x480
[   14.744721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.744744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.744768]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.744792]  ? __kthread_parkme+0x82/0x180
[   14.744812]  ? preempt_count_sub+0x50/0x80
[   14.744836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.744880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.744904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.744928]  kthread+0x337/0x6f0
[   14.744949]  ? trace_preempt_on+0x20/0xc0
[   14.744972]  ? __pfx_kthread+0x10/0x10
[   14.744993]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.745015]  ? calculate_sigpending+0x7b/0xa0
[   14.745040]  ? __pfx_kthread+0x10/0x10
[   14.745061]  ret_from_fork+0x116/0x1d0
[   14.745079]  ? __pfx_kthread+0x10/0x10
[   14.745110]  ret_from_fork_asm+0x1a/0x30
[   14.745141]  </TASK>
[   14.745152] 
[   14.753125] Allocated by task 283:
[   14.753324]  kasan_save_stack+0x45/0x70
[   14.753545]  kasan_save_track+0x18/0x40
[   14.753703]  kasan_save_alloc_info+0x3b/0x50
[   14.753918]  __kasan_kmalloc+0xb7/0xc0
[   14.754109]  __kmalloc_cache_noprof+0x189/0x420
[   14.754327]  kasan_atomics+0x95/0x310
[   14.754490]  kunit_try_run_case+0x1a5/0x480
[   14.754698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.754930]  kthread+0x337/0x6f0
[   14.755107]  ret_from_fork+0x116/0x1d0
[   14.755296]  ret_from_fork_asm+0x1a/0x30
[   14.755493] 
[   14.755590] The buggy address belongs to the object at ffff8881038eb080
[   14.755590]  which belongs to the cache kmalloc-64 of size 64
[   14.756069] The buggy address is located 0 bytes to the right of
[   14.756069]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.756627] 
[   14.756705] The buggy address belongs to the physical page:
[   14.756953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.757288] flags: 0x200000000000000(node=0|zone=2)
[   14.757509] page_type: f5(slab)
[   14.757671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.758024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.758437] page dumped because: kasan: bad access detected
[   14.758711] 
[   14.758808] Memory state around the buggy address:
[   14.759027]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.759358]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.759670] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.759981]                                      ^
[   14.760208]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.760516]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.760793] ==================================================================
[   14.265426] ==================================================================
[   14.265770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.266144] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.266483] 
[   14.266705] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.266750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.266764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.266784] Call Trace:
[   14.266799]  <TASK>
[   14.266814]  dump_stack_lvl+0x73/0xb0
[   14.266841]  print_report+0xd1/0x650
[   14.266863]  ? __virt_addr_valid+0x1db/0x2d0
[   14.266922]  ? kasan_atomics_helper+0xac7/0x5450
[   14.266945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.266968]  ? kasan_atomics_helper+0xac7/0x5450
[   14.267001]  kasan_report+0x141/0x180
[   14.267025]  ? kasan_atomics_helper+0xac7/0x5450
[   14.267076]  kasan_check_range+0x10c/0x1c0
[   14.267118]  __kasan_check_write+0x18/0x20
[   14.267139]  kasan_atomics_helper+0xac7/0x5450
[   14.267161]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.267184]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.267215]  ? kasan_atomics+0x152/0x310
[   14.267309]  kasan_atomics+0x1dc/0x310
[   14.267346]  ? __pfx_kasan_atomics+0x10/0x10
[   14.267371]  ? __pfx_read_tsc+0x10/0x10
[   14.267392]  ? ktime_get_ts64+0x86/0x230
[   14.267427]  kunit_try_run_case+0x1a5/0x480
[   14.267452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.267503]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.267528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.267551]  ? __kthread_parkme+0x82/0x180
[   14.267582]  ? preempt_count_sub+0x50/0x80
[   14.267606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.267657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.267680]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.267703]  kthread+0x337/0x6f0
[   14.267734]  ? trace_preempt_on+0x20/0xc0
[   14.267758]  ? __pfx_kthread+0x10/0x10
[   14.267779]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.267801]  ? calculate_sigpending+0x7b/0xa0
[   14.267825]  ? __pfx_kthread+0x10/0x10
[   14.267848]  ret_from_fork+0x116/0x1d0
[   14.267866]  ? __pfx_kthread+0x10/0x10
[   14.267887]  ret_from_fork_asm+0x1a/0x30
[   14.267918]  </TASK>
[   14.267930] 
[   14.277145] Allocated by task 283:
[   14.277478]  kasan_save_stack+0x45/0x70
[   14.277726]  kasan_save_track+0x18/0x40
[   14.278119]  kasan_save_alloc_info+0x3b/0x50
[   14.278494]  __kasan_kmalloc+0xb7/0xc0
[   14.278683]  __kmalloc_cache_noprof+0x189/0x420
[   14.278844]  kasan_atomics+0x95/0x310
[   14.279030]  kunit_try_run_case+0x1a5/0x480
[   14.279405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.279732]  kthread+0x337/0x6f0
[   14.279922]  ret_from_fork+0x116/0x1d0
[   14.280070]  ret_from_fork_asm+0x1a/0x30
[   14.280567] 
[   14.280686] The buggy address belongs to the object at ffff8881038eb080
[   14.280686]  which belongs to the cache kmalloc-64 of size 64
[   14.281085] The buggy address is located 0 bytes to the right of
[   14.281085]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.281927] 
[   14.282005] The buggy address belongs to the physical page:
[   14.282202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.282638] flags: 0x200000000000000(node=0|zone=2)
[   14.283167] page_type: f5(slab)
[   14.283414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.283666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.284005] page dumped because: kasan: bad access detected
[   14.284449] 
[   14.284540] Memory state around the buggy address:
[   14.284739]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.285032]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.285592] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.285947]                                      ^
[   14.286149]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.286404]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.286948] ==================================================================
[   14.608750] ==================================================================
[   14.609762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.610122] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.610415] 
[   14.610528] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.610571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.610584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.610622] Call Trace:
[   14.610637]  <TASK>
[   14.610653]  dump_stack_lvl+0x73/0xb0
[   14.610680]  print_report+0xd1/0x650
[   14.610704]  ? __virt_addr_valid+0x1db/0x2d0
[   14.610727]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.610749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.610771]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.610793]  kasan_report+0x141/0x180
[   14.610817]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.610845]  __asan_report_load4_noabort+0x18/0x20
[   14.610870]  kasan_atomics_helper+0x49e8/0x5450
[   14.610893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.610916]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.610942]  ? kasan_atomics+0x152/0x310
[   14.610970]  kasan_atomics+0x1dc/0x310
[   14.610992]  ? __pfx_kasan_atomics+0x10/0x10
[   14.611017]  ? __pfx_read_tsc+0x10/0x10
[   14.611038]  ? ktime_get_ts64+0x86/0x230
[   14.611062]  kunit_try_run_case+0x1a5/0x480
[   14.611085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.611118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.611142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.611165]  ? __kthread_parkme+0x82/0x180
[   14.611185]  ? preempt_count_sub+0x50/0x80
[   14.611215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.611239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.611262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.611286]  kthread+0x337/0x6f0
[   14.611305]  ? trace_preempt_on+0x20/0xc0
[   14.611338]  ? __pfx_kthread+0x10/0x10
[   14.611360]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.611380]  ? calculate_sigpending+0x7b/0xa0
[   14.611405]  ? __pfx_kthread+0x10/0x10
[   14.611426]  ret_from_fork+0x116/0x1d0
[   14.611444]  ? __pfx_kthread+0x10/0x10
[   14.611466]  ret_from_fork_asm+0x1a/0x30
[   14.611496]  </TASK>
[   14.611508] 
[   14.618584] Allocated by task 283:
[   14.618732]  kasan_save_stack+0x45/0x70
[   14.618941]  kasan_save_track+0x18/0x40
[   14.619148]  kasan_save_alloc_info+0x3b/0x50
[   14.619366]  __kasan_kmalloc+0xb7/0xc0
[   14.619691]  __kmalloc_cache_noprof+0x189/0x420
[   14.619848]  kasan_atomics+0x95/0x310
[   14.619981]  kunit_try_run_case+0x1a5/0x480
[   14.620254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.620668]  kthread+0x337/0x6f0
[   14.620845]  ret_from_fork+0x116/0x1d0
[   14.621035]  ret_from_fork_asm+0x1a/0x30
[   14.621187] 
[   14.621265] The buggy address belongs to the object at ffff8881038eb080
[   14.621265]  which belongs to the cache kmalloc-64 of size 64
[   14.621654] The buggy address is located 0 bytes to the right of
[   14.621654]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.622232] 
[   14.622336] The buggy address belongs to the physical page:
[   14.622594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.622933] flags: 0x200000000000000(node=0|zone=2)
[   14.623151] page_type: f5(slab)
[   14.623284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.623633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.623983] page dumped because: kasan: bad access detected
[   14.624167] 
[   14.624240] Memory state around the buggy address:
[   14.624467]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.624784]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.625082] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.625309]                                      ^
[   14.625467]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.625685]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.626001] ==================================================================
[   14.126926] ==================================================================
[   14.127416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.127855] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.128250] 
[   14.128357] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.128401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.128415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.128437] Call Trace:
[   14.128452]  <TASK>
[   14.128501]  dump_stack_lvl+0x73/0xb0
[   14.128530]  print_report+0xd1/0x650
[   14.128553]  ? __virt_addr_valid+0x1db/0x2d0
[   14.128607]  ? kasan_atomics_helper+0x72f/0x5450
[   14.128629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.128652]  ? kasan_atomics_helper+0x72f/0x5450
[   14.128685]  kasan_report+0x141/0x180
[   14.128710]  ? kasan_atomics_helper+0x72f/0x5450
[   14.128736]  kasan_check_range+0x10c/0x1c0
[   14.128786]  __kasan_check_write+0x18/0x20
[   14.128807]  kasan_atomics_helper+0x72f/0x5450
[   14.128829]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.128862]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.128888]  ? kasan_atomics+0x152/0x310
[   14.128916]  kasan_atomics+0x1dc/0x310
[   14.128938]  ? __pfx_kasan_atomics+0x10/0x10
[   14.128963]  ? __pfx_read_tsc+0x10/0x10
[   14.128984]  ? ktime_get_ts64+0x86/0x230
[   14.129034]  kunit_try_run_case+0x1a5/0x480
[   14.129058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.129081]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.129121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.129145]  ? __kthread_parkme+0x82/0x180
[   14.129237]  ? preempt_count_sub+0x50/0x80
[   14.129260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.129306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.129331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.129355]  kthread+0x337/0x6f0
[   14.129375]  ? trace_preempt_on+0x20/0xc0
[   14.129399]  ? __pfx_kthread+0x10/0x10
[   14.129421]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.129442]  ? calculate_sigpending+0x7b/0xa0
[   14.129467]  ? __pfx_kthread+0x10/0x10
[   14.129489]  ret_from_fork+0x116/0x1d0
[   14.129508]  ? __pfx_kthread+0x10/0x10
[   14.129528]  ret_from_fork_asm+0x1a/0x30
[   14.129559]  </TASK>
[   14.129572] 
[   14.138907] Allocated by task 283:
[   14.139085]  kasan_save_stack+0x45/0x70
[   14.139432]  kasan_save_track+0x18/0x40
[   14.139788]  kasan_save_alloc_info+0x3b/0x50
[   14.139997]  __kasan_kmalloc+0xb7/0xc0
[   14.140230]  __kmalloc_cache_noprof+0x189/0x420
[   14.140471]  kasan_atomics+0x95/0x310
[   14.140669]  kunit_try_run_case+0x1a5/0x480
[   14.141126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.141378]  kthread+0x337/0x6f0
[   14.141505]  ret_from_fork+0x116/0x1d0
[   14.141852]  ret_from_fork_asm+0x1a/0x30
[   14.142093] 
[   14.142255] The buggy address belongs to the object at ffff8881038eb080
[   14.142255]  which belongs to the cache kmalloc-64 of size 64
[   14.142835] The buggy address is located 0 bytes to the right of
[   14.142835]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.143739] 
[   14.143844] The buggy address belongs to the physical page:
[   14.144023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.144788] flags: 0x200000000000000(node=0|zone=2)
[   14.145000] page_type: f5(slab)
[   14.145213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.145719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.146171] page dumped because: kasan: bad access detected
[   14.146467] 
[   14.146665] Memory state around the buggy address:
[   14.146916]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.147292]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.147742] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.148077]                                      ^
[   14.148379]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.148950]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.149371] ==================================================================
[   14.697923] ==================================================================
[   14.698470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.698782] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.699036] 
[   14.699134] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.699177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.699191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.699216] Call Trace:
[   14.699229]  <TASK>
[   14.699246]  dump_stack_lvl+0x73/0xb0
[   14.699271]  print_report+0xd1/0x650
[   14.699294]  ? __virt_addr_valid+0x1db/0x2d0
[   14.699317]  ? kasan_atomics_helper+0x1467/0x5450
[   14.699338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.699361]  ? kasan_atomics_helper+0x1467/0x5450
[   14.699383]  kasan_report+0x141/0x180
[   14.699405]  ? kasan_atomics_helper+0x1467/0x5450
[   14.699433]  kasan_check_range+0x10c/0x1c0
[   14.699458]  __kasan_check_write+0x18/0x20
[   14.699478]  kasan_atomics_helper+0x1467/0x5450
[   14.699502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.699525]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.699550]  ? kasan_atomics+0x152/0x310
[   14.699576]  kasan_atomics+0x1dc/0x310
[   14.699601]  ? __pfx_kasan_atomics+0x10/0x10
[   14.699625]  ? __pfx_read_tsc+0x10/0x10
[   14.699646]  ? ktime_get_ts64+0x86/0x230
[   14.699669]  kunit_try_run_case+0x1a5/0x480
[   14.699693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.699717]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.699739]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.699762]  ? __kthread_parkme+0x82/0x180
[   14.699783]  ? preempt_count_sub+0x50/0x80
[   14.699807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.699831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.699867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.699892]  kthread+0x337/0x6f0
[   14.699911]  ? trace_preempt_on+0x20/0xc0
[   14.699935]  ? __pfx_kthread+0x10/0x10
[   14.699958]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.699980]  ? calculate_sigpending+0x7b/0xa0
[   14.700004]  ? __pfx_kthread+0x10/0x10
[   14.700026]  ret_from_fork+0x116/0x1d0
[   14.700045]  ? __pfx_kthread+0x10/0x10
[   14.700066]  ret_from_fork_asm+0x1a/0x30
[   14.700106]  </TASK>
[   14.700118] 
[   14.715018] Allocated by task 283:
[   14.715368]  kasan_save_stack+0x45/0x70
[   14.715584]  kasan_save_track+0x18/0x40
[   14.715766]  kasan_save_alloc_info+0x3b/0x50
[   14.715969]  __kasan_kmalloc+0xb7/0xc0
[   14.716162]  __kmalloc_cache_noprof+0x189/0x420
[   14.716688]  kasan_atomics+0x95/0x310
[   14.716876]  kunit_try_run_case+0x1a5/0x480
[   14.717203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.717409]  kthread+0x337/0x6f0
[   14.717621]  ret_from_fork+0x116/0x1d0
[   14.717805]  ret_from_fork_asm+0x1a/0x30
[   14.718009] 
[   14.718107] The buggy address belongs to the object at ffff8881038eb080
[   14.718107]  which belongs to the cache kmalloc-64 of size 64
[   14.718636] The buggy address is located 0 bytes to the right of
[   14.718636]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.719144] 
[   14.719267] The buggy address belongs to the physical page:
[   14.719486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.719802] flags: 0x200000000000000(node=0|zone=2)
[   14.720057] page_type: f5(slab)
[   14.720240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.720532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.720860] page dumped because: kasan: bad access detected
[   14.721113] 
[   14.721203] Memory state around the buggy address:
[   14.721551]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.721853]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.722175] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.722477]                                      ^
[   14.722650]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.722970]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.723209] ==================================================================
[   14.781782] ==================================================================
[   14.782087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.782539] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.782891] 
[   14.783008] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.783049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.783062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.783083] Call Trace:
[   14.783108]  <TASK>
[   14.783124]  dump_stack_lvl+0x73/0xb0
[   14.783150]  print_report+0xd1/0x650
[   14.783173]  ? __virt_addr_valid+0x1db/0x2d0
[   14.783195]  ? kasan_atomics_helper+0x164f/0x5450
[   14.783221]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.783245]  ? kasan_atomics_helper+0x164f/0x5450
[   14.783268]  kasan_report+0x141/0x180
[   14.783289]  ? kasan_atomics_helper+0x164f/0x5450
[   14.783317]  kasan_check_range+0x10c/0x1c0
[   14.783352]  __kasan_check_write+0x18/0x20
[   14.783373]  kasan_atomics_helper+0x164f/0x5450
[   14.783396]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.783440]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.783466]  ? kasan_atomics+0x152/0x310
[   14.783492]  kasan_atomics+0x1dc/0x310
[   14.783531]  ? __pfx_kasan_atomics+0x10/0x10
[   14.783556]  ? __pfx_read_tsc+0x10/0x10
[   14.783577]  ? ktime_get_ts64+0x86/0x230
[   14.783601]  kunit_try_run_case+0x1a5/0x480
[   14.783624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.783647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.783669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.783693]  ? __kthread_parkme+0x82/0x180
[   14.783713]  ? preempt_count_sub+0x50/0x80
[   14.783737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.783778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.783802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.783827]  kthread+0x337/0x6f0
[   14.783846]  ? trace_preempt_on+0x20/0xc0
[   14.783869]  ? __pfx_kthread+0x10/0x10
[   14.783890]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.783912]  ? calculate_sigpending+0x7b/0xa0
[   14.783936]  ? __pfx_kthread+0x10/0x10
[   14.783958]  ret_from_fork+0x116/0x1d0
[   14.783976]  ? __pfx_kthread+0x10/0x10
[   14.783997]  ret_from_fork_asm+0x1a/0x30
[   14.784028]  </TASK>
[   14.784056] 
[   14.791718] Allocated by task 283:
[   14.791929]  kasan_save_stack+0x45/0x70
[   14.792170]  kasan_save_track+0x18/0x40
[   14.792413]  kasan_save_alloc_info+0x3b/0x50
[   14.792665]  __kasan_kmalloc+0xb7/0xc0
[   14.792870]  __kmalloc_cache_noprof+0x189/0x420
[   14.793145]  kasan_atomics+0x95/0x310
[   14.793337]  kunit_try_run_case+0x1a5/0x480
[   14.793543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.793728]  kthread+0x337/0x6f0
[   14.793847]  ret_from_fork+0x116/0x1d0
[   14.793978]  ret_from_fork_asm+0x1a/0x30
[   14.794124] 
[   14.794218] The buggy address belongs to the object at ffff8881038eb080
[   14.794218]  which belongs to the cache kmalloc-64 of size 64
[   14.795427] The buggy address is located 0 bytes to the right of
[   14.795427]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.795943] 
[   14.796036] The buggy address belongs to the physical page:
[   14.796275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.797352] flags: 0x200000000000000(node=0|zone=2)
[   14.797540] page_type: f5(slab)
[   14.798355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.798727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.799074] page dumped because: kasan: bad access detected
[   14.799357] 
[   14.799453] Memory state around the buggy address:
[   14.799652]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.799876]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.800349] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.800982]                                      ^
[   14.801528]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.801988]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.802542] ==================================================================
[   15.010080] ==================================================================
[   15.010524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.010806] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.011243] 
[   15.011331] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.011374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.011387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.011409] Call Trace:
[   15.011424]  <TASK>
[   15.011438]  dump_stack_lvl+0x73/0xb0
[   15.011465]  print_report+0xd1/0x650
[   15.011489]  ? __virt_addr_valid+0x1db/0x2d0
[   15.011512]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.011534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.011557]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.011580]  kasan_report+0x141/0x180
[   15.011603]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.011631]  __asan_report_load8_noabort+0x18/0x20
[   15.011667]  kasan_atomics_helper+0x4f30/0x5450
[   15.011691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.011714]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.011739]  ? kasan_atomics+0x152/0x310
[   15.011766]  kasan_atomics+0x1dc/0x310
[   15.011789]  ? __pfx_kasan_atomics+0x10/0x10
[   15.011813]  ? __pfx_read_tsc+0x10/0x10
[   15.011836]  ? ktime_get_ts64+0x86/0x230
[   15.011859]  kunit_try_run_case+0x1a5/0x480
[   15.011884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.011906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.011929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.011953]  ? __kthread_parkme+0x82/0x180
[   15.011976]  ? preempt_count_sub+0x50/0x80
[   15.012000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.012024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.012047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.012072]  kthread+0x337/0x6f0
[   15.012092]  ? trace_preempt_on+0x20/0xc0
[   15.012126]  ? __pfx_kthread+0x10/0x10
[   15.012147]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.012170]  ? calculate_sigpending+0x7b/0xa0
[   15.012193]  ? __pfx_kthread+0x10/0x10
[   15.012215]  ret_from_fork+0x116/0x1d0
[   15.012234]  ? __pfx_kthread+0x10/0x10
[   15.012255]  ret_from_fork_asm+0x1a/0x30
[   15.012286]  </TASK>
[   15.012300] 
[   15.019763] Allocated by task 283:
[   15.019925]  kasan_save_stack+0x45/0x70
[   15.020076]  kasan_save_track+0x18/0x40
[   15.020279]  kasan_save_alloc_info+0x3b/0x50
[   15.020571]  __kasan_kmalloc+0xb7/0xc0
[   15.020765]  __kmalloc_cache_noprof+0x189/0x420
[   15.020964]  kasan_atomics+0x95/0x310
[   15.021144]  kunit_try_run_case+0x1a5/0x480
[   15.021335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.021572]  kthread+0x337/0x6f0
[   15.021702]  ret_from_fork+0x116/0x1d0
[   15.021836]  ret_from_fork_asm+0x1a/0x30
[   15.021977] 
[   15.022050] The buggy address belongs to the object at ffff8881038eb080
[   15.022050]  which belongs to the cache kmalloc-64 of size 64
[   15.022645] The buggy address is located 0 bytes to the right of
[   15.022645]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.023213] 
[   15.023309] The buggy address belongs to the physical page:
[   15.023507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.023752] flags: 0x200000000000000(node=0|zone=2)
[   15.023920] page_type: f5(slab)
[   15.024058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.024502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.024849] page dumped because: kasan: bad access detected
[   15.025115] 
[   15.025215] Memory state around the buggy address:
[   15.025503]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.025762]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.026048] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.026380]                                      ^
[   15.026579]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.026867]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.027162] ==================================================================
[   15.168218] ==================================================================
[   15.168691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.169009] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.169337] 
[   15.169457] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.169499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.169512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.169532] Call Trace:
[   15.169547]  <TASK>
[   15.169563]  dump_stack_lvl+0x73/0xb0
[   15.169609]  print_report+0xd1/0x650
[   15.169631]  ? __virt_addr_valid+0x1db/0x2d0
[   15.169654]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.169676]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.169698]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.169721]  kasan_report+0x141/0x180
[   15.169759]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.169787]  __asan_report_load8_noabort+0x18/0x20
[   15.169812]  kasan_atomics_helper+0x4f98/0x5450
[   15.169836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.169859]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.169884]  ? kasan_atomics+0x152/0x310
[   15.169926]  kasan_atomics+0x1dc/0x310
[   15.169950]  ? __pfx_kasan_atomics+0x10/0x10
[   15.169974]  ? __pfx_read_tsc+0x10/0x10
[   15.169995]  ? ktime_get_ts64+0x86/0x230
[   15.170019]  kunit_try_run_case+0x1a5/0x480
[   15.170044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.170066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.170089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.170124]  ? __kthread_parkme+0x82/0x180
[   15.170145]  ? preempt_count_sub+0x50/0x80
[   15.170169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.170193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.170216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.170241]  kthread+0x337/0x6f0
[   15.170261]  ? trace_preempt_on+0x20/0xc0
[   15.170285]  ? __pfx_kthread+0x10/0x10
[   15.170306]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.170344]  ? calculate_sigpending+0x7b/0xa0
[   15.170369]  ? __pfx_kthread+0x10/0x10
[   15.170391]  ret_from_fork+0x116/0x1d0
[   15.170411]  ? __pfx_kthread+0x10/0x10
[   15.170432]  ret_from_fork_asm+0x1a/0x30
[   15.170463]  </TASK>
[   15.170475] 
[   15.182254] Allocated by task 283:
[   15.182610]  kasan_save_stack+0x45/0x70
[   15.182970]  kasan_save_track+0x18/0x40
[   15.183360]  kasan_save_alloc_info+0x3b/0x50
[   15.183716]  __kasan_kmalloc+0xb7/0xc0
[   15.183844]  __kmalloc_cache_noprof+0x189/0x420
[   15.183995]  kasan_atomics+0x95/0x310
[   15.184135]  kunit_try_run_case+0x1a5/0x480
[   15.184279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.184474]  kthread+0x337/0x6f0
[   15.184593]  ret_from_fork+0x116/0x1d0
[   15.184882]  ret_from_fork_asm+0x1a/0x30
[   15.185071] 
[   15.185178] The buggy address belongs to the object at ffff8881038eb080
[   15.185178]  which belongs to the cache kmalloc-64 of size 64
[   15.185598] The buggy address is located 0 bytes to the right of
[   15.185598]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.186061] 
[   15.186144] The buggy address belongs to the physical page:
[   15.186363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.186778] flags: 0x200000000000000(node=0|zone=2)
[   15.187040] page_type: f5(slab)
[   15.187299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.187558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.187855] page dumped because: kasan: bad access detected
[   15.188117] 
[   15.188215] Memory state around the buggy address:
[   15.188415]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.188735]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.189028] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.189328]                                      ^
[   15.189521]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.189815]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.190105] ==================================================================
[   14.194522] ==================================================================
[   14.195083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.195526] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.195919] 
[   14.196044] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.196132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.196147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.196169] Call Trace:
[   14.196186]  <TASK>
[   14.196214]  dump_stack_lvl+0x73/0xb0
[   14.196289]  print_report+0xd1/0x650
[   14.196336]  ? __virt_addr_valid+0x1db/0x2d0
[   14.196370]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.196393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.196427]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.196450]  kasan_report+0x141/0x180
[   14.196474]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.196529]  kasan_check_range+0x10c/0x1c0
[   14.196553]  __kasan_check_write+0x18/0x20
[   14.196586]  kasan_atomics_helper+0x8f9/0x5450
[   14.196610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.196633]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.196694]  ? kasan_atomics+0x152/0x310
[   14.196722]  kasan_atomics+0x1dc/0x310
[   14.196746]  ? __pfx_kasan_atomics+0x10/0x10
[   14.196781]  ? __pfx_read_tsc+0x10/0x10
[   14.196828]  ? ktime_get_ts64+0x86/0x230
[   14.196853]  kunit_try_run_case+0x1a5/0x480
[   14.196877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.196913]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.196936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.196985]  ? __kthread_parkme+0x82/0x180
[   14.197021]  ? preempt_count_sub+0x50/0x80
[   14.197066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.197111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.197134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.197159]  kthread+0x337/0x6f0
[   14.197190]  ? trace_preempt_on+0x20/0xc0
[   14.197213]  ? __pfx_kthread+0x10/0x10
[   14.197236]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.197257]  ? calculate_sigpending+0x7b/0xa0
[   14.197281]  ? __pfx_kthread+0x10/0x10
[   14.197303]  ret_from_fork+0x116/0x1d0
[   14.197361]  ? __pfx_kthread+0x10/0x10
[   14.197386]  ret_from_fork_asm+0x1a/0x30
[   14.197418]  </TASK>
[   14.197431] 
[   14.206916] Allocated by task 283:
[   14.207117]  kasan_save_stack+0x45/0x70
[   14.207393]  kasan_save_track+0x18/0x40
[   14.207638]  kasan_save_alloc_info+0x3b/0x50
[   14.207864]  __kasan_kmalloc+0xb7/0xc0
[   14.208105]  __kmalloc_cache_noprof+0x189/0x420
[   14.208517]  kasan_atomics+0x95/0x310
[   14.208679]  kunit_try_run_case+0x1a5/0x480
[   14.208830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.209009]  kthread+0x337/0x6f0
[   14.209193]  ret_from_fork+0x116/0x1d0
[   14.209595]  ret_from_fork_asm+0x1a/0x30
[   14.209833] 
[   14.209932] The buggy address belongs to the object at ffff8881038eb080
[   14.209932]  which belongs to the cache kmalloc-64 of size 64
[   14.210598] The buggy address is located 0 bytes to the right of
[   14.210598]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.211252] 
[   14.211376] The buggy address belongs to the physical page:
[   14.211655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.212014] flags: 0x200000000000000(node=0|zone=2)
[   14.212424] page_type: f5(slab)
[   14.212708] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.213130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.213496] page dumped because: kasan: bad access detected
[   14.213892] 
[   14.213995] Memory state around the buggy address:
[   14.214272]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.214717]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.214947] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.215564]                                      ^
[   14.215784]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.216204]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.216539] ==================================================================
[   15.112527] ==================================================================
[   15.112875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.113501] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.113874] 
[   15.114005] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.114049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.114078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.114111] Call Trace:
[   15.114126]  <TASK>
[   15.114142]  dump_stack_lvl+0x73/0xb0
[   15.114169]  print_report+0xd1/0x650
[   15.114192]  ? __virt_addr_valid+0x1db/0x2d0
[   15.114214]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.114236]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.114258]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.114282]  kasan_report+0x141/0x180
[   15.114322]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.114362]  kasan_check_range+0x10c/0x1c0
[   15.114387]  __kasan_check_write+0x18/0x20
[   15.114408]  kasan_atomics_helper+0x1f43/0x5450
[   15.114431]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.114454]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.114478]  ? kasan_atomics+0x152/0x310
[   15.114505]  kasan_atomics+0x1dc/0x310
[   15.114528]  ? __pfx_kasan_atomics+0x10/0x10
[   15.114552]  ? __pfx_read_tsc+0x10/0x10
[   15.114591]  ? ktime_get_ts64+0x86/0x230
[   15.114629]  kunit_try_run_case+0x1a5/0x480
[   15.114666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.114754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.114791]  ? __kthread_parkme+0x82/0x180
[   15.114824]  ? preempt_count_sub+0x50/0x80
[   15.114862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.114922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.114946]  kthread+0x337/0x6f0
[   15.114966]  ? trace_preempt_on+0x20/0xc0
[   15.114989]  ? __pfx_kthread+0x10/0x10
[   15.115010]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.115033]  ? calculate_sigpending+0x7b/0xa0
[   15.115057]  ? __pfx_kthread+0x10/0x10
[   15.115078]  ret_from_fork+0x116/0x1d0
[   15.115108]  ? __pfx_kthread+0x10/0x10
[   15.115129]  ret_from_fork_asm+0x1a/0x30
[   15.115159]  </TASK>
[   15.115173] 
[   15.122509] Allocated by task 283:
[   15.122699]  kasan_save_stack+0x45/0x70
[   15.122930]  kasan_save_track+0x18/0x40
[   15.123092]  kasan_save_alloc_info+0x3b/0x50
[   15.123310]  __kasan_kmalloc+0xb7/0xc0
[   15.123492]  __kmalloc_cache_noprof+0x189/0x420
[   15.123705]  kasan_atomics+0x95/0x310
[   15.123883]  kunit_try_run_case+0x1a5/0x480
[   15.124121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.124563]  kthread+0x337/0x6f0
[   15.124732]  ret_from_fork+0x116/0x1d0
[   15.124882]  ret_from_fork_asm+0x1a/0x30
[   15.125019] 
[   15.125090] The buggy address belongs to the object at ffff8881038eb080
[   15.125090]  which belongs to the cache kmalloc-64 of size 64
[   15.125763] The buggy address is located 0 bytes to the right of
[   15.125763]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.126355] 
[   15.126457] The buggy address belongs to the physical page:
[   15.126702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.126998] flags: 0x200000000000000(node=0|zone=2)
[   15.127169] page_type: f5(slab)
[   15.127298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.127666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.128022] page dumped because: kasan: bad access detected
[   15.128304] 
[   15.128434] Memory state around the buggy address:
[   15.128609]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.128885]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.129247] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.129563]                                      ^
[   15.129741]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.130067]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.130385] ==================================================================
[   14.470493] ==================================================================
[   14.470807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.471890] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.472432] 
[   14.472658] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.472812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.472830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.472854] Call Trace:
[   14.472872]  <TASK>
[   14.472889]  dump_stack_lvl+0x73/0xb0
[   14.472919]  print_report+0xd1/0x650
[   14.472944]  ? __virt_addr_valid+0x1db/0x2d0
[   14.472968]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.472989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.473013]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.473038]  kasan_report+0x141/0x180
[   14.473061]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.473088]  __asan_report_load4_noabort+0x18/0x20
[   14.473128]  kasan_atomics_helper+0x4a36/0x5450
[   14.473151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.473174]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.473200]  ? kasan_atomics+0x152/0x310
[   14.473226]  kasan_atomics+0x1dc/0x310
[   14.473249]  ? __pfx_kasan_atomics+0x10/0x10
[   14.473273]  ? __pfx_read_tsc+0x10/0x10
[   14.473295]  ? ktime_get_ts64+0x86/0x230
[   14.473320]  kunit_try_run_case+0x1a5/0x480
[   14.473345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.473367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.473390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.473414]  ? __kthread_parkme+0x82/0x180
[   14.473435]  ? preempt_count_sub+0x50/0x80
[   14.473458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.473483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.473507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.473531]  kthread+0x337/0x6f0
[   14.473551]  ? trace_preempt_on+0x20/0xc0
[   14.473575]  ? __pfx_kthread+0x10/0x10
[   14.473596]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.473617]  ? calculate_sigpending+0x7b/0xa0
[   14.473642]  ? __pfx_kthread+0x10/0x10
[   14.473664]  ret_from_fork+0x116/0x1d0
[   14.473682]  ? __pfx_kthread+0x10/0x10
[   14.473704]  ret_from_fork_asm+0x1a/0x30
[   14.473734]  </TASK>
[   14.473748] 
[   14.484539] Allocated by task 283:
[   14.484933]  kasan_save_stack+0x45/0x70
[   14.485241]  kasan_save_track+0x18/0x40
[   14.485520]  kasan_save_alloc_info+0x3b/0x50
[   14.485827]  __kasan_kmalloc+0xb7/0xc0
[   14.486013]  __kmalloc_cache_noprof+0x189/0x420
[   14.486238]  kasan_atomics+0x95/0x310
[   14.486473]  kunit_try_run_case+0x1a5/0x480
[   14.486947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.487316]  kthread+0x337/0x6f0
[   14.487585]  ret_from_fork+0x116/0x1d0
[   14.487861]  ret_from_fork_asm+0x1a/0x30
[   14.488192] 
[   14.488272] The buggy address belongs to the object at ffff8881038eb080
[   14.488272]  which belongs to the cache kmalloc-64 of size 64
[   14.488987] The buggy address is located 0 bytes to the right of
[   14.488987]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.489734] 
[   14.489818] The buggy address belongs to the physical page:
[   14.490076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.490693] flags: 0x200000000000000(node=0|zone=2)
[   14.490923] page_type: f5(slab)
[   14.491186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.491646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.492070] page dumped because: kasan: bad access detected
[   14.492459] 
[   14.492668] Memory state around the buggy address:
[   14.492836]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.493089]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.493623] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.493989]                                      ^
[   14.494290]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.494686]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.495080] ==================================================================
[   14.417145] ==================================================================
[   14.417967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.418614] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.418938] 
[   14.419056] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.419110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.419123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.419145] Call Trace:
[   14.419158]  <TASK>
[   14.419174]  dump_stack_lvl+0x73/0xb0
[   14.419211]  print_report+0xd1/0x650
[   14.419234]  ? __virt_addr_valid+0x1db/0x2d0
[   14.419257]  ? kasan_atomics_helper+0xf10/0x5450
[   14.419279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.419303]  ? kasan_atomics_helper+0xf10/0x5450
[   14.419604]  kasan_report+0x141/0x180
[   14.419636]  ? kasan_atomics_helper+0xf10/0x5450
[   14.419665]  kasan_check_range+0x10c/0x1c0
[   14.419689]  __kasan_check_write+0x18/0x20
[   14.419710]  kasan_atomics_helper+0xf10/0x5450
[   14.419737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.419761]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.419786]  ? kasan_atomics+0x152/0x310
[   14.419812]  kasan_atomics+0x1dc/0x310
[   14.419836]  ? __pfx_kasan_atomics+0x10/0x10
[   14.419861]  ? __pfx_read_tsc+0x10/0x10
[   14.419883]  ? ktime_get_ts64+0x86/0x230
[   14.419907]  kunit_try_run_case+0x1a5/0x480
[   14.419932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.419954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.419978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.420001]  ? __kthread_parkme+0x82/0x180
[   14.420022]  ? preempt_count_sub+0x50/0x80
[   14.420047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.420071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.420108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.420133]  kthread+0x337/0x6f0
[   14.420153]  ? trace_preempt_on+0x20/0xc0
[   14.420177]  ? __pfx_kthread+0x10/0x10
[   14.420198]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.420220]  ? calculate_sigpending+0x7b/0xa0
[   14.420244]  ? __pfx_kthread+0x10/0x10
[   14.420267]  ret_from_fork+0x116/0x1d0
[   14.420285]  ? __pfx_kthread+0x10/0x10
[   14.420307]  ret_from_fork_asm+0x1a/0x30
[   14.420337]  </TASK>
[   14.420350] 
[   14.430515] Allocated by task 283:
[   14.430840]  kasan_save_stack+0x45/0x70
[   14.431169]  kasan_save_track+0x18/0x40
[   14.431372]  kasan_save_alloc_info+0x3b/0x50
[   14.431710]  __kasan_kmalloc+0xb7/0xc0
[   14.431892]  __kmalloc_cache_noprof+0x189/0x420
[   14.432127]  kasan_atomics+0x95/0x310
[   14.432319]  kunit_try_run_case+0x1a5/0x480
[   14.432757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.433075]  kthread+0x337/0x6f0
[   14.433243]  ret_from_fork+0x116/0x1d0
[   14.433616]  ret_from_fork_asm+0x1a/0x30
[   14.433885] 
[   14.433991] The buggy address belongs to the object at ffff8881038eb080
[   14.433991]  which belongs to the cache kmalloc-64 of size 64
[   14.434769] The buggy address is located 0 bytes to the right of
[   14.434769]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.435424] 
[   14.435525] The buggy address belongs to the physical page:
[   14.435888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.436296] flags: 0x200000000000000(node=0|zone=2)
[   14.436594] page_type: f5(slab)
[   14.436918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.437352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.437803] page dumped because: kasan: bad access detected
[   14.438137] 
[   14.438239] Memory state around the buggy address:
[   14.438637]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.438948]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.439267] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.439792]                                      ^
[   14.440114]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.440595]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.440894] ==================================================================
[   14.240147] ==================================================================
[   14.240648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.240982] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.241374] 
[   14.241508] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.241584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.241598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.241648] Call Trace:
[   14.241666]  <TASK>
[   14.241682]  dump_stack_lvl+0x73/0xb0
[   14.241721]  print_report+0xd1/0x650
[   14.241744]  ? __virt_addr_valid+0x1db/0x2d0
[   14.241767]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.241788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.241837]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.241861]  kasan_report+0x141/0x180
[   14.241885]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.241923]  kasan_check_range+0x10c/0x1c0
[   14.241947]  __kasan_check_write+0x18/0x20
[   14.241966]  kasan_atomics_helper+0xa2b/0x5450
[   14.241989]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.242012]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.242037]  ? kasan_atomics+0x152/0x310
[   14.242064]  kasan_atomics+0x1dc/0x310
[   14.242088]  ? __pfx_kasan_atomics+0x10/0x10
[   14.242123]  ? __pfx_read_tsc+0x10/0x10
[   14.242144]  ? ktime_get_ts64+0x86/0x230
[   14.242212]  kunit_try_run_case+0x1a5/0x480
[   14.242238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.242261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.242327]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.242352]  ? __kthread_parkme+0x82/0x180
[   14.242402]  ? preempt_count_sub+0x50/0x80
[   14.242439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.242463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.242498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.242522]  kthread+0x337/0x6f0
[   14.242543]  ? trace_preempt_on+0x20/0xc0
[   14.242594]  ? __pfx_kthread+0x10/0x10
[   14.242616]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.242639]  ? calculate_sigpending+0x7b/0xa0
[   14.242675]  ? __pfx_kthread+0x10/0x10
[   14.242697]  ret_from_fork+0x116/0x1d0
[   14.242716]  ? __pfx_kthread+0x10/0x10
[   14.242738]  ret_from_fork_asm+0x1a/0x30
[   14.242769]  </TASK>
[   14.242781] 
[   14.252619] Allocated by task 283:
[   14.252846]  kasan_save_stack+0x45/0x70
[   14.253039]  kasan_save_track+0x18/0x40
[   14.253320]  kasan_save_alloc_info+0x3b/0x50
[   14.253669]  __kasan_kmalloc+0xb7/0xc0
[   14.253879]  __kmalloc_cache_noprof+0x189/0x420
[   14.254182]  kasan_atomics+0x95/0x310
[   14.255407]  kunit_try_run_case+0x1a5/0x480
[   14.255723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.255903]  kthread+0x337/0x6f0
[   14.256026]  ret_from_fork+0x116/0x1d0
[   14.256268]  ret_from_fork_asm+0x1a/0x30
[   14.256708] 
[   14.256915] The buggy address belongs to the object at ffff8881038eb080
[   14.256915]  which belongs to the cache kmalloc-64 of size 64
[   14.258171] The buggy address is located 0 bytes to the right of
[   14.258171]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.259541] 
[   14.259725] The buggy address belongs to the physical page:
[   14.260137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.260712] flags: 0x200000000000000(node=0|zone=2)
[   14.260886] page_type: f5(slab)
[   14.261011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.261323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.261784] page dumped because: kasan: bad access detected
[   14.262046] 
[   14.262205] Memory state around the buggy address:
[   14.262563]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.262910]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.263404] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.263717]                                      ^
[   14.263926]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264446]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264756] ==================================================================
[   14.626653] ==================================================================
[   14.626999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.627363] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.627954] 
[   14.628069] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.628126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.628140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.628175] Call Trace:
[   14.628189]  <TASK>
[   14.628204]  dump_stack_lvl+0x73/0xb0
[   14.628231]  print_report+0xd1/0x650
[   14.628254]  ? __virt_addr_valid+0x1db/0x2d0
[   14.628278]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.628300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.628323]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.628344]  kasan_report+0x141/0x180
[   14.628367]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.628394]  kasan_check_range+0x10c/0x1c0
[   14.628418]  __kasan_check_write+0x18/0x20
[   14.628437]  kasan_atomics_helper+0x12e6/0x5450
[   14.628460]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.628483]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.628507]  ? kasan_atomics+0x152/0x310
[   14.628533]  kasan_atomics+0x1dc/0x310
[   14.628557]  ? __pfx_kasan_atomics+0x10/0x10
[   14.628580]  ? __pfx_read_tsc+0x10/0x10
[   14.628602]  ? ktime_get_ts64+0x86/0x230
[   14.628625]  kunit_try_run_case+0x1a5/0x480
[   14.628650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.628672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.628695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.628718]  ? __kthread_parkme+0x82/0x180
[   14.628738]  ? preempt_count_sub+0x50/0x80
[   14.628762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.628785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.628809]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.628833]  kthread+0x337/0x6f0
[   14.628853]  ? trace_preempt_on+0x20/0xc0
[   14.628876]  ? __pfx_kthread+0x10/0x10
[   14.628897]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.628919]  ? calculate_sigpending+0x7b/0xa0
[   14.628942]  ? __pfx_kthread+0x10/0x10
[   14.628964]  ret_from_fork+0x116/0x1d0
[   14.628982]  ? __pfx_kthread+0x10/0x10
[   14.629003]  ret_from_fork_asm+0x1a/0x30
[   14.629034]  </TASK>
[   14.629047] 
[   14.636580] Allocated by task 283:
[   14.636717]  kasan_save_stack+0x45/0x70
[   14.636893]  kasan_save_track+0x18/0x40
[   14.637089]  kasan_save_alloc_info+0x3b/0x50
[   14.637317]  __kasan_kmalloc+0xb7/0xc0
[   14.637491]  __kmalloc_cache_noprof+0x189/0x420
[   14.637707]  kasan_atomics+0x95/0x310
[   14.637862]  kunit_try_run_case+0x1a5/0x480
[   14.638075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.638310]  kthread+0x337/0x6f0
[   14.638485]  ret_from_fork+0x116/0x1d0
[   14.638630]  ret_from_fork_asm+0x1a/0x30
[   14.638816] 
[   14.638904] The buggy address belongs to the object at ffff8881038eb080
[   14.638904]  which belongs to the cache kmalloc-64 of size 64
[   14.639438] The buggy address is located 0 bytes to the right of
[   14.639438]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.639857] 
[   14.639954] The buggy address belongs to the physical page:
[   14.640203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.640467] flags: 0x200000000000000(node=0|zone=2)
[   14.640820] page_type: f5(slab)
[   14.640995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.641324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.641669] page dumped because: kasan: bad access detected
[   14.641906] 
[   14.641991] Memory state around the buggy address:
[   14.642199]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.642419]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.642642] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.642860]                                      ^
[   14.643018]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.643311]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.643642] ==================================================================
[   14.377443] ==================================================================
[   14.377756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.378078] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.378498] 
[   14.378607] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.378650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.378662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.378683] Call Trace:
[   14.378700]  <TASK>
[   14.378714]  dump_stack_lvl+0x73/0xb0
[   14.378757]  print_report+0xd1/0x650
[   14.378780]  ? __virt_addr_valid+0x1db/0x2d0
[   14.378803]  ? kasan_atomics_helper+0xde0/0x5450
[   14.378824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.378846]  ? kasan_atomics_helper+0xde0/0x5450
[   14.378869]  kasan_report+0x141/0x180
[   14.378892]  ? kasan_atomics_helper+0xde0/0x5450
[   14.378918]  kasan_check_range+0x10c/0x1c0
[   14.378942]  __kasan_check_write+0x18/0x20
[   14.378962]  kasan_atomics_helper+0xde0/0x5450
[   14.378985]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.379008]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.379034]  ? kasan_atomics+0x152/0x310
[   14.379061]  kasan_atomics+0x1dc/0x310
[   14.379084]  ? __pfx_kasan_atomics+0x10/0x10
[   14.379121]  ? __pfx_read_tsc+0x10/0x10
[   14.379206]  ? ktime_get_ts64+0x86/0x230
[   14.379234]  kunit_try_run_case+0x1a5/0x480
[   14.379258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.379281]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.379304]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.379327]  ? __kthread_parkme+0x82/0x180
[   14.379364]  ? preempt_count_sub+0x50/0x80
[   14.379388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.379413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.379438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.379462]  kthread+0x337/0x6f0
[   14.379482]  ? trace_preempt_on+0x20/0xc0
[   14.379507]  ? __pfx_kthread+0x10/0x10
[   14.379528]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.379550]  ? calculate_sigpending+0x7b/0xa0
[   14.379573]  ? __pfx_kthread+0x10/0x10
[   14.379596]  ret_from_fork+0x116/0x1d0
[   14.379615]  ? __pfx_kthread+0x10/0x10
[   14.379637]  ret_from_fork_asm+0x1a/0x30
[   14.379668]  </TASK>
[   14.379679] 
[   14.387623] Allocated by task 283:
[   14.387814]  kasan_save_stack+0x45/0x70
[   14.388024]  kasan_save_track+0x18/0x40
[   14.388392]  kasan_save_alloc_info+0x3b/0x50
[   14.388617]  __kasan_kmalloc+0xb7/0xc0
[   14.388816]  __kmalloc_cache_noprof+0x189/0x420
[   14.389013]  kasan_atomics+0x95/0x310
[   14.389277]  kunit_try_run_case+0x1a5/0x480
[   14.389508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.389739]  kthread+0x337/0x6f0
[   14.389899]  ret_from_fork+0x116/0x1d0
[   14.390056]  ret_from_fork_asm+0x1a/0x30
[   14.390309] 
[   14.390433] The buggy address belongs to the object at ffff8881038eb080
[   14.390433]  which belongs to the cache kmalloc-64 of size 64
[   14.390915] The buggy address is located 0 bytes to the right of
[   14.390915]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.391442] 
[   14.391519] The buggy address belongs to the physical page:
[   14.391694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.392040] flags: 0x200000000000000(node=0|zone=2)
[   14.392361] page_type: f5(slab)
[   14.392539] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.392885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.393375] page dumped because: kasan: bad access detected
[   14.393588] 
[   14.393663] Memory state around the buggy address:
[   14.393860]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.394268]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.394614] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.394943]                                      ^
[   14.395266]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.395625]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.395899] ==================================================================
[   14.974583] ==================================================================
[   14.974892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.975291] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.975660] 
[   14.975775] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.975820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.975833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.975856] Call Trace:
[   14.975872]  <TASK>
[   14.975889]  dump_stack_lvl+0x73/0xb0
[   14.975916]  print_report+0xd1/0x650
[   14.975938]  ? __virt_addr_valid+0x1db/0x2d0
[   14.975963]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.975984]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.976008]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.976030]  kasan_report+0x141/0x180
[   14.976052]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.976079]  kasan_check_range+0x10c/0x1c0
[   14.976123]  __kasan_check_write+0x18/0x20
[   14.976145]  kasan_atomics_helper+0x1b22/0x5450
[   14.976167]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.976190]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.976215]  ? kasan_atomics+0x152/0x310
[   14.976243]  kasan_atomics+0x1dc/0x310
[   14.976267]  ? __pfx_kasan_atomics+0x10/0x10
[   14.976291]  ? __pfx_read_tsc+0x10/0x10
[   14.976312]  ? ktime_get_ts64+0x86/0x230
[   14.976336]  kunit_try_run_case+0x1a5/0x480
[   14.976361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.976383]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.976406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.976429]  ? __kthread_parkme+0x82/0x180
[   14.976450]  ? preempt_count_sub+0x50/0x80
[   14.976475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.976500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.976524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.976549]  kthread+0x337/0x6f0
[   14.976569]  ? trace_preempt_on+0x20/0xc0
[   14.976593]  ? __pfx_kthread+0x10/0x10
[   14.976614]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.976646]  ? calculate_sigpending+0x7b/0xa0
[   14.976670]  ? __pfx_kthread+0x10/0x10
[   14.976692]  ret_from_fork+0x116/0x1d0
[   14.976710]  ? __pfx_kthread+0x10/0x10
[   14.976732]  ret_from_fork_asm+0x1a/0x30
[   14.976762]  </TASK>
[   14.976773] 
[   14.984311] Allocated by task 283:
[   14.984446]  kasan_save_stack+0x45/0x70
[   14.984594]  kasan_save_track+0x18/0x40
[   14.984732]  kasan_save_alloc_info+0x3b/0x50
[   14.984986]  __kasan_kmalloc+0xb7/0xc0
[   14.985183]  __kmalloc_cache_noprof+0x189/0x420
[   14.985536]  kasan_atomics+0x95/0x310
[   14.985726]  kunit_try_run_case+0x1a5/0x480
[   14.985933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.986196]  kthread+0x337/0x6f0
[   14.986332]  ret_from_fork+0x116/0x1d0
[   14.986517]  ret_from_fork_asm+0x1a/0x30
[   14.986659] 
[   14.986733] The buggy address belongs to the object at ffff8881038eb080
[   14.986733]  which belongs to the cache kmalloc-64 of size 64
[   14.987247] The buggy address is located 0 bytes to the right of
[   14.987247]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.987908] 
[   14.987989] The buggy address belongs to the physical page:
[   14.988209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.988577] flags: 0x200000000000000(node=0|zone=2)
[   14.988803] page_type: f5(slab)
[   14.988941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.989242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.989604] page dumped because: kasan: bad access detected
[   14.989799] 
[   14.989872] Memory state around the buggy address:
[   14.990030]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.990339]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.990659] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.990940]                                      ^
[   14.991153]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991534]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991801] ==================================================================
[   14.038813] ==================================================================
[   14.039222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.039887] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.040367] 
[   14.040458] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.040503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.040516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.040538] Call Trace:
[   14.040552]  <TASK>
[   14.040568]  dump_stack_lvl+0x73/0xb0
[   14.040596]  print_report+0xd1/0x650
[   14.040619]  ? __virt_addr_valid+0x1db/0x2d0
[   14.040642]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.040678]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.040701]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.040735]  kasan_report+0x141/0x180
[   14.040758]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.040784]  __asan_report_store4_noabort+0x1b/0x30
[   14.040805]  kasan_atomics_helper+0x4b3a/0x5450
[   14.040839]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.040862]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.040897]  ? kasan_atomics+0x152/0x310
[   14.040925]  kasan_atomics+0x1dc/0x310
[   14.040948]  ? __pfx_kasan_atomics+0x10/0x10
[   14.040973]  ? __pfx_read_tsc+0x10/0x10
[   14.041002]  ? ktime_get_ts64+0x86/0x230
[   14.041026]  kunit_try_run_case+0x1a5/0x480
[   14.041049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.041084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.041118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.041141]  ? __kthread_parkme+0x82/0x180
[   14.041161]  ? preempt_count_sub+0x50/0x80
[   14.041195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.041218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.041242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.041315]  kthread+0x337/0x6f0
[   14.041349]  ? trace_preempt_on+0x20/0xc0
[   14.041383]  ? __pfx_kthread+0x10/0x10
[   14.041405]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.041427]  ? calculate_sigpending+0x7b/0xa0
[   14.041461]  ? __pfx_kthread+0x10/0x10
[   14.041483]  ret_from_fork+0x116/0x1d0
[   14.041502]  ? __pfx_kthread+0x10/0x10
[   14.041523]  ret_from_fork_asm+0x1a/0x30
[   14.041563]  </TASK>
[   14.041576] 
[   14.049920] Allocated by task 283:
[   14.050078]  kasan_save_stack+0x45/0x70
[   14.050337]  kasan_save_track+0x18/0x40
[   14.050655]  kasan_save_alloc_info+0x3b/0x50
[   14.050887]  __kasan_kmalloc+0xb7/0xc0
[   14.051084]  __kmalloc_cache_noprof+0x189/0x420
[   14.051286]  kasan_atomics+0x95/0x310
[   14.051557]  kunit_try_run_case+0x1a5/0x480
[   14.051731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.051912]  kthread+0x337/0x6f0
[   14.052037]  ret_from_fork+0x116/0x1d0
[   14.052219]  ret_from_fork_asm+0x1a/0x30
[   14.052578] 
[   14.052754] The buggy address belongs to the object at ffff8881038eb080
[   14.052754]  which belongs to the cache kmalloc-64 of size 64
[   14.053256] The buggy address is located 0 bytes to the right of
[   14.053256]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.053903] 
[   14.054033] The buggy address belongs to the physical page:
[   14.054411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.054997] flags: 0x200000000000000(node=0|zone=2)
[   14.055494] page_type: f5(slab)
[   14.055642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.055880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.056210] page dumped because: kasan: bad access detected
[   14.056464] 
[   14.056560] Memory state around the buggy address:
[   14.056783]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.057084]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.057314] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.057533]                                      ^
[   14.057797]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.058142]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.058698] ==================================================================
[   14.644584] ==================================================================
[   14.644927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.645231] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.645867] 
[   14.645987] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.646032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.646048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.646071] Call Trace:
[   14.646086]  <TASK>
[   14.646113]  dump_stack_lvl+0x73/0xb0
[   14.646140]  print_report+0xd1/0x650
[   14.646164]  ? __virt_addr_valid+0x1db/0x2d0
[   14.646186]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.646208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.646232]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.646254]  kasan_report+0x141/0x180
[   14.646277]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.646304]  __asan_report_load4_noabort+0x18/0x20
[   14.646338]  kasan_atomics_helper+0x49ce/0x5450
[   14.646362]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.646384]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.646410]  ? kasan_atomics+0x152/0x310
[   14.646437]  kasan_atomics+0x1dc/0x310
[   14.646459]  ? __pfx_kasan_atomics+0x10/0x10
[   14.646484]  ? __pfx_read_tsc+0x10/0x10
[   14.646504]  ? ktime_get_ts64+0x86/0x230
[   14.646529]  kunit_try_run_case+0x1a5/0x480
[   14.646553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.646575]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.646597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.646620]  ? __kthread_parkme+0x82/0x180
[   14.646641]  ? preempt_count_sub+0x50/0x80
[   14.646664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.646687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.646710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.646734]  kthread+0x337/0x6f0
[   14.646753]  ? trace_preempt_on+0x20/0xc0
[   14.646776]  ? __pfx_kthread+0x10/0x10
[   14.646798]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.646819]  ? calculate_sigpending+0x7b/0xa0
[   14.646842]  ? __pfx_kthread+0x10/0x10
[   14.646864]  ret_from_fork+0x116/0x1d0
[   14.646884]  ? __pfx_kthread+0x10/0x10
[   14.646905]  ret_from_fork_asm+0x1a/0x30
[   14.646935]  </TASK>
[   14.646947] 
[   14.654149] Allocated by task 283:
[   14.654341]  kasan_save_stack+0x45/0x70
[   14.654546]  kasan_save_track+0x18/0x40
[   14.654699]  kasan_save_alloc_info+0x3b/0x50
[   14.654852]  __kasan_kmalloc+0xb7/0xc0
[   14.655042]  __kmalloc_cache_noprof+0x189/0x420
[   14.655284]  kasan_atomics+0x95/0x310
[   14.655546]  kunit_try_run_case+0x1a5/0x480
[   14.655727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.655961]  kthread+0x337/0x6f0
[   14.656136]  ret_from_fork+0x116/0x1d0
[   14.656304]  ret_from_fork_asm+0x1a/0x30
[   14.656480] 
[   14.656554] The buggy address belongs to the object at ffff8881038eb080
[   14.656554]  which belongs to the cache kmalloc-64 of size 64
[   14.656985] The buggy address is located 0 bytes to the right of
[   14.656985]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.657675] 
[   14.657751] The buggy address belongs to the physical page:
[   14.657926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.658248] flags: 0x200000000000000(node=0|zone=2)
[   14.658688] page_type: f5(slab)
[   14.658862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.659224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.659595] page dumped because: kasan: bad access detected
[   14.659807] 
[   14.659903] Memory state around the buggy address:
[   14.660139]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.660437]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.660788] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.661037]                                      ^
[   14.661205]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.661425]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.661641] ==================================================================
[   14.925513] ==================================================================
[   14.926278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.926722] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.927241] 
[   14.927536] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.927585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.927600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.927623] Call Trace:
[   14.927637]  <TASK>
[   14.927652]  dump_stack_lvl+0x73/0xb0
[   14.927681]  print_report+0xd1/0x650
[   14.927705]  ? __virt_addr_valid+0x1db/0x2d0
[   14.927727]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.927749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.927774]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.927797]  kasan_report+0x141/0x180
[   14.927819]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.927846]  kasan_check_range+0x10c/0x1c0
[   14.927871]  __kasan_check_write+0x18/0x20
[   14.927890]  kasan_atomics_helper+0x19e3/0x5450
[   14.927913]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.927936]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.927961]  ? kasan_atomics+0x152/0x310
[   14.927989]  kasan_atomics+0x1dc/0x310
[   14.928011]  ? __pfx_kasan_atomics+0x10/0x10
[   14.928036]  ? __pfx_read_tsc+0x10/0x10
[   14.928056]  ? ktime_get_ts64+0x86/0x230
[   14.928080]  kunit_try_run_case+0x1a5/0x480
[   14.928119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.928141]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.928164]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.928188]  ? __kthread_parkme+0x82/0x180
[   14.928208]  ? preempt_count_sub+0x50/0x80
[   14.928232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.928256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.928279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.928302]  kthread+0x337/0x6f0
[   14.928334]  ? trace_preempt_on+0x20/0xc0
[   14.928357]  ? __pfx_kthread+0x10/0x10
[   14.928378]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.928400]  ? calculate_sigpending+0x7b/0xa0
[   14.928425]  ? __pfx_kthread+0x10/0x10
[   14.928448]  ret_from_fork+0x116/0x1d0
[   14.928467]  ? __pfx_kthread+0x10/0x10
[   14.928489]  ret_from_fork_asm+0x1a/0x30
[   14.928519]  </TASK>
[   14.928531] 
[   14.938927] Allocated by task 283:
[   14.939316]  kasan_save_stack+0x45/0x70
[   14.939624]  kasan_save_track+0x18/0x40
[   14.939893]  kasan_save_alloc_info+0x3b/0x50
[   14.940193]  __kasan_kmalloc+0xb7/0xc0
[   14.940570]  __kmalloc_cache_noprof+0x189/0x420
[   14.940880]  kasan_atomics+0x95/0x310
[   14.941165]  kunit_try_run_case+0x1a5/0x480
[   14.941532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.941761]  kthread+0x337/0x6f0
[   14.941932]  ret_from_fork+0x116/0x1d0
[   14.942120]  ret_from_fork_asm+0x1a/0x30
[   14.942310] 
[   14.942713] The buggy address belongs to the object at ffff8881038eb080
[   14.942713]  which belongs to the cache kmalloc-64 of size 64
[   14.943297] The buggy address is located 0 bytes to the right of
[   14.943297]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.944083] 
[   14.944313] The buggy address belongs to the physical page:
[   14.944663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.945109] flags: 0x200000000000000(node=0|zone=2)
[   14.945327] page_type: f5(slab)
[   14.945568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.946148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.946576] page dumped because: kasan: bad access detected
[   14.946909] 
[   14.947128] Memory state around the buggy address:
[   14.947534]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.947852]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.948269] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.948670]                                      ^
[   14.948904]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.949174]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.949708] ==================================================================
[   14.171727] ==================================================================
[   14.172052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.172297] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.172942] 
[   14.173029] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.173072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.173085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.173116] Call Trace:
[   14.173130]  <TASK>
[   14.173145]  dump_stack_lvl+0x73/0xb0
[   14.173172]  print_report+0xd1/0x650
[   14.173195]  ? __virt_addr_valid+0x1db/0x2d0
[   14.173218]  ? kasan_atomics_helper+0x860/0x5450
[   14.173240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.173263]  ? kasan_atomics_helper+0x860/0x5450
[   14.173285]  kasan_report+0x141/0x180
[   14.173308]  ? kasan_atomics_helper+0x860/0x5450
[   14.173335]  kasan_check_range+0x10c/0x1c0
[   14.173359]  __kasan_check_write+0x18/0x20
[   14.173379]  kasan_atomics_helper+0x860/0x5450
[   14.173404]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.173428]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.173453]  ? kasan_atomics+0x152/0x310
[   14.173480]  kasan_atomics+0x1dc/0x310
[   14.173536]  ? __pfx_kasan_atomics+0x10/0x10
[   14.173561]  ? __pfx_read_tsc+0x10/0x10
[   14.173582]  ? ktime_get_ts64+0x86/0x230
[   14.173646]  kunit_try_run_case+0x1a5/0x480
[   14.173749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.173774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.173798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.173821]  ? __kthread_parkme+0x82/0x180
[   14.173842]  ? preempt_count_sub+0x50/0x80
[   14.173866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.173889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.173913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.173966]  kthread+0x337/0x6f0
[   14.173986]  ? trace_preempt_on+0x20/0xc0
[   14.174010]  ? __pfx_kthread+0x10/0x10
[   14.174043]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.174066]  ? calculate_sigpending+0x7b/0xa0
[   14.174091]  ? __pfx_kthread+0x10/0x10
[   14.174122]  ret_from_fork+0x116/0x1d0
[   14.174141]  ? __pfx_kthread+0x10/0x10
[   14.174204]  ret_from_fork_asm+0x1a/0x30
[   14.174269]  </TASK>
[   14.174282] 
[   14.183728] Allocated by task 283:
[   14.183922]  kasan_save_stack+0x45/0x70
[   14.184126]  kasan_save_track+0x18/0x40
[   14.184322]  kasan_save_alloc_info+0x3b/0x50
[   14.185040]  __kasan_kmalloc+0xb7/0xc0
[   14.185423]  __kmalloc_cache_noprof+0x189/0x420
[   14.185663]  kasan_atomics+0x95/0x310
[   14.185801]  kunit_try_run_case+0x1a5/0x480
[   14.185945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.186140]  kthread+0x337/0x6f0
[   14.186635]  ret_from_fork+0x116/0x1d0
[   14.186979]  ret_from_fork_asm+0x1a/0x30
[   14.187136] 
[   14.187217] The buggy address belongs to the object at ffff8881038eb080
[   14.187217]  which belongs to the cache kmalloc-64 of size 64
[   14.187564] The buggy address is located 0 bytes to the right of
[   14.187564]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.188693] 
[   14.188774] The buggy address belongs to the physical page:
[   14.189504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.189838] flags: 0x200000000000000(node=0|zone=2)
[   14.190004] page_type: f5(slab)
[   14.190517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.191088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.191477] page dumped because: kasan: bad access detected
[   14.191655] 
[   14.191728] Memory state around the buggy address:
[   14.191885]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.192191]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.192640] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.192994]                                      ^
[   14.193319]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.193643]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.193856] ==================================================================
[   14.396367] ==================================================================
[   14.396715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.397013] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.397408] 
[   14.397521] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.397562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.397576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.397598] Call Trace:
[   14.397614]  <TASK>
[   14.397629]  dump_stack_lvl+0x73/0xb0
[   14.397656]  print_report+0xd1/0x650
[   14.397679]  ? __virt_addr_valid+0x1db/0x2d0
[   14.397701]  ? kasan_atomics_helper+0xe78/0x5450
[   14.397723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.397746]  ? kasan_atomics_helper+0xe78/0x5450
[   14.397768]  kasan_report+0x141/0x180
[   14.397790]  ? kasan_atomics_helper+0xe78/0x5450
[   14.397818]  kasan_check_range+0x10c/0x1c0
[   14.397843]  __kasan_check_write+0x18/0x20
[   14.397864]  kasan_atomics_helper+0xe78/0x5450
[   14.397887]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.397910]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.397938]  ? kasan_atomics+0x152/0x310
[   14.397965]  kasan_atomics+0x1dc/0x310
[   14.397989]  ? __pfx_kasan_atomics+0x10/0x10
[   14.398013]  ? __pfx_read_tsc+0x10/0x10
[   14.398035]  ? ktime_get_ts64+0x86/0x230
[   14.398059]  kunit_try_run_case+0x1a5/0x480
[   14.398083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.398117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.398203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.398230]  ? __kthread_parkme+0x82/0x180
[   14.398251]  ? preempt_count_sub+0x50/0x80
[   14.398274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.398299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.398322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.398362]  kthread+0x337/0x6f0
[   14.398383]  ? trace_preempt_on+0x20/0xc0
[   14.398407]  ? __pfx_kthread+0x10/0x10
[   14.398428]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.398454]  ? calculate_sigpending+0x7b/0xa0
[   14.398480]  ? __pfx_kthread+0x10/0x10
[   14.398504]  ret_from_fork+0x116/0x1d0
[   14.398524]  ? __pfx_kthread+0x10/0x10
[   14.398545]  ret_from_fork_asm+0x1a/0x30
[   14.398576]  </TASK>
[   14.398590] 
[   14.406645] Allocated by task 283:
[   14.406832]  kasan_save_stack+0x45/0x70
[   14.407039]  kasan_save_track+0x18/0x40
[   14.407464]  kasan_save_alloc_info+0x3b/0x50
[   14.407679]  __kasan_kmalloc+0xb7/0xc0
[   14.407850]  __kmalloc_cache_noprof+0x189/0x420
[   14.408035]  kasan_atomics+0x95/0x310
[   14.408275]  kunit_try_run_case+0x1a5/0x480
[   14.408512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.408757]  kthread+0x337/0x6f0
[   14.408907]  ret_from_fork+0x116/0x1d0
[   14.409119]  ret_from_fork_asm+0x1a/0x30
[   14.409384] 
[   14.409460] The buggy address belongs to the object at ffff8881038eb080
[   14.409460]  which belongs to the cache kmalloc-64 of size 64
[   14.409843] The buggy address is located 0 bytes to the right of
[   14.409843]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.410481] 
[   14.410584] The buggy address belongs to the physical page:
[   14.410801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.411046] flags: 0x200000000000000(node=0|zone=2)
[   14.411384] page_type: f5(slab)
[   14.411556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.411901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.412245] page dumped because: kasan: bad access detected
[   14.412487] 
[   14.412582] Memory state around the buggy address:
[   14.412761]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.413076]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.413599] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.413861]                                      ^
[   14.414021]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.414426]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.414748] ==================================================================
[   15.046974] ==================================================================
[   15.047507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.047854] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.048200] 
[   15.048311] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.049175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.049194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.049217] Call Trace:
[   15.049235]  <TASK>
[   15.049250]  dump_stack_lvl+0x73/0xb0
[   15.049280]  print_report+0xd1/0x650
[   15.049304]  ? __virt_addr_valid+0x1db/0x2d0
[   15.049336]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.049358]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.049382]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.049404]  kasan_report+0x141/0x180
[   15.049427]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.049456]  kasan_check_range+0x10c/0x1c0
[   15.049482]  __kasan_check_write+0x18/0x20
[   15.049503]  kasan_atomics_helper+0x1d7a/0x5450
[   15.049527]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.049550]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.049575]  ? kasan_atomics+0x152/0x310
[   15.049601]  kasan_atomics+0x1dc/0x310
[   15.049624]  ? __pfx_kasan_atomics+0x10/0x10
[   15.049649]  ? __pfx_read_tsc+0x10/0x10
[   15.049673]  ? ktime_get_ts64+0x86/0x230
[   15.049697]  kunit_try_run_case+0x1a5/0x480
[   15.049722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.049766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.049789]  ? __kthread_parkme+0x82/0x180
[   15.049809]  ? preempt_count_sub+0x50/0x80
[   15.049833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.049880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.049903]  kthread+0x337/0x6f0
[   15.049923]  ? trace_preempt_on+0x20/0xc0
[   15.049947]  ? __pfx_kthread+0x10/0x10
[   15.049967]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.049989]  ? calculate_sigpending+0x7b/0xa0
[   15.050012]  ? __pfx_kthread+0x10/0x10
[   15.050033]  ret_from_fork+0x116/0x1d0
[   15.050053]  ? __pfx_kthread+0x10/0x10
[   15.050073]  ret_from_fork_asm+0x1a/0x30
[   15.050114]  </TASK>
[   15.050126] 
[   15.062482] Allocated by task 283:
[   15.062619]  kasan_save_stack+0x45/0x70
[   15.062764]  kasan_save_track+0x18/0x40
[   15.062897]  kasan_save_alloc_info+0x3b/0x50
[   15.063039]  __kasan_kmalloc+0xb7/0xc0
[   15.063381]  __kmalloc_cache_noprof+0x189/0x420
[   15.063538]  kasan_atomics+0x95/0x310
[   15.063668]  kunit_try_run_case+0x1a5/0x480
[   15.063811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.063979]  kthread+0x337/0x6f0
[   15.064107]  ret_from_fork+0x116/0x1d0
[   15.064238]  ret_from_fork_asm+0x1a/0x30
[   15.064560] 
[   15.064737] The buggy address belongs to the object at ffff8881038eb080
[   15.064737]  which belongs to the cache kmalloc-64 of size 64
[   15.065854] The buggy address is located 0 bytes to the right of
[   15.065854]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.066942] 
[   15.067123] The buggy address belongs to the physical page:
[   15.067626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.068298] flags: 0x200000000000000(node=0|zone=2)
[   15.068743] page_type: f5(slab)
[   15.069043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.069632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.069854] page dumped because: kasan: bad access detected
[   15.070019] 
[   15.070088] Memory state around the buggy address:
[   15.070597]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.071232]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.071854] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.072481]                                      ^
[   15.072892]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.073286]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.073781] ==================================================================
[   14.992382] ==================================================================
[   14.992699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.992996] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.993236] 
[   14.993319] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.993359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.993372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.993393] Call Trace:
[   14.993409]  <TASK>
[   14.993423]  dump_stack_lvl+0x73/0xb0
[   14.993449]  print_report+0xd1/0x650
[   14.993488]  ? __virt_addr_valid+0x1db/0x2d0
[   14.993512]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.993534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.993557]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.993580]  kasan_report+0x141/0x180
[   14.993602]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.993630]  kasan_check_range+0x10c/0x1c0
[   14.993653]  __kasan_check_write+0x18/0x20
[   14.993673]  kasan_atomics_helper+0x1c18/0x5450
[   14.993696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.993718]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.993744]  ? kasan_atomics+0x152/0x310
[   14.993770]  kasan_atomics+0x1dc/0x310
[   14.993793]  ? __pfx_kasan_atomics+0x10/0x10
[   14.993817]  ? __pfx_read_tsc+0x10/0x10
[   14.993838]  ? ktime_get_ts64+0x86/0x230
[   14.993863]  kunit_try_run_case+0x1a5/0x480
[   14.993887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.993932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.993956]  ? __kthread_parkme+0x82/0x180
[   14.993977]  ? preempt_count_sub+0x50/0x80
[   14.994001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.994028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.994052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.994076]  kthread+0x337/0x6f0
[   14.994111]  ? trace_preempt_on+0x20/0xc0
[   14.994135]  ? __pfx_kthread+0x10/0x10
[   14.994156]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.994178]  ? calculate_sigpending+0x7b/0xa0
[   14.994202]  ? __pfx_kthread+0x10/0x10
[   14.994224]  ret_from_fork+0x116/0x1d0
[   14.994243]  ? __pfx_kthread+0x10/0x10
[   14.994264]  ret_from_fork_asm+0x1a/0x30
[   14.994296]  </TASK>
[   14.994307] 
[   15.001829] Allocated by task 283:
[   15.002013]  kasan_save_stack+0x45/0x70
[   15.002189]  kasan_save_track+0x18/0x40
[   15.002337]  kasan_save_alloc_info+0x3b/0x50
[   15.002552]  __kasan_kmalloc+0xb7/0xc0
[   15.002739]  __kmalloc_cache_noprof+0x189/0x420
[   15.002914]  kasan_atomics+0x95/0x310
[   15.003050]  kunit_try_run_case+0x1a5/0x480
[   15.003212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.003390]  kthread+0x337/0x6f0
[   15.003511]  ret_from_fork+0x116/0x1d0
[   15.003646]  ret_from_fork_asm+0x1a/0x30
[   15.003847] 
[   15.003944] The buggy address belongs to the object at ffff8881038eb080
[   15.003944]  which belongs to the cache kmalloc-64 of size 64
[   15.004478] The buggy address is located 0 bytes to the right of
[   15.004478]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.005186] 
[   15.005376] The buggy address belongs to the physical page:
[   15.005606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.005919] flags: 0x200000000000000(node=0|zone=2)
[   15.006086] page_type: f5(slab)
[   15.006227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.006829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.007161] page dumped because: kasan: bad access detected
[   15.007406] 
[   15.007481] Memory state around the buggy address:
[   15.007639]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.007859]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.008176] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.008500]                                      ^
[   15.008786]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.009122]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.009543] ==================================================================
[   14.287575] ==================================================================
[   14.287925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.288461] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.288808] 
[   14.288920] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.288991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.289003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.289025] Call Trace:
[   14.289051]  <TASK>
[   14.289068]  dump_stack_lvl+0x73/0xb0
[   14.289105]  print_report+0xd1/0x650
[   14.289147]  ? __virt_addr_valid+0x1db/0x2d0
[   14.289225]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.289259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.289282]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.289304]  kasan_report+0x141/0x180
[   14.289328]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.289354]  kasan_check_range+0x10c/0x1c0
[   14.289378]  __kasan_check_write+0x18/0x20
[   14.289398]  kasan_atomics_helper+0xb6a/0x5450
[   14.289421]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.289443]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.289487]  ? kasan_atomics+0x152/0x310
[   14.289528]  kasan_atomics+0x1dc/0x310
[   14.289564]  ? __pfx_kasan_atomics+0x10/0x10
[   14.289589]  ? __pfx_read_tsc+0x10/0x10
[   14.289623]  ? ktime_get_ts64+0x86/0x230
[   14.289647]  kunit_try_run_case+0x1a5/0x480
[   14.289684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.289721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.289752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.289776]  ? __kthread_parkme+0x82/0x180
[   14.289797]  ? preempt_count_sub+0x50/0x80
[   14.289831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.289856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.289882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.289905]  kthread+0x337/0x6f0
[   14.289925]  ? trace_preempt_on+0x20/0xc0
[   14.289948]  ? __pfx_kthread+0x10/0x10
[   14.289969]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.289991]  ? calculate_sigpending+0x7b/0xa0
[   14.290015]  ? __pfx_kthread+0x10/0x10
[   14.290037]  ret_from_fork+0x116/0x1d0
[   14.290056]  ? __pfx_kthread+0x10/0x10
[   14.290078]  ret_from_fork_asm+0x1a/0x30
[   14.290118]  </TASK>
[   14.290129] 
[   14.299849] Allocated by task 283:
[   14.300041]  kasan_save_stack+0x45/0x70
[   14.300406]  kasan_save_track+0x18/0x40
[   14.300645]  kasan_save_alloc_info+0x3b/0x50
[   14.300863]  __kasan_kmalloc+0xb7/0xc0
[   14.301076]  __kmalloc_cache_noprof+0x189/0x420
[   14.301347]  kasan_atomics+0x95/0x310
[   14.301597]  kunit_try_run_case+0x1a5/0x480
[   14.301785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.302002]  kthread+0x337/0x6f0
[   14.302339]  ret_from_fork+0x116/0x1d0
[   14.302590]  ret_from_fork_asm+0x1a/0x30
[   14.302805] 
[   14.302923] The buggy address belongs to the object at ffff8881038eb080
[   14.302923]  which belongs to the cache kmalloc-64 of size 64
[   14.303609] The buggy address is located 0 bytes to the right of
[   14.303609]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.304312] 
[   14.304464] The buggy address belongs to the physical page:
[   14.304744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.305086] flags: 0x200000000000000(node=0|zone=2)
[   14.305273] page_type: f5(slab)
[   14.305397] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.305894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.306249] page dumped because: kasan: bad access detected
[   14.306509] 
[   14.306606] Memory state around the buggy address:
[   14.307184]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.307595]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.307873] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.308340]                                      ^
[   14.308566]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.308955]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.309532] ==================================================================
[   15.230432] ==================================================================
[   15.230681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.230926] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.232717] 
[   15.233240] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.233297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.233577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.233609] Call Trace:
[   15.233630]  <TASK>
[   15.233650]  dump_stack_lvl+0x73/0xb0
[   15.233681]  print_report+0xd1/0x650
[   15.233707]  ? __virt_addr_valid+0x1db/0x2d0
[   15.233740]  ? kasan_atomics_helper+0x218a/0x5450
[   15.233762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.233785]  ? kasan_atomics_helper+0x218a/0x5450
[   15.233807]  kasan_report+0x141/0x180
[   15.233829]  ? kasan_atomics_helper+0x218a/0x5450
[   15.233856]  kasan_check_range+0x10c/0x1c0
[   15.233881]  __kasan_check_write+0x18/0x20
[   15.233901]  kasan_atomics_helper+0x218a/0x5450
[   15.233924]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.233947]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.233972]  ? kasan_atomics+0x152/0x310
[   15.233998]  kasan_atomics+0x1dc/0x310
[   15.234023]  ? __pfx_kasan_atomics+0x10/0x10
[   15.234047]  ? __pfx_read_tsc+0x10/0x10
[   15.234070]  ? ktime_get_ts64+0x86/0x230
[   15.234105]  kunit_try_run_case+0x1a5/0x480
[   15.234130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.234175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.234199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.234223]  ? __kthread_parkme+0x82/0x180
[   15.234245]  ? preempt_count_sub+0x50/0x80
[   15.234269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.234293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.234333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.234357]  kthread+0x337/0x6f0
[   15.234377]  ? trace_preempt_on+0x20/0xc0
[   15.234401]  ? __pfx_kthread+0x10/0x10
[   15.234422]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.234444]  ? calculate_sigpending+0x7b/0xa0
[   15.234469]  ? __pfx_kthread+0x10/0x10
[   15.234491]  ret_from_fork+0x116/0x1d0
[   15.234510]  ? __pfx_kthread+0x10/0x10
[   15.234532]  ret_from_fork_asm+0x1a/0x30
[   15.234563]  </TASK>
[   15.234576] 
[   15.245466] Allocated by task 283:
[   15.245837]  kasan_save_stack+0x45/0x70
[   15.246069]  kasan_save_track+0x18/0x40
[   15.246430]  kasan_save_alloc_info+0x3b/0x50
[   15.246784]  __kasan_kmalloc+0xb7/0xc0
[   15.246954]  __kmalloc_cache_noprof+0x189/0x420
[   15.247192]  kasan_atomics+0x95/0x310
[   15.247644]  kunit_try_run_case+0x1a5/0x480
[   15.247849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.248154]  kthread+0x337/0x6f0
[   15.248507]  ret_from_fork+0x116/0x1d0
[   15.248684]  ret_from_fork_asm+0x1a/0x30
[   15.248960] 
[   15.249063] The buggy address belongs to the object at ffff8881038eb080
[   15.249063]  which belongs to the cache kmalloc-64 of size 64
[   15.249846] The buggy address is located 0 bytes to the right of
[   15.249846]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.250561] 
[   15.250710] The buggy address belongs to the physical page:
[   15.250987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.251283] flags: 0x200000000000000(node=0|zone=2)
[   15.251541] page_type: f5(slab)
[   15.251729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.252023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.252422] page dumped because: kasan: bad access detected
[   15.252667] 
[   15.252769] Memory state around the buggy address:
[   15.252938]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253293]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.253624] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.253918]                                      ^
[   15.254118]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.254464]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.254738] ==================================================================
[   13.874033] ==================================================================
[   13.874752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.875075] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   13.875425] 
[   13.875546] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.875591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.875603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.875623] Call Trace:
[   13.875635]  <TASK>
[   13.875652]  dump_stack_lvl+0x73/0xb0
[   13.875678]  print_report+0xd1/0x650
[   13.875700]  ? __virt_addr_valid+0x1db/0x2d0
[   13.875722]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.875742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.875764]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.875786]  kasan_report+0x141/0x180
[   13.875807]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.875833]  __asan_report_load4_noabort+0x18/0x20
[   13.875856]  kasan_atomics_helper+0x4bbc/0x5450
[   13.875879]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.875901]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.875924]  ? kasan_atomics+0x152/0x310
[   13.875950]  kasan_atomics+0x1dc/0x310
[   13.875973]  ? __pfx_kasan_atomics+0x10/0x10
[   13.875997]  ? __pfx_read_tsc+0x10/0x10
[   13.876017]  ? ktime_get_ts64+0x86/0x230
[   13.876040]  kunit_try_run_case+0x1a5/0x480
[   13.876063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.876083]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.876119]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.876142]  ? __kthread_parkme+0x82/0x180
[   13.876175]  ? preempt_count_sub+0x50/0x80
[   13.876198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.876222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.876244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.876267]  kthread+0x337/0x6f0
[   13.876286]  ? trace_preempt_on+0x20/0xc0
[   13.876309]  ? __pfx_kthread+0x10/0x10
[   13.876368]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.876391]  ? calculate_sigpending+0x7b/0xa0
[   13.876414]  ? __pfx_kthread+0x10/0x10
[   13.876434]  ret_from_fork+0x116/0x1d0
[   13.876452]  ? __pfx_kthread+0x10/0x10
[   13.876481]  ret_from_fork_asm+0x1a/0x30
[   13.876511]  </TASK>
[   13.876522] 
[   13.890053] Allocated by task 283:
[   13.890495]  kasan_save_stack+0x45/0x70
[   13.890843]  kasan_save_track+0x18/0x40
[   13.890981]  kasan_save_alloc_info+0x3b/0x50
[   13.891146]  __kasan_kmalloc+0xb7/0xc0
[   13.891582]  __kmalloc_cache_noprof+0x189/0x420
[   13.893302]  kasan_atomics+0x95/0x310
[   13.894265]  kunit_try_run_case+0x1a5/0x480
[   13.895320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.895514]  kthread+0x337/0x6f0
[   13.895638]  ret_from_fork+0x116/0x1d0
[   13.895772]  ret_from_fork_asm+0x1a/0x30
[   13.895914] 
[   13.895987] The buggy address belongs to the object at ffff8881038eb080
[   13.895987]  which belongs to the cache kmalloc-64 of size 64
[   13.896939] The buggy address is located 0 bytes to the right of
[   13.896939]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   13.898740] 
[   13.899682] The buggy address belongs to the physical page:
[   13.899874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   13.900141] flags: 0x200000000000000(node=0|zone=2)
[   13.901296] page_type: f5(slab)
[   13.901506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.901863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.902223] page dumped because: kasan: bad access detected
[   13.902480] 
[   13.902573] Memory state around the buggy address:
[   13.902803]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.903035]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.904606] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.905205]                                      ^
[   13.905388]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.906156]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.906599] ==================================================================
[   14.548680] ==================================================================
[   14.549017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.549567] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.550139] 
[   14.550364] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.550432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.550447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.550471] Call Trace:
[   14.550487]  <TASK>
[   14.550503]  dump_stack_lvl+0x73/0xb0
[   14.550533]  print_report+0xd1/0x650
[   14.550557]  ? __virt_addr_valid+0x1db/0x2d0
[   14.550580]  ? kasan_atomics_helper+0x1148/0x5450
[   14.550602]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.550625]  ? kasan_atomics_helper+0x1148/0x5450
[   14.550647]  kasan_report+0x141/0x180
[   14.550671]  ? kasan_atomics_helper+0x1148/0x5450
[   14.550699]  kasan_check_range+0x10c/0x1c0
[   14.550724]  __kasan_check_write+0x18/0x20
[   14.550745]  kasan_atomics_helper+0x1148/0x5450
[   14.550769]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.550791]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.550816]  ? kasan_atomics+0x152/0x310
[   14.550842]  kasan_atomics+0x1dc/0x310
[   14.550866]  ? __pfx_kasan_atomics+0x10/0x10
[   14.550890]  ? __pfx_read_tsc+0x10/0x10
[   14.550911]  ? ktime_get_ts64+0x86/0x230
[   14.550935]  kunit_try_run_case+0x1a5/0x480
[   14.550959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.550983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.551005]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.551029]  ? __kthread_parkme+0x82/0x180
[   14.551050]  ? preempt_count_sub+0x50/0x80
[   14.551072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.551115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.551140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.551165]  kthread+0x337/0x6f0
[   14.551185]  ? trace_preempt_on+0x20/0xc0
[   14.551212]  ? __pfx_kthread+0x10/0x10
[   14.551234]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.551257]  ? calculate_sigpending+0x7b/0xa0
[   14.551280]  ? __pfx_kthread+0x10/0x10
[   14.551302]  ret_from_fork+0x116/0x1d0
[   14.551322]  ? __pfx_kthread+0x10/0x10
[   14.551355]  ret_from_fork_asm+0x1a/0x30
[   14.551387]  </TASK>
[   14.551399] 
[   14.559315] Allocated by task 283:
[   14.559507]  kasan_save_stack+0x45/0x70
[   14.559730]  kasan_save_track+0x18/0x40
[   14.559908]  kasan_save_alloc_info+0x3b/0x50
[   14.560128]  __kasan_kmalloc+0xb7/0xc0
[   14.560316]  __kmalloc_cache_noprof+0x189/0x420
[   14.560523]  kasan_atomics+0x95/0x310
[   14.560712]  kunit_try_run_case+0x1a5/0x480
[   14.560914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.561168]  kthread+0x337/0x6f0
[   14.561337]  ret_from_fork+0x116/0x1d0
[   14.561531]  ret_from_fork_asm+0x1a/0x30
[   14.561699] 
[   14.561817] The buggy address belongs to the object at ffff8881038eb080
[   14.561817]  which belongs to the cache kmalloc-64 of size 64
[   14.562301] The buggy address is located 0 bytes to the right of
[   14.562301]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.562842] 
[   14.562933] The buggy address belongs to the physical page:
[   14.563214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.563725] flags: 0x200000000000000(node=0|zone=2)
[   14.563928] page_type: f5(slab)
[   14.564052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.564291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.565033] page dumped because: kasan: bad access detected
[   14.565238] 
[   14.565310] Memory state around the buggy address:
[   14.565469]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.565698]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.566089] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.566669]                                      ^
[   14.566959]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.567336]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.567646] ==================================================================
[   14.803322] ==================================================================
[   14.803643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.803961] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.804528] 
[   14.804872] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.804920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.804934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.804957] Call Trace:
[   14.804973]  <TASK>
[   14.804989]  dump_stack_lvl+0x73/0xb0
[   14.805016]  print_report+0xd1/0x650
[   14.805041]  ? __virt_addr_valid+0x1db/0x2d0
[   14.805065]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.805087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.805122]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.805146]  kasan_report+0x141/0x180
[   14.805168]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.805194]  kasan_check_range+0x10c/0x1c0
[   14.805244]  __kasan_check_write+0x18/0x20
[   14.805265]  kasan_atomics_helper+0x16e7/0x5450
[   14.805288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.805311]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.805337]  ? kasan_atomics+0x152/0x310
[   14.805364]  kasan_atomics+0x1dc/0x310
[   14.805404]  ? __pfx_kasan_atomics+0x10/0x10
[   14.805429]  ? __pfx_read_tsc+0x10/0x10
[   14.805451]  ? ktime_get_ts64+0x86/0x230
[   14.805492]  kunit_try_run_case+0x1a5/0x480
[   14.805530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.805553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.805590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.805615]  ? __kthread_parkme+0x82/0x180
[   14.805676]  ? preempt_count_sub+0x50/0x80
[   14.805700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.805724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.805747]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.805771]  kthread+0x337/0x6f0
[   14.805792]  ? trace_preempt_on+0x20/0xc0
[   14.805816]  ? __pfx_kthread+0x10/0x10
[   14.805837]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.805859]  ? calculate_sigpending+0x7b/0xa0
[   14.805882]  ? __pfx_kthread+0x10/0x10
[   14.805904]  ret_from_fork+0x116/0x1d0
[   14.805924]  ? __pfx_kthread+0x10/0x10
[   14.805945]  ret_from_fork_asm+0x1a/0x30
[   14.805977]  </TASK>
[   14.805990] 
[   14.815964] Allocated by task 283:
[   14.816177]  kasan_save_stack+0x45/0x70
[   14.816435]  kasan_save_track+0x18/0x40
[   14.816814]  kasan_save_alloc_info+0x3b/0x50
[   14.817090]  __kasan_kmalloc+0xb7/0xc0
[   14.817393]  __kmalloc_cache_noprof+0x189/0x420
[   14.817626]  kasan_atomics+0x95/0x310
[   14.817919]  kunit_try_run_case+0x1a5/0x480
[   14.818164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.818536]  kthread+0x337/0x6f0
[   14.818820]  ret_from_fork+0x116/0x1d0
[   14.819032]  ret_from_fork_asm+0x1a/0x30
[   14.819244] 
[   14.819440] The buggy address belongs to the object at ffff8881038eb080
[   14.819440]  which belongs to the cache kmalloc-64 of size 64
[   14.820063] The buggy address is located 0 bytes to the right of
[   14.820063]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.820851] 
[   14.820935] The buggy address belongs to the physical page:
[   14.821418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.821770] flags: 0x200000000000000(node=0|zone=2)
[   14.822093] page_type: f5(slab)
[   14.822272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.822686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.823146] page dumped because: kasan: bad access detected
[   14.823530] 
[   14.823653] Memory state around the buggy address:
[   14.823995]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824366]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.824671] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.824970]                                      ^
[   14.825198]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825779]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.826153] ==================================================================
[   14.217120] ==================================================================
[   14.217698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.217997] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.218237] 
[   14.218589] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.218651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.218665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.218688] Call Trace:
[   14.218715]  <TASK>
[   14.218731]  dump_stack_lvl+0x73/0xb0
[   14.218796]  print_report+0xd1/0x650
[   14.218848]  ? __virt_addr_valid+0x1db/0x2d0
[   14.218897]  ? kasan_atomics_helper+0x992/0x5450
[   14.218919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.218942]  ? kasan_atomics_helper+0x992/0x5450
[   14.218974]  kasan_report+0x141/0x180
[   14.218997]  ? kasan_atomics_helper+0x992/0x5450
[   14.219025]  kasan_check_range+0x10c/0x1c0
[   14.219049]  __kasan_check_write+0x18/0x20
[   14.219070]  kasan_atomics_helper+0x992/0x5450
[   14.219092]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.219123]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.219149]  ? kasan_atomics+0x152/0x310
[   14.219226]  kasan_atomics+0x1dc/0x310
[   14.219250]  ? __pfx_kasan_atomics+0x10/0x10
[   14.219322]  ? __pfx_read_tsc+0x10/0x10
[   14.219345]  ? ktime_get_ts64+0x86/0x230
[   14.219399]  kunit_try_run_case+0x1a5/0x480
[   14.219424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.219448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.219482]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.219506]  ? __kthread_parkme+0x82/0x180
[   14.219527]  ? preempt_count_sub+0x50/0x80
[   14.219551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.219575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.219599]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.219623]  kthread+0x337/0x6f0
[   14.219643]  ? trace_preempt_on+0x20/0xc0
[   14.219667]  ? __pfx_kthread+0x10/0x10
[   14.219688]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.219710]  ? calculate_sigpending+0x7b/0xa0
[   14.219734]  ? __pfx_kthread+0x10/0x10
[   14.219756]  ret_from_fork+0x116/0x1d0
[   14.219777]  ? __pfx_kthread+0x10/0x10
[   14.219798]  ret_from_fork_asm+0x1a/0x30
[   14.219829]  </TASK>
[   14.219841] 
[   14.229634] Allocated by task 283:
[   14.229896]  kasan_save_stack+0x45/0x70
[   14.230091]  kasan_save_track+0x18/0x40
[   14.230423]  kasan_save_alloc_info+0x3b/0x50
[   14.230725]  __kasan_kmalloc+0xb7/0xc0
[   14.230932]  __kmalloc_cache_noprof+0x189/0x420
[   14.231209]  kasan_atomics+0x95/0x310
[   14.231460]  kunit_try_run_case+0x1a5/0x480
[   14.231656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.231963]  kthread+0x337/0x6f0
[   14.232362]  ret_from_fork+0x116/0x1d0
[   14.232549]  ret_from_fork_asm+0x1a/0x30
[   14.232695] 
[   14.232769] The buggy address belongs to the object at ffff8881038eb080
[   14.232769]  which belongs to the cache kmalloc-64 of size 64
[   14.233569] The buggy address is located 0 bytes to the right of
[   14.233569]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.234073] 
[   14.234207] The buggy address belongs to the physical page:
[   14.234503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.234963] flags: 0x200000000000000(node=0|zone=2)
[   14.235354] page_type: f5(slab)
[   14.235551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.235843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.236233] page dumped because: kasan: bad access detected
[   14.236705] 
[   14.236827] Memory state around the buggy address:
[   14.237073]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.237588]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.237870] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.238501]                                      ^
[   14.238768]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.239139]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.239529] ==================================================================
[   14.680434] ==================================================================
[   14.680776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.681131] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.681515] 
[   14.681624] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.681666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.681679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.681699] Call Trace:
[   14.681713]  <TASK>
[   14.681727]  dump_stack_lvl+0x73/0xb0
[   14.681752]  print_report+0xd1/0x650
[   14.681775]  ? __virt_addr_valid+0x1db/0x2d0
[   14.681797]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.681818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.681841]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.681863]  kasan_report+0x141/0x180
[   14.681886]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.681912]  __asan_report_load8_noabort+0x18/0x20
[   14.681937]  kasan_atomics_helper+0x4eae/0x5450
[   14.681960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.681982]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.682007]  ? kasan_atomics+0x152/0x310
[   14.682033]  kasan_atomics+0x1dc/0x310
[   14.682056]  ? __pfx_kasan_atomics+0x10/0x10
[   14.682081]  ? __pfx_read_tsc+0x10/0x10
[   14.682115]  ? ktime_get_ts64+0x86/0x230
[   14.682139]  kunit_try_run_case+0x1a5/0x480
[   14.682163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.682186]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.682210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.682233]  ? __kthread_parkme+0x82/0x180
[   14.682254]  ? preempt_count_sub+0x50/0x80
[   14.682278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.682302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.682338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.682362]  kthread+0x337/0x6f0
[   14.682382]  ? trace_preempt_on+0x20/0xc0
[   14.682405]  ? __pfx_kthread+0x10/0x10
[   14.682426]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.682448]  ? calculate_sigpending+0x7b/0xa0
[   14.682472]  ? __pfx_kthread+0x10/0x10
[   14.682494]  ret_from_fork+0x116/0x1d0
[   14.682513]  ? __pfx_kthread+0x10/0x10
[   14.682534]  ret_from_fork_asm+0x1a/0x30
[   14.682565]  </TASK>
[   14.682577] 
[   14.689977] Allocated by task 283:
[   14.690170]  kasan_save_stack+0x45/0x70
[   14.690350]  kasan_save_track+0x18/0x40
[   14.690539]  kasan_save_alloc_info+0x3b/0x50
[   14.690749]  __kasan_kmalloc+0xb7/0xc0
[   14.690901]  __kmalloc_cache_noprof+0x189/0x420
[   14.691107]  kasan_atomics+0x95/0x310
[   14.691304]  kunit_try_run_case+0x1a5/0x480
[   14.691488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.691748]  kthread+0x337/0x6f0
[   14.691873]  ret_from_fork+0x116/0x1d0
[   14.692007]  ret_from_fork_asm+0x1a/0x30
[   14.692158] 
[   14.692231] The buggy address belongs to the object at ffff8881038eb080
[   14.692231]  which belongs to the cache kmalloc-64 of size 64
[   14.692589] The buggy address is located 0 bytes to the right of
[   14.692589]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.693129] 
[   14.693242] The buggy address belongs to the physical page:
[   14.693672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.694027] flags: 0x200000000000000(node=0|zone=2)
[   14.694273] page_type: f5(slab)
[   14.694440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.694774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.695003] page dumped because: kasan: bad access detected
[   14.695184] 
[   14.695261] Memory state around the buggy address:
[   14.695418]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.695753]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.696073] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.696491]                                      ^
[   14.696723]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.697053]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.697337] ==================================================================
[   14.850888] ==================================================================
[   14.851414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.851724] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.852074] 
[   14.852199] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.852241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.852254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.852275] Call Trace:
[   14.852289]  <TASK>
[   14.852303]  dump_stack_lvl+0x73/0xb0
[   14.852575]  print_report+0xd1/0x650
[   14.852827]  ? __virt_addr_valid+0x1db/0x2d0
[   14.852853]  ? kasan_atomics_helper+0x1818/0x5450
[   14.852876]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.852900]  ? kasan_atomics_helper+0x1818/0x5450
[   14.852922]  kasan_report+0x141/0x180
[   14.852945]  ? kasan_atomics_helper+0x1818/0x5450
[   14.852971]  kasan_check_range+0x10c/0x1c0
[   14.852995]  __kasan_check_write+0x18/0x20
[   14.853015]  kasan_atomics_helper+0x1818/0x5450
[   14.853038]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.853060]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.853085]  ? kasan_atomics+0x152/0x310
[   14.853123]  kasan_atomics+0x1dc/0x310
[   14.853146]  ? __pfx_kasan_atomics+0x10/0x10
[   14.853170]  ? __pfx_read_tsc+0x10/0x10
[   14.853191]  ? ktime_get_ts64+0x86/0x230
[   14.853216]  kunit_try_run_case+0x1a5/0x480
[   14.853240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.853262]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.853286]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.853309]  ? __kthread_parkme+0x82/0x180
[   14.853337]  ? preempt_count_sub+0x50/0x80
[   14.853363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.853386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.853409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.853433]  kthread+0x337/0x6f0
[   14.853452]  ? trace_preempt_on+0x20/0xc0
[   14.853476]  ? __pfx_kthread+0x10/0x10
[   14.853497]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.853519]  ? calculate_sigpending+0x7b/0xa0
[   14.853543]  ? __pfx_kthread+0x10/0x10
[   14.853565]  ret_from_fork+0x116/0x1d0
[   14.853584]  ? __pfx_kthread+0x10/0x10
[   14.853604]  ret_from_fork_asm+0x1a/0x30
[   14.853635]  </TASK>
[   14.853648] 
[   14.864307] Allocated by task 283:
[   14.864511]  kasan_save_stack+0x45/0x70
[   14.864710]  kasan_save_track+0x18/0x40
[   14.865036]  kasan_save_alloc_info+0x3b/0x50
[   14.865337]  __kasan_kmalloc+0xb7/0xc0
[   14.865636]  __kmalloc_cache_noprof+0x189/0x420
[   14.865914]  kasan_atomics+0x95/0x310
[   14.866152]  kunit_try_run_case+0x1a5/0x480
[   14.866582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.866832]  kthread+0x337/0x6f0
[   14.867076]  ret_from_fork+0x116/0x1d0
[   14.867272]  ret_from_fork_asm+0x1a/0x30
[   14.867480] 
[   14.867736] The buggy address belongs to the object at ffff8881038eb080
[   14.867736]  which belongs to the cache kmalloc-64 of size 64
[   14.868470] The buggy address is located 0 bytes to the right of
[   14.868470]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.869137] 
[   14.869402] The buggy address belongs to the physical page:
[   14.869640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.870123] flags: 0x200000000000000(node=0|zone=2)
[   14.870515] page_type: f5(slab)
[   14.870840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.871179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.871578] page dumped because: kasan: bad access detected
[   14.871823] 
[   14.871923] Memory state around the buggy address:
[   14.872148]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.872707]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.872991] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.873411]                                      ^
[   14.873729]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.874126]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.874558] ==================================================================
[   15.207694] ==================================================================
[   15.208039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.208724] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.209011] 
[   15.209108] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.209154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.209167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.209188] Call Trace:
[   15.209203]  <TASK>
[   15.209221]  dump_stack_lvl+0x73/0xb0
[   15.209246]  print_report+0xd1/0x650
[   15.209270]  ? __virt_addr_valid+0x1db/0x2d0
[   15.209293]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.209316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.209350]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.209373]  kasan_report+0x141/0x180
[   15.209396]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.209422]  __asan_report_load8_noabort+0x18/0x20
[   15.209447]  kasan_atomics_helper+0x4fb2/0x5450
[   15.209471]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.209494]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.209519]  ? kasan_atomics+0x152/0x310
[   15.209545]  kasan_atomics+0x1dc/0x310
[   15.209568]  ? __pfx_kasan_atomics+0x10/0x10
[   15.209592]  ? __pfx_read_tsc+0x10/0x10
[   15.209613]  ? ktime_get_ts64+0x86/0x230
[   15.209637]  kunit_try_run_case+0x1a5/0x480
[   15.209661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.209684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.209707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.209730]  ? __kthread_parkme+0x82/0x180
[   15.209751]  ? preempt_count_sub+0x50/0x80
[   15.209776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.209802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.209826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.209850]  kthread+0x337/0x6f0
[   15.209870]  ? trace_preempt_on+0x20/0xc0
[   15.209894]  ? __pfx_kthread+0x10/0x10
[   15.209915]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.209937]  ? calculate_sigpending+0x7b/0xa0
[   15.209960]  ? __pfx_kthread+0x10/0x10
[   15.209982]  ret_from_fork+0x116/0x1d0
[   15.210001]  ? __pfx_kthread+0x10/0x10
[   15.210022]  ret_from_fork_asm+0x1a/0x30
[   15.210053]  </TASK>
[   15.210066] 
[   15.217524] Allocated by task 283:
[   15.217703]  kasan_save_stack+0x45/0x70
[   15.217846]  kasan_save_track+0x18/0x40
[   15.217982]  kasan_save_alloc_info+0x3b/0x50
[   15.218141]  __kasan_kmalloc+0xb7/0xc0
[   15.218336]  __kmalloc_cache_noprof+0x189/0x420
[   15.218564]  kasan_atomics+0x95/0x310
[   15.218753]  kunit_try_run_case+0x1a5/0x480
[   15.218963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.219210]  kthread+0x337/0x6f0
[   15.219401]  ret_from_fork+0x116/0x1d0
[   15.219536]  ret_from_fork_asm+0x1a/0x30
[   15.219731] 
[   15.219824] The buggy address belongs to the object at ffff8881038eb080
[   15.219824]  which belongs to the cache kmalloc-64 of size 64
[   15.220278] The buggy address is located 0 bytes to the right of
[   15.220278]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.220772] 
[   15.220859] The buggy address belongs to the physical page:
[   15.221074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.221441] flags: 0x200000000000000(node=0|zone=2)
[   15.221629] page_type: f5(slab)
[   15.221751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.221988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.222288] page dumped because: kasan: bad access detected
[   15.222486] 
[   15.222557] Memory state around the buggy address:
[   15.222714]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.226129]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.227815] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.228156]                                      ^
[   15.228327]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.229505]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.229746] ==================================================================
[   13.979510] ==================================================================
[   13.980080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.980588] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   13.980909] 
[   13.981022] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.981065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.981080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.981121] Call Trace:
[   13.981138]  <TASK>
[   13.981179]  dump_stack_lvl+0x73/0xb0
[   13.981207]  print_report+0xd1/0x650
[   13.981230]  ? __virt_addr_valid+0x1db/0x2d0
[   13.981254]  ? kasan_atomics_helper+0x3df/0x5450
[   13.981275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.981298]  ? kasan_atomics_helper+0x3df/0x5450
[   13.981320]  kasan_report+0x141/0x180
[   13.981343]  ? kasan_atomics_helper+0x3df/0x5450
[   13.981369]  kasan_check_range+0x10c/0x1c0
[   13.981393]  __kasan_check_read+0x15/0x20
[   13.981414]  kasan_atomics_helper+0x3df/0x5450
[   13.981438]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.981461]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.981535]  ? kasan_atomics+0x152/0x310
[   13.981574]  kasan_atomics+0x1dc/0x310
[   13.981598]  ? __pfx_kasan_atomics+0x10/0x10
[   13.981623]  ? __pfx_read_tsc+0x10/0x10
[   13.981645]  ? ktime_get_ts64+0x86/0x230
[   13.981669]  kunit_try_run_case+0x1a5/0x480
[   13.981703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.981727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.981750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.981775]  ? __kthread_parkme+0x82/0x180
[   13.981796]  ? preempt_count_sub+0x50/0x80
[   13.981820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.981844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.981868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.981901]  kthread+0x337/0x6f0
[   13.981922]  ? trace_preempt_on+0x20/0xc0
[   13.981957]  ? __pfx_kthread+0x10/0x10
[   13.981979]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.982001]  ? calculate_sigpending+0x7b/0xa0
[   13.982025]  ? __pfx_kthread+0x10/0x10
[   13.982047]  ret_from_fork+0x116/0x1d0
[   13.982066]  ? __pfx_kthread+0x10/0x10
[   13.982087]  ret_from_fork_asm+0x1a/0x30
[   13.982128]  </TASK>
[   13.982141] 
[   13.990835] Allocated by task 283:
[   13.991017]  kasan_save_stack+0x45/0x70
[   13.991324]  kasan_save_track+0x18/0x40
[   13.991475]  kasan_save_alloc_info+0x3b/0x50
[   13.991630]  __kasan_kmalloc+0xb7/0xc0
[   13.991889]  __kmalloc_cache_noprof+0x189/0x420
[   13.992122]  kasan_atomics+0x95/0x310
[   13.992260]  kunit_try_run_case+0x1a5/0x480
[   13.992602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.992932]  kthread+0x337/0x6f0
[   13.993134]  ret_from_fork+0x116/0x1d0
[   13.993381]  ret_from_fork_asm+0x1a/0x30
[   13.993602] 
[   13.993714] The buggy address belongs to the object at ffff8881038eb080
[   13.993714]  which belongs to the cache kmalloc-64 of size 64
[   13.994247] The buggy address is located 0 bytes to the right of
[   13.994247]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   13.994808] 
[   13.994888] The buggy address belongs to the physical page:
[   13.995106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   13.995648] flags: 0x200000000000000(node=0|zone=2)
[   13.995919] page_type: f5(slab)
[   13.996092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.996559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.996844] page dumped because: kasan: bad access detected
[   13.997023] 
[   13.997107] Memory state around the buggy address:
[   13.997268]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.997606]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.997935] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.998258]                                      ^
[   13.998573]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.998816]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.999033] ==================================================================
[   14.875567] ==================================================================
[   14.875865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.876348] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.876895] 
[   14.877142] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.877191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.877204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.877341] Call Trace:
[   14.877362]  <TASK>
[   14.877379]  dump_stack_lvl+0x73/0xb0
[   14.877407]  print_report+0xd1/0x650
[   14.877430]  ? __virt_addr_valid+0x1db/0x2d0
[   14.877453]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.877476]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.877499]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.877521]  kasan_report+0x141/0x180
[   14.877545]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.877573]  kasan_check_range+0x10c/0x1c0
[   14.877597]  __kasan_check_write+0x18/0x20
[   14.877617]  kasan_atomics_helper+0x18b1/0x5450
[   14.877640]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.877662]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.877687]  ? kasan_atomics+0x152/0x310
[   14.877713]  kasan_atomics+0x1dc/0x310
[   14.877737]  ? __pfx_kasan_atomics+0x10/0x10
[   14.877762]  ? __pfx_read_tsc+0x10/0x10
[   14.877782]  ? ktime_get_ts64+0x86/0x230
[   14.877806]  kunit_try_run_case+0x1a5/0x480
[   14.877829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.877851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.877874]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.877896]  ? __kthread_parkme+0x82/0x180
[   14.877917]  ? preempt_count_sub+0x50/0x80
[   14.877939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.877963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.877987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.878010]  kthread+0x337/0x6f0
[   14.878029]  ? trace_preempt_on+0x20/0xc0
[   14.878052]  ? __pfx_kthread+0x10/0x10
[   14.878073]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.878107]  ? calculate_sigpending+0x7b/0xa0
[   14.878131]  ? __pfx_kthread+0x10/0x10
[   14.878154]  ret_from_fork+0x116/0x1d0
[   14.878173]  ? __pfx_kthread+0x10/0x10
[   14.878194]  ret_from_fork_asm+0x1a/0x30
[   14.878225]  </TASK>
[   14.878237] 
[   14.888657] Allocated by task 283:
[   14.888859]  kasan_save_stack+0x45/0x70
[   14.889143]  kasan_save_track+0x18/0x40
[   14.889448]  kasan_save_alloc_info+0x3b/0x50
[   14.889746]  __kasan_kmalloc+0xb7/0xc0
[   14.890005]  __kmalloc_cache_noprof+0x189/0x420
[   14.890337]  kasan_atomics+0x95/0x310
[   14.890625]  kunit_try_run_case+0x1a5/0x480
[   14.890920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.891284]  kthread+0x337/0x6f0
[   14.891568]  ret_from_fork+0x116/0x1d0
[   14.891767]  ret_from_fork_asm+0x1a/0x30
[   14.891979] 
[   14.892075] The buggy address belongs to the object at ffff8881038eb080
[   14.892075]  which belongs to the cache kmalloc-64 of size 64
[   14.892983] The buggy address is located 0 bytes to the right of
[   14.892983]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.893662] 
[   14.893771] The buggy address belongs to the physical page:
[   14.894175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.894649] flags: 0x200000000000000(node=0|zone=2)
[   14.894965] page_type: f5(slab)
[   14.895230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.895684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.896134] page dumped because: kasan: bad access detected
[   14.896522] 
[   14.896604] Memory state around the buggy address:
[   14.896946]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.897376]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.897785] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.898194]                                      ^
[   14.898599]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.898997]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.899550] ==================================================================
[   15.255307] ==================================================================
[   15.255749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.256134] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.256458] 
[   15.256627] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.256668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.256681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.256702] Call Trace:
[   15.256717]  <TASK>
[   15.256731]  dump_stack_lvl+0x73/0xb0
[   15.256757]  print_report+0xd1/0x650
[   15.256780]  ? __virt_addr_valid+0x1db/0x2d0
[   15.256802]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.256824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.256866]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.256902]  kasan_report+0x141/0x180
[   15.256925]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.256953]  __asan_report_load8_noabort+0x18/0x20
[   15.256978]  kasan_atomics_helper+0x4fa5/0x5450
[   15.257001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.257023]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.257048]  ? kasan_atomics+0x152/0x310
[   15.257074]  kasan_atomics+0x1dc/0x310
[   15.257108]  ? __pfx_kasan_atomics+0x10/0x10
[   15.257133]  ? __pfx_read_tsc+0x10/0x10
[   15.257156]  ? ktime_get_ts64+0x86/0x230
[   15.257179]  kunit_try_run_case+0x1a5/0x480
[   15.257203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257244]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.257268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.257306]  ? __kthread_parkme+0x82/0x180
[   15.257337]  ? preempt_count_sub+0x50/0x80
[   15.257362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.257410]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.257433]  kthread+0x337/0x6f0
[   15.257453]  ? trace_preempt_on+0x20/0xc0
[   15.257476]  ? __pfx_kthread+0x10/0x10
[   15.257499]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.257520]  ? calculate_sigpending+0x7b/0xa0
[   15.257545]  ? __pfx_kthread+0x10/0x10
[   15.257567]  ret_from_fork+0x116/0x1d0
[   15.257586]  ? __pfx_kthread+0x10/0x10
[   15.257607]  ret_from_fork_asm+0x1a/0x30
[   15.257637]  </TASK>
[   15.257649] 
[   15.265575] Allocated by task 283:
[   15.265745]  kasan_save_stack+0x45/0x70
[   15.265888]  kasan_save_track+0x18/0x40
[   15.266020]  kasan_save_alloc_info+0x3b/0x50
[   15.266217]  __kasan_kmalloc+0xb7/0xc0
[   15.266510]  __kmalloc_cache_noprof+0x189/0x420
[   15.266754]  kasan_atomics+0x95/0x310
[   15.266965]  kunit_try_run_case+0x1a5/0x480
[   15.267214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.267456]  kthread+0x337/0x6f0
[   15.267578]  ret_from_fork+0x116/0x1d0
[   15.267756]  ret_from_fork_asm+0x1a/0x30
[   15.267953] 
[   15.268071] The buggy address belongs to the object at ffff8881038eb080
[   15.268071]  which belongs to the cache kmalloc-64 of size 64
[   15.268578] The buggy address is located 0 bytes to the right of
[   15.268578]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.269134] 
[   15.269234] The buggy address belongs to the physical page:
[   15.269502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.269825] flags: 0x200000000000000(node=0|zone=2)
[   15.270088] page_type: f5(slab)
[   15.270304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.270671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.271021] page dumped because: kasan: bad access detected
[   15.271295] 
[   15.271390] Memory state around the buggy address:
[   15.271604]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.271820]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.272032] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.272624]                                      ^
[   15.272853]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.273181]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.273571] ==================================================================
[   14.568108] ==================================================================
[   14.568788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.569278] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.569666] 
[   14.569806] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.569850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.569864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.569885] Call Trace:
[   14.569901]  <TASK>
[   14.569915]  dump_stack_lvl+0x73/0xb0
[   14.569943]  print_report+0xd1/0x650
[   14.569966]  ? __virt_addr_valid+0x1db/0x2d0
[   14.569990]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.570012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.570035]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.570056]  kasan_report+0x141/0x180
[   14.570079]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.570119]  __asan_report_load4_noabort+0x18/0x20
[   14.570145]  kasan_atomics_helper+0x4a02/0x5450
[   14.570170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.570192]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.570218]  ? kasan_atomics+0x152/0x310
[   14.570245]  kasan_atomics+0x1dc/0x310
[   14.570268]  ? __pfx_kasan_atomics+0x10/0x10
[   14.570328]  ? __pfx_read_tsc+0x10/0x10
[   14.570352]  ? ktime_get_ts64+0x86/0x230
[   14.570378]  kunit_try_run_case+0x1a5/0x480
[   14.570428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.570451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.570474]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.570498]  ? __kthread_parkme+0x82/0x180
[   14.570520]  ? preempt_count_sub+0x50/0x80
[   14.570544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.570568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.570591]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.570646]  kthread+0x337/0x6f0
[   14.570666]  ? trace_preempt_on+0x20/0xc0
[   14.570689]  ? __pfx_kthread+0x10/0x10
[   14.570711]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.570732]  ? calculate_sigpending+0x7b/0xa0
[   14.570756]  ? __pfx_kthread+0x10/0x10
[   14.570809]  ret_from_fork+0x116/0x1d0
[   14.570829]  ? __pfx_kthread+0x10/0x10
[   14.570850]  ret_from_fork_asm+0x1a/0x30
[   14.570881]  </TASK>
[   14.570893] 
[   14.578603] Allocated by task 283:
[   14.578800]  kasan_save_stack+0x45/0x70
[   14.579014]  kasan_save_track+0x18/0x40
[   14.579209]  kasan_save_alloc_info+0x3b/0x50
[   14.579552]  __kasan_kmalloc+0xb7/0xc0
[   14.579745]  __kmalloc_cache_noprof+0x189/0x420
[   14.579966]  kasan_atomics+0x95/0x310
[   14.580170]  kunit_try_run_case+0x1a5/0x480
[   14.580395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.580662]  kthread+0x337/0x6f0
[   14.580795]  ret_from_fork+0x116/0x1d0
[   14.581018]  ret_from_fork_asm+0x1a/0x30
[   14.581269] 
[   14.581385] The buggy address belongs to the object at ffff8881038eb080
[   14.581385]  which belongs to the cache kmalloc-64 of size 64
[   14.581886] The buggy address is located 0 bytes to the right of
[   14.581886]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.582481] 
[   14.582556] The buggy address belongs to the physical page:
[   14.582726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.582959] flags: 0x200000000000000(node=0|zone=2)
[   14.583191] page_type: f5(slab)
[   14.583366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.583702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.584229] page dumped because: kasan: bad access detected
[   14.584580] 
[   14.584677] Memory state around the buggy address:
[   14.584859]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.585072]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.585499] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.585815]                                      ^
[   14.586048]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.586275]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.586830] ==================================================================
[   15.292947] ==================================================================
[   15.293592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.293934] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.294210] 
[   15.294304] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.294348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.294361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.294383] Call Trace:
[   15.294401]  <TASK>
[   15.294421]  dump_stack_lvl+0x73/0xb0
[   15.294448]  print_report+0xd1/0x650
[   15.294470]  ? __virt_addr_valid+0x1db/0x2d0
[   15.294492]  ? kasan_atomics_helper+0x5115/0x5450
[   15.294515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.294537]  ? kasan_atomics_helper+0x5115/0x5450
[   15.294559]  kasan_report+0x141/0x180
[   15.294583]  ? kasan_atomics_helper+0x5115/0x5450
[   15.294609]  __asan_report_load8_noabort+0x18/0x20
[   15.294634]  kasan_atomics_helper+0x5115/0x5450
[   15.294657]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.294680]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.294706]  ? kasan_atomics+0x152/0x310
[   15.294732]  kasan_atomics+0x1dc/0x310
[   15.294756]  ? __pfx_kasan_atomics+0x10/0x10
[   15.294781]  ? __pfx_read_tsc+0x10/0x10
[   15.294802]  ? ktime_get_ts64+0x86/0x230
[   15.294826]  kunit_try_run_case+0x1a5/0x480
[   15.294851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.294874]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.294898]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.294922]  ? __kthread_parkme+0x82/0x180
[   15.294943]  ? preempt_count_sub+0x50/0x80
[   15.294967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.294991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.295015]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.295039]  kthread+0x337/0x6f0
[   15.295058]  ? trace_preempt_on+0x20/0xc0
[   15.295083]  ? __pfx_kthread+0x10/0x10
[   15.295149]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.295172]  ? calculate_sigpending+0x7b/0xa0
[   15.295197]  ? __pfx_kthread+0x10/0x10
[   15.295225]  ret_from_fork+0x116/0x1d0
[   15.295244]  ? __pfx_kthread+0x10/0x10
[   15.295266]  ret_from_fork_asm+0x1a/0x30
[   15.295298]  </TASK>
[   15.295310] 
[   15.305877] Allocated by task 283:
[   15.306057]  kasan_save_stack+0x45/0x70
[   15.306224]  kasan_save_track+0x18/0x40
[   15.306439]  kasan_save_alloc_info+0x3b/0x50
[   15.307055]  __kasan_kmalloc+0xb7/0xc0
[   15.307250]  __kmalloc_cache_noprof+0x189/0x420
[   15.307587]  kasan_atomics+0x95/0x310
[   15.307797]  kunit_try_run_case+0x1a5/0x480
[   15.308106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.308655]  kthread+0x337/0x6f0
[   15.308800]  ret_from_fork+0x116/0x1d0
[   15.309071]  ret_from_fork_asm+0x1a/0x30
[   15.309483] 
[   15.309595] The buggy address belongs to the object at ffff8881038eb080
[   15.309595]  which belongs to the cache kmalloc-64 of size 64
[   15.310386] The buggy address is located 0 bytes to the right of
[   15.310386]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.311062] 
[   15.311295] The buggy address belongs to the physical page:
[   15.311646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.312108] flags: 0x200000000000000(node=0|zone=2)
[   15.312431] page_type: f5(slab)
[   15.312743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.313155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.313651] page dumped because: kasan: bad access detected
[   15.314011] 
[   15.314111] Memory state around the buggy address:
[   15.314480]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.314932]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.315421] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.315790]                                      ^
[   15.315993]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316315]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316915] ==================================================================
[   14.103809] ==================================================================
[   14.104229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.104630] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.104984] 
[   14.105128] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.105183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.105197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.105269] Call Trace:
[   14.105284]  <TASK>
[   14.105323]  dump_stack_lvl+0x73/0xb0
[   14.105363]  print_report+0xd1/0x650
[   14.105402]  ? __virt_addr_valid+0x1db/0x2d0
[   14.105468]  ? kasan_atomics_helper+0x697/0x5450
[   14.105491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.105514]  ? kasan_atomics_helper+0x697/0x5450
[   14.105546]  kasan_report+0x141/0x180
[   14.105570]  ? kasan_atomics_helper+0x697/0x5450
[   14.105596]  kasan_check_range+0x10c/0x1c0
[   14.105620]  __kasan_check_write+0x18/0x20
[   14.105641]  kasan_atomics_helper+0x697/0x5450
[   14.105663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.105685]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.105711]  ? kasan_atomics+0x152/0x310
[   14.105737]  kasan_atomics+0x1dc/0x310
[   14.105762]  ? __pfx_kasan_atomics+0x10/0x10
[   14.105814]  ? __pfx_read_tsc+0x10/0x10
[   14.105836]  ? ktime_get_ts64+0x86/0x230
[   14.105860]  kunit_try_run_case+0x1a5/0x480
[   14.105895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.105918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.105942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.105990]  ? __kthread_parkme+0x82/0x180
[   14.106011]  ? preempt_count_sub+0x50/0x80
[   14.106062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.106110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.106136]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.106160]  kthread+0x337/0x6f0
[   14.106180]  ? trace_preempt_on+0x20/0xc0
[   14.106202]  ? __pfx_kthread+0x10/0x10
[   14.106223]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.106288]  ? calculate_sigpending+0x7b/0xa0
[   14.106326]  ? __pfx_kthread+0x10/0x10
[   14.106348]  ret_from_fork+0x116/0x1d0
[   14.106367]  ? __pfx_kthread+0x10/0x10
[   14.106417]  ret_from_fork_asm+0x1a/0x30
[   14.106449]  </TASK>
[   14.106460] 
[   14.116022] Allocated by task 283:
[   14.116317]  kasan_save_stack+0x45/0x70
[   14.116577]  kasan_save_track+0x18/0x40
[   14.116796]  kasan_save_alloc_info+0x3b/0x50
[   14.117042]  __kasan_kmalloc+0xb7/0xc0
[   14.117344]  __kmalloc_cache_noprof+0x189/0x420
[   14.117634]  kasan_atomics+0x95/0x310
[   14.117877]  kunit_try_run_case+0x1a5/0x480
[   14.118112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.118400]  kthread+0x337/0x6f0
[   14.118729]  ret_from_fork+0x116/0x1d0
[   14.118918]  ret_from_fork_asm+0x1a/0x30
[   14.119059] 
[   14.119144] The buggy address belongs to the object at ffff8881038eb080
[   14.119144]  which belongs to the cache kmalloc-64 of size 64
[   14.120080] The buggy address is located 0 bytes to the right of
[   14.120080]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.120938] 
[   14.121044] The buggy address belongs to the physical page:
[   14.121493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.121841] flags: 0x200000000000000(node=0|zone=2)
[   14.122034] page_type: f5(slab)
[   14.122297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.122692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.123004] page dumped because: kasan: bad access detected
[   14.123333] 
[   14.123468] Memory state around the buggy address:
[   14.123685]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.124040]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.124455] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.124810]                                      ^
[   14.125057]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.125690]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.126078] ==================================================================
[   14.019411] ==================================================================
[   14.019699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.020008] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.020278] 
[   14.020364] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.020458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.020472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.020494] Call Trace:
[   14.020509]  <TASK>
[   14.020525]  dump_stack_lvl+0x73/0xb0
[   14.020551]  print_report+0xd1/0x650
[   14.020575]  ? __virt_addr_valid+0x1db/0x2d0
[   14.020611]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.020634]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.020656]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.020690]  kasan_report+0x141/0x180
[   14.020712]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.020739]  kasan_check_range+0x10c/0x1c0
[   14.020764]  __kasan_check_write+0x18/0x20
[   14.020785]  kasan_atomics_helper+0x4a0/0x5450
[   14.020807]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.020830]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.020855]  ? kasan_atomics+0x152/0x310
[   14.020881]  kasan_atomics+0x1dc/0x310
[   14.020914]  ? __pfx_kasan_atomics+0x10/0x10
[   14.020938]  ? __pfx_read_tsc+0x10/0x10
[   14.020959]  ? ktime_get_ts64+0x86/0x230
[   14.020993]  kunit_try_run_case+0x1a5/0x480
[   14.021016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.021039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.021062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.021087]  ? __kthread_parkme+0x82/0x180
[   14.021115]  ? preempt_count_sub+0x50/0x80
[   14.021139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.021164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.021186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.021210]  kthread+0x337/0x6f0
[   14.021230]  ? trace_preempt_on+0x20/0xc0
[   14.021254]  ? __pfx_kthread+0x10/0x10
[   14.021275]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.021296]  ? calculate_sigpending+0x7b/0xa0
[   14.021320]  ? __pfx_kthread+0x10/0x10
[   14.021403]  ret_from_fork+0x116/0x1d0
[   14.021424]  ? __pfx_kthread+0x10/0x10
[   14.021449]  ret_from_fork_asm+0x1a/0x30
[   14.021482]  </TASK>
[   14.021494] 
[   14.029768] Allocated by task 283:
[   14.029904]  kasan_save_stack+0x45/0x70
[   14.030051]  kasan_save_track+0x18/0x40
[   14.030298]  kasan_save_alloc_info+0x3b/0x50
[   14.030555]  __kasan_kmalloc+0xb7/0xc0
[   14.030772]  __kmalloc_cache_noprof+0x189/0x420
[   14.031002]  kasan_atomics+0x95/0x310
[   14.031287]  kunit_try_run_case+0x1a5/0x480
[   14.031532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.031783]  kthread+0x337/0x6f0
[   14.031957]  ret_from_fork+0x116/0x1d0
[   14.032128]  ret_from_fork_asm+0x1a/0x30
[   14.032514] 
[   14.032701] The buggy address belongs to the object at ffff8881038eb080
[   14.032701]  which belongs to the cache kmalloc-64 of size 64
[   14.033272] The buggy address is located 0 bytes to the right of
[   14.033272]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.033870] 
[   14.033979] The buggy address belongs to the physical page:
[   14.034276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.034644] flags: 0x200000000000000(node=0|zone=2)
[   14.034886] page_type: f5(slab)
[   14.035053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.035501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.035735] page dumped because: kasan: bad access detected
[   14.035919] 
[   14.035995] Memory state around the buggy address:
[   14.036300]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.036755]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.037077] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.037523]                                      ^
[   14.037680]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.037898]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.038123] ==================================================================
[   14.059180] ==================================================================
[   14.059877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.060488] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.060726] 
[   14.060820] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.060862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.060875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.060897] Call Trace:
[   14.060914]  <TASK>
[   14.060930]  dump_stack_lvl+0x73/0xb0
[   14.060956]  print_report+0xd1/0x650
[   14.060980]  ? __virt_addr_valid+0x1db/0x2d0
[   14.061003]  ? kasan_atomics_helper+0x565/0x5450
[   14.061025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.061058]  ? kasan_atomics_helper+0x565/0x5450
[   14.061081]  kasan_report+0x141/0x180
[   14.061125]  ? kasan_atomics_helper+0x565/0x5450
[   14.061153]  kasan_check_range+0x10c/0x1c0
[   14.061179]  __kasan_check_write+0x18/0x20
[   14.061199]  kasan_atomics_helper+0x565/0x5450
[   14.061221]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.061293]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.061336]  ? kasan_atomics+0x152/0x310
[   14.061365]  kasan_atomics+0x1dc/0x310
[   14.061388]  ? __pfx_kasan_atomics+0x10/0x10
[   14.061413]  ? __pfx_read_tsc+0x10/0x10
[   14.061444]  ? ktime_get_ts64+0x86/0x230
[   14.061468]  kunit_try_run_case+0x1a5/0x480
[   14.061492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.061524]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.061548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.061571]  ? __kthread_parkme+0x82/0x180
[   14.061591]  ? preempt_count_sub+0x50/0x80
[   14.061615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.061648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.061671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.061705]  kthread+0x337/0x6f0
[   14.061725]  ? trace_preempt_on+0x20/0xc0
[   14.061748]  ? __pfx_kthread+0x10/0x10
[   14.061769]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.061790]  ? calculate_sigpending+0x7b/0xa0
[   14.061823]  ? __pfx_kthread+0x10/0x10
[   14.061846]  ret_from_fork+0x116/0x1d0
[   14.061867]  ? __pfx_kthread+0x10/0x10
[   14.061898]  ret_from_fork_asm+0x1a/0x30
[   14.061929]  </TASK>
[   14.061943] 
[   14.070677] Allocated by task 283:
[   14.070939]  kasan_save_stack+0x45/0x70
[   14.071158]  kasan_save_track+0x18/0x40
[   14.071430]  kasan_save_alloc_info+0x3b/0x50
[   14.071690]  __kasan_kmalloc+0xb7/0xc0
[   14.071898]  __kmalloc_cache_noprof+0x189/0x420
[   14.072142]  kasan_atomics+0x95/0x310
[   14.072404]  kunit_try_run_case+0x1a5/0x480
[   14.072608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.072827]  kthread+0x337/0x6f0
[   14.073047]  ret_from_fork+0x116/0x1d0
[   14.073335]  ret_from_fork_asm+0x1a/0x30
[   14.073603] 
[   14.073705] The buggy address belongs to the object at ffff8881038eb080
[   14.073705]  which belongs to the cache kmalloc-64 of size 64
[   14.074269] The buggy address is located 0 bytes to the right of
[   14.074269]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.074950] 
[   14.075036] The buggy address belongs to the physical page:
[   14.075323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.075948] flags: 0x200000000000000(node=0|zone=2)
[   14.076324] page_type: f5(slab)
[   14.076521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.076879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.077281] page dumped because: kasan: bad access detected
[   14.077673] 
[   14.077803] Memory state around the buggy address:
[   14.078063]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.078446]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.078858] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.079424]                                      ^
[   14.079707]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.080207]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.080654] ==================================================================
[   15.274147] ==================================================================
[   15.274619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.274966] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.275301] 
[   15.275429] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.275475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.275508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.275531] Call Trace:
[   15.275550]  <TASK>
[   15.275567]  dump_stack_lvl+0x73/0xb0
[   15.275595]  print_report+0xd1/0x650
[   15.275618]  ? __virt_addr_valid+0x1db/0x2d0
[   15.275640]  ? kasan_atomics_helper+0x224c/0x5450
[   15.275662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.275704]  ? kasan_atomics_helper+0x224c/0x5450
[   15.275726]  kasan_report+0x141/0x180
[   15.275749]  ? kasan_atomics_helper+0x224c/0x5450
[   15.275776]  kasan_check_range+0x10c/0x1c0
[   15.275800]  __kasan_check_write+0x18/0x20
[   15.275820]  kasan_atomics_helper+0x224c/0x5450
[   15.275843]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.275883]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.275908]  ? kasan_atomics+0x152/0x310
[   15.275935]  kasan_atomics+0x1dc/0x310
[   15.275976]  ? __pfx_kasan_atomics+0x10/0x10
[   15.276001]  ? __pfx_read_tsc+0x10/0x10
[   15.276022]  ? ktime_get_ts64+0x86/0x230
[   15.276046]  kunit_try_run_case+0x1a5/0x480
[   15.276071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.276093]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.276128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.276152]  ? __kthread_parkme+0x82/0x180
[   15.276173]  ? preempt_count_sub+0x50/0x80
[   15.276197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.276221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.276244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.276286]  kthread+0x337/0x6f0
[   15.276305]  ? trace_preempt_on+0x20/0xc0
[   15.276338]  ? __pfx_kthread+0x10/0x10
[   15.276360]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.276382]  ? calculate_sigpending+0x7b/0xa0
[   15.276407]  ? __pfx_kthread+0x10/0x10
[   15.276428]  ret_from_fork+0x116/0x1d0
[   15.276447]  ? __pfx_kthread+0x10/0x10
[   15.276468]  ret_from_fork_asm+0x1a/0x30
[   15.276518]  </TASK>
[   15.276530] 
[   15.284242] Allocated by task 283:
[   15.284446]  kasan_save_stack+0x45/0x70
[   15.284649]  kasan_save_track+0x18/0x40
[   15.284852]  kasan_save_alloc_info+0x3b/0x50
[   15.285059]  __kasan_kmalloc+0xb7/0xc0
[   15.285238]  __kmalloc_cache_noprof+0x189/0x420
[   15.285395]  kasan_atomics+0x95/0x310
[   15.285607]  kunit_try_run_case+0x1a5/0x480
[   15.285817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.286062]  kthread+0x337/0x6f0
[   15.286236]  ret_from_fork+0x116/0x1d0
[   15.286400]  ret_from_fork_asm+0x1a/0x30
[   15.286620] 
[   15.286745] The buggy address belongs to the object at ffff8881038eb080
[   15.286745]  which belongs to the cache kmalloc-64 of size 64
[   15.287379] The buggy address is located 0 bytes to the right of
[   15.287379]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.288200] 
[   15.288297] The buggy address belongs to the physical page:
[   15.288547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.288892] flags: 0x200000000000000(node=0|zone=2)
[   15.289134] page_type: f5(slab)
[   15.289304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.289698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.289920] page dumped because: kasan: bad access detected
[   15.290086] 
[   15.290165] Memory state around the buggy address:
[   15.290318]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.290709]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.291035] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.291483]                                      ^
[   15.291739]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.292079]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.292380] ==================================================================
[   14.950459] ==================================================================
[   14.951036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.951543] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   14.951842] 
[   14.951947] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.951991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.952004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.952026] Call Trace:
[   14.952041]  <TASK>
[   14.952060]  dump_stack_lvl+0x73/0xb0
[   14.952087]  print_report+0xd1/0x650
[   14.952123]  ? __virt_addr_valid+0x1db/0x2d0
[   14.952146]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.952169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.952193]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.952215]  kasan_report+0x141/0x180
[   14.952238]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.952264]  kasan_check_range+0x10c/0x1c0
[   14.952289]  __kasan_check_write+0x18/0x20
[   14.952309]  kasan_atomics_helper+0x1a7f/0x5450
[   14.952331]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.952355]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.952379]  ? kasan_atomics+0x152/0x310
[   14.952406]  kasan_atomics+0x1dc/0x310
[   14.952429]  ? __pfx_kasan_atomics+0x10/0x10
[   14.952454]  ? __pfx_read_tsc+0x10/0x10
[   14.952475]  ? ktime_get_ts64+0x86/0x230
[   14.952498]  kunit_try_run_case+0x1a5/0x480
[   14.952522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.952544]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.952567]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.952590]  ? __kthread_parkme+0x82/0x180
[   14.952610]  ? preempt_count_sub+0x50/0x80
[   14.952633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.952657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.952680]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.952703]  kthread+0x337/0x6f0
[   14.952723]  ? trace_preempt_on+0x20/0xc0
[   14.952745]  ? __pfx_kthread+0x10/0x10
[   14.952766]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.952788]  ? calculate_sigpending+0x7b/0xa0
[   14.952811]  ? __pfx_kthread+0x10/0x10
[   14.952833]  ret_from_fork+0x116/0x1d0
[   14.952852]  ? __pfx_kthread+0x10/0x10
[   14.952872]  ret_from_fork_asm+0x1a/0x30
[   14.952903]  </TASK>
[   14.952915] 
[   14.963092] Allocated by task 283:
[   14.963269]  kasan_save_stack+0x45/0x70
[   14.963422]  kasan_save_track+0x18/0x40
[   14.963562]  kasan_save_alloc_info+0x3b/0x50
[   14.963717]  __kasan_kmalloc+0xb7/0xc0
[   14.963852]  __kmalloc_cache_noprof+0x189/0x420
[   14.964011]  kasan_atomics+0x95/0x310
[   14.964156]  kunit_try_run_case+0x1a5/0x480
[   14.964339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.964574]  kthread+0x337/0x6f0
[   14.965464]  ret_from_fork+0x116/0x1d0
[   14.965924]  ret_from_fork_asm+0x1a/0x30
[   14.966084] 
[   14.966175] The buggy address belongs to the object at ffff8881038eb080
[   14.966175]  which belongs to the cache kmalloc-64 of size 64
[   14.968192] The buggy address is located 0 bytes to the right of
[   14.968192]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   14.969006] 
[   14.969143] The buggy address belongs to the physical page:
[   14.969432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   14.969682] flags: 0x200000000000000(node=0|zone=2)
[   14.969901] page_type: f5(slab)
[   14.970171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.970421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.970926] page dumped because: kasan: bad access detected
[   14.971109] 
[   14.971184] Memory state around the buggy address:
[   14.972245]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.972482]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.972704] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.973185]                                      ^
[   14.973390]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.973706]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.973968] ==================================================================
[   15.149281] ==================================================================
[   15.149705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.150081] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283
[   15.150482] 
[   15.150603] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.150658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.150671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.150711] Call Trace:
[   15.150727]  <TASK>
[   15.150742]  dump_stack_lvl+0x73/0xb0
[   15.150785]  print_report+0xd1/0x650
[   15.150809]  ? __virt_addr_valid+0x1db/0x2d0
[   15.150832]  ? kasan_atomics_helper+0x2006/0x5450
[   15.150854]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.150877]  ? kasan_atomics_helper+0x2006/0x5450
[   15.150900]  kasan_report+0x141/0x180
[   15.150921]  ? kasan_atomics_helper+0x2006/0x5450
[   15.150948]  kasan_check_range+0x10c/0x1c0
[   15.150973]  __kasan_check_write+0x18/0x20
[   15.150993]  kasan_atomics_helper+0x2006/0x5450
[   15.151016]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.151039]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.151065]  ? kasan_atomics+0x152/0x310
[   15.151093]  kasan_atomics+0x1dc/0x310
[   15.151130]  ? __pfx_kasan_atomics+0x10/0x10
[   15.151155]  ? __pfx_read_tsc+0x10/0x10
[   15.151176]  ? ktime_get_ts64+0x86/0x230
[   15.151205]  kunit_try_run_case+0x1a5/0x480
[   15.151229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.151251]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.151275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.151298]  ? __kthread_parkme+0x82/0x180
[   15.151318]  ? preempt_count_sub+0x50/0x80
[   15.151355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.151380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.151403]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.151427]  kthread+0x337/0x6f0
[   15.151448]  ? trace_preempt_on+0x20/0xc0
[   15.151472]  ? __pfx_kthread+0x10/0x10
[   15.151513]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.151534]  ? calculate_sigpending+0x7b/0xa0
[   15.151557]  ? __pfx_kthread+0x10/0x10
[   15.151596]  ret_from_fork+0x116/0x1d0
[   15.151616]  ? __pfx_kthread+0x10/0x10
[   15.151636]  ret_from_fork_asm+0x1a/0x30
[   15.151685]  </TASK>
[   15.151699] 
[   15.159311] Allocated by task 283:
[   15.159684]  kasan_save_stack+0x45/0x70
[   15.159924]  kasan_save_track+0x18/0x40
[   15.160144]  kasan_save_alloc_info+0x3b/0x50
[   15.160398]  __kasan_kmalloc+0xb7/0xc0
[   15.160562]  __kmalloc_cache_noprof+0x189/0x420
[   15.160786]  kasan_atomics+0x95/0x310
[   15.160918]  kunit_try_run_case+0x1a5/0x480
[   15.161058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.161316]  kthread+0x337/0x6f0
[   15.161519]  ret_from_fork+0x116/0x1d0
[   15.161737]  ret_from_fork_asm+0x1a/0x30
[   15.161933] 
[   15.162029] The buggy address belongs to the object at ffff8881038eb080
[   15.162029]  which belongs to the cache kmalloc-64 of size 64
[   15.162557] The buggy address is located 0 bytes to the right of
[   15.162557]  allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0)
[   15.163012] 
[   15.163084] The buggy address belongs to the physical page:
[   15.163266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb
[   15.163989] flags: 0x200000000000000(node=0|zone=2)
[   15.164217] page_type: f5(slab)
[   15.164412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.164727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.165030] page dumped because: kasan: bad access detected
[   15.165240] 
[   15.165346] Memory state around the buggy address:
[   15.165567]  ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.165876]  ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.166167] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.166481]                                      ^
[   15.166683]  ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.166990]  ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167301] ==================================================================