Hay
Date
July 5, 2025, 5:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.900359] ==================================================================
[   20.900412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.900465] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.900920] 
[   20.901000] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.901175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.901234] Hardware name: linux,dummy-virt (DT)
[   20.901267] Call trace:
[   20.901293]  show_stack+0x20/0x38 (C)
[   20.901565]  dump_stack_lvl+0x8c/0xd0
[   20.901629]  print_report+0x118/0x608
[   20.902011]  kasan_report+0xdc/0x128
[   20.902083]  kasan_check_range+0x100/0x1a8
[   20.902189]  __kasan_check_write+0x20/0x30
[   20.902257]  kasan_atomics_helper+0xe44/0x4858
[   20.902402]  kasan_atomics+0x198/0x2e0
[   20.902480]  kunit_try_run_case+0x170/0x3f0
[   20.902543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.902775]  kthread+0x328/0x630
[   20.903025]  ret_from_fork+0x10/0x20
[   20.903288] 
[   20.903393] Allocated by task 265:
[   20.903538]  kasan_save_stack+0x3c/0x68
[   20.903605]  kasan_save_track+0x20/0x40
[   20.903768]  kasan_save_alloc_info+0x40/0x58
[   20.903992]  __kasan_kmalloc+0xd4/0xd8
[   20.904192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.904263]  kasan_atomics+0xb8/0x2e0
[   20.904606]  kunit_try_run_case+0x170/0x3f0
[   20.904763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.905083]  kthread+0x328/0x630
[   20.905235]  ret_from_fork+0x10/0x20
[   20.905362] 
[   20.905423] The buggy address belongs to the object at fff00000c77daf80
[   20.905423]  which belongs to the cache kmalloc-64 of size 64
[   20.905752] The buggy address is located 0 bytes to the right of
[   20.905752]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.906012] 
[   20.906449] The buggy address belongs to the physical page:
[   20.906516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.906769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.907015] page_type: f5(slab)
[   20.907070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.907317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.907483] page dumped because: kasan: bad access detected
[   20.907584] 
[   20.907951] Memory state around the buggy address:
[   20.908000]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.908083]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.908313] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.908453]                                      ^
[   20.908526]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.908986]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.909176] ==================================================================
[   20.869682] ==================================================================
[   20.869737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.870236] Write of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.870306] 
[   20.870343] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.870695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.870926] Hardware name: linux,dummy-virt (DT)
[   20.871118] Call trace:
[   20.871228]  show_stack+0x20/0x38 (C)
[   20.871369]  dump_stack_lvl+0x8c/0xd0
[   20.871473]  print_report+0x118/0x608
[   20.871592]  kasan_report+0xdc/0x128
[   20.871643]  kasan_check_range+0x100/0x1a8
[   20.871694]  __kasan_check_write+0x20/0x30
[   20.872023]  kasan_atomics_helper+0xd3c/0x4858
[   20.872347]  kasan_atomics+0x198/0x2e0
[   20.872762]  kunit_try_run_case+0x170/0x3f0
[   20.873142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.873236]  kthread+0x328/0x630
[   20.873282]  ret_from_fork+0x10/0x20
[   20.873576] 
[   20.873627] Allocated by task 265:
[   20.873680]  kasan_save_stack+0x3c/0x68
[   20.874029]  kasan_save_track+0x20/0x40
[   20.874123]  kasan_save_alloc_info+0x40/0x58
[   20.874169]  __kasan_kmalloc+0xd4/0xd8
[   20.874453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.874614]  kasan_atomics+0xb8/0x2e0
[   20.874835]  kunit_try_run_case+0x170/0x3f0
[   20.875028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.875083]  kthread+0x328/0x630
[   20.875118]  ret_from_fork+0x10/0x20
[   20.875157] 
[   20.875189] The buggy address belongs to the object at fff00000c77daf80
[   20.875189]  which belongs to the cache kmalloc-64 of size 64
[   20.875567] The buggy address is located 0 bytes to the right of
[   20.875567]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.875690] 
[   20.876220] The buggy address belongs to the physical page:
[   20.876287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.876651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.876731] page_type: f5(slab)
[   20.876774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.877050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.877359] page dumped because: kasan: bad access detected
[   20.877552] 
[   20.877614] Memory state around the buggy address:
[   20.877690]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.877827]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.877902] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.878143]                                      ^
[   20.878380]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.878559]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.878685] ==================================================================
[   21.044928] ==================================================================
[   21.045043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.045123] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.045176] 
[   21.045306] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.045392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.045422] Hardware name: linux,dummy-virt (DT)
[   21.045715] Call trace:
[   21.045759]  show_stack+0x20/0x38 (C)
[   21.045812]  dump_stack_lvl+0x8c/0xd0
[   21.045874]  print_report+0x118/0x608
[   21.046370]  kasan_report+0xdc/0x128
[   21.046444]  kasan_check_range+0x100/0x1a8
[   21.046621]  __kasan_check_write+0x20/0x30
[   21.046685]  kasan_atomics_helper+0x147c/0x4858
[   21.047078]  kasan_atomics+0x198/0x2e0
[   21.047386]  kunit_try_run_case+0x170/0x3f0
[   21.047585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.047666]  kthread+0x328/0x630
[   21.047715]  ret_from_fork+0x10/0x20
[   21.048015] 
[   21.048178] Allocated by task 265:
[   21.048315]  kasan_save_stack+0x3c/0x68
[   21.048386]  kasan_save_track+0x20/0x40
[   21.048463]  kasan_save_alloc_info+0x40/0x58
[   21.048536]  __kasan_kmalloc+0xd4/0xd8
[   21.048717]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.048934]  kasan_atomics+0xb8/0x2e0
[   21.048998]  kunit_try_run_case+0x170/0x3f0
[   21.049052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049097]  kthread+0x328/0x630
[   21.049302]  ret_from_fork+0x10/0x20
[   21.049361] 
[   21.049953] The buggy address belongs to the object at fff00000c77daf80
[   21.049953]  which belongs to the cache kmalloc-64 of size 64
[   21.050025] The buggy address is located 0 bytes to the right of
[   21.050025]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.050278] 
[   21.050453] The buggy address belongs to the physical page:
[   21.050519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.050953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.051316] page_type: f5(slab)
[   21.051464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.051836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.052060] page dumped because: kasan: bad access detected
[   21.052101] 
[   21.052257] Memory state around the buggy address:
[   21.052426]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.052600]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.052879] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.053024]                                      ^
[   21.053063]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.053324]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.053523] ==================================================================
[   20.794272] ==================================================================
[   20.794381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.794435] Write of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.795765]  __kasan_check_write+0x20/0x30
[   20.797100] 
[   20.797217] Allocated by task 265:
[   20.797287]  kasan_save_stack+0x3c/0x68
[   20.797432]  kasan_save_track+0x20/0x40
[   20.797506]  kasan_save_alloc_info+0x40/0x58
[   20.797576]  __kasan_kmalloc+0xd4/0xd8
[   20.798001]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.798103]  kasan_atomics+0xb8/0x2e0
[   20.798200]  kunit_try_run_case+0x170/0x3f0
[   20.798269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.798352]  kthread+0x328/0x630
[   20.798458]  ret_from_fork+0x10/0x20
[   20.798502] 
[   20.798559] The buggy address belongs to the object at fff00000c77daf80
[   20.798559]  which belongs to the cache kmalloc-64 of size 64
[   20.798872] The buggy address is located 0 bytes to the right of
[   20.798872]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.799125] 
[   20.799168] The buggy address belongs to the physical page:
[   20.799229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.799371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.799442] page_type: f5(slab)
[   20.799483] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.799541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.799583] page dumped because: kasan: bad access detected
[   20.799618] 
[   20.799638] Memory state around the buggy address:
[   20.799671]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.799924]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.800432] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.800704]                                      ^
[   20.800753]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.800811]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.800886] ==================================================================
[   20.959605] ==================================================================
[   20.959771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.959832] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.959895] 
[   20.959928] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.960010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.960260] Hardware name: linux,dummy-virt (DT)
[   20.960513] Call trace:
[   20.960541]  show_stack+0x20/0x38 (C)
[   20.960596]  dump_stack_lvl+0x8c/0xd0
[   20.960644]  print_report+0x118/0x608
[   20.961155]  kasan_report+0xdc/0x128
[   20.961227]  kasan_check_range+0x100/0x1a8
[   20.961403]  __kasan_check_write+0x20/0x30
[   20.961568]  kasan_atomics_helper+0x10c0/0x4858
[   20.961625]  kasan_atomics+0x198/0x2e0
[   20.961672]  kunit_try_run_case+0x170/0x3f0
[   20.961731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.961783]  kthread+0x328/0x630
[   20.961826]  ret_from_fork+0x10/0x20
[   20.961882] 
[   20.961982] Allocated by task 265:
[   20.962023]  kasan_save_stack+0x3c/0x68
[   20.962075]  kasan_save_track+0x20/0x40
[   20.962125]  kasan_save_alloc_info+0x40/0x58
[   20.962168]  __kasan_kmalloc+0xd4/0xd8
[   20.962207]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.962253]  kasan_atomics+0xb8/0x2e0
[   20.962308]  kunit_try_run_case+0x170/0x3f0
[   20.962347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.962394]  kthread+0x328/0x630
[   20.962428]  ret_from_fork+0x10/0x20
[   20.962467] 
[   20.962488] The buggy address belongs to the object at fff00000c77daf80
[   20.962488]  which belongs to the cache kmalloc-64 of size 64
[   20.962548] The buggy address is located 0 bytes to the right of
[   20.962548]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.962612] 
[   20.962634] The buggy address belongs to the physical page:
[   20.962666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.962722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.963451] page_type: f5(slab)
[   20.963522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.963967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.964417] page dumped because: kasan: bad access detected
[   20.964486] 
[   20.964843] Memory state around the buggy address:
[   20.964940]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.965014]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.965744] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.965830]                                      ^
[   20.967173]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.967383]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.969798] ==================================================================
[   21.020930] ==================================================================
[   21.020994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.021107] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.021368] 
[   21.021445] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.021549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.021589] Hardware name: linux,dummy-virt (DT)
[   21.021623] Call trace:
[   21.021836]  show_stack+0x20/0x38 (C)
[   21.021916]  dump_stack_lvl+0x8c/0xd0
[   21.021972]  print_report+0x118/0x608
[   21.022312]  kasan_report+0xdc/0x128
[   21.022553]  kasan_check_range+0x100/0x1a8
[   21.022621]  __kasan_check_write+0x20/0x30
[   21.022682]  kasan_atomics_helper+0x1384/0x4858
[   21.022733]  kasan_atomics+0x198/0x2e0
[   21.023150]  kunit_try_run_case+0x170/0x3f0
[   21.023268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.023333]  kthread+0x328/0x630
[   21.023378]  ret_from_fork+0x10/0x20
[   21.023431] 
[   21.023451] Allocated by task 265:
[   21.023482]  kasan_save_stack+0x3c/0x68
[   21.023526]  kasan_save_track+0x20/0x40
[   21.023566]  kasan_save_alloc_info+0x40/0x58
[   21.023608]  __kasan_kmalloc+0xd4/0xd8
[   21.023646]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.024375]  kasan_atomics+0xb8/0x2e0
[   21.024499]  kunit_try_run_case+0x170/0x3f0
[   21.024636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.024801]  kthread+0x328/0x630
[   21.024882]  ret_from_fork+0x10/0x20
[   21.024921] 
[   21.025115] The buggy address belongs to the object at fff00000c77daf80
[   21.025115]  which belongs to the cache kmalloc-64 of size 64
[   21.025352] The buggy address is located 0 bytes to the right of
[   21.025352]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.025438] 
[   21.025747] The buggy address belongs to the physical page:
[   21.026107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.026302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.026612] page_type: f5(slab)
[   21.026679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.026795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.027223] page dumped because: kasan: bad access detected
[   21.027330] 
[   21.027739] Memory state around the buggy address:
[   21.027815]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.027881]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.028109] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.028288]                                      ^
[   21.028351]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.028616]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.028660] ==================================================================
[   21.141737] ==================================================================
[   21.141800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.142293] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.142433] 
[   21.142509] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.142703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.142738] Hardware name: linux,dummy-virt (DT)
[   21.142881] Call trace:
[   21.142988]  show_stack+0x20/0x38 (C)
[   21.143068]  dump_stack_lvl+0x8c/0xd0
[   21.143118]  print_report+0x118/0x608
[   21.143591]  kasan_report+0xdc/0x128
[   21.143799]  kasan_check_range+0x100/0x1a8
[   21.143960]  __kasan_check_write+0x20/0x30
[   21.144510]  kasan_atomics_helper+0x17ec/0x4858
[   21.144767]  kasan_atomics+0x198/0x2e0
[   21.144914]  kunit_try_run_case+0x170/0x3f0
[   21.145090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.145167]  kthread+0x328/0x630
[   21.145241]  ret_from_fork+0x10/0x20
[   21.145574] 
[   21.145918] Allocated by task 265:
[   21.146073]  kasan_save_stack+0x3c/0x68
[   21.146182]  kasan_save_track+0x20/0x40
[   21.146372]  kasan_save_alloc_info+0x40/0x58
[   21.146421]  __kasan_kmalloc+0xd4/0xd8
[   21.146478]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.146559]  kasan_atomics+0xb8/0x2e0
[   21.146814]  kunit_try_run_case+0x170/0x3f0
[   21.146952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.147049]  kthread+0x328/0x630
[   21.147471]  ret_from_fork+0x10/0x20
[   21.147673] 
[   21.147748] The buggy address belongs to the object at fff00000c77daf80
[   21.147748]  which belongs to the cache kmalloc-64 of size 64
[   21.147835] The buggy address is located 0 bytes to the right of
[   21.147835]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.148284] 
[   21.148330] The buggy address belongs to the physical page:
[   21.148519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.148620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.148807] page_type: f5(slab)
[   21.149055] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.149228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.149439] page dumped because: kasan: bad access detected
[   21.149586] 
[   21.149608] Memory state around the buggy address:
[   21.149755]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.150016]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.150235] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.150494]                                      ^
[   21.150818]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.151070]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.151136] ==================================================================
[   20.925837] ==================================================================
[   20.925905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.925992] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.926243] 
[   20.926308] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.926700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.926828] Hardware name: linux,dummy-virt (DT)
[   20.926919] Call trace:
[   20.926966]  show_stack+0x20/0x38 (C)
[   20.927047]  dump_stack_lvl+0x8c/0xd0
[   20.927195]  print_report+0x118/0x608
[   20.927263]  kasan_report+0xdc/0x128
[   20.927311]  kasan_check_range+0x100/0x1a8
[   20.927557]  __kasan_check_write+0x20/0x30
[   20.927758]  kasan_atomics_helper+0xf20/0x4858
[   20.928152]  kasan_atomics+0x198/0x2e0
[   20.928336]  kunit_try_run_case+0x170/0x3f0
[   20.928434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.928522]  kthread+0x328/0x630
[   20.928840]  ret_from_fork+0x10/0x20
[   20.929087] 
[   20.929159] Allocated by task 265:
[   20.929361]  kasan_save_stack+0x3c/0x68
[   20.929556]  kasan_save_track+0x20/0x40
[   20.929629]  kasan_save_alloc_info+0x40/0x58
[   20.929817]  __kasan_kmalloc+0xd4/0xd8
[   20.929921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.929982]  kasan_atomics+0xb8/0x2e0
[   20.930022]  kunit_try_run_case+0x170/0x3f0
[   20.930394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.930650]  kthread+0x328/0x630
[   20.931087]  ret_from_fork+0x10/0x20
[   20.931205] 
[   20.931264] The buggy address belongs to the object at fff00000c77daf80
[   20.931264]  which belongs to the cache kmalloc-64 of size 64
[   20.931358] The buggy address is located 0 bytes to the right of
[   20.931358]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.931600] 
[   20.931626] The buggy address belongs to the physical page:
[   20.931694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.932082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.932341] page_type: f5(slab)
[   20.932415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.932921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.932994] page dumped because: kasan: bad access detected
[   20.933205] 
[   20.933330] Memory state around the buggy address:
[   20.933495]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.933559]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.933605] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.933788]                                      ^
[   20.934012]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.934379]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.934444] ==================================================================
[   21.115287] ==================================================================
[   21.115339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.115813] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.116224] 
[   21.116277] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.116489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.116545] Hardware name: linux,dummy-virt (DT)
[   21.116605] Call trace:
[   21.116632]  show_stack+0x20/0x38 (C)
[   21.116686]  dump_stack_lvl+0x8c/0xd0
[   21.116903]  print_report+0x118/0x608
[   21.117100]  kasan_report+0xdc/0x128
[   21.117374]  __asan_report_load8_noabort+0x20/0x30
[   21.117648]  kasan_atomics_helper+0x3e10/0x4858
[   21.117725]  kasan_atomics+0x198/0x2e0
[   21.118046]  kunit_try_run_case+0x170/0x3f0
[   21.118187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.118272]  kthread+0x328/0x630
[   21.118381]  ret_from_fork+0x10/0x20
[   21.118446] 
[   21.118488] Allocated by task 265:
[   21.118522]  kasan_save_stack+0x3c/0x68
[   21.118586]  kasan_save_track+0x20/0x40
[   21.118847]  kasan_save_alloc_info+0x40/0x58
[   21.119018]  __kasan_kmalloc+0xd4/0xd8
[   21.119309]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.119516]  kasan_atomics+0xb8/0x2e0
[   21.119579]  kunit_try_run_case+0x170/0x3f0
[   21.119721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.120128]  kthread+0x328/0x630
[   21.120235]  ret_from_fork+0x10/0x20
[   21.120475] 
[   21.120526] The buggy address belongs to the object at fff00000c77daf80
[   21.120526]  which belongs to the cache kmalloc-64 of size 64
[   21.120612] The buggy address is located 0 bytes to the right of
[   21.120612]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.121232] 
[   21.121321] The buggy address belongs to the physical page:
[   21.121718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.121816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.122112] page_type: f5(slab)
[   21.122281] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.122782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.122887] page dumped because: kasan: bad access detected
[   21.123124] 
[   21.123263] Memory state around the buggy address:
[   21.123474]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.123721]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.123953] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.124220]                                      ^
[   21.124263]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.124493]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.124585] ==================================================================
[   20.887491] ==================================================================
[   20.887556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.887728] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.887992] 
[   20.888068] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.888278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.888464] Hardware name: linux,dummy-virt (DT)
[   20.888523] Call trace:
[   20.888548]  show_stack+0x20/0x38 (C)
[   20.888696]  dump_stack_lvl+0x8c/0xd0
[   20.888782]  print_report+0x118/0x608
[   20.888965]  kasan_report+0xdc/0x128
[   20.889171]  kasan_check_range+0x100/0x1a8
[   20.889248]  __kasan_check_read+0x20/0x30
[   20.889442]  kasan_atomics_helper+0xdd4/0x4858
[   20.889629]  kasan_atomics+0x198/0x2e0
[   20.889705]  kunit_try_run_case+0x170/0x3f0
[   20.889759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.889822]  kthread+0x328/0x630
[   20.889875]  ret_from_fork+0x10/0x20
[   20.889968] 
[   20.890020] Allocated by task 265:
[   20.890055]  kasan_save_stack+0x3c/0x68
[   20.890101]  kasan_save_track+0x20/0x40
[   20.890431]  kasan_save_alloc_info+0x40/0x58
[   20.890645]  __kasan_kmalloc+0xd4/0xd8
[   20.890695]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.890975]  kasan_atomics+0xb8/0x2e0
[   20.891227]  kunit_try_run_case+0x170/0x3f0
[   20.891282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.891344]  kthread+0x328/0x630
[   20.891387]  ret_from_fork+0x10/0x20
[   20.891465] 
[   20.891509] The buggy address belongs to the object at fff00000c77daf80
[   20.891509]  which belongs to the cache kmalloc-64 of size 64
[   20.891577] The buggy address is located 0 bytes to the right of
[   20.891577]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.891781] 
[   20.892157] The buggy address belongs to the physical page:
[   20.892320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.892695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.893036] page_type: f5(slab)
[   20.893495] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.893606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.893675] page dumped because: kasan: bad access detected
[   20.893767] 
[   20.893788] Memory state around the buggy address:
[   20.893828]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.894183]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.894360] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.894406]                                      ^
[   20.894743]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.895009]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.895109] ==================================================================
[   20.941357] ==================================================================
[   20.941410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.941459] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.941509] 
[   20.941674] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.941774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.942261] Hardware name: linux,dummy-virt (DT)
[   20.942318] Call trace:
[   20.942434]  show_stack+0x20/0x38 (C)
[   20.942490]  dump_stack_lvl+0x8c/0xd0
[   20.942557]  print_report+0x118/0x608
[   20.942625]  kasan_report+0xdc/0x128
[   20.942675]  kasan_check_range+0x100/0x1a8
[   20.942724]  __kasan_check_write+0x20/0x30
[   20.943148]  kasan_atomics_helper+0xff0/0x4858
[   20.943471]  kasan_atomics+0x198/0x2e0
[   20.943666]  kunit_try_run_case+0x170/0x3f0
[   20.943755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.943953]  kthread+0x328/0x630
[   20.944015]  ret_from_fork+0x10/0x20
[   20.944063] 
[   20.944085] Allocated by task 265:
[   20.944287]  kasan_save_stack+0x3c/0x68
[   20.944407]  kasan_save_track+0x20/0x40
[   20.944846]  kasan_save_alloc_info+0x40/0x58
[   20.944998]  __kasan_kmalloc+0xd4/0xd8
[   20.945085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.945247]  kasan_atomics+0xb8/0x2e0
[   20.945315]  kunit_try_run_case+0x170/0x3f0
[   20.945368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.945420]  kthread+0x328/0x630
[   20.945661]  ret_from_fork+0x10/0x20
[   20.946049] 
[   20.946093] The buggy address belongs to the object at fff00000c77daf80
[   20.946093]  which belongs to the cache kmalloc-64 of size 64
[   20.946156] The buggy address is located 0 bytes to the right of
[   20.946156]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.946539] 
[   20.946792] The buggy address belongs to the physical page:
[   20.946894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.947151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.947403] page_type: f5(slab)
[   20.947476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.947767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.947977] page dumped because: kasan: bad access detected
[   20.948016] 
[   20.948275] Memory state around the buggy address:
[   20.948912]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.949000]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.949329] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.949494]                                      ^
[   20.949721]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.949897]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.950012] ==================================================================
[   20.952002] ==================================================================
[   20.952086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.952207] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.952260] 
[   20.952296] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.952386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.952726] Hardware name: linux,dummy-virt (DT)
[   20.952779] Call trace:
[   20.952806]  show_stack+0x20/0x38 (C)
[   20.952898]  dump_stack_lvl+0x8c/0xd0
[   20.952952]  print_report+0x118/0x608
[   20.953018]  kasan_report+0xdc/0x128
[   20.953301]  kasan_check_range+0x100/0x1a8
[   20.953475]  __kasan_check_write+0x20/0x30
[   20.953537]  kasan_atomics_helper+0x1058/0x4858
[   20.953589]  kasan_atomics+0x198/0x2e0
[   20.953635]  kunit_try_run_case+0x170/0x3f0
[   20.954083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.954246]  kthread+0x328/0x630
[   20.954305]  ret_from_fork+0x10/0x20
[   20.954357] 
[   20.954382] Allocated by task 265:
[   20.954421]  kasan_save_stack+0x3c/0x68
[   20.954476]  kasan_save_track+0x20/0x40
[   20.954516]  kasan_save_alloc_info+0x40/0x58
[   20.954559]  __kasan_kmalloc+0xd4/0xd8
[   20.954596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.954638]  kasan_atomics+0xb8/0x2e0
[   20.954676]  kunit_try_run_case+0x170/0x3f0
[   20.954714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.954777]  kthread+0x328/0x630
[   20.955190]  ret_from_fork+0x10/0x20
[   20.955485] 
[   20.955602] The buggy address belongs to the object at fff00000c77daf80
[   20.955602]  which belongs to the cache kmalloc-64 of size 64
[   20.955700] The buggy address is located 0 bytes to the right of
[   20.955700]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.955918] 
[   20.955975] The buggy address belongs to the physical page:
[   20.956194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.956268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.956419] page_type: f5(slab)
[   20.956646] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.956732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.956966] page dumped because: kasan: bad access detected
[   20.957148] 
[   20.957193] Memory state around the buggy address:
[   20.957267]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.957343]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.957776] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.957842]                                      ^
[   20.957901]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.958239]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.958344] ==================================================================
[   20.802542] ==================================================================
[   20.802996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.803189] Write of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.803318] 
[   20.803775] Call trace:
[   20.806475]  kasan_save_alloc_info+0x40/0x58
[   20.806689]  __kasan_kmalloc+0xd4/0xd8
[   20.806830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.806898]  kasan_atomics+0xb8/0x2e0
[   20.807069]  kunit_try_run_case+0x170/0x3f0
[   20.807285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.808068] 
[   20.808490] 
[   20.811429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.814835]  kasan_save_alloc_info+0x40/0x58
[   20.815017]  __kasan_kmalloc+0xd4/0xd8
[   20.815082]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.815133]  kasan_atomics+0xb8/0x2e0
[   20.815172]  kunit_try_run_case+0x170/0x3f0
[   20.815213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.815398]  kthread+0x328/0x630
[   20.815782] The buggy address belongs to the object at fff00000c77daf80
[   20.815782]  which belongs to the cache kmalloc-64 of size 64
[   20.818332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.820954]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.823516] page dumped because: kasan: bad access detected
[   20.827184]  kasan_atomics+0x198/0x2e0
[   20.830845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.834591]  ret_from_fork+0x10/0x20
[   20.838361] page_type: f5(slab)
[   20.838721] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.841955]  kunit_try_run_case+0x170/0x3f0
[   20.843525]  kthread+0x328/0x630
[   20.846070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.848644] Hardware name: linux,dummy-virt (DT)
[   20.849460]  __kasan_kmalloc+0xd4/0xd8
[   20.851977] page dumped because: kasan: bad access detected
[   20.853612] ==================================================================
[   21.125636] ==================================================================
[   21.125691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.126243] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.126314] 
[   21.126588] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.127099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.127143] Hardware name: linux,dummy-virt (DT)
[   21.127179] Call trace:
[   21.127203]  show_stack+0x20/0x38 (C)
[   21.127257]  dump_stack_lvl+0x8c/0xd0
[   21.127304]  print_report+0x118/0x608
[   21.127354]  kasan_report+0xdc/0x128
[   21.127399]  kasan_check_range+0x100/0x1a8
[   21.127455]  __kasan_check_write+0x20/0x30
[   21.127501]  kasan_atomics_helper+0x175c/0x4858
[   21.127549]  kasan_atomics+0x198/0x2e0
[   21.127891]  kunit_try_run_case+0x170/0x3f0
[   21.128079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.128294]  kthread+0x328/0x630
[   21.128509]  ret_from_fork+0x10/0x20
[   21.128599] 
[   21.128698] Allocated by task 265:
[   21.128809]  kasan_save_stack+0x3c/0x68
[   21.128854]  kasan_save_track+0x20/0x40
[   21.129297]  kasan_save_alloc_info+0x40/0x58
[   21.129368]  __kasan_kmalloc+0xd4/0xd8
[   21.129747]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.129818]  kasan_atomics+0xb8/0x2e0
[   21.129969]  kunit_try_run_case+0x170/0x3f0
[   21.130069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.130510]  kthread+0x328/0x630
[   21.130743]  ret_from_fork+0x10/0x20
[   21.130947] 
[   21.131004] The buggy address belongs to the object at fff00000c77daf80
[   21.131004]  which belongs to the cache kmalloc-64 of size 64
[   21.131280] The buggy address is located 0 bytes to the right of
[   21.131280]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.131555] 
[   21.131612] The buggy address belongs to the physical page:
[   21.131670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.131752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.132084] page_type: f5(slab)
[   21.132156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.132613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.132667] page dumped because: kasan: bad access detected
[   21.132704] 
[   21.132886] Memory state around the buggy address:
[   21.133070]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.133143]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.133500] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.133565]                                      ^
[   21.133603]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.133970]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.134293] ==================================================================
[   21.097491] ==================================================================
[   21.098027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.098102] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.098472] 
[   21.098516] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.098601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.098870] Hardware name: linux,dummy-virt (DT)
[   21.098976] Call trace:
[   21.099001]  show_stack+0x20/0x38 (C)
[   21.099056]  dump_stack_lvl+0x8c/0xd0
[   21.099104]  print_report+0x118/0x608
[   21.099815]  kasan_report+0xdc/0x128
[   21.100002]  __asan_report_load8_noabort+0x20/0x30
[   21.100128]  kasan_atomics_helper+0x3df4/0x4858
[   21.100219]  kasan_atomics+0x198/0x2e0
[   21.100402]  kunit_try_run_case+0x170/0x3f0
[   21.100460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.100670]  kthread+0x328/0x630
[   21.101219]  ret_from_fork+0x10/0x20
[   21.101364] 
[   21.101444] Allocated by task 265:
[   21.101569]  kasan_save_stack+0x3c/0x68
[   21.101673]  kasan_save_track+0x20/0x40
[   21.101982]  kasan_save_alloc_info+0x40/0x58
[   21.102510]  __kasan_kmalloc+0xd4/0xd8
[   21.102627]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.103006]  kasan_atomics+0xb8/0x2e0
[   21.103058]  kunit_try_run_case+0x170/0x3f0
[   21.103097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.103395]  kthread+0x328/0x630
[   21.103881]  ret_from_fork+0x10/0x20
[   21.104136] 
[   21.104352] The buggy address belongs to the object at fff00000c77daf80
[   21.104352]  which belongs to the cache kmalloc-64 of size 64
[   21.104463] The buggy address is located 0 bytes to the right of
[   21.104463]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.105026] 
[   21.105102] The buggy address belongs to the physical page:
[   21.105280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.105512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.105592] page_type: f5(slab)
[   21.105634] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.106005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.106352] page dumped because: kasan: bad access detected
[   21.106429] 
[   21.106450] Memory state around the buggy address:
[   21.106631]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.106855]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.106945] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.107299]                                      ^
[   21.107447]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.107720]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.108011] ==================================================================
[   20.879544] ==================================================================
[   20.879629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.879683] Read of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.879744] 
[   20.879895] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.880054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.880087] Hardware name: linux,dummy-virt (DT)
[   20.880121] Call trace:
[   20.880145]  show_stack+0x20/0x38 (C)
[   20.880203]  dump_stack_lvl+0x8c/0xd0
[   20.880253]  print_report+0x118/0x608
[   20.880542]  kasan_report+0xdc/0x128
[   20.880792]  __asan_report_load4_noabort+0x20/0x30
[   20.881016]  kasan_atomics_helper+0x3e04/0x4858
[   20.881081]  kasan_atomics+0x198/0x2e0
[   20.881220]  kunit_try_run_case+0x170/0x3f0
[   20.881305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.881497]  kthread+0x328/0x630
[   20.881558]  ret_from_fork+0x10/0x20
[   20.881763] 
[   20.881794] Allocated by task 265:
[   20.882155]  kasan_save_stack+0x3c/0x68
[   20.882218]  kasan_save_track+0x20/0x40
[   20.882540]  kasan_save_alloc_info+0x40/0x58
[   20.882598]  __kasan_kmalloc+0xd4/0xd8
[   20.882638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.882679]  kasan_atomics+0xb8/0x2e0
[   20.882715]  kunit_try_run_case+0x170/0x3f0
[   20.882755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.882800]  kthread+0x328/0x630
[   20.882834]  ret_from_fork+0x10/0x20
[   20.882921] 
[   20.882945] The buggy address belongs to the object at fff00000c77daf80
[   20.882945]  which belongs to the cache kmalloc-64 of size 64
[   20.883015] The buggy address is located 0 bytes to the right of
[   20.883015]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.883089] 
[   20.883129] The buggy address belongs to the physical page:
[   20.883442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.883510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.883560] page_type: f5(slab)
[   20.883628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.884054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.884351] page dumped because: kasan: bad access detected
[   20.884404] 
[   20.884691] Memory state around the buggy address:
[   20.884935]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.885024]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.885199] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.885504]                                      ^
[   20.885880]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.886044]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.886123] ==================================================================
[   20.935245] ==================================================================
[   20.935299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.935481] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.935536] 
[   20.935570] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.935893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.935933] Hardware name: linux,dummy-virt (DT)
[   20.935968] Call trace:
[   20.936373]  show_stack+0x20/0x38 (C)
[   20.936448]  dump_stack_lvl+0x8c/0xd0
[   20.936500]  print_report+0x118/0x608
[   20.936548]  kasan_report+0xdc/0x128
[   20.936596]  kasan_check_range+0x100/0x1a8
[   20.936645]  __kasan_check_write+0x20/0x30
[   20.936690]  kasan_atomics_helper+0xf88/0x4858
[   20.936739]  kasan_atomics+0x198/0x2e0
[   20.936785]  kunit_try_run_case+0x170/0x3f0
[   20.936835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.936901]  kthread+0x328/0x630
[   20.936943]  ret_from_fork+0x10/0x20
[   20.936992] 
[   20.937090] Allocated by task 265:
[   20.937124]  kasan_save_stack+0x3c/0x68
[   20.937180]  kasan_save_track+0x20/0x40
[   20.937231]  kasan_save_alloc_info+0x40/0x58
[   20.937274]  __kasan_kmalloc+0xd4/0xd8
[   20.937313]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.937353]  kasan_atomics+0xb8/0x2e0
[   20.937392]  kunit_try_run_case+0x170/0x3f0
[   20.937434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.937479]  kthread+0x328/0x630
[   20.937523]  ret_from_fork+0x10/0x20
[   20.937562] 
[   20.937590] The buggy address belongs to the object at fff00000c77daf80
[   20.937590]  which belongs to the cache kmalloc-64 of size 64
[   20.937657] The buggy address is located 0 bytes to the right of
[   20.937657]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.937723] 
[   20.937744] The buggy address belongs to the physical page:
[   20.937775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.937831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.938674] page_type: f5(slab)
[   20.938779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.939121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.939452] page dumped because: kasan: bad access detected
[   20.939500] 
[   20.939692] Memory state around the buggy address:
[   20.939754]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.939976]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.940185] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.940250]                                      ^
[   20.940309]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.940498]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.940551] ==================================================================
[   21.065487] ==================================================================
[   21.065543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.065595] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.065881] 
[   21.065939] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.066025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.066055] Hardware name: linux,dummy-virt (DT)
[   21.066361] Call trace:
[   21.066406]  show_stack+0x20/0x38 (C)
[   21.066613]  dump_stack_lvl+0x8c/0xd0
[   21.066883]  print_report+0x118/0x608
[   21.066961]  kasan_report+0xdc/0x128
[   21.067477]  kasan_check_range+0x100/0x1a8
[   21.067555]  __kasan_check_write+0x20/0x30
[   21.067778]  kasan_atomics_helper+0x154c/0x4858
[   21.068080]  kasan_atomics+0x198/0x2e0
[   21.068258]  kunit_try_run_case+0x170/0x3f0
[   21.068524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.068703]  kthread+0x328/0x630
[   21.069017]  ret_from_fork+0x10/0x20
[   21.069164] 
[   21.069310] Allocated by task 265:
[   21.069350]  kasan_save_stack+0x3c/0x68
[   21.069481]  kasan_save_track+0x20/0x40
[   21.069522]  kasan_save_alloc_info+0x40/0x58
[   21.069566]  __kasan_kmalloc+0xd4/0xd8
[   21.069618]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.069658]  kasan_atomics+0xb8/0x2e0
[   21.069697]  kunit_try_run_case+0x170/0x3f0
[   21.069737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.069816]  kthread+0x328/0x630
[   21.069853]  ret_from_fork+0x10/0x20
[   21.069905] 
[   21.069943] The buggy address belongs to the object at fff00000c77daf80
[   21.069943]  which belongs to the cache kmalloc-64 of size 64
[   21.070010] The buggy address is located 0 bytes to the right of
[   21.070010]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.070093] 
[   21.070124] The buggy address belongs to the physical page:
[   21.070161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.070232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.070298] page_type: f5(slab)
[   21.070351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.070410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.070458] page dumped because: kasan: bad access detected
[   21.070493] 
[   21.070513] Memory state around the buggy address:
[   21.070549]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.070617]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.070679] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.070737]                                      ^
[   21.070802]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.070846]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.070895] ==================================================================
[   20.862736] ==================================================================
[   20.863143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.863251] Read of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.863365] 
[   20.863411] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.863520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.863614] Hardware name: linux,dummy-virt (DT)
[   20.863650] Call trace:
[   20.863696]  show_stack+0x20/0x38 (C)
[   20.863754]  dump_stack_lvl+0x8c/0xd0
[   20.864041]  print_report+0x118/0x608
[   20.864389]  kasan_report+0xdc/0x128
[   20.864560]  __asan_report_load4_noabort+0x20/0x30
[   20.864657]  kasan_atomics_helper+0x3dd8/0x4858
[   20.865126]  kasan_atomics+0x198/0x2e0
[   20.865189]  kunit_try_run_case+0x170/0x3f0
[   20.865352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.865460]  kthread+0x328/0x630
[   20.866000]  ret_from_fork+0x10/0x20
[   20.866080] 
[   20.866102] Allocated by task 265:
[   20.866347]  kasan_save_stack+0x3c/0x68
[   20.866549]  kasan_save_track+0x20/0x40
[   20.866792]  kasan_save_alloc_info+0x40/0x58
[   20.866850]  __kasan_kmalloc+0xd4/0xd8
[   20.866904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.866946]  kasan_atomics+0xb8/0x2e0
[   20.866984]  kunit_try_run_case+0x170/0x3f0
[   20.867570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.867728]  kthread+0x328/0x630
[   20.867796]  ret_from_fork+0x10/0x20
[   20.867845] 
[   20.867883] The buggy address belongs to the object at fff00000c77daf80
[   20.867883]  which belongs to the cache kmalloc-64 of size 64
[   20.867946] The buggy address is located 0 bytes to the right of
[   20.867946]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.868013] 
[   20.868057] The buggy address belongs to the physical page:
[   20.868103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.868179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.868235] page_type: f5(slab)
[   20.868291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.868343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.868386] page dumped because: kasan: bad access detected
[   20.868436] 
[   20.868456] Memory state around the buggy address:
[   20.868489]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.868543]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.868588] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.868628]                                      ^
[   20.868662]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.868706]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.868756] ==================================================================
[   21.072225] ==================================================================
[   21.072440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.072524] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.072779] 
[   21.072825] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.072922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.073175] Hardware name: linux,dummy-virt (DT)
[   21.073566] Call trace:
[   21.073609]  show_stack+0x20/0x38 (C)
[   21.073661]  dump_stack_lvl+0x8c/0xd0
[   21.073718]  print_report+0x118/0x608
[   21.073971]  kasan_report+0xdc/0x128
[   21.074052]  kasan_check_range+0x100/0x1a8
[   21.074107]  __kasan_check_write+0x20/0x30
[   21.074153]  kasan_atomics_helper+0x15b4/0x4858
[   21.074290]  kasan_atomics+0x198/0x2e0
[   21.074344]  kunit_try_run_case+0x170/0x3f0
[   21.074396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.074450]  kthread+0x328/0x630
[   21.074491]  ret_from_fork+0x10/0x20
[   21.074540] 
[   21.074659] Allocated by task 265:
[   21.074701]  kasan_save_stack+0x3c/0x68
[   21.075342]  kasan_save_track+0x20/0x40
[   21.075523]  kasan_save_alloc_info+0x40/0x58
[   21.075684]  __kasan_kmalloc+0xd4/0xd8
[   21.075818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.075923]  kasan_atomics+0xb8/0x2e0
[   21.076372]  kunit_try_run_case+0x170/0x3f0
[   21.076501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.076701]  kthread+0x328/0x630
[   21.076811]  ret_from_fork+0x10/0x20
[   21.076904] 
[   21.077245] The buggy address belongs to the object at fff00000c77daf80
[   21.077245]  which belongs to the cache kmalloc-64 of size 64
[   21.077520] The buggy address is located 0 bytes to the right of
[   21.077520]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.077620] 
[   21.077925] The buggy address belongs to the physical page:
[   21.078023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.078503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.078761] page_type: f5(slab)
[   21.078937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.079553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.079604] page dumped because: kasan: bad access detected
[   21.079641] 
[   21.079661] Memory state around the buggy address:
[   21.079697]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.079953]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.080150] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.080220]                                      ^
[   21.080450]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.080599]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.080641] ==================================================================
[   21.081907] ==================================================================
[   21.082135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.082253] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.082309] 
[   21.082603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.082700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.082737] Hardware name: linux,dummy-virt (DT)
[   21.083204] Call trace:
[   21.083257]  show_stack+0x20/0x38 (C)
[   21.083470]  dump_stack_lvl+0x8c/0xd0
[   21.083603]  print_report+0x118/0x608
[   21.083761]  kasan_report+0xdc/0x128
[   21.083836]  __asan_report_load8_noabort+0x20/0x30
[   21.083898]  kasan_atomics_helper+0x3db0/0x4858
[   21.084335]  kasan_atomics+0x198/0x2e0
[   21.084551]  kunit_try_run_case+0x170/0x3f0
[   21.084751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.084849]  kthread+0x328/0x630
[   21.084905]  ret_from_fork+0x10/0x20
[   21.084954] 
[   21.085518] Allocated by task 265:
[   21.085615]  kasan_save_stack+0x3c/0x68
[   21.085758]  kasan_save_track+0x20/0x40
[   21.085843]  kasan_save_alloc_info+0x40/0x58
[   21.085955]  __kasan_kmalloc+0xd4/0xd8
[   21.086387]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.086570]  kasan_atomics+0xb8/0x2e0
[   21.086645]  kunit_try_run_case+0x170/0x3f0
[   21.086783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.086897]  kthread+0x328/0x630
[   21.086985]  ret_from_fork+0x10/0x20
[   21.087405] 
[   21.087449] The buggy address belongs to the object at fff00000c77daf80
[   21.087449]  which belongs to the cache kmalloc-64 of size 64
[   21.087777] The buggy address is located 0 bytes to the right of
[   21.087777]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.088044] 
[   21.088073] The buggy address belongs to the physical page:
[   21.088107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.088169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.088672] page_type: f5(slab)
[   21.088725] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.089039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.089474] page dumped because: kasan: bad access detected
[   21.089607] 
[   21.089632] Memory state around the buggy address:
[   21.089670]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.089995]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.090140] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.090381]                                      ^
[   21.090509]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.090553]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.090919] ==================================================================
[   21.030096] ==================================================================
[   21.030192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.030366] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.030428] 
[   21.030531] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.030638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.030675] Hardware name: linux,dummy-virt (DT)
[   21.030708] Call trace:
[   21.030734]  show_stack+0x20/0x38 (C)
[   21.031044]  dump_stack_lvl+0x8c/0xd0
[   21.031268]  print_report+0x118/0x608
[   21.031477]  kasan_report+0xdc/0x128
[   21.031595]  __asan_report_load8_noabort+0x20/0x30
[   21.031833]  kasan_atomics_helper+0x3f04/0x4858
[   21.032074]  kasan_atomics+0x198/0x2e0
[   21.032337]  kunit_try_run_case+0x170/0x3f0
[   21.032542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.032759]  kthread+0x328/0x630
[   21.033219]  ret_from_fork+0x10/0x20
[   21.033491] 
[   21.033645] Allocated by task 265:
[   21.033785]  kasan_save_stack+0x3c/0x68
[   21.033837]  kasan_save_track+0x20/0x40
[   21.034071]  kasan_save_alloc_info+0x40/0x58
[   21.034335]  __kasan_kmalloc+0xd4/0xd8
[   21.034582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.034734]  kasan_atomics+0xb8/0x2e0
[   21.034977]  kunit_try_run_case+0x170/0x3f0
[   21.035024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.035091]  kthread+0x328/0x630
[   21.035132]  ret_from_fork+0x10/0x20
[   21.035352] 
[   21.036031] The buggy address belongs to the object at fff00000c77daf80
[   21.036031]  which belongs to the cache kmalloc-64 of size 64
[   21.036147] The buggy address is located 0 bytes to the right of
[   21.036147]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.036244] 
[   21.036471] The buggy address belongs to the physical page:
[   21.036518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.037006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.037086] page_type: f5(slab)
[   21.037332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.037840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.037923] page dumped because: kasan: bad access detected
[   21.038337] 
[   21.038555] Memory state around the buggy address:
[   21.038599]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.038646]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.038877] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.039216]                                      ^
[   21.039437]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.039509]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.039551] ==================================================================
[   20.918977] ==================================================================
[   20.919139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.919321] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.919405] 
[   20.919478] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.919562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.919591] Hardware name: linux,dummy-virt (DT)
[   20.919625] Call trace:
[   20.919648]  show_stack+0x20/0x38 (C)
[   20.919697]  dump_stack_lvl+0x8c/0xd0
[   20.919747]  print_report+0x118/0x608
[   20.919796]  kasan_report+0xdc/0x128
[   20.919842]  kasan_check_range+0x100/0x1a8
[   20.919904]  __kasan_check_write+0x20/0x30
[   20.920174]  kasan_atomics_helper+0xeb8/0x4858
[   20.920649]  kasan_atomics+0x198/0x2e0
[   20.920838]  kunit_try_run_case+0x170/0x3f0
[   20.920923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.921108]  kthread+0x328/0x630
[   20.921181]  ret_from_fork+0x10/0x20
[   20.921231] 
[   20.921283] Allocated by task 265:
[   20.921527]  kasan_save_stack+0x3c/0x68
[   20.921892]  kasan_save_track+0x20/0x40
[   20.922045]  kasan_save_alloc_info+0x40/0x58
[   20.922143]  __kasan_kmalloc+0xd4/0xd8
[   20.922309]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.922395]  kasan_atomics+0xb8/0x2e0
[   20.922526]  kunit_try_run_case+0x170/0x3f0
[   20.922747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.922927]  kthread+0x328/0x630
[   20.923311]  ret_from_fork+0x10/0x20
[   20.923426] 
[   20.923459] The buggy address belongs to the object at fff00000c77daf80
[   20.923459]  which belongs to the cache kmalloc-64 of size 64
[   20.923521] The buggy address is located 0 bytes to the right of
[   20.923521]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.923585] 
[   20.923927] The buggy address belongs to the physical page:
[   20.924058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.924122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.924175] page_type: f5(slab)
[   20.924214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.924278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.924322] page dumped because: kasan: bad access detected
[   20.924357] 
[   20.924387] Memory state around the buggy address:
[   20.924422]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.924484]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.924537] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.924576]                                      ^
[   20.924612]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.924655]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.924695] ==================================================================
[   21.108894] ==================================================================
[   21.108972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.109023] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.109320] 
[   21.109364] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.109458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.109801] Hardware name: linux,dummy-virt (DT)
[   21.109853] Call trace:
[   21.110073]  show_stack+0x20/0x38 (C)
[   21.110153]  dump_stack_lvl+0x8c/0xd0
[   21.110358]  print_report+0x118/0x608
[   21.110420]  kasan_report+0xdc/0x128
[   21.110498]  kasan_check_range+0x100/0x1a8
[   21.110647]  __kasan_check_write+0x20/0x30
[   21.110711]  kasan_atomics_helper+0x16d0/0x4858
[   21.111109]  kasan_atomics+0x198/0x2e0
[   21.111471]  kunit_try_run_case+0x170/0x3f0
[   21.111702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.111765]  kthread+0x328/0x630
[   21.111807]  ret_from_fork+0x10/0x20
[   21.111895] 
[   21.112172] Allocated by task 265:
[   21.112440]  kasan_save_stack+0x3c/0x68
[   21.112585]  kasan_save_track+0x20/0x40
[   21.112712]  kasan_save_alloc_info+0x40/0x58
[   21.112764]  __kasan_kmalloc+0xd4/0xd8
[   21.112804]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.112883]  kasan_atomics+0xb8/0x2e0
[   21.112925]  kunit_try_run_case+0x170/0x3f0
[   21.112964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.113022]  kthread+0x328/0x630
[   21.113066]  ret_from_fork+0x10/0x20
[   21.113103] 
[   21.113135] The buggy address belongs to the object at fff00000c77daf80
[   21.113135]  which belongs to the cache kmalloc-64 of size 64
[   21.113212] The buggy address is located 0 bytes to the right of
[   21.113212]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.113278] 
[   21.113299] The buggy address belongs to the physical page:
[   21.113346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.113411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.113471] page_type: f5(slab)
[   21.113535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.113587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.113629] page dumped because: kasan: bad access detected
[   21.113673] 
[   21.113693] Memory state around the buggy address:
[   21.113728]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.113782]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.113827] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.114217]                                      ^
[   21.114614]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.114694]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.114776] ==================================================================
[   21.135315] ==================================================================
[   21.135588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.135652] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.135703] 
[   21.135736] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.135816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.135844] Hardware name: linux,dummy-virt (DT)
[   21.135960] Call trace:
[   21.135986]  show_stack+0x20/0x38 (C)
[   21.136038]  dump_stack_lvl+0x8c/0xd0
[   21.136085]  print_report+0x118/0x608
[   21.136134]  kasan_report+0xdc/0x128
[   21.136181]  __asan_report_load8_noabort+0x20/0x30
[   21.136230]  kasan_atomics_helper+0x3e20/0x4858
[   21.136282]  kasan_atomics+0x198/0x2e0
[   21.136341]  kunit_try_run_case+0x170/0x3f0
[   21.136393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.136447]  kthread+0x328/0x630
[   21.136500]  ret_from_fork+0x10/0x20
[   21.136551] 
[   21.136571] Allocated by task 265:
[   21.136600]  kasan_save_stack+0x3c/0x68
[   21.136652]  kasan_save_track+0x20/0x40
[   21.136696]  kasan_save_alloc_info+0x40/0x58
[   21.136748]  __kasan_kmalloc+0xd4/0xd8
[   21.136787]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.136835]  kasan_atomics+0xb8/0x2e0
[   21.137631]  kunit_try_run_case+0x170/0x3f0
[   21.137712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.137773]  kthread+0x328/0x630
[   21.137808]  ret_from_fork+0x10/0x20
[   21.138037] 
[   21.138072] The buggy address belongs to the object at fff00000c77daf80
[   21.138072]  which belongs to the cache kmalloc-64 of size 64
[   21.138133] The buggy address is located 0 bytes to the right of
[   21.138133]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.138208] 
[   21.138229] The buggy address belongs to the physical page:
[   21.138262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.138319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.138662] page_type: f5(slab)
[   21.138873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.139127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.139215] page dumped because: kasan: bad access detected
[   21.139384] 
[   21.139447] Memory state around the buggy address:
[   21.139900]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.139993]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.140219] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.140412]                                      ^
[   21.140496]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.140703]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.140751] ==================================================================
[   21.091850] ==================================================================
[   21.092018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.092161] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.092247] 
[   21.092282] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.092397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.092425] Hardware name: linux,dummy-virt (DT)
[   21.092622] Call trace:
[   21.092794]  show_stack+0x20/0x38 (C)
[   21.092875]  dump_stack_lvl+0x8c/0xd0
[   21.093138]  print_report+0x118/0x608
[   21.093206]  kasan_report+0xdc/0x128
[   21.093440]  kasan_check_range+0x100/0x1a8
[   21.093665]  __kasan_check_write+0x20/0x30
[   21.093728]  kasan_atomics_helper+0x1644/0x4858
[   21.093808]  kasan_atomics+0x198/0x2e0
[   21.093905]  kunit_try_run_case+0x170/0x3f0
[   21.094111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.094224]  kthread+0x328/0x630
[   21.094511]  ret_from_fork+0x10/0x20
[   21.094593] 
[   21.094630] Allocated by task 265:
[   21.094665]  kasan_save_stack+0x3c/0x68
[   21.094710]  kasan_save_track+0x20/0x40
[   21.094947]  kasan_save_alloc_info+0x40/0x58
[   21.095119]  __kasan_kmalloc+0xd4/0xd8
[   21.095168]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.095211]  kasan_atomics+0xb8/0x2e0
[   21.095297]  kunit_try_run_case+0x170/0x3f0
[   21.095342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.095401]  kthread+0x328/0x630
[   21.095442]  ret_from_fork+0x10/0x20
[   21.095480] 
[   21.095522] The buggy address belongs to the object at fff00000c77daf80
[   21.095522]  which belongs to the cache kmalloc-64 of size 64
[   21.095584] The buggy address is located 0 bytes to the right of
[   21.095584]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.095667] 
[   21.095692] The buggy address belongs to the physical page:
[   21.095746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.095812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.095879] page_type: f5(slab)
[   21.095938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.095997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.096039] page dumped because: kasan: bad access detected
[   21.096075] 
[   21.096095] Memory state around the buggy address:
[   21.096130]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.096177]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.096231] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.096287]                                      ^
[   21.096323]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.096364]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.096413] ==================================================================
[   21.040019] ==================================================================
[   21.040088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.040150] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.040204] 
[   21.040238] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.040320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.040348] Hardware name: linux,dummy-virt (DT)
[   21.040392] Call trace:
[   21.040416]  show_stack+0x20/0x38 (C)
[   21.040467]  dump_stack_lvl+0x8c/0xd0
[   21.040513]  print_report+0x118/0x608
[   21.040568]  kasan_report+0xdc/0x128
[   21.040615]  kasan_check_range+0x100/0x1a8
[   21.040673]  __kasan_check_write+0x20/0x30
[   21.040721]  kasan_atomics_helper+0x1414/0x4858
[   21.040777]  kasan_atomics+0x198/0x2e0
[   21.040826]  kunit_try_run_case+0x170/0x3f0
[   21.040905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.040974]  kthread+0x328/0x630
[   21.041018]  ret_from_fork+0x10/0x20
[   21.041066] 
[   21.041086] Allocated by task 265:
[   21.041117]  kasan_save_stack+0x3c/0x68
[   21.041166]  kasan_save_track+0x20/0x40
[   21.041220]  kasan_save_alloc_info+0x40/0x58
[   21.041272]  __kasan_kmalloc+0xd4/0xd8
[   21.041311]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.041352]  kasan_atomics+0xb8/0x2e0
[   21.041396]  kunit_try_run_case+0x170/0x3f0
[   21.041446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.041491]  kthread+0x328/0x630
[   21.041524]  ret_from_fork+0x10/0x20
[   21.041562] 
[   21.041588] The buggy address belongs to the object at fff00000c77daf80
[   21.041588]  which belongs to the cache kmalloc-64 of size 64
[   21.041649] The buggy address is located 0 bytes to the right of
[   21.041649]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.041713] 
[   21.041735] The buggy address belongs to the physical page:
[   21.041776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.041837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.041925] page_type: f5(slab)
[   21.042389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.042459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.043047] page dumped because: kasan: bad access detected
[   21.043143] 
[   21.043187] Memory state around the buggy address:
[   21.043260]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.043332]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.043407] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.043729]                                      ^
[   21.043773]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.043922]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.043964] ==================================================================
[   20.772892] ==================================================================
[   20.772944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.772995] Read of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.773047] 
[   20.773380] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.773550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.773585] Hardware name: linux,dummy-virt (DT)
[   20.773619] Call trace:
[   20.773683]  show_stack+0x20/0x38 (C)
[   20.773912]  dump_stack_lvl+0x8c/0xd0
[   20.774127]  print_report+0x118/0x608
[   20.774192]  kasan_report+0xdc/0x128
[   20.774242]  __asan_report_load4_noabort+0x20/0x30
[   20.774531]  kasan_atomics_helper+0x42d8/0x4858
[   20.774660]  kasan_atomics+0x198/0x2e0
[   20.774723]  kunit_try_run_case+0x170/0x3f0
[   20.774823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.774956]  kthread+0x328/0x630
[   20.775014]  ret_from_fork+0x10/0x20
[   20.775445] 
[   20.776111]  __kasan_kmalloc+0xd4/0xd8
[   20.776163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.776251]  kasan_atomics+0xb8/0x2e0
[   20.776466]  kunit_try_run_case+0x170/0x3f0
[   20.776783]  kthread+0x328/0x630
[   20.777217] The buggy address is located 0 bytes to the right of
[   20.777217]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.778852] 
[   20.779192] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.780998] ==================================================================
[   20.895991] ==================================================================
[   20.896155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.896219] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.896271] 
[   20.896304] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.896385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.896436] Hardware name: linux,dummy-virt (DT)
[   20.896471] Call trace:
[   20.896495]  show_stack+0x20/0x38 (C)
[   20.896545]  dump_stack_lvl+0x8c/0xd0
[   20.896596]  print_report+0x118/0x608
[   20.896644]  kasan_report+0xdc/0x128
[   20.896692]  __asan_report_load8_noabort+0x20/0x30
[   20.896741]  kasan_atomics_helper+0x3f58/0x4858
[   20.896790]  kasan_atomics+0x198/0x2e0
[   20.896837]  kunit_try_run_case+0x170/0x3f0
[   20.896902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.896962]  kthread+0x328/0x630
[   20.897007]  ret_from_fork+0x10/0x20
[   20.897055] 
[   20.897075] Allocated by task 265:
[   20.897106]  kasan_save_stack+0x3c/0x68
[   20.897150]  kasan_save_track+0x20/0x40
[   20.897191]  kasan_save_alloc_info+0x40/0x58
[   20.897234]  __kasan_kmalloc+0xd4/0xd8
[   20.897273]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.897316]  kasan_atomics+0xb8/0x2e0
[   20.897354]  kunit_try_run_case+0x170/0x3f0
[   20.897394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.897440]  kthread+0x328/0x630
[   20.897496]  ret_from_fork+0x10/0x20
[   20.897541] 
[   20.897567] The buggy address belongs to the object at fff00000c77daf80
[   20.897567]  which belongs to the cache kmalloc-64 of size 64
[   20.897627] The buggy address is located 0 bytes to the right of
[   20.897627]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.897703] 
[   20.897733] The buggy address belongs to the physical page:
[   20.897766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.897824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.898269] page_type: f5(slab)
[   20.898318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.898714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.898803] page dumped because: kasan: bad access detected
[   20.898858] 
[   20.898888] Memory state around the buggy address:
[   20.898923]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.898967]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.899012] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.899053]                                      ^
[   20.899335]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.899696]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.899984] ==================================================================
[   20.909718] ==================================================================
[   20.909879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.909937] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.910004] 
[   20.910205] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.910300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.910336] Hardware name: linux,dummy-virt (DT)
[   20.910641] Call trace:
[   20.910819]  show_stack+0x20/0x38 (C)
[   20.910969]  dump_stack_lvl+0x8c/0xd0
[   20.911121]  print_report+0x118/0x608
[   20.911182]  kasan_report+0xdc/0x128
[   20.911229]  __asan_report_store8_noabort+0x20/0x30
[   20.911286]  kasan_atomics_helper+0x3e5c/0x4858
[   20.911670]  kasan_atomics+0x198/0x2e0
[   20.911748]  kunit_try_run_case+0x170/0x3f0
[   20.911961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.912170]  kthread+0x328/0x630
[   20.912328]  ret_from_fork+0x10/0x20
[   20.912448] 
[   20.912507] Allocated by task 265:
[   20.912879]  kasan_save_stack+0x3c/0x68
[   20.913201]  kasan_save_track+0x20/0x40
[   20.913285]  kasan_save_alloc_info+0x40/0x58
[   20.913623]  __kasan_kmalloc+0xd4/0xd8
[   20.913698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.914052]  kasan_atomics+0xb8/0x2e0
[   20.914455]  kunit_try_run_case+0x170/0x3f0
[   20.914553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.914847]  kthread+0x328/0x630
[   20.915046]  ret_from_fork+0x10/0x20
[   20.915098] 
[   20.915121] The buggy address belongs to the object at fff00000c77daf80
[   20.915121]  which belongs to the cache kmalloc-64 of size 64
[   20.915180] The buggy address is located 0 bytes to the right of
[   20.915180]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.915536] 
[   20.915992] The buggy address belongs to the physical page:
[   20.916041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.916483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.916590] page_type: f5(slab)
[   20.916665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.916944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.917109] page dumped because: kasan: bad access detected
[   20.917370] 
[   20.917412] Memory state around the buggy address:
[   20.917549]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.917613]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.917671] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.917709]                                      ^
[   20.917755]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.917799]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.917848] ==================================================================
[   20.789097] ==================================================================
[   20.789192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.789324] Write of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.789410] 
[   20.789508] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.789597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.789626] Hardware name: linux,dummy-virt (DT)
[   20.789675] Call trace:
[   20.789702]  show_stack+0x20/0x38 (C)
[   20.790026]  dump_stack_lvl+0x8c/0xd0
[   20.790109]  print_report+0x118/0x608
[   20.790286]  kasan_report+0xdc/0x128
[   20.790500]  kasan_check_range+0x100/0x1a8
[   20.790562]  __kasan_check_write+0x20/0x30
[   20.790608]  kasan_atomics_helper+0x99c/0x4858
[   20.790774]  kasan_atomics+0x198/0x2e0
[   20.790961]  kunit_try_run_case+0x170/0x3f0
[   20.791031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.791105]  kthread+0x328/0x630
[   20.791149]  ret_from_fork+0x10/0x20
[   20.791198] 
[   20.791597] Allocated by task 265:
[   20.791692]  kasan_save_stack+0x3c/0x68
[   20.791757]  kasan_save_track+0x20/0x40
[   20.791846]  kasan_save_alloc_info+0x40/0x58
[   20.791912]  __kasan_kmalloc+0xd4/0xd8
[   20.791955]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.791995]  kasan_atomics+0xb8/0x2e0
[   20.792043]  kunit_try_run_case+0x170/0x3f0
[   20.792093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.792140]  kthread+0x328/0x630
[   20.792185]  ret_from_fork+0x10/0x20
[   20.792223] 
[   20.792245] The buggy address belongs to the object at fff00000c77daf80
[   20.792245]  which belongs to the cache kmalloc-64 of size 64
[   20.792314] The buggy address is located 0 bytes to the right of
[   20.792314]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.792378] 
[   20.792399] The buggy address belongs to the physical page:
[   20.792433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.792489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.792538] page_type: f5(slab)
[   20.792577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.792629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.792687] page dumped because: kasan: bad access detected
[   20.792721] 
[   20.792747] Memory state around the buggy address:
[   20.792780]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.792832]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.792895] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.792946]                                      ^
[   20.792982]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.793035]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.793074] ==================================================================
[   20.990395] ==================================================================
[   20.990456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.990505] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.990730] 
[   20.990875] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.991447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.991606] Hardware name: linux,dummy-virt (DT)
[   20.991645] Call trace:
[   20.991670]  show_stack+0x20/0x38 (C)
[   20.992297]  dump_stack_lvl+0x8c/0xd0
[   20.992512]  print_report+0x118/0x608
[   20.992850]  kasan_report+0xdc/0x128
[   20.993109]  kasan_check_range+0x100/0x1a8
[   20.993188]  __kasan_check_write+0x20/0x30
[   20.993322]  kasan_atomics_helper+0x11f8/0x4858
[   20.993442]  kasan_atomics+0x198/0x2e0
[   20.993510]  kunit_try_run_case+0x170/0x3f0
[   20.993785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.994157]  kthread+0x328/0x630
[   20.994385]  ret_from_fork+0x10/0x20
[   20.994490] 
[   20.994544] Allocated by task 265:
[   20.994713]  kasan_save_stack+0x3c/0x68
[   20.994837]  kasan_save_track+0x20/0x40
[   20.995231]  kasan_save_alloc_info+0x40/0x58
[   20.995511]  __kasan_kmalloc+0xd4/0xd8
[   20.995682]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.995842]  kasan_atomics+0xb8/0x2e0
[   20.995991]  kunit_try_run_case+0x170/0x3f0
[   20.996035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.996100]  kthread+0x328/0x630
[   20.996438]  ret_from_fork+0x10/0x20
[   20.996772] 
[   20.996844] The buggy address belongs to the object at fff00000c77daf80
[   20.996844]  which belongs to the cache kmalloc-64 of size 64
[   20.997314] The buggy address is located 0 bytes to the right of
[   20.997314]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.997794] 
[   20.997827] The buggy address belongs to the physical page:
[   20.997926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.998333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.998798] page_type: f5(slab)
[   20.998856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.999217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.999502] page dumped because: kasan: bad access detected
[   20.999810] 
[   20.999887] Memory state around the buggy address:
[   21.000093]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.000440]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.000499] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.000971]                                      ^
[   21.001337]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.001421]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.001819] ==================================================================
[   21.054636] ==================================================================
[   21.054854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.055023] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.055086] 
[   21.055140] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.055393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.055589] Hardware name: linux,dummy-virt (DT)
[   21.055643] Call trace:
[   21.055843]  show_stack+0x20/0x38 (C)
[   21.056319]  dump_stack_lvl+0x8c/0xd0
[   21.056423]  print_report+0x118/0x608
[   21.056615]  kasan_report+0xdc/0x128
[   21.056694]  kasan_check_range+0x100/0x1a8
[   21.057107]  __kasan_check_write+0x20/0x30
[   21.057320]  kasan_atomics_helper+0x14e4/0x4858
[   21.057440]  kasan_atomics+0x198/0x2e0
[   21.057856]  kunit_try_run_case+0x170/0x3f0
[   21.057955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.058272]  kthread+0x328/0x630
[   21.058428]  ret_from_fork+0x10/0x20
[   21.058645] 
[   21.058935] Allocated by task 265:
[   21.059232]  kasan_save_stack+0x3c/0x68
[   21.059448]  kasan_save_track+0x20/0x40
[   21.059654]  kasan_save_alloc_info+0x40/0x58
[   21.059733]  __kasan_kmalloc+0xd4/0xd8
[   21.059896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.060009]  kasan_atomics+0xb8/0x2e0
[   21.060193]  kunit_try_run_case+0x170/0x3f0
[   21.060281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.060525]  kthread+0x328/0x630
[   21.060956]  ret_from_fork+0x10/0x20
[   21.061039] 
[   21.061189] The buggy address belongs to the object at fff00000c77daf80
[   21.061189]  which belongs to the cache kmalloc-64 of size 64
[   21.061292] The buggy address is located 0 bytes to the right of
[   21.061292]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.061510] 
[   21.061559] The buggy address belongs to the physical page:
[   21.061648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.061876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.062104] page_type: f5(slab)
[   21.062173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.062465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.062595] page dumped because: kasan: bad access detected
[   21.062741] 
[   21.063236] Memory state around the buggy address:
[   21.063296]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.063494]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.063755] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.063929]                                      ^
[   21.064208]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.064393]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.064448] ==================================================================
[   21.002848] ==================================================================
[   21.003123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.003175] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.003472] 
[   21.003651] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.004176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.004269] Hardware name: linux,dummy-virt (DT)
[   21.004318] Call trace:
[   21.004498]  show_stack+0x20/0x38 (C)
[   21.004572]  dump_stack_lvl+0x8c/0xd0
[   21.004688]  print_report+0x118/0x608
[   21.005040]  kasan_report+0xdc/0x128
[   21.005287]  kasan_check_range+0x100/0x1a8
[   21.005390]  __kasan_check_write+0x20/0x30
[   21.005452]  kasan_atomics_helper+0x126c/0x4858
[   21.005501]  kasan_atomics+0x198/0x2e0
[   21.005553]  kunit_try_run_case+0x170/0x3f0
[   21.005605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.005672]  kthread+0x328/0x630
[   21.005719]  ret_from_fork+0x10/0x20
[   21.005790] 
[   21.005819] Allocated by task 265:
[   21.005872]  kasan_save_stack+0x3c/0x68
[   21.005926]  kasan_save_track+0x20/0x40
[   21.005967]  kasan_save_alloc_info+0x40/0x58
[   21.006010]  __kasan_kmalloc+0xd4/0xd8
[   21.006048]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.006090]  kasan_atomics+0xb8/0x2e0
[   21.006127]  kunit_try_run_case+0x170/0x3f0
[   21.006174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.006225]  kthread+0x328/0x630
[   21.006267]  ret_from_fork+0x10/0x20
[   21.006317] 
[   21.006348] The buggy address belongs to the object at fff00000c77daf80
[   21.006348]  which belongs to the cache kmalloc-64 of size 64
[   21.006410] The buggy address is located 0 bytes to the right of
[   21.006410]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.006476] 
[   21.006497] The buggy address belongs to the physical page:
[   21.006545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.006617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.006668] page_type: f5(slab)
[   21.006706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.007090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.007521] page dumped because: kasan: bad access detected
[   21.007581] 
[   21.007603] Memory state around the buggy address:
[   21.007639]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.007738]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.008067] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.008131]                                      ^
[   21.008618]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.009190]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.009509] ==================================================================
[   21.010057] ==================================================================
[   21.010371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.010435] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   21.010487] 
[   21.010716] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.010905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.011249] Hardware name: linux,dummy-virt (DT)
[   21.011307] Call trace:
[   21.011434]  show_stack+0x20/0x38 (C)
[   21.011650]  dump_stack_lvl+0x8c/0xd0
[   21.011746]  print_report+0x118/0x608
[   21.011967]  kasan_report+0xdc/0x128
[   21.012217]  kasan_check_range+0x100/0x1a8
[   21.012435]  __kasan_check_write+0x20/0x30
[   21.012533]  kasan_atomics_helper+0x12d8/0x4858
[   21.012935]  kasan_atomics+0x198/0x2e0
[   21.013028]  kunit_try_run_case+0x170/0x3f0
[   21.013225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.013303]  kthread+0x328/0x630
[   21.013379]  ret_from_fork+0x10/0x20
[   21.013880] 
[   21.014084] Allocated by task 265:
[   21.014241]  kasan_save_stack+0x3c/0x68
[   21.014448]  kasan_save_track+0x20/0x40
[   21.014532]  kasan_save_alloc_info+0x40/0x58
[   21.014576]  __kasan_kmalloc+0xd4/0xd8
[   21.014639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.014792]  kasan_atomics+0xb8/0x2e0
[   21.015128]  kunit_try_run_case+0x170/0x3f0
[   21.015232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.015457]  kthread+0x328/0x630
[   21.015710]  ret_from_fork+0x10/0x20
[   21.015848] 
[   21.015895] The buggy address belongs to the object at fff00000c77daf80
[   21.015895]  which belongs to the cache kmalloc-64 of size 64
[   21.015958] The buggy address is located 0 bytes to the right of
[   21.015958]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   21.016023] 
[   21.016470] The buggy address belongs to the physical page:
[   21.016713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   21.016982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.017042] page_type: f5(slab)
[   21.017264] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.017664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.017732] page dumped because: kasan: bad access detected
[   21.017853] 
[   21.018138] Memory state around the buggy address:
[   21.018359]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.018684]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.019041] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.019120]                                      ^
[   21.019493]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.019545]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.019585] ==================================================================
[   20.983697] ==================================================================
[   20.983752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.983805] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.984230] 
[   20.984311] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.984473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.984503] Hardware name: linux,dummy-virt (DT)
[   20.984535] Call trace:
[   20.984561]  show_stack+0x20/0x38 (C)
[   20.984634]  dump_stack_lvl+0x8c/0xd0
[   20.984686]  print_report+0x118/0x608
[   20.984733]  kasan_report+0xdc/0x128
[   20.984780]  kasan_check_range+0x100/0x1a8
[   20.984828]  __kasan_check_write+0x20/0x30
[   20.984937]  kasan_atomics_helper+0x1190/0x4858
[   20.984988]  kasan_atomics+0x198/0x2e0
[   20.985033]  kunit_try_run_case+0x170/0x3f0
[   20.985082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.985138]  kthread+0x328/0x630
[   20.985181]  ret_from_fork+0x10/0x20
[   20.985231] 
[   20.985251] Allocated by task 265:
[   20.985290]  kasan_save_stack+0x3c/0x68
[   20.985340]  kasan_save_track+0x20/0x40
[   20.985379]  kasan_save_alloc_info+0x40/0x58
[   20.985428]  __kasan_kmalloc+0xd4/0xd8
[   20.985468]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.985508]  kasan_atomics+0xb8/0x2e0
[   20.985546]  kunit_try_run_case+0x170/0x3f0
[   20.985594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.985641]  kthread+0x328/0x630
[   20.985674]  ret_from_fork+0x10/0x20
[   20.985710] 
[   20.985731] The buggy address belongs to the object at fff00000c77daf80
[   20.985731]  which belongs to the cache kmalloc-64 of size 64
[   20.985790] The buggy address is located 0 bytes to the right of
[   20.985790]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.985854] 
[   20.985886] The buggy address belongs to the physical page:
[   20.986048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.986562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.987001] page_type: f5(slab)
[   20.987114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.987229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.987514] page dumped because: kasan: bad access detected
[   20.987638] 
[   20.987730] Memory state around the buggy address:
[   20.988217]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.988342]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.988422] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.988877]                                      ^
[   20.988935]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.989009]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989284] ==================================================================
[   20.973658] ==================================================================
[   20.973713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.973766] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265
[   20.975242] 
[   20.975300] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.975385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.975414] Hardware name: linux,dummy-virt (DT)
[   20.975454] Call trace:
[   20.975477]  show_stack+0x20/0x38 (C)
[   20.975532]  dump_stack_lvl+0x8c/0xd0
[   20.975581]  print_report+0x118/0x608
[   20.975629]  kasan_report+0xdc/0x128
[   20.975674]  kasan_check_range+0x100/0x1a8
[   20.975723]  __kasan_check_write+0x20/0x30
[   20.975768]  kasan_atomics_helper+0x1128/0x4858
[   20.975817]  kasan_atomics+0x198/0x2e0
[   20.975880]  kunit_try_run_case+0x170/0x3f0
[   20.975952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.976065]  kthread+0x328/0x630
[   20.976245]  ret_from_fork+0x10/0x20
[   20.976570] 
[   20.976632] Allocated by task 265:
[   20.976685]  kasan_save_stack+0x3c/0x68
[   20.976757]  kasan_save_track+0x20/0x40
[   20.977158]  kasan_save_alloc_info+0x40/0x58
[   20.977337]  __kasan_kmalloc+0xd4/0xd8
[   20.977397]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.977448]  kasan_atomics+0xb8/0x2e0
[   20.977676]  kunit_try_run_case+0x170/0x3f0
[   20.978166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.978371]  kthread+0x328/0x630
[   20.978539]  ret_from_fork+0x10/0x20
[   20.978782] 
[   20.978840] The buggy address belongs to the object at fff00000c77daf80
[   20.978840]  which belongs to the cache kmalloc-64 of size 64
[   20.978958] The buggy address is located 0 bytes to the right of
[   20.978958]  allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0)
[   20.979119] 
[   20.979177] The buggy address belongs to the physical page:
[   20.979452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da
[   20.980102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.980202] page_type: f5(slab)
[   20.980281] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.980651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.980843] page dumped because: kasan: bad access detected
[   20.981066] 
[   20.981308] Memory state around the buggy address:
[   20.981388]  fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.981857]  fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.981929] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.981970]                                      ^
[   20.982006]  fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.982052]  fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.982179] ==================================================================

[   14.902731] ==================================================================
[   14.903187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.903873] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.904144] 
[   14.904262] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.904307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.904332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.904355] Call Trace:
[   14.904372]  <TASK>
[   14.904400]  dump_stack_lvl+0x73/0xb0
[   14.904430]  print_report+0xd1/0x650
[   14.904464]  ? __virt_addr_valid+0x1db/0x2d0
[   14.904487]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.904519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.904542]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.904576]  kasan_report+0x141/0x180
[   14.904601]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.904630]  __asan_report_store8_noabort+0x1b/0x30
[   14.904653]  kasan_atomics_helper+0x50d4/0x5450
[   14.904679]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.904705]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.904732]  ? kasan_atomics+0x152/0x310
[   14.904775]  kasan_atomics+0x1dc/0x310
[   14.904799]  ? __pfx_kasan_atomics+0x10/0x10
[   14.904825]  ? __pfx_read_tsc+0x10/0x10
[   14.904847]  ? ktime_get_ts64+0x86/0x230
[   14.904873]  kunit_try_run_case+0x1a5/0x480
[   14.904898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.904931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.904956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.904991]  ? __kthread_parkme+0x82/0x180
[   14.905013]  ? preempt_count_sub+0x50/0x80
[   14.905038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.905063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.905087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.905112]  kthread+0x337/0x6f0
[   14.905133]  ? trace_preempt_on+0x20/0xc0
[   14.905157]  ? __pfx_kthread+0x10/0x10
[   14.905179]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.905201]  ? calculate_sigpending+0x7b/0xa0
[   14.905226]  ? __pfx_kthread+0x10/0x10
[   14.905249]  ret_from_fork+0x116/0x1d0
[   14.905268]  ? __pfx_kthread+0x10/0x10
[   14.905290]  ret_from_fork_asm+0x1a/0x30
[   14.905331]  </TASK>
[   14.905344] 
[   14.912837] Allocated by task 283:
[   14.913032]  kasan_save_stack+0x45/0x70
[   14.913219]  kasan_save_track+0x18/0x40
[   14.913405]  kasan_save_alloc_info+0x3b/0x50
[   14.913593]  __kasan_kmalloc+0xb7/0xc0
[   14.913850]  __kmalloc_cache_noprof+0x189/0x420
[   14.914044]  kasan_atomics+0x95/0x310
[   14.914215]  kunit_try_run_case+0x1a5/0x480
[   14.914366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.914633]  kthread+0x337/0x6f0
[   14.914839]  ret_from_fork+0x116/0x1d0
[   14.915016]  ret_from_fork_asm+0x1a/0x30
[   14.915190] 
[   14.915289] The buggy address belongs to the object at ffff8881031c4500
[   14.915289]  which belongs to the cache kmalloc-64 of size 64
[   14.915820] The buggy address is located 0 bytes to the right of
[   14.915820]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.916356] 
[   14.916473] The buggy address belongs to the physical page:
[   14.916715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.917057] flags: 0x200000000000000(node=0|zone=2)
[   14.917278] page_type: f5(slab)
[   14.917408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.917657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.917933] page dumped because: kasan: bad access detected
[   14.918211] 
[   14.918321] Memory state around the buggy address:
[   14.918558]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.918833]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.919052] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.919269]                                      ^
[   14.919676]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.919998]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.920345] ==================================================================
[   15.096857] ==================================================================
[   15.097101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.097732] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.098064] 
[   15.098199] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.098244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.098259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.098283] Call Trace:
[   15.098300]  <TASK>
[   15.098316]  dump_stack_lvl+0x73/0xb0
[   15.098345]  print_report+0xd1/0x650
[   15.098368]  ? __virt_addr_valid+0x1db/0x2d0
[   15.098391]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.098415]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.098439]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.098476]  kasan_report+0x141/0x180
[   15.098499]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.098528]  kasan_check_range+0x10c/0x1c0
[   15.098553]  __kasan_check_write+0x18/0x20
[   15.098573]  kasan_atomics_helper+0x19e3/0x5450
[   15.098598]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.098621]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.098648]  ? kasan_atomics+0x152/0x310
[   15.098675]  kasan_atomics+0x1dc/0x310
[   15.098710]  ? __pfx_kasan_atomics+0x10/0x10
[   15.098735]  ? __pfx_read_tsc+0x10/0x10
[   15.098757]  ? ktime_get_ts64+0x86/0x230
[   15.098782]  kunit_try_run_case+0x1a5/0x480
[   15.098808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.098830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.098854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.098879]  ? __kthread_parkme+0x82/0x180
[   15.098901]  ? preempt_count_sub+0x50/0x80
[   15.098927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.098952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.098976]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.099000]  kthread+0x337/0x6f0
[   15.099022]  ? trace_preempt_on+0x20/0xc0
[   15.099045]  ? __pfx_kthread+0x10/0x10
[   15.099068]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.099091]  ? calculate_sigpending+0x7b/0xa0
[   15.099116]  ? __pfx_kthread+0x10/0x10
[   15.099138]  ret_from_fork+0x116/0x1d0
[   15.099158]  ? __pfx_kthread+0x10/0x10
[   15.099179]  ret_from_fork_asm+0x1a/0x30
[   15.099211]  </TASK>
[   15.099226] 
[   15.107026] Allocated by task 283:
[   15.107168]  kasan_save_stack+0x45/0x70
[   15.107327]  kasan_save_track+0x18/0x40
[   15.107534]  kasan_save_alloc_info+0x3b/0x50
[   15.107822]  __kasan_kmalloc+0xb7/0xc0
[   15.107993]  __kmalloc_cache_noprof+0x189/0x420
[   15.108185]  kasan_atomics+0x95/0x310
[   15.108322]  kunit_try_run_case+0x1a5/0x480
[   15.108483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.108663]  kthread+0x337/0x6f0
[   15.108843]  ret_from_fork+0x116/0x1d0
[   15.109035]  ret_from_fork_asm+0x1a/0x30
[   15.109242] 
[   15.109345] The buggy address belongs to the object at ffff8881031c4500
[   15.109345]  which belongs to the cache kmalloc-64 of size 64
[   15.109947] The buggy address is located 0 bytes to the right of
[   15.109947]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.110363] 
[   15.110474] The buggy address belongs to the physical page:
[   15.110793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.111150] flags: 0x200000000000000(node=0|zone=2)
[   15.111367] page_type: f5(slab)
[   15.111554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.111907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.112204] page dumped because: kasan: bad access detected
[   15.112450] 
[   15.112536] Memory state around the buggy address:
[   15.112769]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.113063]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.113345] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.113652]                                      ^
[   15.113860]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.114147]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.114424] ==================================================================
[   15.458013] ==================================================================
[   15.458554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.459042] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.459308] 
[   15.459401] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.459445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.459469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.459493] Call Trace:
[   15.459508]  <TASK>
[   15.459524]  dump_stack_lvl+0x73/0xb0
[   15.459555]  print_report+0xd1/0x650
[   15.459578]  ? __virt_addr_valid+0x1db/0x2d0
[   15.459602]  ? kasan_atomics_helper+0x224c/0x5450
[   15.459625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.459648]  ? kasan_atomics_helper+0x224c/0x5450
[   15.459678]  kasan_report+0x141/0x180
[   15.459702]  ? kasan_atomics_helper+0x224c/0x5450
[   15.459730]  kasan_check_range+0x10c/0x1c0
[   15.459755]  __kasan_check_write+0x18/0x20
[   15.459776]  kasan_atomics_helper+0x224c/0x5450
[   15.459800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.459824]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.459850]  ? kasan_atomics+0x152/0x310
[   15.459878]  kasan_atomics+0x1dc/0x310
[   15.459902]  ? __pfx_kasan_atomics+0x10/0x10
[   15.459927]  ? __pfx_read_tsc+0x10/0x10
[   15.459949]  ? ktime_get_ts64+0x86/0x230
[   15.459993]  kunit_try_run_case+0x1a5/0x480
[   15.460038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.460061]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.460086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.460111]  ? __kthread_parkme+0x82/0x180
[   15.460150]  ? preempt_count_sub+0x50/0x80
[   15.460175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.460201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.460225]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.460249]  kthread+0x337/0x6f0
[   15.460271]  ? trace_preempt_on+0x20/0xc0
[   15.460295]  ? __pfx_kthread+0x10/0x10
[   15.460317]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.460340]  ? calculate_sigpending+0x7b/0xa0
[   15.460365]  ? __pfx_kthread+0x10/0x10
[   15.460388]  ret_from_fork+0x116/0x1d0
[   15.460406]  ? __pfx_kthread+0x10/0x10
[   15.460430]  ret_from_fork_asm+0x1a/0x30
[   15.460471]  </TASK>
[   15.460484] 
[   15.467860] Allocated by task 283:
[   15.468035]  kasan_save_stack+0x45/0x70
[   15.468228]  kasan_save_track+0x18/0x40
[   15.468370]  kasan_save_alloc_info+0x3b/0x50
[   15.468600]  __kasan_kmalloc+0xb7/0xc0
[   15.468818]  __kmalloc_cache_noprof+0x189/0x420
[   15.468978]  kasan_atomics+0x95/0x310
[   15.469116]  kunit_try_run_case+0x1a5/0x480
[   15.469267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.469463]  kthread+0x337/0x6f0
[   15.469639]  ret_from_fork+0x116/0x1d0
[   15.469846]  ret_from_fork_asm+0x1a/0x30
[   15.470046] 
[   15.470144] The buggy address belongs to the object at ffff8881031c4500
[   15.470144]  which belongs to the cache kmalloc-64 of size 64
[   15.470711] The buggy address is located 0 bytes to the right of
[   15.470711]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.471216] 
[   15.471291] The buggy address belongs to the physical page:
[   15.471477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.471833] flags: 0x200000000000000(node=0|zone=2)
[   15.472072] page_type: f5(slab)
[   15.472239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.472592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.472904] page dumped because: kasan: bad access detected
[   15.473163] 
[   15.473237] Memory state around the buggy address:
[   15.473461]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.473775]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.474072] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.474354]                                      ^
[   15.474563]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.474867]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.475138] ==================================================================
[   14.184640] ==================================================================
[   14.185029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.185444] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.185816] 
[   14.185953] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.185997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.186011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.186034] Call Trace:
[   14.186050]  <TASK>
[   14.186067]  dump_stack_lvl+0x73/0xb0
[   14.186117]  print_report+0xd1/0x650
[   14.186143]  ? __virt_addr_valid+0x1db/0x2d0
[   14.186167]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.186254]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.186301]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.186326]  kasan_report+0x141/0x180
[   14.186351]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.186378]  kasan_check_range+0x10c/0x1c0
[   14.186403]  __kasan_check_write+0x18/0x20
[   14.186426]  kasan_atomics_helper+0x4a0/0x5450
[   14.186481]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.186504]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.186547]  ? kasan_atomics+0x152/0x310
[   14.186577]  kasan_atomics+0x1dc/0x310
[   14.186600]  ? __pfx_kasan_atomics+0x10/0x10
[   14.186626]  ? __pfx_read_tsc+0x10/0x10
[   14.186648]  ? ktime_get_ts64+0x86/0x230
[   14.186672]  kunit_try_run_case+0x1a5/0x480
[   14.186715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.186740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.186765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.186805]  ? __kthread_parkme+0x82/0x180
[   14.186841]  ? preempt_count_sub+0x50/0x80
[   14.186879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.186917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.186941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.186979]  kthread+0x337/0x6f0
[   14.187014]  ? trace_preempt_on+0x20/0xc0
[   14.187038]  ? __pfx_kthread+0x10/0x10
[   14.187060]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.187081]  ? calculate_sigpending+0x7b/0xa0
[   14.187106]  ? __pfx_kthread+0x10/0x10
[   14.187129]  ret_from_fork+0x116/0x1d0
[   14.187149]  ? __pfx_kthread+0x10/0x10
[   14.187170]  ret_from_fork_asm+0x1a/0x30
[   14.187264]  </TASK>
[   14.187277] 
[   14.196141] Allocated by task 283:
[   14.196395]  kasan_save_stack+0x45/0x70
[   14.196596]  kasan_save_track+0x18/0x40
[   14.196758]  kasan_save_alloc_info+0x3b/0x50
[   14.196994]  __kasan_kmalloc+0xb7/0xc0
[   14.197216]  __kmalloc_cache_noprof+0x189/0x420
[   14.197516]  kasan_atomics+0x95/0x310
[   14.197731]  kunit_try_run_case+0x1a5/0x480
[   14.197965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.198176]  kthread+0x337/0x6f0
[   14.198447]  ret_from_fork+0x116/0x1d0
[   14.198653]  ret_from_fork_asm+0x1a/0x30
[   14.198882] 
[   14.198976] The buggy address belongs to the object at ffff8881031c4500
[   14.198976]  which belongs to the cache kmalloc-64 of size 64
[   14.199606] The buggy address is located 0 bytes to the right of
[   14.199606]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.200415] 
[   14.200517] The buggy address belongs to the physical page:
[   14.200705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.201170] flags: 0x200000000000000(node=0|zone=2)
[   14.201477] page_type: f5(slab)
[   14.201681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.202012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.202426] page dumped because: kasan: bad access detected
[   14.202710] 
[   14.202826] Memory state around the buggy address:
[   14.203057]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.203434]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.203753] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.204052]                                      ^
[   14.204375]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.204685]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.205031] ==================================================================
[   14.106667] ==================================================================
[   14.106995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.107388] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.107688] 
[   14.107801] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.107842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.107856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.107876] Call Trace:
[   14.107892]  <TASK>
[   14.107907]  dump_stack_lvl+0x73/0xb0
[   14.107936]  print_report+0xd1/0x650
[   14.107959]  ? __virt_addr_valid+0x1db/0x2d0
[   14.107980]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.108002]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.108024]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.108045]  kasan_report+0x141/0x180
[   14.108066]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.108092]  __asan_report_load4_noabort+0x18/0x20
[   14.108115]  kasan_atomics_helper+0x4b88/0x5450
[   14.108138]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.108159]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.108183]  ? kasan_atomics+0x152/0x310
[   14.108251]  kasan_atomics+0x1dc/0x310
[   14.108274]  ? __pfx_kasan_atomics+0x10/0x10
[   14.108298]  ? __pfx_read_tsc+0x10/0x10
[   14.108318]  ? ktime_get_ts64+0x86/0x230
[   14.108340]  kunit_try_run_case+0x1a5/0x480
[   14.108364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.108386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.108408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.108431]  ? __kthread_parkme+0x82/0x180
[   14.108464]  ? preempt_count_sub+0x50/0x80
[   14.108488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.108511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.108533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.108555]  kthread+0x337/0x6f0
[   14.108575]  ? trace_preempt_on+0x20/0xc0
[   14.108598]  ? __pfx_kthread+0x10/0x10
[   14.108617]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.108638]  ? calculate_sigpending+0x7b/0xa0
[   14.108662]  ? __pfx_kthread+0x10/0x10
[   14.108682]  ret_from_fork+0x116/0x1d0
[   14.108708]  ? __pfx_kthread+0x10/0x10
[   14.108728]  ret_from_fork_asm+0x1a/0x30
[   14.108759]  </TASK>
[   14.108770] 
[   14.116511] Allocated by task 283:
[   14.116644]  kasan_save_stack+0x45/0x70
[   14.116811]  kasan_save_track+0x18/0x40
[   14.116976]  kasan_save_alloc_info+0x3b/0x50
[   14.117599]  __kasan_kmalloc+0xb7/0xc0
[   14.117832]  __kmalloc_cache_noprof+0x189/0x420
[   14.118058]  kasan_atomics+0x95/0x310
[   14.118218]  kunit_try_run_case+0x1a5/0x480
[   14.118368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.118654]  kthread+0x337/0x6f0
[   14.118850]  ret_from_fork+0x116/0x1d0
[   14.119039]  ret_from_fork_asm+0x1a/0x30
[   14.119307] 
[   14.119408] The buggy address belongs to the object at ffff8881031c4500
[   14.119408]  which belongs to the cache kmalloc-64 of size 64
[   14.119962] The buggy address is located 0 bytes to the right of
[   14.119962]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.120471] 
[   14.120575] The buggy address belongs to the physical page:
[   14.120855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.121196] flags: 0x200000000000000(node=0|zone=2)
[   14.121413] page_type: f5(slab)
[   14.121547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.121892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.122236] page dumped because: kasan: bad access detected
[   14.122515] 
[   14.122618] Memory state around the buggy address:
[   14.122825]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.123105]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.123579] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.123939]                                      ^
[   14.124236]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.124537]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.124822] ==================================================================
[   14.609520] ==================================================================
[   14.609861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.610160] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.610485] 
[   14.610871] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.610918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.610932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.610954] Call Trace:
[   14.610971]  <TASK>
[   14.610988]  dump_stack_lvl+0x73/0xb0
[   14.611020]  print_report+0xd1/0x650
[   14.611045]  ? __virt_addr_valid+0x1db/0x2d0
[   14.611067]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.611090]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.611113]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.611135]  kasan_report+0x141/0x180
[   14.611159]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.611186]  kasan_check_range+0x10c/0x1c0
[   14.611229]  __kasan_check_write+0x18/0x20
[   14.611250]  kasan_atomics_helper+0xfa9/0x5450
[   14.611274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.611297]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.611324]  ? kasan_atomics+0x152/0x310
[   14.611352]  kasan_atomics+0x1dc/0x310
[   14.611376]  ? __pfx_kasan_atomics+0x10/0x10
[   14.611402]  ? __pfx_read_tsc+0x10/0x10
[   14.611424]  ? ktime_get_ts64+0x86/0x230
[   14.611449]  kunit_try_run_case+0x1a5/0x480
[   14.611556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.611580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.611605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.611629]  ? __kthread_parkme+0x82/0x180
[   14.611651]  ? preempt_count_sub+0x50/0x80
[   14.611675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.611700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.611724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.611748]  kthread+0x337/0x6f0
[   14.611770]  ? trace_preempt_on+0x20/0xc0
[   14.611794]  ? __pfx_kthread+0x10/0x10
[   14.611815]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.611837]  ? calculate_sigpending+0x7b/0xa0
[   14.611863]  ? __pfx_kthread+0x10/0x10
[   14.611885]  ret_from_fork+0x116/0x1d0
[   14.611905]  ? __pfx_kthread+0x10/0x10
[   14.611944]  ret_from_fork_asm+0x1a/0x30
[   14.611976]  </TASK>
[   14.611990] 
[   14.623355] Allocated by task 283:
[   14.623543]  kasan_save_stack+0x45/0x70
[   14.624021]  kasan_save_track+0x18/0x40
[   14.624335]  kasan_save_alloc_info+0x3b/0x50
[   14.624789]  __kasan_kmalloc+0xb7/0xc0
[   14.624981]  __kmalloc_cache_noprof+0x189/0x420
[   14.625187]  kasan_atomics+0x95/0x310
[   14.625363]  kunit_try_run_case+0x1a5/0x480
[   14.625567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.626511]  kthread+0x337/0x6f0
[   14.626922]  ret_from_fork+0x116/0x1d0
[   14.627314]  ret_from_fork_asm+0x1a/0x30
[   14.627531] 
[   14.627631] The buggy address belongs to the object at ffff8881031c4500
[   14.627631]  which belongs to the cache kmalloc-64 of size 64
[   14.628618] The buggy address is located 0 bytes to the right of
[   14.628618]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.629484] 
[   14.629596] The buggy address belongs to the physical page:
[   14.629779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.630158] flags: 0x200000000000000(node=0|zone=2)
[   14.630562] page_type: f5(slab)
[   14.630755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.631059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.631437] page dumped because: kasan: bad access detected
[   14.631666] 
[   14.631779] Memory state around the buggy address:
[   14.631988]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.632255]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.632534] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.632959]                                      ^
[   14.633140]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.633637]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.633932] ==================================================================
[   14.275107] ==================================================================
[   14.275471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.275828] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.276090] 
[   14.276181] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.276224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.276239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.276261] Call Trace:
[   14.276277]  <TASK>
[   14.276294]  dump_stack_lvl+0x73/0xb0
[   14.276325]  print_report+0xd1/0x650
[   14.276350]  ? __virt_addr_valid+0x1db/0x2d0
[   14.276373]  ? kasan_atomics_helper+0x697/0x5450
[   14.276395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.276419]  ? kasan_atomics_helper+0x697/0x5450
[   14.276442]  kasan_report+0x141/0x180
[   14.276477]  ? kasan_atomics_helper+0x697/0x5450
[   14.276505]  kasan_check_range+0x10c/0x1c0
[   14.276530]  __kasan_check_write+0x18/0x20
[   14.276551]  kasan_atomics_helper+0x697/0x5450
[   14.276575]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.276598]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.276625]  ? kasan_atomics+0x152/0x310
[   14.276654]  kasan_atomics+0x1dc/0x310
[   14.276700]  ? __pfx_kasan_atomics+0x10/0x10
[   14.276728]  ? __pfx_read_tsc+0x10/0x10
[   14.276751]  ? ktime_get_ts64+0x86/0x230
[   14.276776]  kunit_try_run_case+0x1a5/0x480
[   14.276802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.276825]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.276850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.276874]  ? __kthread_parkme+0x82/0x180
[   14.276896]  ? preempt_count_sub+0x50/0x80
[   14.276921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.276946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.276970]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.276994]  kthread+0x337/0x6f0
[   14.277015]  ? trace_preempt_on+0x20/0xc0
[   14.277039]  ? __pfx_kthread+0x10/0x10
[   14.277060]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.277083]  ? calculate_sigpending+0x7b/0xa0
[   14.277108]  ? __pfx_kthread+0x10/0x10
[   14.277130]  ret_from_fork+0x116/0x1d0
[   14.277150]  ? __pfx_kthread+0x10/0x10
[   14.277171]  ret_from_fork_asm+0x1a/0x30
[   14.277203]  </TASK>
[   14.277216] 
[   14.286440] Allocated by task 283:
[   14.286701]  kasan_save_stack+0x45/0x70
[   14.286911]  kasan_save_track+0x18/0x40
[   14.287096]  kasan_save_alloc_info+0x3b/0x50
[   14.287570]  __kasan_kmalloc+0xb7/0xc0
[   14.288050]  __kmalloc_cache_noprof+0x189/0x420
[   14.288563]  kasan_atomics+0x95/0x310
[   14.288895]  kunit_try_run_case+0x1a5/0x480
[   14.289363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.289616]  kthread+0x337/0x6f0
[   14.290077]  ret_from_fork+0x116/0x1d0
[   14.290561]  ret_from_fork_asm+0x1a/0x30
[   14.290768] 
[   14.290865] The buggy address belongs to the object at ffff8881031c4500
[   14.290865]  which belongs to the cache kmalloc-64 of size 64
[   14.291645] The buggy address is located 0 bytes to the right of
[   14.291645]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.292566] 
[   14.292835] The buggy address belongs to the physical page:
[   14.293073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.293664] flags: 0x200000000000000(node=0|zone=2)
[   14.294065] page_type: f5(slab)
[   14.294385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.294875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.295367] page dumped because: kasan: bad access detected
[   14.295913] 
[   14.296025] Memory state around the buggy address:
[   14.296506]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.297127]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.297562] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.298175]                                      ^
[   14.298530]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.299253]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.299947] ==================================================================
[   14.751354] ==================================================================
[   14.751660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.752591] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.752958] 
[   14.753078] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.753125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.753139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.753164] Call Trace:
[   14.753179]  <TASK>
[   14.753197]  dump_stack_lvl+0x73/0xb0
[   14.753229]  print_report+0xd1/0x650
[   14.753259]  ? __virt_addr_valid+0x1db/0x2d0
[   14.753284]  ? kasan_atomics_helper+0x1217/0x5450
[   14.753332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.753356]  ? kasan_atomics_helper+0x1217/0x5450
[   14.753384]  kasan_report+0x141/0x180
[   14.753407]  ? kasan_atomics_helper+0x1217/0x5450
[   14.753436]  kasan_check_range+0x10c/0x1c0
[   14.753473]  __kasan_check_write+0x18/0x20
[   14.753495]  kasan_atomics_helper+0x1217/0x5450
[   14.753519]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.753542]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.753569]  ? kasan_atomics+0x152/0x310
[   14.753596]  kasan_atomics+0x1dc/0x310
[   14.753620]  ? __pfx_kasan_atomics+0x10/0x10
[   14.753647]  ? __pfx_read_tsc+0x10/0x10
[   14.753669]  ? ktime_get_ts64+0x86/0x230
[   14.753704]  kunit_try_run_case+0x1a5/0x480
[   14.753729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.753753]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.753777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.753801]  ? __kthread_parkme+0x82/0x180
[   14.753822]  ? preempt_count_sub+0x50/0x80
[   14.753848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.753872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.753896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.753920]  kthread+0x337/0x6f0
[   14.753941]  ? trace_preempt_on+0x20/0xc0
[   14.753965]  ? __pfx_kthread+0x10/0x10
[   14.753987]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.754009]  ? calculate_sigpending+0x7b/0xa0
[   14.754034]  ? __pfx_kthread+0x10/0x10
[   14.754057]  ret_from_fork+0x116/0x1d0
[   14.754077]  ? __pfx_kthread+0x10/0x10
[   14.754098]  ret_from_fork_asm+0x1a/0x30
[   14.754130]  </TASK>
[   14.754142] 
[   14.764471] Allocated by task 283:
[   14.764839]  kasan_save_stack+0x45/0x70
[   14.765115]  kasan_save_track+0x18/0x40
[   14.765307]  kasan_save_alloc_info+0x3b/0x50
[   14.765536]  __kasan_kmalloc+0xb7/0xc0
[   14.765961]  __kmalloc_cache_noprof+0x189/0x420
[   14.766198]  kasan_atomics+0x95/0x310
[   14.766464]  kunit_try_run_case+0x1a5/0x480
[   14.766682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.767074]  kthread+0x337/0x6f0
[   14.767321]  ret_from_fork+0x116/0x1d0
[   14.767630]  ret_from_fork_asm+0x1a/0x30
[   14.767920] 
[   14.768025] The buggy address belongs to the object at ffff8881031c4500
[   14.768025]  which belongs to the cache kmalloc-64 of size 64
[   14.768822] The buggy address is located 0 bytes to the right of
[   14.768822]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.769362] 
[   14.769467] The buggy address belongs to the physical page:
[   14.769944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.770273] flags: 0x200000000000000(node=0|zone=2)
[   14.770591] page_type: f5(slab)
[   14.770932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.771272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.771691] page dumped because: kasan: bad access detected
[   14.772035] 
[   14.772143] Memory state around the buggy address:
[   14.772338]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.772679]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.773219] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.773611]                                      ^
[   14.773975]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774369]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774856] ==================================================================
[   15.475547] ==================================================================
[   15.476031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.476478] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.476804] 
[   15.476920] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.476963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.476977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.477000] Call Trace:
[   15.477018]  <TASK>
[   15.477035]  dump_stack_lvl+0x73/0xb0
[   15.477063]  print_report+0xd1/0x650
[   15.477086]  ? __virt_addr_valid+0x1db/0x2d0
[   15.477111]  ? kasan_atomics_helper+0x5115/0x5450
[   15.477133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.477156]  ? kasan_atomics_helper+0x5115/0x5450
[   15.477180]  kasan_report+0x141/0x180
[   15.477203]  ? kasan_atomics_helper+0x5115/0x5450
[   15.477232]  __asan_report_load8_noabort+0x18/0x20
[   15.477257]  kasan_atomics_helper+0x5115/0x5450
[   15.477281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.477304]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.477331]  ? kasan_atomics+0x152/0x310
[   15.477359]  kasan_atomics+0x1dc/0x310
[   15.477388]  ? __pfx_kasan_atomics+0x10/0x10
[   15.477414]  ? __pfx_read_tsc+0x10/0x10
[   15.477435]  ? ktime_get_ts64+0x86/0x230
[   15.477470]  kunit_try_run_case+0x1a5/0x480
[   15.477496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.477519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.477544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.477568]  ? __kthread_parkme+0x82/0x180
[   15.477589]  ? preempt_count_sub+0x50/0x80
[   15.477614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.477640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.477684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.477709]  kthread+0x337/0x6f0
[   15.477731]  ? trace_preempt_on+0x20/0xc0
[   15.477756]  ? __pfx_kthread+0x10/0x10
[   15.477778]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.477800]  ? calculate_sigpending+0x7b/0xa0
[   15.477825]  ? __pfx_kthread+0x10/0x10
[   15.477848]  ret_from_fork+0x116/0x1d0
[   15.477867]  ? __pfx_kthread+0x10/0x10
[   15.477890]  ret_from_fork_asm+0x1a/0x30
[   15.477921]  </TASK>
[   15.477935] 
[   15.485028] Allocated by task 283:
[   15.485185]  kasan_save_stack+0x45/0x70
[   15.485349]  kasan_save_track+0x18/0x40
[   15.485565]  kasan_save_alloc_info+0x3b/0x50
[   15.485787]  __kasan_kmalloc+0xb7/0xc0
[   15.485961]  __kmalloc_cache_noprof+0x189/0x420
[   15.486122]  kasan_atomics+0x95/0x310
[   15.486261]  kunit_try_run_case+0x1a5/0x480
[   15.486412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.486691]  kthread+0x337/0x6f0
[   15.486868]  ret_from_fork+0x116/0x1d0
[   15.487058]  ret_from_fork_asm+0x1a/0x30
[   15.487256] 
[   15.487354] The buggy address belongs to the object at ffff8881031c4500
[   15.487354]  which belongs to the cache kmalloc-64 of size 64
[   15.487828] The buggy address is located 0 bytes to the right of
[   15.487828]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.488328] 
[   15.488429] The buggy address belongs to the physical page:
[   15.488649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.488994] flags: 0x200000000000000(node=0|zone=2)
[   15.489212] page_type: f5(slab)
[   15.489367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.489686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.490008] page dumped because: kasan: bad access detected
[   15.490250] 
[   15.490352] Memory state around the buggy address:
[   15.490579]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.490901]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.491128] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.491347]                                      ^
[   15.491516]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.491827]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.492154] ==================================================================
[   14.125366] ==================================================================
[   14.125752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.126041] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.126460] 
[   14.126568] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.126613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.126626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.126650] Call Trace:
[   14.126666]  <TASK>
[   14.126681]  dump_stack_lvl+0x73/0xb0
[   14.126730]  print_report+0xd1/0x650
[   14.126754]  ? __virt_addr_valid+0x1db/0x2d0
[   14.126777]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.126799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.126822]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.126844]  kasan_report+0x141/0x180
[   14.126868]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.126895]  __asan_report_store4_noabort+0x1b/0x30
[   14.126917]  kasan_atomics_helper+0x4b6e/0x5450
[   14.126940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.126963]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.126989]  ? kasan_atomics+0x152/0x310
[   14.127016]  kasan_atomics+0x1dc/0x310
[   14.127041]  ? __pfx_kasan_atomics+0x10/0x10
[   14.127066]  ? __pfx_read_tsc+0x10/0x10
[   14.127088]  ? ktime_get_ts64+0x86/0x230
[   14.127114]  kunit_try_run_case+0x1a5/0x480
[   14.127139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.127162]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.127244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.127271]  ? __kthread_parkme+0x82/0x180
[   14.127292]  ? preempt_count_sub+0x50/0x80
[   14.127317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.127342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.127366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.127390]  kthread+0x337/0x6f0
[   14.127412]  ? trace_preempt_on+0x20/0xc0
[   14.127436]  ? __pfx_kthread+0x10/0x10
[   14.127469]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.127491]  ? calculate_sigpending+0x7b/0xa0
[   14.127516]  ? __pfx_kthread+0x10/0x10
[   14.127539]  ret_from_fork+0x116/0x1d0
[   14.127559]  ? __pfx_kthread+0x10/0x10
[   14.127581]  ret_from_fork_asm+0x1a/0x30
[   14.127612]  </TASK>
[   14.127625] 
[   14.135707] Allocated by task 283:
[   14.135894]  kasan_save_stack+0x45/0x70
[   14.136092]  kasan_save_track+0x18/0x40
[   14.136471]  kasan_save_alloc_info+0x3b/0x50
[   14.136664]  __kasan_kmalloc+0xb7/0xc0
[   14.136881]  __kmalloc_cache_noprof+0x189/0x420
[   14.137073]  kasan_atomics+0x95/0x310
[   14.137333]  kunit_try_run_case+0x1a5/0x480
[   14.137544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.137810]  kthread+0x337/0x6f0
[   14.137970]  ret_from_fork+0x116/0x1d0
[   14.138139]  ret_from_fork_asm+0x1a/0x30
[   14.138361] 
[   14.138446] The buggy address belongs to the object at ffff8881031c4500
[   14.138446]  which belongs to the cache kmalloc-64 of size 64
[   14.138970] The buggy address is located 0 bytes to the right of
[   14.138970]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.139443] 
[   14.139531] The buggy address belongs to the physical page:
[   14.139707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.140064] flags: 0x200000000000000(node=0|zone=2)
[   14.140298] page_type: f5(slab)
[   14.140617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.141052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.141528] page dumped because: kasan: bad access detected
[   14.141762] 
[   14.141862] Memory state around the buggy address:
[   14.142097]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.142499]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.142854] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.143176]                                      ^
[   14.143438]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.143745]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.144035] ==================================================================
[   15.391544] ==================================================================
[   15.392937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.393632] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.394253] 
[   15.394430] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.394486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.394500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.394523] Call Trace:
[   15.394542]  <TASK>
[   15.394559]  dump_stack_lvl+0x73/0xb0
[   15.394589]  print_report+0xd1/0x650
[   15.394613]  ? __virt_addr_valid+0x1db/0x2d0
[   15.394638]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.394660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.394705]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.394728]  kasan_report+0x141/0x180
[   15.394751]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.394779]  __asan_report_load8_noabort+0x18/0x20
[   15.394804]  kasan_atomics_helper+0x4fb2/0x5450
[   15.394828]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.394851]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.394877]  ? kasan_atomics+0x152/0x310
[   15.394905]  kasan_atomics+0x1dc/0x310
[   15.394930]  ? __pfx_kasan_atomics+0x10/0x10
[   15.394955]  ? __pfx_read_tsc+0x10/0x10
[   15.394977]  ? ktime_get_ts64+0x86/0x230
[   15.395002]  kunit_try_run_case+0x1a5/0x480
[   15.395027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.395050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.395074]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.395099]  ? __kthread_parkme+0x82/0x180
[   15.395120]  ? preempt_count_sub+0x50/0x80
[   15.395145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.395170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.395194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.395219]  kthread+0x337/0x6f0
[   15.395241]  ? trace_preempt_on+0x20/0xc0
[   15.395265]  ? __pfx_kthread+0x10/0x10
[   15.395287]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.395309]  ? calculate_sigpending+0x7b/0xa0
[   15.395334]  ? __pfx_kthread+0x10/0x10
[   15.395356]  ret_from_fork+0x116/0x1d0
[   15.395376]  ? __pfx_kthread+0x10/0x10
[   15.395398]  ret_from_fork_asm+0x1a/0x30
[   15.395431]  </TASK>
[   15.395445] 
[   15.408402] Allocated by task 283:
[   15.408754]  kasan_save_stack+0x45/0x70
[   15.409107]  kasan_save_track+0x18/0x40
[   15.409417]  kasan_save_alloc_info+0x3b/0x50
[   15.409583]  __kasan_kmalloc+0xb7/0xc0
[   15.409840]  __kmalloc_cache_noprof+0x189/0x420
[   15.410250]  kasan_atomics+0x95/0x310
[   15.410604]  kunit_try_run_case+0x1a5/0x480
[   15.410997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.411467]  kthread+0x337/0x6f0
[   15.411621]  ret_from_fork+0x116/0x1d0
[   15.411984]  ret_from_fork_asm+0x1a/0x30
[   15.412354] 
[   15.412528] The buggy address belongs to the object at ffff8881031c4500
[   15.412528]  which belongs to the cache kmalloc-64 of size 64
[   15.412993] The buggy address is located 0 bytes to the right of
[   15.412993]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.414222] 
[   15.414386] The buggy address belongs to the physical page:
[   15.414782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.415182] flags: 0x200000000000000(node=0|zone=2)
[   15.415350] page_type: f5(slab)
[   15.415484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.415737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.416152] page dumped because: kasan: bad access detected
[   15.416381] 
[   15.416494] Memory state around the buggy address:
[   15.417144]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.417448]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.417793] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.418212]                                      ^
[   15.418437]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.418872]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.419163] ==================================================================
[   14.331805] ==================================================================
[   14.332163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.332653] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.333510] 
[   14.333747] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.333802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.333819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.333945] Call Trace:
[   14.333965]  <TASK>
[   14.333985]  dump_stack_lvl+0x73/0xb0
[   14.334017]  print_report+0xd1/0x650
[   14.334041]  ? __virt_addr_valid+0x1db/0x2d0
[   14.334096]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.334121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.334144]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.334167]  kasan_report+0x141/0x180
[   14.334208]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.334235]  kasan_check_range+0x10c/0x1c0
[   14.334260]  __kasan_check_write+0x18/0x20
[   14.334281]  kasan_atomics_helper+0x7c7/0x5450
[   14.334305]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.334329]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.334356]  ? kasan_atomics+0x152/0x310
[   14.334384]  kasan_atomics+0x1dc/0x310
[   14.334408]  ? __pfx_kasan_atomics+0x10/0x10
[   14.334434]  ? __pfx_read_tsc+0x10/0x10
[   14.334468]  ? ktime_get_ts64+0x86/0x230
[   14.334493]  kunit_try_run_case+0x1a5/0x480
[   14.334519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.334542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.334566]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.334591]  ? __kthread_parkme+0x82/0x180
[   14.334612]  ? preempt_count_sub+0x50/0x80
[   14.334638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.334662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.334686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.334711]  kthread+0x337/0x6f0
[   14.334732]  ? trace_preempt_on+0x20/0xc0
[   14.334757]  ? __pfx_kthread+0x10/0x10
[   14.334779]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.334802]  ? calculate_sigpending+0x7b/0xa0
[   14.334827]  ? __pfx_kthread+0x10/0x10
[   14.334850]  ret_from_fork+0x116/0x1d0
[   14.334869]  ? __pfx_kthread+0x10/0x10
[   14.334891]  ret_from_fork_asm+0x1a/0x30
[   14.334923]  </TASK>
[   14.334935] 
[   14.348996] Allocated by task 283:
[   14.349763]  kasan_save_stack+0x45/0x70
[   14.350276]  kasan_save_track+0x18/0x40
[   14.351019]  kasan_save_alloc_info+0x3b/0x50
[   14.351210]  __kasan_kmalloc+0xb7/0xc0
[   14.351597]  __kmalloc_cache_noprof+0x189/0x420
[   14.351805]  kasan_atomics+0x95/0x310
[   14.352145]  kunit_try_run_case+0x1a5/0x480
[   14.352510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.352888]  kthread+0x337/0x6f0
[   14.353141]  ret_from_fork+0x116/0x1d0
[   14.353425]  ret_from_fork_asm+0x1a/0x30
[   14.353630] 
[   14.353769] The buggy address belongs to the object at ffff8881031c4500
[   14.353769]  which belongs to the cache kmalloc-64 of size 64
[   14.354245] The buggy address is located 0 bytes to the right of
[   14.354245]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.354959] 
[   14.355058] The buggy address belongs to the physical page:
[   14.355300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.356212] flags: 0x200000000000000(node=0|zone=2)
[   14.356577] page_type: f5(slab)
[   14.356728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.357266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.357779] page dumped because: kasan: bad access detected
[   14.358126] 
[   14.358236] Memory state around the buggy address:
[   14.358578]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.359109]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.359653] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.359990]                                      ^
[   14.360248]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.360604]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.361017] ==================================================================
[   14.697978] ==================================================================
[   14.698395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.698649] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.698991] 
[   14.699105] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.699149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.699164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.699189] Call Trace:
[   14.699244]  <TASK>
[   14.699265]  dump_stack_lvl+0x73/0xb0
[   14.699296]  print_report+0xd1/0x650
[   14.699320]  ? __virt_addr_valid+0x1db/0x2d0
[   14.699344]  ? kasan_atomics_helper+0x1148/0x5450
[   14.699368]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.699393]  ? kasan_atomics_helper+0x1148/0x5450
[   14.699416]  kasan_report+0x141/0x180
[   14.699440]  ? kasan_atomics_helper+0x1148/0x5450
[   14.699482]  kasan_check_range+0x10c/0x1c0
[   14.699508]  __kasan_check_write+0x18/0x20
[   14.699528]  kasan_atomics_helper+0x1148/0x5450
[   14.699552]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.699575]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.699601]  ? kasan_atomics+0x152/0x310
[   14.699629]  kasan_atomics+0x1dc/0x310
[   14.699653]  ? __pfx_kasan_atomics+0x10/0x10
[   14.699679]  ? __pfx_read_tsc+0x10/0x10
[   14.699700]  ? ktime_get_ts64+0x86/0x230
[   14.699725]  kunit_try_run_case+0x1a5/0x480
[   14.699750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.699774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.699798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.699822]  ? __kthread_parkme+0x82/0x180
[   14.699843]  ? preempt_count_sub+0x50/0x80
[   14.699869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.699895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.699919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.699943]  kthread+0x337/0x6f0
[   14.699964]  ? trace_preempt_on+0x20/0xc0
[   14.700000]  ? __pfx_kthread+0x10/0x10
[   14.700022]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.700044]  ? calculate_sigpending+0x7b/0xa0
[   14.700069]  ? __pfx_kthread+0x10/0x10
[   14.700091]  ret_from_fork+0x116/0x1d0
[   14.700111]  ? __pfx_kthread+0x10/0x10
[   14.700132]  ret_from_fork_asm+0x1a/0x30
[   14.700164]  </TASK>
[   14.700177] 
[   14.708281] Allocated by task 283:
[   14.708477]  kasan_save_stack+0x45/0x70
[   14.708685]  kasan_save_track+0x18/0x40
[   14.709132]  kasan_save_alloc_info+0x3b/0x50
[   14.709529]  __kasan_kmalloc+0xb7/0xc0
[   14.709779]  __kmalloc_cache_noprof+0x189/0x420
[   14.709966]  kasan_atomics+0x95/0x310
[   14.710141]  kunit_try_run_case+0x1a5/0x480
[   14.710292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.710481]  kthread+0x337/0x6f0
[   14.710655]  ret_from_fork+0x116/0x1d0
[   14.710846]  ret_from_fork_asm+0x1a/0x30
[   14.711264] 
[   14.711353] The buggy address belongs to the object at ffff8881031c4500
[   14.711353]  which belongs to the cache kmalloc-64 of size 64
[   14.711842] The buggy address is located 0 bytes to the right of
[   14.711842]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.712400] 
[   14.712495] The buggy address belongs to the physical page:
[   14.712696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.712941] flags: 0x200000000000000(node=0|zone=2)
[   14.713107] page_type: f5(slab)
[   14.713371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.713742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.714084] page dumped because: kasan: bad access detected
[   14.714391] 
[   14.714489] Memory state around the buggy address:
[   14.714714]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.714938]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.715157] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.715591]                                      ^
[   14.716040]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.716585]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.717089] ==================================================================
[   14.146571] ==================================================================
[   14.146896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.147197] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.147533] 
[   14.147631] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.147695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.147710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.147733] Call Trace:
[   14.147751]  <TASK>
[   14.147768]  dump_stack_lvl+0x73/0xb0
[   14.147796]  print_report+0xd1/0x650
[   14.147820]  ? __virt_addr_valid+0x1db/0x2d0
[   14.147843]  ? kasan_atomics_helper+0x3df/0x5450
[   14.147865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.147888]  ? kasan_atomics_helper+0x3df/0x5450
[   14.147911]  kasan_report+0x141/0x180
[   14.147934]  ? kasan_atomics_helper+0x3df/0x5450
[   14.147962]  kasan_check_range+0x10c/0x1c0
[   14.147987]  __kasan_check_read+0x15/0x20
[   14.148007]  kasan_atomics_helper+0x3df/0x5450
[   14.148031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.148054]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.148079]  ? kasan_atomics+0x152/0x310
[   14.148108]  kasan_atomics+0x1dc/0x310
[   14.148131]  ? __pfx_kasan_atomics+0x10/0x10
[   14.148157]  ? __pfx_read_tsc+0x10/0x10
[   14.148179]  ? ktime_get_ts64+0x86/0x230
[   14.148203]  kunit_try_run_case+0x1a5/0x480
[   14.148229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.148252]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.148276]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.148301]  ? __kthread_parkme+0x82/0x180
[   14.148321]  ? preempt_count_sub+0x50/0x80
[   14.148345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.148371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.148394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.148419]  kthread+0x337/0x6f0
[   14.148440]  ? trace_preempt_on+0x20/0xc0
[   14.148474]  ? __pfx_kthread+0x10/0x10
[   14.148496]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.148519]  ? calculate_sigpending+0x7b/0xa0
[   14.148544]  ? __pfx_kthread+0x10/0x10
[   14.148567]  ret_from_fork+0x116/0x1d0
[   14.148587]  ? __pfx_kthread+0x10/0x10
[   14.148609]  ret_from_fork_asm+0x1a/0x30
[   14.148641]  </TASK>
[   14.148655] 
[   14.156812] Allocated by task 283:
[   14.157001]  kasan_save_stack+0x45/0x70
[   14.157268]  kasan_save_track+0x18/0x40
[   14.157437]  kasan_save_alloc_info+0x3b/0x50
[   14.157601]  __kasan_kmalloc+0xb7/0xc0
[   14.157782]  __kmalloc_cache_noprof+0x189/0x420
[   14.158011]  kasan_atomics+0x95/0x310
[   14.158410]  kunit_try_run_case+0x1a5/0x480
[   14.158647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.158889]  kthread+0x337/0x6f0
[   14.159014]  ret_from_fork+0x116/0x1d0
[   14.159160]  ret_from_fork_asm+0x1a/0x30
[   14.159425] 
[   14.159540] The buggy address belongs to the object at ffff8881031c4500
[   14.159540]  which belongs to the cache kmalloc-64 of size 64
[   14.160100] The buggy address is located 0 bytes to the right of
[   14.160100]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.160668] 
[   14.160775] The buggy address belongs to the physical page:
[   14.161004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.161410] flags: 0x200000000000000(node=0|zone=2)
[   14.161594] page_type: f5(slab)
[   14.161740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.162090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.162504] page dumped because: kasan: bad access detected
[   14.162789] 
[   14.162885] Memory state around the buggy address:
[   14.163044]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.163592]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.163895] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.164290]                                      ^
[   14.164501]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.164817]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.165068] ==================================================================
[   15.229563] ==================================================================
[   15.230000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.230382] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.231134] 
[   15.231410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.231472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.231486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.231510] Call Trace:
[   15.231528]  <TASK>
[   15.231544]  dump_stack_lvl+0x73/0xb0
[   15.231574]  print_report+0xd1/0x650
[   15.231619]  ? __virt_addr_valid+0x1db/0x2d0
[   15.231643]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.231690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.231714]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.231737]  kasan_report+0x141/0x180
[   15.231761]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.231789]  kasan_check_range+0x10c/0x1c0
[   15.231814]  __kasan_check_write+0x18/0x20
[   15.231835]  kasan_atomics_helper+0x1d7a/0x5450
[   15.231859]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.231883]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.231910]  ? kasan_atomics+0x152/0x310
[   15.231938]  kasan_atomics+0x1dc/0x310
[   15.231962]  ? __pfx_kasan_atomics+0x10/0x10
[   15.231987]  ? __pfx_read_tsc+0x10/0x10
[   15.232009]  ? ktime_get_ts64+0x86/0x230
[   15.232035]  kunit_try_run_case+0x1a5/0x480
[   15.232061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.232085]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.232109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.232134]  ? __kthread_parkme+0x82/0x180
[   15.232155]  ? preempt_count_sub+0x50/0x80
[   15.232181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.232216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.232239]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.232262]  kthread+0x337/0x6f0
[   15.232312]  ? trace_preempt_on+0x20/0xc0
[   15.232337]  ? __pfx_kthread+0x10/0x10
[   15.232387]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.232409]  ? calculate_sigpending+0x7b/0xa0
[   15.232471]  ? __pfx_kthread+0x10/0x10
[   15.232494]  ret_from_fork+0x116/0x1d0
[   15.232531]  ? __pfx_kthread+0x10/0x10
[   15.232565]  ret_from_fork_asm+0x1a/0x30
[   15.232613]  </TASK>
[   15.232637] 
[   15.241245] Allocated by task 283:
[   15.241485]  kasan_save_stack+0x45/0x70
[   15.241740]  kasan_save_track+0x18/0x40
[   15.241927]  kasan_save_alloc_info+0x3b/0x50
[   15.242163]  __kasan_kmalloc+0xb7/0xc0
[   15.242378]  __kmalloc_cache_noprof+0x189/0x420
[   15.242634]  kasan_atomics+0x95/0x310
[   15.242872]  kunit_try_run_case+0x1a5/0x480
[   15.243096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.243384]  kthread+0x337/0x6f0
[   15.243581]  ret_from_fork+0x116/0x1d0
[   15.243951]  ret_from_fork_asm+0x1a/0x30
[   15.244157] 
[   15.244232] The buggy address belongs to the object at ffff8881031c4500
[   15.244232]  which belongs to the cache kmalloc-64 of size 64
[   15.244800] The buggy address is located 0 bytes to the right of
[   15.244800]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.245539] 
[   15.245660] The buggy address belongs to the physical page:
[   15.245923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.246241] flags: 0x200000000000000(node=0|zone=2)
[   15.246402] page_type: f5(slab)
[   15.246534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.246941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.247318] page dumped because: kasan: bad access detected
[   15.247663] 
[   15.247799] Memory state around the buggy address:
[   15.248135]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.248409]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.248787] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.249190]                                      ^
[   15.249438]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.249815]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.250033] ==================================================================
[   14.547040] ==================================================================
[   14.547436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.547770] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.548010] 
[   14.548125] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.548169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.548247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.548272] Call Trace:
[   14.548290]  <TASK>
[   14.548307]  dump_stack_lvl+0x73/0xb0
[   14.548337]  print_report+0xd1/0x650
[   14.548361]  ? __virt_addr_valid+0x1db/0x2d0
[   14.548385]  ? kasan_atomics_helper+0xde0/0x5450
[   14.548407]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.548431]  ? kasan_atomics_helper+0xde0/0x5450
[   14.548463]  kasan_report+0x141/0x180
[   14.548487]  ? kasan_atomics_helper+0xde0/0x5450
[   14.548515]  kasan_check_range+0x10c/0x1c0
[   14.548539]  __kasan_check_write+0x18/0x20
[   14.548561]  kasan_atomics_helper+0xde0/0x5450
[   14.548585]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.548608]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.548635]  ? kasan_atomics+0x152/0x310
[   14.548662]  kasan_atomics+0x1dc/0x310
[   14.548686]  ? __pfx_kasan_atomics+0x10/0x10
[   14.548730]  ? __pfx_read_tsc+0x10/0x10
[   14.548752]  ? ktime_get_ts64+0x86/0x230
[   14.548777]  kunit_try_run_case+0x1a5/0x480
[   14.548802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.548825]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.548851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.548876]  ? __kthread_parkme+0x82/0x180
[   14.548898]  ? preempt_count_sub+0x50/0x80
[   14.548923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.548948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.548972]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.548997]  kthread+0x337/0x6f0
[   14.549018]  ? trace_preempt_on+0x20/0xc0
[   14.549043]  ? __pfx_kthread+0x10/0x10
[   14.549065]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.549089]  ? calculate_sigpending+0x7b/0xa0
[   14.549115]  ? __pfx_kthread+0x10/0x10
[   14.549138]  ret_from_fork+0x116/0x1d0
[   14.549157]  ? __pfx_kthread+0x10/0x10
[   14.549233]  ret_from_fork_asm+0x1a/0x30
[   14.549268]  </TASK>
[   14.549282] 
[   14.557440] Allocated by task 283:
[   14.557608]  kasan_save_stack+0x45/0x70
[   14.557758]  kasan_save_track+0x18/0x40
[   14.558380]  kasan_save_alloc_info+0x3b/0x50
[   14.558626]  __kasan_kmalloc+0xb7/0xc0
[   14.558813]  __kmalloc_cache_noprof+0x189/0x420
[   14.559009]  kasan_atomics+0x95/0x310
[   14.559148]  kunit_try_run_case+0x1a5/0x480
[   14.559298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559566]  kthread+0x337/0x6f0
[   14.559780]  ret_from_fork+0x116/0x1d0
[   14.559973]  ret_from_fork_asm+0x1a/0x30
[   14.560118] 
[   14.560244] The buggy address belongs to the object at ffff8881031c4500
[   14.560244]  which belongs to the cache kmalloc-64 of size 64
[   14.560797] The buggy address is located 0 bytes to the right of
[   14.560797]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.561336] 
[   14.561446] The buggy address belongs to the physical page:
[   14.561699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.561948] flags: 0x200000000000000(node=0|zone=2)
[   14.562113] page_type: f5(slab)
[   14.562470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.562805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.563242] page dumped because: kasan: bad access detected
[   14.563505] 
[   14.563605] Memory state around the buggy address:
[   14.563850]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.564105]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.564388] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.564638]                                      ^
[   14.564894]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.565276]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.565566] ==================================================================
[   15.168932] ==================================================================
[   15.169406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.169672] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.170046] 
[   15.170172] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.170217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.170231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.170284] Call Trace:
[   15.170300]  <TASK>
[   15.170319]  dump_stack_lvl+0x73/0xb0
[   15.170362]  print_report+0xd1/0x650
[   15.170404]  ? __virt_addr_valid+0x1db/0x2d0
[   15.170436]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.170475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.170499]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.170524]  kasan_report+0x141/0x180
[   15.170548]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.170593]  kasan_check_range+0x10c/0x1c0
[   15.170627]  __kasan_check_write+0x18/0x20
[   15.170648]  kasan_atomics_helper+0x1c18/0x5450
[   15.170682]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.170706]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.170732]  ? kasan_atomics+0x152/0x310
[   15.170760]  kasan_atomics+0x1dc/0x310
[   15.170786]  ? __pfx_kasan_atomics+0x10/0x10
[   15.170810]  ? __pfx_read_tsc+0x10/0x10
[   15.170831]  ? ktime_get_ts64+0x86/0x230
[   15.170856]  kunit_try_run_case+0x1a5/0x480
[   15.170880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.170903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.170928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.170979]  ? __kthread_parkme+0x82/0x180
[   15.171000]  ? preempt_count_sub+0x50/0x80
[   15.171024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.171060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.171084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.171133]  kthread+0x337/0x6f0
[   15.171154]  ? trace_preempt_on+0x20/0xc0
[   15.171179]  ? __pfx_kthread+0x10/0x10
[   15.171211]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.171234]  ? calculate_sigpending+0x7b/0xa0
[   15.171259]  ? __pfx_kthread+0x10/0x10
[   15.171281]  ret_from_fork+0x116/0x1d0
[   15.171300]  ? __pfx_kthread+0x10/0x10
[   15.171321]  ret_from_fork_asm+0x1a/0x30
[   15.171353]  </TASK>
[   15.171365] 
[   15.179647] Allocated by task 283:
[   15.179844]  kasan_save_stack+0x45/0x70
[   15.180049]  kasan_save_track+0x18/0x40
[   15.180233]  kasan_save_alloc_info+0x3b/0x50
[   15.180386]  __kasan_kmalloc+0xb7/0xc0
[   15.180533]  __kmalloc_cache_noprof+0x189/0x420
[   15.180728]  kasan_atomics+0x95/0x310
[   15.180972]  kunit_try_run_case+0x1a5/0x480
[   15.181262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.181572]  kthread+0x337/0x6f0
[   15.181808]  ret_from_fork+0x116/0x1d0
[   15.182042]  ret_from_fork_asm+0x1a/0x30
[   15.182243] 
[   15.182388] The buggy address belongs to the object at ffff8881031c4500
[   15.182388]  which belongs to the cache kmalloc-64 of size 64
[   15.182947] The buggy address is located 0 bytes to the right of
[   15.182947]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.183532] 
[   15.183670] The buggy address belongs to the physical page:
[   15.183937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.184290] flags: 0x200000000000000(node=0|zone=2)
[   15.184561] page_type: f5(slab)
[   15.184769] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.185114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.185473] page dumped because: kasan: bad access detected
[   15.185819] 
[   15.185929] Memory state around the buggy address:
[   15.186143]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.186531]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.186897] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.187231]                                      ^
[   15.187447]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.187861]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.188236] ==================================================================
[   14.444892] ==================================================================
[   14.445286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.445572] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.445845] 
[   14.445974] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.446019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.446033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.446057] Call Trace:
[   14.446073]  <TASK>
[   14.446090]  dump_stack_lvl+0x73/0xb0
[   14.446119]  print_report+0xd1/0x650
[   14.446143]  ? __virt_addr_valid+0x1db/0x2d0
[   14.446167]  ? kasan_atomics_helper+0xac7/0x5450
[   14.446189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.446258]  ? kasan_atomics_helper+0xac7/0x5450
[   14.446286]  kasan_report+0x141/0x180
[   14.446310]  ? kasan_atomics_helper+0xac7/0x5450
[   14.446337]  kasan_check_range+0x10c/0x1c0
[   14.446362]  __kasan_check_write+0x18/0x20
[   14.446382]  kasan_atomics_helper+0xac7/0x5450
[   14.446406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.446430]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.446468]  ? kasan_atomics+0x152/0x310
[   14.446496]  kasan_atomics+0x1dc/0x310
[   14.446520]  ? __pfx_kasan_atomics+0x10/0x10
[   14.446546]  ? __pfx_read_tsc+0x10/0x10
[   14.446569]  ? ktime_get_ts64+0x86/0x230
[   14.446593]  kunit_try_run_case+0x1a5/0x480
[   14.446619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.446642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.446666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.446691]  ? __kthread_parkme+0x82/0x180
[   14.446712]  ? preempt_count_sub+0x50/0x80
[   14.446736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.446761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.446785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.446809]  kthread+0x337/0x6f0
[   14.446831]  ? trace_preempt_on+0x20/0xc0
[   14.446855]  ? __pfx_kthread+0x10/0x10
[   14.446877]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.446898]  ? calculate_sigpending+0x7b/0xa0
[   14.446923]  ? __pfx_kthread+0x10/0x10
[   14.446945]  ret_from_fork+0x116/0x1d0
[   14.446965]  ? __pfx_kthread+0x10/0x10
[   14.446988]  ret_from_fork_asm+0x1a/0x30
[   14.447020]  </TASK>
[   14.447034] 
[   14.455029] Allocated by task 283:
[   14.455363]  kasan_save_stack+0x45/0x70
[   14.455580]  kasan_save_track+0x18/0x40
[   14.455818]  kasan_save_alloc_info+0x3b/0x50
[   14.456004]  __kasan_kmalloc+0xb7/0xc0
[   14.456142]  __kmalloc_cache_noprof+0x189/0x420
[   14.456483]  kasan_atomics+0x95/0x310
[   14.456671]  kunit_try_run_case+0x1a5/0x480
[   14.456895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.457074]  kthread+0x337/0x6f0
[   14.457198]  ret_from_fork+0x116/0x1d0
[   14.457333]  ret_from_fork_asm+0x1a/0x30
[   14.457548] 
[   14.457648] The buggy address belongs to the object at ffff8881031c4500
[   14.457648]  which belongs to the cache kmalloc-64 of size 64
[   14.458411] The buggy address is located 0 bytes to the right of
[   14.458411]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.458836] 
[   14.458914] The buggy address belongs to the physical page:
[   14.459087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.459929] flags: 0x200000000000000(node=0|zone=2)
[   14.460181] page_type: f5(slab)
[   14.460353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.460746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.461037] page dumped because: kasan: bad access detected
[   14.461239] 
[   14.461314] Memory state around the buggy address:
[   14.461489]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.461805]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.462110] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.462536]                                      ^
[   14.462765]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.463044]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.463655] ==================================================================
[   15.290855] ==================================================================
[   15.291150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.291617] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.292120] 
[   15.292276] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.292321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.292335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.292359] Call Trace:
[   15.292373]  <TASK>
[   15.292390]  dump_stack_lvl+0x73/0xb0
[   15.292421]  print_report+0xd1/0x650
[   15.292444]  ? __virt_addr_valid+0x1db/0x2d0
[   15.292509]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.292532]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.292584]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.292632]  kasan_report+0x141/0x180
[   15.292657]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.292703]  kasan_check_range+0x10c/0x1c0
[   15.292729]  __kasan_check_write+0x18/0x20
[   15.292749]  kasan_atomics_helper+0x1f43/0x5450
[   15.292790]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.292827]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.292878]  ? kasan_atomics+0x152/0x310
[   15.292905]  kasan_atomics+0x1dc/0x310
[   15.292941]  ? __pfx_kasan_atomics+0x10/0x10
[   15.292967]  ? __pfx_read_tsc+0x10/0x10
[   15.292988]  ? ktime_get_ts64+0x86/0x230
[   15.293014]  kunit_try_run_case+0x1a5/0x480
[   15.293039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.293063]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.293088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.293112]  ? __kthread_parkme+0x82/0x180
[   15.293134]  ? preempt_count_sub+0x50/0x80
[   15.293159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.293184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.293208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.293233]  kthread+0x337/0x6f0
[   15.293254]  ? trace_preempt_on+0x20/0xc0
[   15.293296]  ? __pfx_kthread+0x10/0x10
[   15.293328]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.293349]  ? calculate_sigpending+0x7b/0xa0
[   15.293391]  ? __pfx_kthread+0x10/0x10
[   15.293414]  ret_from_fork+0x116/0x1d0
[   15.293434]  ? __pfx_kthread+0x10/0x10
[   15.293488]  ret_from_fork_asm+0x1a/0x30
[   15.293534]  </TASK>
[   15.293568] 
[   15.301981] Allocated by task 283:
[   15.302211]  kasan_save_stack+0x45/0x70
[   15.302436]  kasan_save_track+0x18/0x40
[   15.302695]  kasan_save_alloc_info+0x3b/0x50
[   15.302926]  __kasan_kmalloc+0xb7/0xc0
[   15.303114]  __kmalloc_cache_noprof+0x189/0x420
[   15.303333]  kasan_atomics+0x95/0x310
[   15.303478]  kunit_try_run_case+0x1a5/0x480
[   15.303662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.304066]  kthread+0x337/0x6f0
[   15.304232]  ret_from_fork+0x116/0x1d0
[   15.304368]  ret_from_fork_asm+0x1a/0x30
[   15.304522] 
[   15.304596] The buggy address belongs to the object at ffff8881031c4500
[   15.304596]  which belongs to the cache kmalloc-64 of size 64
[   15.305096] The buggy address is located 0 bytes to the right of
[   15.305096]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.305687] 
[   15.305788] The buggy address belongs to the physical page:
[   15.306104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.306352] flags: 0x200000000000000(node=0|zone=2)
[   15.306629] page_type: f5(slab)
[   15.306801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.307278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.307780] page dumped because: kasan: bad access detected
[   15.307999] 
[   15.308074] Memory state around the buggy address:
[   15.308248]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.308653]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.309033] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.309327]                                      ^
[   15.309567]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.309910]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.310241] ==================================================================
[   15.330747] ==================================================================
[   15.331139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.331532] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.331965] 
[   15.332087] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.332164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.332191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.332228] Call Trace:
[   15.332244]  <TASK>
[   15.332274]  dump_stack_lvl+0x73/0xb0
[   15.332317]  print_report+0xd1/0x650
[   15.332342]  ? __virt_addr_valid+0x1db/0x2d0
[   15.332377]  ? kasan_atomics_helper+0x2006/0x5450
[   15.332400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.332424]  ? kasan_atomics_helper+0x2006/0x5450
[   15.332469]  kasan_report+0x141/0x180
[   15.332493]  ? kasan_atomics_helper+0x2006/0x5450
[   15.332521]  kasan_check_range+0x10c/0x1c0
[   15.332546]  __kasan_check_write+0x18/0x20
[   15.332567]  kasan_atomics_helper+0x2006/0x5450
[   15.332591]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.332615]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.332643]  ? kasan_atomics+0x152/0x310
[   15.332672]  kasan_atomics+0x1dc/0x310
[   15.332695]  ? __pfx_kasan_atomics+0x10/0x10
[   15.332722]  ? __pfx_read_tsc+0x10/0x10
[   15.332746]  ? ktime_get_ts64+0x86/0x230
[   15.332800]  kunit_try_run_case+0x1a5/0x480
[   15.332826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.332860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.332885]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.332909]  ? __kthread_parkme+0x82/0x180
[   15.332931]  ? preempt_count_sub+0x50/0x80
[   15.332955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.332980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.333005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.333030]  kthread+0x337/0x6f0
[   15.333078]  ? trace_preempt_on+0x20/0xc0
[   15.333103]  ? __pfx_kthread+0x10/0x10
[   15.333125]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.333159]  ? calculate_sigpending+0x7b/0xa0
[   15.333184]  ? __pfx_kthread+0x10/0x10
[   15.333232]  ret_from_fork+0x116/0x1d0
[   15.333252]  ? __pfx_kthread+0x10/0x10
[   15.333274]  ret_from_fork_asm+0x1a/0x30
[   15.333316]  </TASK>
[   15.333330] 
[   15.341791] Allocated by task 283:
[   15.341987]  kasan_save_stack+0x45/0x70
[   15.342207]  kasan_save_track+0x18/0x40
[   15.342418]  kasan_save_alloc_info+0x3b/0x50
[   15.342641]  __kasan_kmalloc+0xb7/0xc0
[   15.342865]  __kmalloc_cache_noprof+0x189/0x420
[   15.343156]  kasan_atomics+0x95/0x310
[   15.343338]  kunit_try_run_case+0x1a5/0x480
[   15.343587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.343892]  kthread+0x337/0x6f0
[   15.344196]  ret_from_fork+0x116/0x1d0
[   15.344371]  ret_from_fork_asm+0x1a/0x30
[   15.344535] 
[   15.344634] The buggy address belongs to the object at ffff8881031c4500
[   15.344634]  which belongs to the cache kmalloc-64 of size 64
[   15.345256] The buggy address is located 0 bytes to the right of
[   15.345256]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.345868] 
[   15.346011] The buggy address belongs to the physical page:
[   15.346278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.346630] flags: 0x200000000000000(node=0|zone=2)
[   15.346911] page_type: f5(slab)
[   15.347105] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.347466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.347864] page dumped because: kasan: bad access detected
[   15.348038] 
[   15.348109] Memory state around the buggy address:
[   15.348262]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.348522]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.348842] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.349283]                                      ^
[   15.349475]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.349688]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.349898] ==================================================================
[   14.381628] ==================================================================
[   14.381988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.382328] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.382713] 
[   14.382832] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.382878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.382912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.382936] Call Trace:
[   14.382953]  <TASK>
[   14.382970]  dump_stack_lvl+0x73/0xb0
[   14.383000]  print_report+0xd1/0x650
[   14.383024]  ? __virt_addr_valid+0x1db/0x2d0
[   14.383047]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.383090]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.383117]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.383141]  kasan_report+0x141/0x180
[   14.383164]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.383273]  kasan_check_range+0x10c/0x1c0
[   14.383300]  __kasan_check_write+0x18/0x20
[   14.383321]  kasan_atomics_helper+0x8f9/0x5450
[   14.383345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.383369]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.383396]  ? kasan_atomics+0x152/0x310
[   14.383443]  kasan_atomics+0x1dc/0x310
[   14.383478]  ? __pfx_kasan_atomics+0x10/0x10
[   14.383503]  ? __pfx_read_tsc+0x10/0x10
[   14.383525]  ? ktime_get_ts64+0x86/0x230
[   14.383550]  kunit_try_run_case+0x1a5/0x480
[   14.383575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.383601]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.383626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.383651]  ? __kthread_parkme+0x82/0x180
[   14.383672]  ? preempt_count_sub+0x50/0x80
[   14.383696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.383739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.383764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.383810]  kthread+0x337/0x6f0
[   14.383831]  ? trace_preempt_on+0x20/0xc0
[   14.383856]  ? __pfx_kthread+0x10/0x10
[   14.383878]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.383901]  ? calculate_sigpending+0x7b/0xa0
[   14.383926]  ? __pfx_kthread+0x10/0x10
[   14.383949]  ret_from_fork+0x116/0x1d0
[   14.383987]  ? __pfx_kthread+0x10/0x10
[   14.384009]  ret_from_fork_asm+0x1a/0x30
[   14.384040]  </TASK>
[   14.384054] 
[   14.392470] Allocated by task 283:
[   14.392684]  kasan_save_stack+0x45/0x70
[   14.392906]  kasan_save_track+0x18/0x40
[   14.393089]  kasan_save_alloc_info+0x3b/0x50
[   14.393408]  __kasan_kmalloc+0xb7/0xc0
[   14.393596]  __kmalloc_cache_noprof+0x189/0x420
[   14.393856]  kasan_atomics+0x95/0x310
[   14.394041]  kunit_try_run_case+0x1a5/0x480
[   14.394287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.394481]  kthread+0x337/0x6f0
[   14.394669]  ret_from_fork+0x116/0x1d0
[   14.394878]  ret_from_fork_asm+0x1a/0x30
[   14.395075] 
[   14.395176] The buggy address belongs to the object at ffff8881031c4500
[   14.395176]  which belongs to the cache kmalloc-64 of size 64
[   14.395743] The buggy address is located 0 bytes to the right of
[   14.395743]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.396357] 
[   14.396471] The buggy address belongs to the physical page:
[   14.396741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.397073] flags: 0x200000000000000(node=0|zone=2)
[   14.397519] page_type: f5(slab)
[   14.397701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.398063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.398472] page dumped because: kasan: bad access detected
[   14.398762] 
[   14.398839] Memory state around the buggy address:
[   14.399015]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.399410]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.399767] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.400083]                                      ^
[   14.400376]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.400721]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.401028] ==================================================================
[   15.009516] ==================================================================
[   15.009787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.010488] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.011021] 
[   15.011227] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.011270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.011284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.011307] Call Trace:
[   15.011323]  <TASK>
[   15.011339]  dump_stack_lvl+0x73/0xb0
[   15.011368]  print_report+0xd1/0x650
[   15.011392]  ? __virt_addr_valid+0x1db/0x2d0
[   15.011415]  ? kasan_atomics_helper+0x177f/0x5450
[   15.011437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.011472]  ? kasan_atomics_helper+0x177f/0x5450
[   15.011495]  kasan_report+0x141/0x180
[   15.011520]  ? kasan_atomics_helper+0x177f/0x5450
[   15.011547]  kasan_check_range+0x10c/0x1c0
[   15.011573]  __kasan_check_write+0x18/0x20
[   15.011594]  kasan_atomics_helper+0x177f/0x5450
[   15.011617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.011641]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.011686]  ? kasan_atomics+0x152/0x310
[   15.011714]  kasan_atomics+0x1dc/0x310
[   15.011741]  ? __pfx_kasan_atomics+0x10/0x10
[   15.011768]  ? __pfx_read_tsc+0x10/0x10
[   15.011790]  ? ktime_get_ts64+0x86/0x230
[   15.011814]  kunit_try_run_case+0x1a5/0x480
[   15.011839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.011882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.011906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.011931]  ? __kthread_parkme+0x82/0x180
[   15.011952]  ? preempt_count_sub+0x50/0x80
[   15.011976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.012002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.012025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.012049]  kthread+0x337/0x6f0
[   15.012071]  ? trace_preempt_on+0x20/0xc0
[   15.012094]  ? __pfx_kthread+0x10/0x10
[   15.012116]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.012140]  ? calculate_sigpending+0x7b/0xa0
[   15.012164]  ? __pfx_kthread+0x10/0x10
[   15.012187]  ret_from_fork+0x116/0x1d0
[   15.012207]  ? __pfx_kthread+0x10/0x10
[   15.012229]  ret_from_fork_asm+0x1a/0x30
[   15.012261]  </TASK>
[   15.012274] 
[   15.022828] Allocated by task 283:
[   15.023003]  kasan_save_stack+0x45/0x70
[   15.023214]  kasan_save_track+0x18/0x40
[   15.023382]  kasan_save_alloc_info+0x3b/0x50
[   15.023607]  __kasan_kmalloc+0xb7/0xc0
[   15.024023]  __kmalloc_cache_noprof+0x189/0x420
[   15.024337]  kasan_atomics+0x95/0x310
[   15.024597]  kunit_try_run_case+0x1a5/0x480
[   15.024898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.025157]  kthread+0x337/0x6f0
[   15.025438]  ret_from_fork+0x116/0x1d0
[   15.025637]  ret_from_fork_asm+0x1a/0x30
[   15.025965] 
[   15.026067] The buggy address belongs to the object at ffff8881031c4500
[   15.026067]  which belongs to the cache kmalloc-64 of size 64
[   15.026684] The buggy address is located 0 bytes to the right of
[   15.026684]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.027334] 
[   15.027434] The buggy address belongs to the physical page:
[   15.027883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.028242] flags: 0x200000000000000(node=0|zone=2)
[   15.028480] page_type: f5(slab)
[   15.028636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.029151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.029511] page dumped because: kasan: bad access detected
[   15.029878] 
[   15.029983] Memory state around the buggy address:
[   15.030294]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.030690]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.031049] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.031350]                                      ^
[   15.031583]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032112]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032499] ==================================================================
[   15.271104] ==================================================================
[   15.271538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.271991] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.272342] 
[   15.272498] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.272546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.272571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.272595] Call Trace:
[   15.272612]  <TASK>
[   15.272657]  dump_stack_lvl+0x73/0xb0
[   15.272689]  print_report+0xd1/0x650
[   15.272737]  ? __virt_addr_valid+0x1db/0x2d0
[   15.272761]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.272811]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.272835]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.272897]  kasan_report+0x141/0x180
[   15.272921]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.272971]  kasan_check_range+0x10c/0x1c0
[   15.272997]  __kasan_check_write+0x18/0x20
[   15.273018]  kasan_atomics_helper+0x1eaa/0x5450
[   15.273054]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.273078]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.273115]  ? kasan_atomics+0x152/0x310
[   15.273144]  kasan_atomics+0x1dc/0x310
[   15.273168]  ? __pfx_kasan_atomics+0x10/0x10
[   15.273194]  ? __pfx_read_tsc+0x10/0x10
[   15.273217]  ? ktime_get_ts64+0x86/0x230
[   15.273242]  kunit_try_run_case+0x1a5/0x480
[   15.273267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.273292]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.273317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.273342]  ? __kthread_parkme+0x82/0x180
[   15.273386]  ? preempt_count_sub+0x50/0x80
[   15.273419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.273444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.273486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.273510]  kthread+0x337/0x6f0
[   15.273533]  ? trace_preempt_on+0x20/0xc0
[   15.273581]  ? __pfx_kthread+0x10/0x10
[   15.273604]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.273649]  ? calculate_sigpending+0x7b/0xa0
[   15.273674]  ? __pfx_kthread+0x10/0x10
[   15.273722]  ret_from_fork+0x116/0x1d0
[   15.273756]  ? __pfx_kthread+0x10/0x10
[   15.273790]  ret_from_fork_asm+0x1a/0x30
[   15.273821]  </TASK>
[   15.273836] 
[   15.282033] Allocated by task 283:
[   15.282260]  kasan_save_stack+0x45/0x70
[   15.282493]  kasan_save_track+0x18/0x40
[   15.282686]  kasan_save_alloc_info+0x3b/0x50
[   15.282953]  __kasan_kmalloc+0xb7/0xc0
[   15.283205]  __kmalloc_cache_noprof+0x189/0x420
[   15.283459]  kasan_atomics+0x95/0x310
[   15.283646]  kunit_try_run_case+0x1a5/0x480
[   15.283890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.284145]  kthread+0x337/0x6f0
[   15.284290]  ret_from_fork+0x116/0x1d0
[   15.284429]  ret_from_fork_asm+0x1a/0x30
[   15.284581] 
[   15.284662] The buggy address belongs to the object at ffff8881031c4500
[   15.284662]  which belongs to the cache kmalloc-64 of size 64
[   15.285192] The buggy address is located 0 bytes to the right of
[   15.285192]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.285728] 
[   15.285806] The buggy address belongs to the physical page:
[   15.285983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.286401] flags: 0x200000000000000(node=0|zone=2)
[   15.286693] page_type: f5(slab)
[   15.286926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.287358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.287800] page dumped because: kasan: bad access detected
[   15.288032] 
[   15.288106] Memory state around the buggy address:
[   15.288284]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.288695]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.289031] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.289391]                                      ^
[   15.289611]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.289972]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.290315] ==================================================================
[   14.361543] ==================================================================
[   14.361862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.362313] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.362633] 
[   14.362813] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.362857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.362895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.362919] Call Trace:
[   14.362935]  <TASK>
[   14.362952]  dump_stack_lvl+0x73/0xb0
[   14.362983]  print_report+0xd1/0x650
[   14.363007]  ? __virt_addr_valid+0x1db/0x2d0
[   14.363030]  ? kasan_atomics_helper+0x860/0x5450
[   14.363073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.363096]  ? kasan_atomics_helper+0x860/0x5450
[   14.363119]  kasan_report+0x141/0x180
[   14.363142]  ? kasan_atomics_helper+0x860/0x5450
[   14.363170]  kasan_check_range+0x10c/0x1c0
[   14.363258]  __kasan_check_write+0x18/0x20
[   14.363284]  kasan_atomics_helper+0x860/0x5450
[   14.363308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.363332]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.363359]  ? kasan_atomics+0x152/0x310
[   14.363387]  kasan_atomics+0x1dc/0x310
[   14.363411]  ? __pfx_kasan_atomics+0x10/0x10
[   14.363475]  ? __pfx_read_tsc+0x10/0x10
[   14.363498]  ? ktime_get_ts64+0x86/0x230
[   14.363524]  kunit_try_run_case+0x1a5/0x480
[   14.363551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.363574]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.363598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.363624]  ? __kthread_parkme+0x82/0x180
[   14.363646]  ? preempt_count_sub+0x50/0x80
[   14.363670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.363712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.363736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.363782]  kthread+0x337/0x6f0
[   14.363803]  ? trace_preempt_on+0x20/0xc0
[   14.363829]  ? __pfx_kthread+0x10/0x10
[   14.363851]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.363874]  ? calculate_sigpending+0x7b/0xa0
[   14.363899]  ? __pfx_kthread+0x10/0x10
[   14.363921]  ret_from_fork+0x116/0x1d0
[   14.363941]  ? __pfx_kthread+0x10/0x10
[   14.363963]  ret_from_fork_asm+0x1a/0x30
[   14.363995]  </TASK>
[   14.364009] 
[   14.372572] Allocated by task 283:
[   14.372756]  kasan_save_stack+0x45/0x70
[   14.372906]  kasan_save_track+0x18/0x40
[   14.373094]  kasan_save_alloc_info+0x3b/0x50
[   14.373550]  __kasan_kmalloc+0xb7/0xc0
[   14.373784]  __kmalloc_cache_noprof+0x189/0x420
[   14.374006]  kasan_atomics+0x95/0x310
[   14.374169]  kunit_try_run_case+0x1a5/0x480
[   14.374476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.374690]  kthread+0x337/0x6f0
[   14.374863]  ret_from_fork+0x116/0x1d0
[   14.375056]  ret_from_fork_asm+0x1a/0x30
[   14.375299] 
[   14.375378] The buggy address belongs to the object at ffff8881031c4500
[   14.375378]  which belongs to the cache kmalloc-64 of size 64
[   14.375971] The buggy address is located 0 bytes to the right of
[   14.375971]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.376540] 
[   14.376641] The buggy address belongs to the physical page:
[   14.376902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.377219] flags: 0x200000000000000(node=0|zone=2)
[   14.377462] page_type: f5(slab)
[   14.377632] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.378025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.378517] page dumped because: kasan: bad access detected
[   14.378852] 
[   14.378971] Memory state around the buggy address:
[   14.379279]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.379608]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.379904] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.380298]                                      ^
[   14.380540]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.380864]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.381133] ==================================================================
[   14.660363] ==================================================================
[   14.660667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.660972] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.661262] 
[   14.661351] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.661400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.661414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.661437] Call Trace:
[   14.661469]  <TASK>
[   14.661532]  dump_stack_lvl+0x73/0xb0
[   14.661566]  print_report+0xd1/0x650
[   14.661589]  ? __virt_addr_valid+0x1db/0x2d0
[   14.661613]  ? kasan_atomics_helper+0x1079/0x5450
[   14.661637]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.661662]  ? kasan_atomics_helper+0x1079/0x5450
[   14.661686]  kasan_report+0x141/0x180
[   14.661709]  ? kasan_atomics_helper+0x1079/0x5450
[   14.661737]  kasan_check_range+0x10c/0x1c0
[   14.661776]  __kasan_check_write+0x18/0x20
[   14.661797]  kasan_atomics_helper+0x1079/0x5450
[   14.661821]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.661845]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.661871]  ? kasan_atomics+0x152/0x310
[   14.661900]  kasan_atomics+0x1dc/0x310
[   14.661923]  ? __pfx_kasan_atomics+0x10/0x10
[   14.661949]  ? __pfx_read_tsc+0x10/0x10
[   14.661971]  ? ktime_get_ts64+0x86/0x230
[   14.661996]  kunit_try_run_case+0x1a5/0x480
[   14.662020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.662068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.662093]  ? __kthread_parkme+0x82/0x180
[   14.662114]  ? preempt_count_sub+0x50/0x80
[   14.662138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.662187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.662251]  kthread+0x337/0x6f0
[   14.662272]  ? trace_preempt_on+0x20/0xc0
[   14.662297]  ? __pfx_kthread+0x10/0x10
[   14.662319]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.662342]  ? calculate_sigpending+0x7b/0xa0
[   14.662366]  ? __pfx_kthread+0x10/0x10
[   14.662389]  ret_from_fork+0x116/0x1d0
[   14.662408]  ? __pfx_kthread+0x10/0x10
[   14.662430]  ret_from_fork_asm+0x1a/0x30
[   14.662473]  </TASK>
[   14.662486] 
[   14.670553] Allocated by task 283:
[   14.670796]  kasan_save_stack+0x45/0x70
[   14.670951]  kasan_save_track+0x18/0x40
[   14.671092]  kasan_save_alloc_info+0x3b/0x50
[   14.671525]  __kasan_kmalloc+0xb7/0xc0
[   14.671760]  __kmalloc_cache_noprof+0x189/0x420
[   14.671996]  kasan_atomics+0x95/0x310
[   14.672249]  kunit_try_run_case+0x1a5/0x480
[   14.672493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.672767]  kthread+0x337/0x6f0
[   14.672894]  ret_from_fork+0x116/0x1d0
[   14.673069]  ret_from_fork_asm+0x1a/0x30
[   14.673320] 
[   14.673430] The buggy address belongs to the object at ffff8881031c4500
[   14.673430]  which belongs to the cache kmalloc-64 of size 64
[   14.673962] The buggy address is located 0 bytes to the right of
[   14.673962]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.674352] 
[   14.674429] The buggy address belongs to the physical page:
[   14.674626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.675083] flags: 0x200000000000000(node=0|zone=2)
[   14.675520] page_type: f5(slab)
[   14.675707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.675993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.676465] page dumped because: kasan: bad access detected
[   14.676835] 
[   14.676933] Memory state around the buggy address:
[   14.677160]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.677515]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.677740] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.678231]                                      ^
[   14.678479]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.678802]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.679044] ==================================================================
[   14.793659] ==================================================================
[   14.794007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.794762] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.795066] 
[   14.795181] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.795482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.795497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.795520] Call Trace:
[   14.795538]  <TASK>
[   14.795554]  dump_stack_lvl+0x73/0xb0
[   14.795585]  print_report+0xd1/0x650
[   14.795608]  ? __virt_addr_valid+0x1db/0x2d0
[   14.795632]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.795654]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.795679]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.795714]  kasan_report+0x141/0x180
[   14.795739]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.795766]  kasan_check_range+0x10c/0x1c0
[   14.795791]  __kasan_check_write+0x18/0x20
[   14.795811]  kasan_atomics_helper+0x12e6/0x5450
[   14.795836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.795859]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.795885]  ? kasan_atomics+0x152/0x310
[   14.795913]  kasan_atomics+0x1dc/0x310
[   14.795936]  ? __pfx_kasan_atomics+0x10/0x10
[   14.795962]  ? __pfx_read_tsc+0x10/0x10
[   14.795984]  ? ktime_get_ts64+0x86/0x230
[   14.796008]  kunit_try_run_case+0x1a5/0x480
[   14.796033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.796057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.796081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.796105]  ? __kthread_parkme+0x82/0x180
[   14.796126]  ? preempt_count_sub+0x50/0x80
[   14.796151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.796175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.796200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.796224]  kthread+0x337/0x6f0
[   14.796245]  ? trace_preempt_on+0x20/0xc0
[   14.796269]  ? __pfx_kthread+0x10/0x10
[   14.796291]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.796313]  ? calculate_sigpending+0x7b/0xa0
[   14.796337]  ? __pfx_kthread+0x10/0x10
[   14.796360]  ret_from_fork+0x116/0x1d0
[   14.796378]  ? __pfx_kthread+0x10/0x10
[   14.796400]  ret_from_fork_asm+0x1a/0x30
[   14.796432]  </TASK>
[   14.796444] 
[   14.803790] Allocated by task 283:
[   14.803985]  kasan_save_stack+0x45/0x70
[   14.804185]  kasan_save_track+0x18/0x40
[   14.804583]  kasan_save_alloc_info+0x3b/0x50
[   14.804817]  __kasan_kmalloc+0xb7/0xc0
[   14.804954]  __kmalloc_cache_noprof+0x189/0x420
[   14.805113]  kasan_atomics+0x95/0x310
[   14.805250]  kunit_try_run_case+0x1a5/0x480
[   14.805405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.805594]  kthread+0x337/0x6f0
[   14.805741]  ret_from_fork+0x116/0x1d0
[   14.805933]  ret_from_fork_asm+0x1a/0x30
[   14.806168] 
[   14.806267] The buggy address belongs to the object at ffff8881031c4500
[   14.806267]  which belongs to the cache kmalloc-64 of size 64
[   14.806860] The buggy address is located 0 bytes to the right of
[   14.806860]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.807228] 
[   14.807305] The buggy address belongs to the physical page:
[   14.807488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.808223] flags: 0x200000000000000(node=0|zone=2)
[   14.808496] page_type: f5(slab)
[   14.808802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.809429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.811241] page dumped because: kasan: bad access detected
[   14.811894] 
[   14.812339] Memory state around the buggy address:
[   14.813125]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.813863]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.814097] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.814318]                                      ^
[   14.814489]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.814857]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.815230] ==================================================================
[   14.401583] ==================================================================
[   14.401918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.402519] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.402853] 
[   14.402945] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.402992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.403006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.403029] Call Trace:
[   14.403046]  <TASK>
[   14.403063]  dump_stack_lvl+0x73/0xb0
[   14.403093]  print_report+0xd1/0x650
[   14.403117]  ? __virt_addr_valid+0x1db/0x2d0
[   14.403141]  ? kasan_atomics_helper+0x992/0x5450
[   14.403209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.403235]  ? kasan_atomics_helper+0x992/0x5450
[   14.403258]  kasan_report+0x141/0x180
[   14.403281]  ? kasan_atomics_helper+0x992/0x5450
[   14.403309]  kasan_check_range+0x10c/0x1c0
[   14.403334]  __kasan_check_write+0x18/0x20
[   14.403415]  kasan_atomics_helper+0x992/0x5450
[   14.403440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.403475]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.403502]  ? kasan_atomics+0x152/0x310
[   14.403531]  kasan_atomics+0x1dc/0x310
[   14.403555]  ? __pfx_kasan_atomics+0x10/0x10
[   14.403581]  ? __pfx_read_tsc+0x10/0x10
[   14.403603]  ? ktime_get_ts64+0x86/0x230
[   14.403628]  kunit_try_run_case+0x1a5/0x480
[   14.403653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.403695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.403720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.403744]  ? __kthread_parkme+0x82/0x180
[   14.403764]  ? preempt_count_sub+0x50/0x80
[   14.403813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.403838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.403862]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.403886]  kthread+0x337/0x6f0
[   14.403907]  ? trace_preempt_on+0x20/0xc0
[   14.403931]  ? __pfx_kthread+0x10/0x10
[   14.403953]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.403975]  ? calculate_sigpending+0x7b/0xa0
[   14.403999]  ? __pfx_kthread+0x10/0x10
[   14.404023]  ret_from_fork+0x116/0x1d0
[   14.404043]  ? __pfx_kthread+0x10/0x10
[   14.404065]  ret_from_fork_asm+0x1a/0x30
[   14.404098]  </TASK>
[   14.404111] 
[   14.412309] Allocated by task 283:
[   14.412460]  kasan_save_stack+0x45/0x70
[   14.412713]  kasan_save_track+0x18/0x40
[   14.412898]  kasan_save_alloc_info+0x3b/0x50
[   14.413095]  __kasan_kmalloc+0xb7/0xc0
[   14.413582]  __kmalloc_cache_noprof+0x189/0x420
[   14.413788]  kasan_atomics+0x95/0x310
[   14.413953]  kunit_try_run_case+0x1a5/0x480
[   14.414250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.414543]  kthread+0x337/0x6f0
[   14.414709]  ret_from_fork+0x116/0x1d0
[   14.414843]  ret_from_fork_asm+0x1a/0x30
[   14.414989] 
[   14.415089] The buggy address belongs to the object at ffff8881031c4500
[   14.415089]  which belongs to the cache kmalloc-64 of size 64
[   14.415643] The buggy address is located 0 bytes to the right of
[   14.415643]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.416243] 
[   14.416349] The buggy address belongs to the physical page:
[   14.416613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.416960] flags: 0x200000000000000(node=0|zone=2)
[   14.417131] page_type: f5(slab)
[   14.417353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.417800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.418144] page dumped because: kasan: bad access detected
[   14.418585] 
[   14.418714] Memory state around the buggy address:
[   14.418964]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.419375]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.419692] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.420030]                                      ^
[   14.420321]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.420596]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.420950] ==================================================================
[   14.921062] ==================================================================
[   14.921782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.922064] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.922396] 
[   14.922499] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.922542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.922557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.922581] Call Trace:
[   14.922597]  <TASK>
[   14.922615]  dump_stack_lvl+0x73/0xb0
[   14.922654]  print_report+0xd1/0x650
[   14.922683]  ? __virt_addr_valid+0x1db/0x2d0
[   14.922707]  ? kasan_atomics_helper+0x151d/0x5450
[   14.922729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.922753]  ? kasan_atomics_helper+0x151d/0x5450
[   14.922776]  kasan_report+0x141/0x180
[   14.922811]  ? kasan_atomics_helper+0x151d/0x5450
[   14.922840]  kasan_check_range+0x10c/0x1c0
[   14.922878]  __kasan_check_write+0x18/0x20
[   14.922899]  kasan_atomics_helper+0x151d/0x5450
[   14.922924]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.922958]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.922985]  ? kasan_atomics+0x152/0x310
[   14.923013]  kasan_atomics+0x1dc/0x310
[   14.923038]  ? __pfx_kasan_atomics+0x10/0x10
[   14.923063]  ? __pfx_read_tsc+0x10/0x10
[   14.923084]  ? ktime_get_ts64+0x86/0x230
[   14.923109]  kunit_try_run_case+0x1a5/0x480
[   14.923133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.923157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.923181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.923206]  ? __kthread_parkme+0x82/0x180
[   14.923227]  ? preempt_count_sub+0x50/0x80
[   14.923251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.923276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.923301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.923325]  kthread+0x337/0x6f0
[   14.923346]  ? trace_preempt_on+0x20/0xc0
[   14.923371]  ? __pfx_kthread+0x10/0x10
[   14.923394]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.923418]  ? calculate_sigpending+0x7b/0xa0
[   14.923462]  ? __pfx_kthread+0x10/0x10
[   14.923485]  ret_from_fork+0x116/0x1d0
[   14.923505]  ? __pfx_kthread+0x10/0x10
[   14.923537]  ret_from_fork_asm+0x1a/0x30
[   14.923569]  </TASK>
[   14.923582] 
[   14.933502] Allocated by task 283:
[   14.933696]  kasan_save_stack+0x45/0x70
[   14.934022]  kasan_save_track+0x18/0x40
[   14.934313]  kasan_save_alloc_info+0x3b/0x50
[   14.934501]  __kasan_kmalloc+0xb7/0xc0
[   14.934856]  __kmalloc_cache_noprof+0x189/0x420
[   14.935083]  kasan_atomics+0x95/0x310
[   14.935363]  kunit_try_run_case+0x1a5/0x480
[   14.935560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.935961]  kthread+0x337/0x6f0
[   14.936250]  ret_from_fork+0x116/0x1d0
[   14.936397]  ret_from_fork_asm+0x1a/0x30
[   14.936760] 
[   14.936867] The buggy address belongs to the object at ffff8881031c4500
[   14.936867]  which belongs to the cache kmalloc-64 of size 64
[   14.937370] The buggy address is located 0 bytes to the right of
[   14.937370]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.938235] 
[   14.938336] The buggy address belongs to the physical page:
[   14.938529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.939040] flags: 0x200000000000000(node=0|zone=2)
[   14.939355] page_type: f5(slab)
[   14.939514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.939976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.940394] page dumped because: kasan: bad access detected
[   14.940657] 
[   14.940933] Memory state around the buggy address:
[   14.941132]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.941664]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.942378] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.943152]                                      ^
[   14.943660]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.944330]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.945008] ==================================================================
[   14.970687] ==================================================================
[   14.971057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.971613] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.972038] 
[   14.972157] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.972266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.972284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.972370] Call Trace:
[   14.972387]  <TASK>
[   14.972476]  dump_stack_lvl+0x73/0xb0
[   14.972549]  print_report+0xd1/0x650
[   14.972629]  ? __virt_addr_valid+0x1db/0x2d0
[   14.972654]  ? kasan_atomics_helper+0x164f/0x5450
[   14.972697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.972721]  ? kasan_atomics_helper+0x164f/0x5450
[   14.972744]  kasan_report+0x141/0x180
[   14.972768]  ? kasan_atomics_helper+0x164f/0x5450
[   14.972795]  kasan_check_range+0x10c/0x1c0
[   14.972821]  __kasan_check_write+0x18/0x20
[   14.972841]  kasan_atomics_helper+0x164f/0x5450
[   14.972865]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.972888]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.972914]  ? kasan_atomics+0x152/0x310
[   14.972943]  kasan_atomics+0x1dc/0x310
[   14.972967]  ? __pfx_kasan_atomics+0x10/0x10
[   14.972993]  ? __pfx_read_tsc+0x10/0x10
[   14.973015]  ? ktime_get_ts64+0x86/0x230
[   14.973040]  kunit_try_run_case+0x1a5/0x480
[   14.973066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.973090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.973115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.973140]  ? __kthread_parkme+0x82/0x180
[   14.973161]  ? preempt_count_sub+0x50/0x80
[   14.973187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.973212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.973236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.973261]  kthread+0x337/0x6f0
[   14.973283]  ? trace_preempt_on+0x20/0xc0
[   14.973309]  ? __pfx_kthread+0x10/0x10
[   14.973331]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.973354]  ? calculate_sigpending+0x7b/0xa0
[   14.973385]  ? __pfx_kthread+0x10/0x10
[   14.973408]  ret_from_fork+0x116/0x1d0
[   14.973428]  ? __pfx_kthread+0x10/0x10
[   14.973450]  ret_from_fork_asm+0x1a/0x30
[   14.973495]  </TASK>
[   14.973508] 
[   14.984121] Allocated by task 283:
[   14.984327]  kasan_save_stack+0x45/0x70
[   14.984545]  kasan_save_track+0x18/0x40
[   14.984733]  kasan_save_alloc_info+0x3b/0x50
[   14.984886]  __kasan_kmalloc+0xb7/0xc0
[   14.985096]  __kmalloc_cache_noprof+0x189/0x420
[   14.985342]  kasan_atomics+0x95/0x310
[   14.985535]  kunit_try_run_case+0x1a5/0x480
[   14.985764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.985947]  kthread+0x337/0x6f0
[   14.986121]  ret_from_fork+0x116/0x1d0
[   14.986310]  ret_from_fork_asm+0x1a/0x30
[   14.986538] 
[   14.986637] The buggy address belongs to the object at ffff8881031c4500
[   14.986637]  which belongs to the cache kmalloc-64 of size 64
[   14.987114] The buggy address is located 0 bytes to the right of
[   14.987114]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.987692] 
[   14.987795] The buggy address belongs to the physical page:
[   14.988021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.988339] flags: 0x200000000000000(node=0|zone=2)
[   14.988570] page_type: f5(slab)
[   14.988754] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.989071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.989328] page dumped because: kasan: bad access detected
[   14.989524] 
[   14.989598] Memory state around the buggy address:
[   14.989783]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.990111]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.990441] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.990797]                                      ^
[   14.991031]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991288]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991593] ==================================================================
[   15.209351] ==================================================================
[   15.209781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.210175] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.210543] 
[   15.210710] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.210756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.210769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.210792] Call Trace:
[   15.210837]  <TASK>
[   15.210854]  dump_stack_lvl+0x73/0xb0
[   15.210913]  print_report+0xd1/0x650
[   15.210938]  ? __virt_addr_valid+0x1db/0x2d0
[   15.210962]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.210984]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.211007]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.211030]  kasan_report+0x141/0x180
[   15.211054]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.211107]  kasan_check_range+0x10c/0x1c0
[   15.211133]  __kasan_check_write+0x18/0x20
[   15.211171]  kasan_atomics_helper+0x1ce1/0x5450
[   15.211207]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.211230]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.211257]  ? kasan_atomics+0x152/0x310
[   15.211285]  kasan_atomics+0x1dc/0x310
[   15.211310]  ? __pfx_kasan_atomics+0x10/0x10
[   15.211335]  ? __pfx_read_tsc+0x10/0x10
[   15.211357]  ? ktime_get_ts64+0x86/0x230
[   15.211382]  kunit_try_run_case+0x1a5/0x480
[   15.211407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.211430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.211492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.211516]  ? __kthread_parkme+0x82/0x180
[   15.211537]  ? preempt_count_sub+0x50/0x80
[   15.211571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.211595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.211646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.211671]  kthread+0x337/0x6f0
[   15.211703]  ? trace_preempt_on+0x20/0xc0
[   15.211766]  ? __pfx_kthread+0x10/0x10
[   15.211788]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.211810]  ? calculate_sigpending+0x7b/0xa0
[   15.211845]  ? __pfx_kthread+0x10/0x10
[   15.211868]  ret_from_fork+0x116/0x1d0
[   15.211887]  ? __pfx_kthread+0x10/0x10
[   15.211924]  ret_from_fork_asm+0x1a/0x30
[   15.211956]  </TASK>
[   15.211969] 
[   15.220178] Allocated by task 283:
[   15.220316]  kasan_save_stack+0x45/0x70
[   15.220467]  kasan_save_track+0x18/0x40
[   15.220689]  kasan_save_alloc_info+0x3b/0x50
[   15.220953]  __kasan_kmalloc+0xb7/0xc0
[   15.221188]  __kmalloc_cache_noprof+0x189/0x420
[   15.221432]  kasan_atomics+0x95/0x310
[   15.221594]  kunit_try_run_case+0x1a5/0x480
[   15.221846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.222119]  kthread+0x337/0x6f0
[   15.222345]  ret_from_fork+0x116/0x1d0
[   15.222556]  ret_from_fork_asm+0x1a/0x30
[   15.222772] 
[   15.222906] The buggy address belongs to the object at ffff8881031c4500
[   15.222906]  which belongs to the cache kmalloc-64 of size 64
[   15.223620] The buggy address is located 0 bytes to the right of
[   15.223620]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.224170] 
[   15.224291] The buggy address belongs to the physical page:
[   15.224616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.225035] flags: 0x200000000000000(node=0|zone=2)
[   15.225336] page_type: f5(slab)
[   15.225511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.225926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.226287] page dumped because: kasan: bad access detected
[   15.226571] 
[   15.226682] Memory state around the buggy address:
[   15.226979]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.227311]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.227648] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.227994]                                      ^
[   15.228253]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.228607]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.228965] ==================================================================
[   14.508103] ==================================================================
[   14.508662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.509019] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.509532] 
[   14.509640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.509684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.509699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.509721] Call Trace:
[   14.509738]  <TASK>
[   14.509754]  dump_stack_lvl+0x73/0xb0
[   14.509784]  print_report+0xd1/0x650
[   14.509818]  ? __virt_addr_valid+0x1db/0x2d0
[   14.509842]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.509864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.509888]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.509911]  kasan_report+0x141/0x180
[   14.509935]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.509963]  __asan_report_load4_noabort+0x18/0x20
[   14.509989]  kasan_atomics_helper+0x4a84/0x5450
[   14.510013]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.510036]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.510063]  ? kasan_atomics+0x152/0x310
[   14.510091]  kasan_atomics+0x1dc/0x310
[   14.510114]  ? __pfx_kasan_atomics+0x10/0x10
[   14.510140]  ? __pfx_read_tsc+0x10/0x10
[   14.510162]  ? ktime_get_ts64+0x86/0x230
[   14.510186]  kunit_try_run_case+0x1a5/0x480
[   14.510211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.510235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.510259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.510284]  ? __kthread_parkme+0x82/0x180
[   14.510304]  ? preempt_count_sub+0x50/0x80
[   14.510329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.510353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.510378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.510402]  kthread+0x337/0x6f0
[   14.510423]  ? trace_preempt_on+0x20/0xc0
[   14.510448]  ? __pfx_kthread+0x10/0x10
[   14.510481]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.510504]  ? calculate_sigpending+0x7b/0xa0
[   14.510528]  ? __pfx_kthread+0x10/0x10
[   14.510551]  ret_from_fork+0x116/0x1d0
[   14.510570]  ? __pfx_kthread+0x10/0x10
[   14.510592]  ret_from_fork_asm+0x1a/0x30
[   14.510623]  </TASK>
[   14.510636] 
[   14.518840] Allocated by task 283:
[   14.519016]  kasan_save_stack+0x45/0x70
[   14.519233]  kasan_save_track+0x18/0x40
[   14.519387]  kasan_save_alloc_info+0x3b/0x50
[   14.519597]  __kasan_kmalloc+0xb7/0xc0
[   14.519811]  __kmalloc_cache_noprof+0x189/0x420
[   14.520015]  kasan_atomics+0x95/0x310
[   14.520208]  kunit_try_run_case+0x1a5/0x480
[   14.520614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.520859]  kthread+0x337/0x6f0
[   14.521036]  ret_from_fork+0x116/0x1d0
[   14.521279]  ret_from_fork_asm+0x1a/0x30
[   14.521478] 
[   14.521564] The buggy address belongs to the object at ffff8881031c4500
[   14.521564]  which belongs to the cache kmalloc-64 of size 64
[   14.522070] The buggy address is located 0 bytes to the right of
[   14.522070]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.522610] 
[   14.522721] The buggy address belongs to the physical page:
[   14.522936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.523180] flags: 0x200000000000000(node=0|zone=2)
[   14.523345] page_type: f5(slab)
[   14.523478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.524051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.524387] page dumped because: kasan: bad access detected
[   14.524663] 
[   14.524760] Memory state around the buggy address:
[   14.524984]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.525239]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.525474] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.526835]                                      ^
[   14.527055]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.527356]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.527657] ==================================================================
[   14.300713] ==================================================================
[   14.301032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.301817] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.302138] 
[   14.302319] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.302369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.302384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.302410] Call Trace:
[   14.302427]  <TASK>
[   14.302445]  dump_stack_lvl+0x73/0xb0
[   14.302489]  print_report+0xd1/0x650
[   14.302512]  ? __virt_addr_valid+0x1db/0x2d0
[   14.302537]  ? kasan_atomics_helper+0x72f/0x5450
[   14.302559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.302583]  ? kasan_atomics_helper+0x72f/0x5450
[   14.302606]  kasan_report+0x141/0x180
[   14.302629]  ? kasan_atomics_helper+0x72f/0x5450
[   14.302657]  kasan_check_range+0x10c/0x1c0
[   14.302682]  __kasan_check_write+0x18/0x20
[   14.302703]  kasan_atomics_helper+0x72f/0x5450
[   14.302727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.302751]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.302778]  ? kasan_atomics+0x152/0x310
[   14.302806]  kasan_atomics+0x1dc/0x310
[   14.302830]  ? __pfx_kasan_atomics+0x10/0x10
[   14.302857]  ? __pfx_read_tsc+0x10/0x10
[   14.302878]  ? ktime_get_ts64+0x86/0x230
[   14.302903]  kunit_try_run_case+0x1a5/0x480
[   14.302928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.302952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.302977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.303001]  ? __kthread_parkme+0x82/0x180
[   14.303022]  ? preempt_count_sub+0x50/0x80
[   14.303047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.303073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.303096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.303120]  kthread+0x337/0x6f0
[   14.303141]  ? trace_preempt_on+0x20/0xc0
[   14.303165]  ? __pfx_kthread+0x10/0x10
[   14.303538]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.303576]  ? calculate_sigpending+0x7b/0xa0
[   14.303604]  ? __pfx_kthread+0x10/0x10
[   14.303628]  ret_from_fork+0x116/0x1d0
[   14.303650]  ? __pfx_kthread+0x10/0x10
[   14.303674]  ret_from_fork_asm+0x1a/0x30
[   14.303746]  </TASK>
[   14.303760] 
[   14.316976] Allocated by task 283:
[   14.317145]  kasan_save_stack+0x45/0x70
[   14.317402]  kasan_save_track+0x18/0x40
[   14.317609]  kasan_save_alloc_info+0x3b/0x50
[   14.318225]  __kasan_kmalloc+0xb7/0xc0
[   14.318550]  __kmalloc_cache_noprof+0x189/0x420
[   14.318971]  kasan_atomics+0x95/0x310
[   14.319289]  kunit_try_run_case+0x1a5/0x480
[   14.319812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.320074]  kthread+0x337/0x6f0
[   14.320446]  ret_from_fork+0x116/0x1d0
[   14.320658]  ret_from_fork_asm+0x1a/0x30
[   14.321011] 
[   14.321111] The buggy address belongs to the object at ffff8881031c4500
[   14.321111]  which belongs to the cache kmalloc-64 of size 64
[   14.322125] The buggy address is located 0 bytes to the right of
[   14.322125]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.323421] 
[   14.323550] The buggy address belongs to the physical page:
[   14.324093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.324822] flags: 0x200000000000000(node=0|zone=2)
[   14.325058] page_type: f5(slab)
[   14.325270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.325607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.326676] page dumped because: kasan: bad access detected
[   14.327016] 
[   14.327313] Memory state around the buggy address:
[   14.327804]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.328137]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.328491] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.329142]                                      ^
[   14.329623]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.330128]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.330568] ==================================================================
[   14.465309] ==================================================================
[   14.465805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.466078] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.466603] 
[   14.466823] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.466871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.466885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.466908] Call Trace:
[   14.466926]  <TASK>
[   14.466943]  dump_stack_lvl+0x73/0xb0
[   14.466977]  print_report+0xd1/0x650
[   14.467004]  ? __virt_addr_valid+0x1db/0x2d0
[   14.467027]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.467050]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.467073]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.467097]  kasan_report+0x141/0x180
[   14.467120]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.467146]  kasan_check_range+0x10c/0x1c0
[   14.467171]  __kasan_check_write+0x18/0x20
[   14.467191]  kasan_atomics_helper+0xb6a/0x5450
[   14.467215]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.467238]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.467265]  ? kasan_atomics+0x152/0x310
[   14.467292]  kasan_atomics+0x1dc/0x310
[   14.467328]  ? __pfx_kasan_atomics+0x10/0x10
[   14.467354]  ? __pfx_read_tsc+0x10/0x10
[   14.467375]  ? ktime_get_ts64+0x86/0x230
[   14.467400]  kunit_try_run_case+0x1a5/0x480
[   14.467425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.467447]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.467484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.467509]  ? __kthread_parkme+0x82/0x180
[   14.467530]  ? preempt_count_sub+0x50/0x80
[   14.467554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.467579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.467603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.467628]  kthread+0x337/0x6f0
[   14.467649]  ? trace_preempt_on+0x20/0xc0
[   14.467673]  ? __pfx_kthread+0x10/0x10
[   14.467737]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.467760]  ? calculate_sigpending+0x7b/0xa0
[   14.467784]  ? __pfx_kthread+0x10/0x10
[   14.467807]  ret_from_fork+0x116/0x1d0
[   14.467827]  ? __pfx_kthread+0x10/0x10
[   14.467848]  ret_from_fork_asm+0x1a/0x30
[   14.467879]  </TASK>
[   14.467892] 
[   14.478877] Allocated by task 283:
[   14.479015]  kasan_save_stack+0x45/0x70
[   14.479354]  kasan_save_track+0x18/0x40
[   14.479565]  kasan_save_alloc_info+0x3b/0x50
[   14.479847]  __kasan_kmalloc+0xb7/0xc0
[   14.479985]  __kmalloc_cache_noprof+0x189/0x420
[   14.480145]  kasan_atomics+0x95/0x310
[   14.480285]  kunit_try_run_case+0x1a5/0x480
[   14.480586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.481042]  kthread+0x337/0x6f0
[   14.481220]  ret_from_fork+0x116/0x1d0
[   14.481521]  ret_from_fork_asm+0x1a/0x30
[   14.481911] 
[   14.482014] The buggy address belongs to the object at ffff8881031c4500
[   14.482014]  which belongs to the cache kmalloc-64 of size 64
[   14.482500] The buggy address is located 0 bytes to the right of
[   14.482500]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.483190] 
[   14.483269] The buggy address belongs to the physical page:
[   14.483446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.484046] flags: 0x200000000000000(node=0|zone=2)
[   14.484256] page_type: f5(slab)
[   14.484381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.484771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.485117] page dumped because: kasan: bad access detected
[   14.485372] 
[   14.485484] Memory state around the buggy address:
[   14.485739]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.485965]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.486522] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.486824]                                      ^
[   14.486986]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.487205]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.487887] ==================================================================
[   14.566025] ==================================================================
[   14.566417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.566733] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.567010] 
[   14.567125] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.567169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.567241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.567267] Call Trace:
[   14.567283]  <TASK>
[   14.567299]  dump_stack_lvl+0x73/0xb0
[   14.567328]  print_report+0xd1/0x650
[   14.567352]  ? __virt_addr_valid+0x1db/0x2d0
[   14.567375]  ? kasan_atomics_helper+0xe78/0x5450
[   14.567397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.567421]  ? kasan_atomics_helper+0xe78/0x5450
[   14.567443]  kasan_report+0x141/0x180
[   14.567477]  ? kasan_atomics_helper+0xe78/0x5450
[   14.567505]  kasan_check_range+0x10c/0x1c0
[   14.567529]  __kasan_check_write+0x18/0x20
[   14.567549]  kasan_atomics_helper+0xe78/0x5450
[   14.567574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.567598]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.567624]  ? kasan_atomics+0x152/0x310
[   14.567653]  kasan_atomics+0x1dc/0x310
[   14.567677]  ? __pfx_kasan_atomics+0x10/0x10
[   14.567720]  ? __pfx_read_tsc+0x10/0x10
[   14.567743]  ? ktime_get_ts64+0x86/0x230
[   14.567768]  kunit_try_run_case+0x1a5/0x480
[   14.567794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.567818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.567842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.567867]  ? __kthread_parkme+0x82/0x180
[   14.567888]  ? preempt_count_sub+0x50/0x80
[   14.567913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.567938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.567962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.567986]  kthread+0x337/0x6f0
[   14.568007]  ? trace_preempt_on+0x20/0xc0
[   14.568031]  ? __pfx_kthread+0x10/0x10
[   14.568053]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.568076]  ? calculate_sigpending+0x7b/0xa0
[   14.568102]  ? __pfx_kthread+0x10/0x10
[   14.568125]  ret_from_fork+0x116/0x1d0
[   14.568144]  ? __pfx_kthread+0x10/0x10
[   14.568167]  ret_from_fork_asm+0x1a/0x30
[   14.568254]  </TASK>
[   14.568269] 
[   14.576011] Allocated by task 283:
[   14.576176]  kasan_save_stack+0x45/0x70
[   14.576368]  kasan_save_track+0x18/0x40
[   14.576536]  kasan_save_alloc_info+0x3b/0x50
[   14.576742]  __kasan_kmalloc+0xb7/0xc0
[   14.576890]  __kmalloc_cache_noprof+0x189/0x420
[   14.577115]  kasan_atomics+0x95/0x310
[   14.577289]  kunit_try_run_case+0x1a5/0x480
[   14.577563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.577776]  kthread+0x337/0x6f0
[   14.577907]  ret_from_fork+0x116/0x1d0
[   14.578044]  ret_from_fork_asm+0x1a/0x30
[   14.578486] 
[   14.578606] The buggy address belongs to the object at ffff8881031c4500
[   14.578606]  which belongs to the cache kmalloc-64 of size 64
[   14.579163] The buggy address is located 0 bytes to the right of
[   14.579163]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.579818] 
[   14.579918] The buggy address belongs to the physical page:
[   14.580229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.580568] flags: 0x200000000000000(node=0|zone=2)
[   14.580814] page_type: f5(slab)
[   14.580964] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.581259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.581514] page dumped because: kasan: bad access detected
[   14.581776] 
[   14.581875] Memory state around the buggy address:
[   14.582105]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.582432]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.582755] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.583024]                                      ^
[   14.583181]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.583414]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.583751] ==================================================================
[   14.205698] ==================================================================
[   14.206099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.206506] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.206868] 
[   14.207009] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.207054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.207068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.207091] Call Trace:
[   14.207107]  <TASK>
[   14.207123]  dump_stack_lvl+0x73/0xb0
[   14.207152]  print_report+0xd1/0x650
[   14.207251]  ? __virt_addr_valid+0x1db/0x2d0
[   14.207299]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.207323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.207348]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.207371]  kasan_report+0x141/0x180
[   14.207396]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.207424]  __asan_report_store4_noabort+0x1b/0x30
[   14.207446]  kasan_atomics_helper+0x4b3a/0x5450
[   14.207480]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.207504]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.207530]  ? kasan_atomics+0x152/0x310
[   14.207558]  kasan_atomics+0x1dc/0x310
[   14.207583]  ? __pfx_kasan_atomics+0x10/0x10
[   14.207609]  ? __pfx_read_tsc+0x10/0x10
[   14.207630]  ? ktime_get_ts64+0x86/0x230
[   14.207654]  kunit_try_run_case+0x1a5/0x480
[   14.207698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.207721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.207764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.207788]  ? __kthread_parkme+0x82/0x180
[   14.207825]  ? preempt_count_sub+0x50/0x80
[   14.207862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.207901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.207925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.207950]  kthread+0x337/0x6f0
[   14.207988]  ? trace_preempt_on+0x20/0xc0
[   14.208027]  ? __pfx_kthread+0x10/0x10
[   14.208049]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.208072]  ? calculate_sigpending+0x7b/0xa0
[   14.208096]  ? __pfx_kthread+0x10/0x10
[   14.208119]  ret_from_fork+0x116/0x1d0
[   14.208139]  ? __pfx_kthread+0x10/0x10
[   14.208162]  ret_from_fork_asm+0x1a/0x30
[   14.208250]  </TASK>
[   14.208265] 
[   14.216908] Allocated by task 283:
[   14.217047]  kasan_save_stack+0x45/0x70
[   14.217265]  kasan_save_track+0x18/0x40
[   14.217487]  kasan_save_alloc_info+0x3b/0x50
[   14.217750]  __kasan_kmalloc+0xb7/0xc0
[   14.217949]  __kmalloc_cache_noprof+0x189/0x420
[   14.218183]  kasan_atomics+0x95/0x310
[   14.218356]  kunit_try_run_case+0x1a5/0x480
[   14.218537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.218799]  kthread+0x337/0x6f0
[   14.218960]  ret_from_fork+0x116/0x1d0
[   14.219144]  ret_from_fork_asm+0x1a/0x30
[   14.219307] 
[   14.219410] The buggy address belongs to the object at ffff8881031c4500
[   14.219410]  which belongs to the cache kmalloc-64 of size 64
[   14.219979] The buggy address is located 0 bytes to the right of
[   14.219979]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.220432] 
[   14.220570] The buggy address belongs to the physical page:
[   14.220888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.221533] flags: 0x200000000000000(node=0|zone=2)
[   14.221837] page_type: f5(slab)
[   14.222007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.222419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.222759] page dumped because: kasan: bad access detected
[   14.222941] 
[   14.223038] Memory state around the buggy address:
[   14.223379]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.223743]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.224074] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.224473]                                      ^
[   14.224671]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.225032]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.225402] ==================================================================
[   14.717492] ==================================================================
[   14.717736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.718218] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.718569] 
[   14.718686] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.718734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.718747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.718770] Call Trace:
[   14.718788]  <TASK>
[   14.718804]  dump_stack_lvl+0x73/0xb0
[   14.718833]  print_report+0xd1/0x650
[   14.718857]  ? __virt_addr_valid+0x1db/0x2d0
[   14.718880]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.718901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.718925]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.718948]  kasan_report+0x141/0x180
[   14.719027]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.719057]  __asan_report_load4_noabort+0x18/0x20
[   14.719084]  kasan_atomics_helper+0x4a02/0x5450
[   14.719108]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.719133]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.719160]  ? kasan_atomics+0x152/0x310
[   14.719189]  kasan_atomics+0x1dc/0x310
[   14.719212]  ? __pfx_kasan_atomics+0x10/0x10
[   14.719238]  ? __pfx_read_tsc+0x10/0x10
[   14.719259]  ? ktime_get_ts64+0x86/0x230
[   14.719283]  kunit_try_run_case+0x1a5/0x480
[   14.719308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.719332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.719355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.719379]  ? __kthread_parkme+0x82/0x180
[   14.719400]  ? preempt_count_sub+0x50/0x80
[   14.719425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.719449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.719485]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.719509]  kthread+0x337/0x6f0
[   14.719529]  ? trace_preempt_on+0x20/0xc0
[   14.719583]  ? __pfx_kthread+0x10/0x10
[   14.719607]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.719628]  ? calculate_sigpending+0x7b/0xa0
[   14.719654]  ? __pfx_kthread+0x10/0x10
[   14.719676]  ret_from_fork+0x116/0x1d0
[   14.719696]  ? __pfx_kthread+0x10/0x10
[   14.719719]  ret_from_fork_asm+0x1a/0x30
[   14.719752]  </TASK>
[   14.719765] 
[   14.733872] Allocated by task 283:
[   14.734021]  kasan_save_stack+0x45/0x70
[   14.734656]  kasan_save_track+0x18/0x40
[   14.735187]  kasan_save_alloc_info+0x3b/0x50
[   14.735824]  __kasan_kmalloc+0xb7/0xc0
[   14.736176]  __kmalloc_cache_noprof+0x189/0x420
[   14.736669]  kasan_atomics+0x95/0x310
[   14.736819]  kunit_try_run_case+0x1a5/0x480
[   14.736976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.737160]  kthread+0x337/0x6f0
[   14.737797]  ret_from_fork+0x116/0x1d0
[   14.738426]  ret_from_fork_asm+0x1a/0x30
[   14.739042] 
[   14.739373] The buggy address belongs to the object at ffff8881031c4500
[   14.739373]  which belongs to the cache kmalloc-64 of size 64
[   14.740938] The buggy address is located 0 bytes to the right of
[   14.740938]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.742003] 
[   14.742092] The buggy address belongs to the physical page:
[   14.742307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.743550] flags: 0x200000000000000(node=0|zone=2)
[   14.744248] page_type: f5(slab)
[   14.744789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.745105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.745340] page dumped because: kasan: bad access detected
[   14.745535] 
[   14.745619] Memory state around the buggy address:
[   14.746084]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.747113]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.747833] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.748615]                                      ^
[   14.749216]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.750040]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.750855] ==================================================================
[   14.584546] ==================================================================
[   14.584923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.585314] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.585656] 
[   14.585793] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.585838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.585852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.585875] Call Trace:
[   14.585891]  <TASK>
[   14.585908]  dump_stack_lvl+0x73/0xb0
[   14.585938]  print_report+0xd1/0x650
[   14.585962]  ? __virt_addr_valid+0x1db/0x2d0
[   14.585985]  ? kasan_atomics_helper+0xf10/0x5450
[   14.586007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.586030]  ? kasan_atomics_helper+0xf10/0x5450
[   14.586053]  kasan_report+0x141/0x180
[   14.586077]  ? kasan_atomics_helper+0xf10/0x5450
[   14.586104]  kasan_check_range+0x10c/0x1c0
[   14.586129]  __kasan_check_write+0x18/0x20
[   14.586149]  kasan_atomics_helper+0xf10/0x5450
[   14.586173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.586263]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.586289]  ? kasan_atomics+0x152/0x310
[   14.586317]  kasan_atomics+0x1dc/0x310
[   14.586342]  ? __pfx_kasan_atomics+0x10/0x10
[   14.586367]  ? __pfx_read_tsc+0x10/0x10
[   14.586388]  ? ktime_get_ts64+0x86/0x230
[   14.586413]  kunit_try_run_case+0x1a5/0x480
[   14.586439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.586472]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.586496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.586521]  ? __kthread_parkme+0x82/0x180
[   14.586543]  ? preempt_count_sub+0x50/0x80
[   14.586568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.586594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.586618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.586644]  kthread+0x337/0x6f0
[   14.586664]  ? trace_preempt_on+0x20/0xc0
[   14.586689]  ? __pfx_kthread+0x10/0x10
[   14.586730]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.586753]  ? calculate_sigpending+0x7b/0xa0
[   14.586778]  ? __pfx_kthread+0x10/0x10
[   14.586800]  ret_from_fork+0x116/0x1d0
[   14.586821]  ? __pfx_kthread+0x10/0x10
[   14.586843]  ret_from_fork_asm+0x1a/0x30
[   14.586876]  </TASK>
[   14.586888] 
[   14.594768] Allocated by task 283:
[   14.594956]  kasan_save_stack+0x45/0x70
[   14.595161]  kasan_save_track+0x18/0x40
[   14.595554]  kasan_save_alloc_info+0x3b/0x50
[   14.595780]  __kasan_kmalloc+0xb7/0xc0
[   14.595963]  __kmalloc_cache_noprof+0x189/0x420
[   14.596166]  kasan_atomics+0x95/0x310
[   14.596437]  kunit_try_run_case+0x1a5/0x480
[   14.596621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.596876]  kthread+0x337/0x6f0
[   14.597047]  ret_from_fork+0x116/0x1d0
[   14.597271]  ret_from_fork_asm+0x1a/0x30
[   14.597493] 
[   14.597586] The buggy address belongs to the object at ffff8881031c4500
[   14.597586]  which belongs to the cache kmalloc-64 of size 64
[   14.598041] The buggy address is located 0 bytes to the right of
[   14.598041]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.598617] 
[   14.598716] The buggy address belongs to the physical page:
[   14.598894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.599141] flags: 0x200000000000000(node=0|zone=2)
[   14.599429] page_type: f5(slab)
[   14.599611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.599977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.602748] page dumped because: kasan: bad access detected
[   14.603499] 
[   14.604059] Memory state around the buggy address:
[   14.605024]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.606260]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.607546] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.607914]                                      ^
[   14.608191]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.608702]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.608964] ==================================================================
[   14.679552] ==================================================================
[   14.680110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.680535] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.680767] 
[   14.680854] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.680896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.680910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.680932] Call Trace:
[   14.680948]  <TASK>
[   14.680965]  dump_stack_lvl+0x73/0xb0
[   14.680993]  print_report+0xd1/0x650
[   14.681016]  ? __virt_addr_valid+0x1db/0x2d0
[   14.681039]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.681061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.681084]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.681107]  kasan_report+0x141/0x180
[   14.681130]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.681158]  __asan_report_load4_noabort+0x18/0x20
[   14.681184]  kasan_atomics_helper+0x4a1c/0x5450
[   14.681208]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.681230]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.681257]  ? kasan_atomics+0x152/0x310
[   14.681285]  kasan_atomics+0x1dc/0x310
[   14.681308]  ? __pfx_kasan_atomics+0x10/0x10
[   14.681334]  ? __pfx_read_tsc+0x10/0x10
[   14.681356]  ? ktime_get_ts64+0x86/0x230
[   14.681386]  kunit_try_run_case+0x1a5/0x480
[   14.681411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.681435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.681468]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.681492]  ? __kthread_parkme+0x82/0x180
[   14.681513]  ? preempt_count_sub+0x50/0x80
[   14.681538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.681562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.681586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.681611]  kthread+0x337/0x6f0
[   14.681632]  ? trace_preempt_on+0x20/0xc0
[   14.681656]  ? __pfx_kthread+0x10/0x10
[   14.681678]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.681701]  ? calculate_sigpending+0x7b/0xa0
[   14.681724]  ? __pfx_kthread+0x10/0x10
[   14.681747]  ret_from_fork+0x116/0x1d0
[   14.681767]  ? __pfx_kthread+0x10/0x10
[   14.681789]  ret_from_fork_asm+0x1a/0x30
[   14.681821]  </TASK>
[   14.681834] 
[   14.689231] Allocated by task 283:
[   14.689419]  kasan_save_stack+0x45/0x70
[   14.689646]  kasan_save_track+0x18/0x40
[   14.690126]  kasan_save_alloc_info+0x3b/0x50
[   14.690374]  __kasan_kmalloc+0xb7/0xc0
[   14.690536]  __kmalloc_cache_noprof+0x189/0x420
[   14.690707]  kasan_atomics+0x95/0x310
[   14.690845]  kunit_try_run_case+0x1a5/0x480
[   14.691039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.691439]  kthread+0x337/0x6f0
[   14.691630]  ret_from_fork+0x116/0x1d0
[   14.691817]  ret_from_fork_asm+0x1a/0x30
[   14.692112] 
[   14.692251] The buggy address belongs to the object at ffff8881031c4500
[   14.692251]  which belongs to the cache kmalloc-64 of size 64
[   14.692676] The buggy address is located 0 bytes to the right of
[   14.692676]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.693263] 
[   14.693370] The buggy address belongs to the physical page:
[   14.693600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.693926] flags: 0x200000000000000(node=0|zone=2)
[   14.694138] page_type: f5(slab)
[   14.694309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.694606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.694837] page dumped because: kasan: bad access detected
[   14.695012] 
[   14.695086] Memory state around the buggy address:
[   14.695245]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.695521]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.695904] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.696388]                                      ^
[   14.696648]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.696974]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.697477] ==================================================================
[   14.078082] ==================================================================
[   14.078782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.079122] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.079855] 
[   14.079963] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.080009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.080024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.080045] Call Trace:
[   14.080058]  <TASK>
[   14.080074]  dump_stack_lvl+0x73/0xb0
[   14.080104]  print_report+0xd1/0x650
[   14.080126]  ? __virt_addr_valid+0x1db/0x2d0
[   14.080149]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.080169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.080364]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.080395]  kasan_report+0x141/0x180
[   14.080418]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.080445]  __asan_report_store4_noabort+0x1b/0x30
[   14.080482]  kasan_atomics_helper+0x4ba2/0x5450
[   14.080505]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.080527]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.080552]  ? kasan_atomics+0x152/0x310
[   14.080578]  kasan_atomics+0x1dc/0x310
[   14.080601]  ? __pfx_kasan_atomics+0x10/0x10
[   14.080624]  ? __pfx_read_tsc+0x10/0x10
[   14.080646]  ? ktime_get_ts64+0x86/0x230
[   14.080668]  kunit_try_run_case+0x1a5/0x480
[   14.080692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.080714]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.080738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.080760]  ? __kthread_parkme+0x82/0x180
[   14.080781]  ? preempt_count_sub+0x50/0x80
[   14.080804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.080828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.080851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.080874]  kthread+0x337/0x6f0
[   14.080894]  ? trace_preempt_on+0x20/0xc0
[   14.080917]  ? __pfx_kthread+0x10/0x10
[   14.080937]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.080958]  ? calculate_sigpending+0x7b/0xa0
[   14.080981]  ? __pfx_kthread+0x10/0x10
[   14.081003]  ret_from_fork+0x116/0x1d0
[   14.081021]  ? __pfx_kthread+0x10/0x10
[   14.081042]  ret_from_fork_asm+0x1a/0x30
[   14.081071]  </TASK>
[   14.081083] 
[   14.096134] Allocated by task 283:
[   14.096389]  kasan_save_stack+0x45/0x70
[   14.096875]  kasan_save_track+0x18/0x40
[   14.097150]  kasan_save_alloc_info+0x3b/0x50
[   14.097510]  __kasan_kmalloc+0xb7/0xc0
[   14.097701]  __kmalloc_cache_noprof+0x189/0x420
[   14.098084]  kasan_atomics+0x95/0x310
[   14.098338]  kunit_try_run_case+0x1a5/0x480
[   14.098697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.098939]  kthread+0x337/0x6f0
[   14.099399]  ret_from_fork+0x116/0x1d0
[   14.099622]  ret_from_fork_asm+0x1a/0x30
[   14.099954] 
[   14.100038] The buggy address belongs to the object at ffff8881031c4500
[   14.100038]  which belongs to the cache kmalloc-64 of size 64
[   14.100807] The buggy address is located 0 bytes to the right of
[   14.100807]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.101543] 
[   14.101626] The buggy address belongs to the physical page:
[   14.101961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.102298] flags: 0x200000000000000(node=0|zone=2)
[   14.102640] page_type: f5(slab)
[   14.102800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.103170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.103581] page dumped because: kasan: bad access detected
[   14.103806] 
[   14.103898] Memory state around the buggy address:
[   14.104104]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.104590]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.104927] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.105252]                                      ^
[   14.105419]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.105746]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.106140] ==================================================================
[   14.251256] ==================================================================
[   14.252509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.252991] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.254104] 
[   14.254293] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.254344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.254359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.254382] Call Trace:
[   14.254397]  <TASK>
[   14.254414]  dump_stack_lvl+0x73/0xb0
[   14.254445]  print_report+0xd1/0x650
[   14.254482]  ? __virt_addr_valid+0x1db/0x2d0
[   14.254507]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.254530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.254553]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.254576]  kasan_report+0x141/0x180
[   14.254600]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.254628]  kasan_check_range+0x10c/0x1c0
[   14.254653]  __kasan_check_write+0x18/0x20
[   14.254673]  kasan_atomics_helper+0x5fe/0x5450
[   14.254708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.254731]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.254759]  ? kasan_atomics+0x152/0x310
[   14.254787]  kasan_atomics+0x1dc/0x310
[   14.254811]  ? __pfx_kasan_atomics+0x10/0x10
[   14.254837]  ? __pfx_read_tsc+0x10/0x10
[   14.254859]  ? ktime_get_ts64+0x86/0x230
[   14.254885]  kunit_try_run_case+0x1a5/0x480
[   14.254910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.254933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.254959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.254983]  ? __kthread_parkme+0x82/0x180
[   14.255005]  ? preempt_count_sub+0x50/0x80
[   14.255030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.255055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.255080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.255103]  kthread+0x337/0x6f0
[   14.255125]  ? trace_preempt_on+0x20/0xc0
[   14.255148]  ? __pfx_kthread+0x10/0x10
[   14.255170]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.255235]  ? calculate_sigpending+0x7b/0xa0
[   14.255263]  ? __pfx_kthread+0x10/0x10
[   14.255286]  ret_from_fork+0x116/0x1d0
[   14.255306]  ? __pfx_kthread+0x10/0x10
[   14.255328]  ret_from_fork_asm+0x1a/0x30
[   14.255359]  </TASK>
[   14.255372] 
[   14.265589] Allocated by task 283:
[   14.265758]  kasan_save_stack+0x45/0x70
[   14.265957]  kasan_save_track+0x18/0x40
[   14.266131]  kasan_save_alloc_info+0x3b/0x50
[   14.266692]  __kasan_kmalloc+0xb7/0xc0
[   14.266927]  __kmalloc_cache_noprof+0x189/0x420
[   14.267234]  kasan_atomics+0x95/0x310
[   14.267585]  kunit_try_run_case+0x1a5/0x480
[   14.267938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.268153]  kthread+0x337/0x6f0
[   14.268537]  ret_from_fork+0x116/0x1d0
[   14.268862]  ret_from_fork_asm+0x1a/0x30
[   14.269126] 
[   14.269214] The buggy address belongs to the object at ffff8881031c4500
[   14.269214]  which belongs to the cache kmalloc-64 of size 64
[   14.269774] The buggy address is located 0 bytes to the right of
[   14.269774]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.270266] 
[   14.270422] The buggy address belongs to the physical page:
[   14.270676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.271044] flags: 0x200000000000000(node=0|zone=2)
[   14.271243] page_type: f5(slab)
[   14.271415] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.271951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.272277] page dumped because: kasan: bad access detected
[   14.272581] 
[   14.272688] Memory state around the buggy address:
[   14.272893]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.273243]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.273524] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.273826]                                      ^
[   14.274040]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.274268]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.274722] ==================================================================
[   14.816036] ==================================================================
[   14.816419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.816810] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.817144] 
[   14.817262] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.817307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.817321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.817356] Call Trace:
[   14.817374]  <TASK>
[   14.817395]  dump_stack_lvl+0x73/0xb0
[   14.817430]  print_report+0xd1/0x650
[   14.817463]  ? __virt_addr_valid+0x1db/0x2d0
[   14.817486]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.817509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.817532]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.817555]  kasan_report+0x141/0x180
[   14.817579]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.817606]  __asan_report_load4_noabort+0x18/0x20
[   14.817633]  kasan_atomics_helper+0x49ce/0x5450
[   14.817657]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.817705]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.817731]  ? kasan_atomics+0x152/0x310
[   14.817760]  kasan_atomics+0x1dc/0x310
[   14.817784]  ? __pfx_kasan_atomics+0x10/0x10
[   14.817810]  ? __pfx_read_tsc+0x10/0x10
[   14.817832]  ? ktime_get_ts64+0x86/0x230
[   14.817857]  kunit_try_run_case+0x1a5/0x480
[   14.817884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.817908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.817943]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.817967]  ? __kthread_parkme+0x82/0x180
[   14.817988]  ? preempt_count_sub+0x50/0x80
[   14.818026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.818051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.818085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.818110]  kthread+0x337/0x6f0
[   14.818131]  ? trace_preempt_on+0x20/0xc0
[   14.818155]  ? __pfx_kthread+0x10/0x10
[   14.818177]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.818198]  ? calculate_sigpending+0x7b/0xa0
[   14.818223]  ? __pfx_kthread+0x10/0x10
[   14.818246]  ret_from_fork+0x116/0x1d0
[   14.818265]  ? __pfx_kthread+0x10/0x10
[   14.818287]  ret_from_fork_asm+0x1a/0x30
[   14.818319]  </TASK>
[   14.818332] 
[   14.825813] Allocated by task 283:
[   14.825970]  kasan_save_stack+0x45/0x70
[   14.826119]  kasan_save_track+0x18/0x40
[   14.826257]  kasan_save_alloc_info+0x3b/0x50
[   14.826506]  __kasan_kmalloc+0xb7/0xc0
[   14.826734]  __kmalloc_cache_noprof+0x189/0x420
[   14.826957]  kasan_atomics+0x95/0x310
[   14.827146]  kunit_try_run_case+0x1a5/0x480
[   14.827332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.827561]  kthread+0x337/0x6f0
[   14.827759]  ret_from_fork+0x116/0x1d0
[   14.827982]  ret_from_fork_asm+0x1a/0x30
[   14.828162] 
[   14.828236] The buggy address belongs to the object at ffff8881031c4500
[   14.828236]  which belongs to the cache kmalloc-64 of size 64
[   14.828637] The buggy address is located 0 bytes to the right of
[   14.828637]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.829232] 
[   14.829325] The buggy address belongs to the physical page:
[   14.829520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.829805] flags: 0x200000000000000(node=0|zone=2)
[   14.830043] page_type: f5(slab)
[   14.830239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.830609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.831000] page dumped because: kasan: bad access detected
[   14.831264] 
[   14.831376] Memory state around the buggy address:
[   14.831604]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.831933]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.832260] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.832596]                                      ^
[   14.832873]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.833213]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.833442] ==================================================================
[   14.225897] ==================================================================
[   14.226422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.226811] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.227159] 
[   14.227275] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.227387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.227405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.227429] Call Trace:
[   14.227446]  <TASK>
[   14.227474]  dump_stack_lvl+0x73/0xb0
[   14.227505]  print_report+0xd1/0x650
[   14.227529]  ? __virt_addr_valid+0x1db/0x2d0
[   14.227575]  ? kasan_atomics_helper+0x565/0x5450
[   14.227598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.227624]  ? kasan_atomics_helper+0x565/0x5450
[   14.227647]  kasan_report+0x141/0x180
[   14.227689]  ? kasan_atomics_helper+0x565/0x5450
[   14.227736]  kasan_check_range+0x10c/0x1c0
[   14.227761]  __kasan_check_write+0x18/0x20
[   14.227782]  kasan_atomics_helper+0x565/0x5450
[   14.227806]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.227830]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.227856]  ? kasan_atomics+0x152/0x310
[   14.227900]  kasan_atomics+0x1dc/0x310
[   14.227925]  ? __pfx_kasan_atomics+0x10/0x10
[   14.227965]  ? __pfx_read_tsc+0x10/0x10
[   14.227987]  ? ktime_get_ts64+0x86/0x230
[   14.228012]  kunit_try_run_case+0x1a5/0x480
[   14.228038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.228064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.228089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.228114]  ? __kthread_parkme+0x82/0x180
[   14.228151]  ? preempt_count_sub+0x50/0x80
[   14.228238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.228269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.228294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.228318]  kthread+0x337/0x6f0
[   14.228339]  ? trace_preempt_on+0x20/0xc0
[   14.228364]  ? __pfx_kthread+0x10/0x10
[   14.228386]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.228409]  ? calculate_sigpending+0x7b/0xa0
[   14.228433]  ? __pfx_kthread+0x10/0x10
[   14.228468]  ret_from_fork+0x116/0x1d0
[   14.228487]  ? __pfx_kthread+0x10/0x10
[   14.228510]  ret_from_fork_asm+0x1a/0x30
[   14.228543]  </TASK>
[   14.228557] 
[   14.239921] Allocated by task 283:
[   14.240112]  kasan_save_stack+0x45/0x70
[   14.240580]  kasan_save_track+0x18/0x40
[   14.240797]  kasan_save_alloc_info+0x3b/0x50
[   14.241002]  __kasan_kmalloc+0xb7/0xc0
[   14.241180]  __kmalloc_cache_noprof+0x189/0x420
[   14.241655]  kasan_atomics+0x95/0x310
[   14.241881]  kunit_try_run_case+0x1a5/0x480
[   14.242285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.242634]  kthread+0x337/0x6f0
[   14.242829]  ret_from_fork+0x116/0x1d0
[   14.243014]  ret_from_fork_asm+0x1a/0x30
[   14.243470] 
[   14.243577] The buggy address belongs to the object at ffff8881031c4500
[   14.243577]  which belongs to the cache kmalloc-64 of size 64
[   14.244317] The buggy address is located 0 bytes to the right of
[   14.244317]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.245018] 
[   14.245102] The buggy address belongs to the physical page:
[   14.245497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.245951] flags: 0x200000000000000(node=0|zone=2)
[   14.246267] page_type: f5(slab)
[   14.246470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.246800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.247111] page dumped because: kasan: bad access detected
[   14.247356] 
[   14.247445] Memory state around the buggy address:
[   14.247666]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.248510]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.248979] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.249300]                                      ^
[   14.249646]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.250143]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.250720] ==================================================================
[   14.488448] ==================================================================
[   14.488830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.489082] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.489334] 
[   14.489469] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.489515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.489529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.489552] Call Trace:
[   14.489570]  <TASK>
[   14.489638]  dump_stack_lvl+0x73/0xb0
[   14.489669]  print_report+0xd1/0x650
[   14.489707]  ? __virt_addr_valid+0x1db/0x2d0
[   14.489731]  ? kasan_atomics_helper+0xc70/0x5450
[   14.489753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.489777]  ? kasan_atomics_helper+0xc70/0x5450
[   14.489800]  kasan_report+0x141/0x180
[   14.489824]  ? kasan_atomics_helper+0xc70/0x5450
[   14.489852]  kasan_check_range+0x10c/0x1c0
[   14.489877]  __kasan_check_write+0x18/0x20
[   14.489898]  kasan_atomics_helper+0xc70/0x5450
[   14.489922]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.489946]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.489972]  ? kasan_atomics+0x152/0x310
[   14.490000]  kasan_atomics+0x1dc/0x310
[   14.490024]  ? __pfx_kasan_atomics+0x10/0x10
[   14.490049]  ? __pfx_read_tsc+0x10/0x10
[   14.490071]  ? ktime_get_ts64+0x86/0x230
[   14.490096]  kunit_try_run_case+0x1a5/0x480
[   14.490121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.490145]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.490169]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.490192]  ? __kthread_parkme+0x82/0x180
[   14.490251]  ? preempt_count_sub+0x50/0x80
[   14.490275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.490300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.490325]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.490348]  kthread+0x337/0x6f0
[   14.490370]  ? trace_preempt_on+0x20/0xc0
[   14.490394]  ? __pfx_kthread+0x10/0x10
[   14.490416]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.490437]  ? calculate_sigpending+0x7b/0xa0
[   14.490472]  ? __pfx_kthread+0x10/0x10
[   14.490494]  ret_from_fork+0x116/0x1d0
[   14.490514]  ? __pfx_kthread+0x10/0x10
[   14.490536]  ret_from_fork_asm+0x1a/0x30
[   14.490569]  </TASK>
[   14.490581] 
[   14.499000] Allocated by task 283:
[   14.499135]  kasan_save_stack+0x45/0x70
[   14.499712]  kasan_save_track+0x18/0x40
[   14.499930]  kasan_save_alloc_info+0x3b/0x50
[   14.500153]  __kasan_kmalloc+0xb7/0xc0
[   14.500439]  __kmalloc_cache_noprof+0x189/0x420
[   14.500617]  kasan_atomics+0x95/0x310
[   14.500758]  kunit_try_run_case+0x1a5/0x480
[   14.500972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.501297]  kthread+0x337/0x6f0
[   14.501515]  ret_from_fork+0x116/0x1d0
[   14.501913]  ret_from_fork_asm+0x1a/0x30
[   14.502089] 
[   14.502188] The buggy address belongs to the object at ffff8881031c4500
[   14.502188]  which belongs to the cache kmalloc-64 of size 64
[   14.502668] The buggy address is located 0 bytes to the right of
[   14.502668]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.503144] 
[   14.503228] The buggy address belongs to the physical page:
[   14.503463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.503833] flags: 0x200000000000000(node=0|zone=2)
[   14.504042] page_type: f5(slab)
[   14.504252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.504520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.504755] page dumped because: kasan: bad access detected
[   14.504933] 
[   14.505008] Memory state around the buggy address:
[   14.505204]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.505976]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.506393] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.506624]                                      ^
[   14.506783]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.507001]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.507649] ==================================================================
[   14.858279] ==================================================================
[   14.858597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.858840] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.859128] 
[   14.860198] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.860252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.860267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.860292] Call Trace:
[   14.860310]  <TASK>
[   14.860326]  dump_stack_lvl+0x73/0xb0
[   14.860360]  print_report+0xd1/0x650
[   14.860384]  ? __virt_addr_valid+0x1db/0x2d0
[   14.860407]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.860429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.860468]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.860490]  kasan_report+0x141/0x180
[   14.860514]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.860542]  __asan_report_load8_noabort+0x18/0x20
[   14.860566]  kasan_atomics_helper+0x4eae/0x5450
[   14.860590]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.860614]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.860639]  ? kasan_atomics+0x152/0x310
[   14.860690]  kasan_atomics+0x1dc/0x310
[   14.860715]  ? __pfx_kasan_atomics+0x10/0x10
[   14.860741]  ? __pfx_read_tsc+0x10/0x10
[   14.860762]  ? ktime_get_ts64+0x86/0x230
[   14.860787]  kunit_try_run_case+0x1a5/0x480
[   14.860811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.860834]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.860859]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.860883]  ? __kthread_parkme+0x82/0x180
[   14.860904]  ? preempt_count_sub+0x50/0x80
[   14.860928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.860952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.860976]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.861001]  kthread+0x337/0x6f0
[   14.861021]  ? trace_preempt_on+0x20/0xc0
[   14.861045]  ? __pfx_kthread+0x10/0x10
[   14.861067]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.861089]  ? calculate_sigpending+0x7b/0xa0
[   14.861113]  ? __pfx_kthread+0x10/0x10
[   14.861136]  ret_from_fork+0x116/0x1d0
[   14.861157]  ? __pfx_kthread+0x10/0x10
[   14.861178]  ret_from_fork_asm+0x1a/0x30
[   14.861211]  </TASK>
[   14.861224] 
[   14.874313] Allocated by task 283:
[   14.874539]  kasan_save_stack+0x45/0x70
[   14.874757]  kasan_save_track+0x18/0x40
[   14.874978]  kasan_save_alloc_info+0x3b/0x50
[   14.875184]  __kasan_kmalloc+0xb7/0xc0
[   14.875349]  __kmalloc_cache_noprof+0x189/0x420
[   14.875590]  kasan_atomics+0x95/0x310
[   14.875836]  kunit_try_run_case+0x1a5/0x480
[   14.876001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.876253]  kthread+0x337/0x6f0
[   14.876438]  ret_from_fork+0x116/0x1d0
[   14.876600]  ret_from_fork_asm+0x1a/0x30
[   14.876768] 
[   14.876939] The buggy address belongs to the object at ffff8881031c4500
[   14.876939]  which belongs to the cache kmalloc-64 of size 64
[   14.877446] The buggy address is located 0 bytes to the right of
[   14.877446]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.878039] 
[   14.878141] The buggy address belongs to the physical page:
[   14.878356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.878699] flags: 0x200000000000000(node=0|zone=2)
[   14.879026] page_type: f5(slab)
[   14.879176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.879497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.879899] page dumped because: kasan: bad access detected
[   14.880185] 
[   14.880285] Memory state around the buggy address:
[   14.880538]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.880824]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.881179] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.881480]                                      ^
[   14.881692]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.882022]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.882332] ==================================================================
[   14.992088] ==================================================================
[   14.992490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.992879] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.993258] 
[   14.993363] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.993413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.993427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.993450] Call Trace:
[   14.993480]  <TASK>
[   14.993497]  dump_stack_lvl+0x73/0xb0
[   14.993525]  print_report+0xd1/0x650
[   14.993549]  ? __virt_addr_valid+0x1db/0x2d0
[   14.993573]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.993595]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.993618]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.993641]  kasan_report+0x141/0x180
[   14.993665]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.993692]  kasan_check_range+0x10c/0x1c0
[   14.993717]  __kasan_check_write+0x18/0x20
[   14.993738]  kasan_atomics_helper+0x16e7/0x5450
[   14.993761]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.993784]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.993811]  ? kasan_atomics+0x152/0x310
[   14.993838]  kasan_atomics+0x1dc/0x310
[   14.993862]  ? __pfx_kasan_atomics+0x10/0x10
[   14.993887]  ? __pfx_read_tsc+0x10/0x10
[   14.993910]  ? ktime_get_ts64+0x86/0x230
[   14.993935]  kunit_try_run_case+0x1a5/0x480
[   14.993959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993982]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.994007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.994030]  ? __kthread_parkme+0x82/0x180
[   14.994052]  ? preempt_count_sub+0x50/0x80
[   14.994077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.994102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.994127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.994151]  kthread+0x337/0x6f0
[   14.994172]  ? trace_preempt_on+0x20/0xc0
[   14.994197]  ? __pfx_kthread+0x10/0x10
[   14.994219]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.994241]  ? calculate_sigpending+0x7b/0xa0
[   14.994266]  ? __pfx_kthread+0x10/0x10
[   14.994289]  ret_from_fork+0x116/0x1d0
[   14.994308]  ? __pfx_kthread+0x10/0x10
[   14.994331]  ret_from_fork_asm+0x1a/0x30
[   14.994362]  </TASK>
[   14.994375] 
[   15.001642] Allocated by task 283:
[   15.001871]  kasan_save_stack+0x45/0x70
[   15.002078]  kasan_save_track+0x18/0x40
[   15.002272]  kasan_save_alloc_info+0x3b/0x50
[   15.002499]  __kasan_kmalloc+0xb7/0xc0
[   15.002715]  __kmalloc_cache_noprof+0x189/0x420
[   15.002940]  kasan_atomics+0x95/0x310
[   15.003133]  kunit_try_run_case+0x1a5/0x480
[   15.003299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.003567]  kthread+0x337/0x6f0
[   15.003722]  ret_from_fork+0x116/0x1d0
[   15.003859]  ret_from_fork_asm+0x1a/0x30
[   15.004062] 
[   15.004162] The buggy address belongs to the object at ffff8881031c4500
[   15.004162]  which belongs to the cache kmalloc-64 of size 64
[   15.004683] The buggy address is located 0 bytes to the right of
[   15.004683]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.005175] 
[   15.005268] The buggy address belongs to the physical page:
[   15.005507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.005844] flags: 0x200000000000000(node=0|zone=2)
[   15.006071] page_type: f5(slab)
[   15.006234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.006547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.006871] page dumped because: kasan: bad access detected
[   15.007104] 
[   15.007182] Memory state around the buggy address:
[   15.007372]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.007605]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.007852] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.008084]                                      ^
[   15.008313]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.008643]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.008978] ==================================================================
[   15.078820] ==================================================================
[   15.079234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.079736] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.080158] 
[   15.080280] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.080328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.080343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.080366] Call Trace:
[   15.080383]  <TASK>
[   15.080401]  dump_stack_lvl+0x73/0xb0
[   15.080430]  print_report+0xd1/0x650
[   15.080466]  ? __virt_addr_valid+0x1db/0x2d0
[   15.080489]  ? kasan_atomics_helper+0x194a/0x5450
[   15.080513]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.080538]  ? kasan_atomics_helper+0x194a/0x5450
[   15.080562]  kasan_report+0x141/0x180
[   15.080585]  ? kasan_atomics_helper+0x194a/0x5450
[   15.080612]  kasan_check_range+0x10c/0x1c0
[   15.080637]  __kasan_check_write+0x18/0x20
[   15.080657]  kasan_atomics_helper+0x194a/0x5450
[   15.080682]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.080705]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.080732]  ? kasan_atomics+0x152/0x310
[   15.080761]  kasan_atomics+0x1dc/0x310
[   15.080786]  ? __pfx_kasan_atomics+0x10/0x10
[   15.080813]  ? __pfx_read_tsc+0x10/0x10
[   15.080834]  ? ktime_get_ts64+0x86/0x230
[   15.080858]  kunit_try_run_case+0x1a5/0x480
[   15.080884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.080908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.080932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.080958]  ? __kthread_parkme+0x82/0x180
[   15.080980]  ? preempt_count_sub+0x50/0x80
[   15.081004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.081029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.081055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.081081]  kthread+0x337/0x6f0
[   15.081103]  ? trace_preempt_on+0x20/0xc0
[   15.081127]  ? __pfx_kthread+0x10/0x10
[   15.081150]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.081172]  ? calculate_sigpending+0x7b/0xa0
[   15.081197]  ? __pfx_kthread+0x10/0x10
[   15.081220]  ret_from_fork+0x116/0x1d0
[   15.081239]  ? __pfx_kthread+0x10/0x10
[   15.081261]  ret_from_fork_asm+0x1a/0x30
[   15.081291]  </TASK>
[   15.081304] 
[   15.088725] Allocated by task 283:
[   15.088925]  kasan_save_stack+0x45/0x70
[   15.089119]  kasan_save_track+0x18/0x40
[   15.089307]  kasan_save_alloc_info+0x3b/0x50
[   15.089516]  __kasan_kmalloc+0xb7/0xc0
[   15.089700]  __kmalloc_cache_noprof+0x189/0x420
[   15.089861]  kasan_atomics+0x95/0x310
[   15.089999]  kunit_try_run_case+0x1a5/0x480
[   15.090201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090469]  kthread+0x337/0x6f0
[   15.090643]  ret_from_fork+0x116/0x1d0
[   15.090906]  ret_from_fork_asm+0x1a/0x30
[   15.091050] 
[   15.091125] The buggy address belongs to the object at ffff8881031c4500
[   15.091125]  which belongs to the cache kmalloc-64 of size 64
[   15.091644] The buggy address is located 0 bytes to the right of
[   15.091644]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.092150] 
[   15.092258] The buggy address belongs to the physical page:
[   15.092490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.092822] flags: 0x200000000000000(node=0|zone=2)
[   15.093046] page_type: f5(slab)
[   15.093196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.093507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.093832] page dumped because: kasan: bad access detected
[   15.094057] 
[   15.094160] Memory state around the buggy address:
[   15.094363]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.094676]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.094969] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.095188]                                      ^
[   15.095347]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.095636]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.096300] ==================================================================
[   14.528109] ==================================================================
[   14.528410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.528985] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.529328] 
[   14.529446] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.529501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.529514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.529538] Call Trace:
[   14.529555]  <TASK>
[   14.529571]  dump_stack_lvl+0x73/0xb0
[   14.529603]  print_report+0xd1/0x650
[   14.529627]  ? __virt_addr_valid+0x1db/0x2d0
[   14.529651]  ? kasan_atomics_helper+0xd47/0x5450
[   14.529757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.529785]  ? kasan_atomics_helper+0xd47/0x5450
[   14.529809]  kasan_report+0x141/0x180
[   14.529834]  ? kasan_atomics_helper+0xd47/0x5450
[   14.529862]  kasan_check_range+0x10c/0x1c0
[   14.529888]  __kasan_check_write+0x18/0x20
[   14.529909]  kasan_atomics_helper+0xd47/0x5450
[   14.529934]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.529958]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.529985]  ? kasan_atomics+0x152/0x310
[   14.530013]  kasan_atomics+0x1dc/0x310
[   14.530038]  ? __pfx_kasan_atomics+0x10/0x10
[   14.530063]  ? __pfx_read_tsc+0x10/0x10
[   14.530086]  ? ktime_get_ts64+0x86/0x230
[   14.530112]  kunit_try_run_case+0x1a5/0x480
[   14.530138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.530162]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.530240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.530267]  ? __kthread_parkme+0x82/0x180
[   14.530289]  ? preempt_count_sub+0x50/0x80
[   14.530314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.530339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.530364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.530389]  kthread+0x337/0x6f0
[   14.530411]  ? trace_preempt_on+0x20/0xc0
[   14.530435]  ? __pfx_kthread+0x10/0x10
[   14.530469]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.530491]  ? calculate_sigpending+0x7b/0xa0
[   14.530516]  ? __pfx_kthread+0x10/0x10
[   14.530540]  ret_from_fork+0x116/0x1d0
[   14.530560]  ? __pfx_kthread+0x10/0x10
[   14.530582]  ret_from_fork_asm+0x1a/0x30
[   14.530615]  </TASK>
[   14.530628] 
[   14.538392] Allocated by task 283:
[   14.538571]  kasan_save_stack+0x45/0x70
[   14.538748]  kasan_save_track+0x18/0x40
[   14.538904]  kasan_save_alloc_info+0x3b/0x50
[   14.539121]  __kasan_kmalloc+0xb7/0xc0
[   14.539513]  __kmalloc_cache_noprof+0x189/0x420
[   14.539753]  kasan_atomics+0x95/0x310
[   14.539975]  kunit_try_run_case+0x1a5/0x480
[   14.540248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.540517]  kthread+0x337/0x6f0
[   14.540645]  ret_from_fork+0x116/0x1d0
[   14.540808]  ret_from_fork_asm+0x1a/0x30
[   14.540953] 
[   14.541053] The buggy address belongs to the object at ffff8881031c4500
[   14.541053]  which belongs to the cache kmalloc-64 of size 64
[   14.541654] The buggy address is located 0 bytes to the right of
[   14.541654]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.542061] 
[   14.542159] The buggy address belongs to the physical page:
[   14.542483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.542874] flags: 0x200000000000000(node=0|zone=2)
[   14.543113] page_type: f5(slab)
[   14.543312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.543566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.543872] page dumped because: kasan: bad access detected
[   14.544123] 
[   14.544423] Memory state around the buggy address:
[   14.544668]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.545027]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.545408] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.545732]                                      ^
[   14.545937]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.546275]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.546550] ==================================================================
[   15.351027] ==================================================================
[   15.351792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.352174] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.352558] 
[   15.352674] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.352749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.352764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.352787] Call Trace:
[   15.352805]  <TASK>
[   15.352833]  dump_stack_lvl+0x73/0xb0
[   15.352864]  print_report+0xd1/0x650
[   15.352888]  ? __virt_addr_valid+0x1db/0x2d0
[   15.352911]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.352934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.352958]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.352981]  kasan_report+0x141/0x180
[   15.353005]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.353060]  __asan_report_load8_noabort+0x18/0x20
[   15.353086]  kasan_atomics_helper+0x4f98/0x5450
[   15.353110]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.353144]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.353171]  ? kasan_atomics+0x152/0x310
[   15.353226]  kasan_atomics+0x1dc/0x310
[   15.353251]  ? __pfx_kasan_atomics+0x10/0x10
[   15.353277]  ? __pfx_read_tsc+0x10/0x10
[   15.353310]  ? ktime_get_ts64+0x86/0x230
[   15.353335]  kunit_try_run_case+0x1a5/0x480
[   15.353391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.353415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.353440]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.353479]  ? __kthread_parkme+0x82/0x180
[   15.353500]  ? preempt_count_sub+0x50/0x80
[   15.353525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.353550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.353574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.353598]  kthread+0x337/0x6f0
[   15.353620]  ? trace_preempt_on+0x20/0xc0
[   15.353644]  ? __pfx_kthread+0x10/0x10
[   15.353666]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.353699]  ? calculate_sigpending+0x7b/0xa0
[   15.353724]  ? __pfx_kthread+0x10/0x10
[   15.353748]  ret_from_fork+0x116/0x1d0
[   15.353768]  ? __pfx_kthread+0x10/0x10
[   15.353820]  ret_from_fork_asm+0x1a/0x30
[   15.353852]  </TASK>
[   15.353865] 
[   15.361962] Allocated by task 283:
[   15.362147]  kasan_save_stack+0x45/0x70
[   15.362351]  kasan_save_track+0x18/0x40
[   15.362554]  kasan_save_alloc_info+0x3b/0x50
[   15.362844]  __kasan_kmalloc+0xb7/0xc0
[   15.362985]  __kmalloc_cache_noprof+0x189/0x420
[   15.363143]  kasan_atomics+0x95/0x310
[   15.363280]  kunit_try_run_case+0x1a5/0x480
[   15.363507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.363822]  kthread+0x337/0x6f0
[   15.364081]  ret_from_fork+0x116/0x1d0
[   15.364447]  ret_from_fork_asm+0x1a/0x30
[   15.364764] 
[   15.364873] The buggy address belongs to the object at ffff8881031c4500
[   15.364873]  which belongs to the cache kmalloc-64 of size 64
[   15.365291] The buggy address is located 0 bytes to the right of
[   15.365291]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.365922] 
[   15.366077] The buggy address belongs to the physical page:
[   15.366373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.366804] flags: 0x200000000000000(node=0|zone=2)
[   15.367019] page_type: f5(slab)
[   15.367182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.367550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.367929] page dumped because: kasan: bad access detected
[   15.368210] 
[   15.368337] Memory state around the buggy address:
[   15.368577]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.368948]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.369283] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.369648]                                      ^
[   15.369922]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.370238]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.370581] ==================================================================
[   15.441036] ==================================================================
[   15.441381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.441774] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.442074] 
[   15.442178] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.442222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.442236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.442260] Call Trace:
[   15.442276]  <TASK>
[   15.442293]  dump_stack_lvl+0x73/0xb0
[   15.442325]  print_report+0xd1/0x650
[   15.442348]  ? __virt_addr_valid+0x1db/0x2d0
[   15.442370]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.442393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.442416]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.442439]  kasan_report+0x141/0x180
[   15.442475]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.442503]  __asan_report_load8_noabort+0x18/0x20
[   15.442529]  kasan_atomics_helper+0x4fa5/0x5450
[   15.442553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.442576]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.442603]  ? kasan_atomics+0x152/0x310
[   15.442631]  kasan_atomics+0x1dc/0x310
[   15.442655]  ? __pfx_kasan_atomics+0x10/0x10
[   15.442702]  ? __pfx_read_tsc+0x10/0x10
[   15.442724]  ? ktime_get_ts64+0x86/0x230
[   15.442749]  kunit_try_run_case+0x1a5/0x480
[   15.442774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.442798]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.442822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.442847]  ? __kthread_parkme+0x82/0x180
[   15.442869]  ? preempt_count_sub+0x50/0x80
[   15.442893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.442919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.442943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.442967]  kthread+0x337/0x6f0
[   15.442989]  ? trace_preempt_on+0x20/0xc0
[   15.443014]  ? __pfx_kthread+0x10/0x10
[   15.443036]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.443059]  ? calculate_sigpending+0x7b/0xa0
[   15.443084]  ? __pfx_kthread+0x10/0x10
[   15.443106]  ret_from_fork+0x116/0x1d0
[   15.443126]  ? __pfx_kthread+0x10/0x10
[   15.443147]  ret_from_fork_asm+0x1a/0x30
[   15.443180]  </TASK>
[   15.443193] 
[   15.450308] Allocated by task 283:
[   15.450442]  kasan_save_stack+0x45/0x70
[   15.450596]  kasan_save_track+0x18/0x40
[   15.450819]  kasan_save_alloc_info+0x3b/0x50
[   15.451040]  __kasan_kmalloc+0xb7/0xc0
[   15.451230]  __kmalloc_cache_noprof+0x189/0x420
[   15.451466]  kasan_atomics+0x95/0x310
[   15.451627]  kunit_try_run_case+0x1a5/0x480
[   15.451852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.452089]  kthread+0x337/0x6f0
[   15.452241]  ret_from_fork+0x116/0x1d0
[   15.452406]  ret_from_fork_asm+0x1a/0x30
[   15.452615] 
[   15.452735] The buggy address belongs to the object at ffff8881031c4500
[   15.452735]  which belongs to the cache kmalloc-64 of size 64
[   15.453186] The buggy address is located 0 bytes to the right of
[   15.453186]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.453707] 
[   15.453808] The buggy address belongs to the physical page:
[   15.454055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.454400] flags: 0x200000000000000(node=0|zone=2)
[   15.454616] page_type: f5(slab)
[   15.454796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.455092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.455397] page dumped because: kasan: bad access detected
[   15.455644] 
[   15.455761] Memory state around the buggy address:
[   15.455971]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.456251]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.456517] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.456760]                                      ^
[   15.456920]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.457147]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.457478] ==================================================================
[   15.144389] ==================================================================
[   15.144752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.145067] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.145909] 
[   15.146151] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.146307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.146326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.146350] Call Trace:
[   15.146381]  <TASK>
[   15.146401]  dump_stack_lvl+0x73/0xb0
[   15.146480]  print_report+0xd1/0x650
[   15.146507]  ? __virt_addr_valid+0x1db/0x2d0
[   15.146531]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.146554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.146578]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.146601]  kasan_report+0x141/0x180
[   15.146624]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.146651]  kasan_check_range+0x10c/0x1c0
[   15.146690]  __kasan_check_write+0x18/0x20
[   15.146711]  kasan_atomics_helper+0x1b22/0x5450
[   15.146734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.146758]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.146784]  ? kasan_atomics+0x152/0x310
[   15.146812]  kasan_atomics+0x1dc/0x310
[   15.146835]  ? __pfx_kasan_atomics+0x10/0x10
[   15.146860]  ? __pfx_read_tsc+0x10/0x10
[   15.146881]  ? ktime_get_ts64+0x86/0x230
[   15.146906]  kunit_try_run_case+0x1a5/0x480
[   15.146931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146955]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.146979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.147003]  ? __kthread_parkme+0x82/0x180
[   15.147025]  ? preempt_count_sub+0x50/0x80
[   15.147049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.147073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.147096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.147121]  kthread+0x337/0x6f0
[   15.147142]  ? trace_preempt_on+0x20/0xc0
[   15.147166]  ? __pfx_kthread+0x10/0x10
[   15.147187]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.147209]  ? calculate_sigpending+0x7b/0xa0
[   15.147234]  ? __pfx_kthread+0x10/0x10
[   15.147257]  ret_from_fork+0x116/0x1d0
[   15.147276]  ? __pfx_kthread+0x10/0x10
[   15.147297]  ret_from_fork_asm+0x1a/0x30
[   15.147329]  </TASK>
[   15.147342] 
[   15.156618] Allocated by task 283:
[   15.157169]  kasan_save_stack+0x45/0x70
[   15.157493]  kasan_save_track+0x18/0x40
[   15.157827]  kasan_save_alloc_info+0x3b/0x50
[   15.158127]  __kasan_kmalloc+0xb7/0xc0
[   15.158409]  __kmalloc_cache_noprof+0x189/0x420
[   15.158759]  kasan_atomics+0x95/0x310
[   15.159041]  kunit_try_run_case+0x1a5/0x480
[   15.159334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.159677]  kthread+0x337/0x6f0
[   15.159992]  ret_from_fork+0x116/0x1d0
[   15.160276]  ret_from_fork_asm+0x1a/0x30
[   15.160525] 
[   15.160630] The buggy address belongs to the object at ffff8881031c4500
[   15.160630]  which belongs to the cache kmalloc-64 of size 64
[   15.161485] The buggy address is located 0 bytes to the right of
[   15.161485]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.162250] 
[   15.162333] The buggy address belongs to the physical page:
[   15.162784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.163222] flags: 0x200000000000000(node=0|zone=2)
[   15.163558] page_type: f5(slab)
[   15.163909] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.164268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.164785] page dumped because: kasan: bad access detected
[   15.165126] 
[   15.165338] Memory state around the buggy address:
[   15.165711]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.166110]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.166523] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.167038]                                      ^
[   15.167351]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167771]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.168170] ==================================================================
[   15.310905] ==================================================================
[   15.311280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.311625] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.311984] 
[   15.312102] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.312174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.312188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.312222] Call Trace:
[   15.312241]  <TASK>
[   15.312257]  dump_stack_lvl+0x73/0xb0
[   15.312314]  print_report+0xd1/0x650
[   15.312338]  ? __virt_addr_valid+0x1db/0x2d0
[   15.312389]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.312412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.312436]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.312468]  kasan_report+0x141/0x180
[   15.312492]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.312520]  __asan_report_load8_noabort+0x18/0x20
[   15.312572]  kasan_atomics_helper+0x4f71/0x5450
[   15.312597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.312659]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.312686]  ? kasan_atomics+0x152/0x310
[   15.312724]  kasan_atomics+0x1dc/0x310
[   15.312748]  ? __pfx_kasan_atomics+0x10/0x10
[   15.312784]  ? __pfx_read_tsc+0x10/0x10
[   15.312805]  ? ktime_get_ts64+0x86/0x230
[   15.312830]  kunit_try_run_case+0x1a5/0x480
[   15.312854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.312879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.312903]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.312954]  ? __kthread_parkme+0x82/0x180
[   15.312975]  ? preempt_count_sub+0x50/0x80
[   15.313028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.313078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.313103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.313128]  kthread+0x337/0x6f0
[   15.313161]  ? trace_preempt_on+0x20/0xc0
[   15.313186]  ? __pfx_kthread+0x10/0x10
[   15.313208]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.313230]  ? calculate_sigpending+0x7b/0xa0
[   15.313255]  ? __pfx_kthread+0x10/0x10
[   15.313277]  ret_from_fork+0x116/0x1d0
[   15.313297]  ? __pfx_kthread+0x10/0x10
[   15.313319]  ret_from_fork_asm+0x1a/0x30
[   15.313350]  </TASK>
[   15.313392] 
[   15.321288] Allocated by task 283:
[   15.321504]  kasan_save_stack+0x45/0x70
[   15.321740]  kasan_save_track+0x18/0x40
[   15.321932]  kasan_save_alloc_info+0x3b/0x50
[   15.322172]  __kasan_kmalloc+0xb7/0xc0
[   15.322406]  __kmalloc_cache_noprof+0x189/0x420
[   15.322675]  kasan_atomics+0x95/0x310
[   15.322895]  kunit_try_run_case+0x1a5/0x480
[   15.323044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.323551]  kthread+0x337/0x6f0
[   15.323701]  ret_from_fork+0x116/0x1d0
[   15.323963]  ret_from_fork_asm+0x1a/0x30
[   15.324143] 
[   15.324232] The buggy address belongs to the object at ffff8881031c4500
[   15.324232]  which belongs to the cache kmalloc-64 of size 64
[   15.324678] The buggy address is located 0 bytes to the right of
[   15.324678]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.325231] 
[   15.325306] The buggy address belongs to the physical page:
[   15.325538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.325998] flags: 0x200000000000000(node=0|zone=2)
[   15.326162] page_type: f5(slab)
[   15.326282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.326517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.326862] page dumped because: kasan: bad access detected
[   15.327361] 
[   15.327505] Memory state around the buggy address:
[   15.327919]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.328252]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.328498] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.329086]                                      ^
[   15.329283]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.329640]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.329992] ==================================================================
[   14.047651] ==================================================================
[   14.049488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.049748] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.049976] 
[   14.050068] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.050115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.050127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.050150] Call Trace:
[   14.050163]  <TASK>
[   14.050178]  dump_stack_lvl+0x73/0xb0
[   14.050206]  print_report+0xd1/0x650
[   14.050227]  ? __virt_addr_valid+0x1db/0x2d0
[   14.050249]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.050270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.050291]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.050315]  kasan_report+0x141/0x180
[   14.050338]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.050363]  __asan_report_load4_noabort+0x18/0x20
[   14.050387]  kasan_atomics_helper+0x4bbc/0x5450
[   14.050409]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.050431]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.050731]  ? kasan_atomics+0x152/0x310
[   14.050829]  kasan_atomics+0x1dc/0x310
[   14.051066]  ? __pfx_kasan_atomics+0x10/0x10
[   14.051095]  ? __pfx_read_tsc+0x10/0x10
[   14.051117]  ? ktime_get_ts64+0x86/0x230
[   14.051168]  kunit_try_run_case+0x1a5/0x480
[   14.051221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.051243]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.051267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.051289]  ? __kthread_parkme+0x82/0x180
[   14.051309]  ? preempt_count_sub+0x50/0x80
[   14.051334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.051357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.051380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.051403]  kthread+0x337/0x6f0
[   14.051422]  ? trace_preempt_on+0x20/0xc0
[   14.051444]  ? __pfx_kthread+0x10/0x10
[   14.051474]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.051494]  ? calculate_sigpending+0x7b/0xa0
[   14.051517]  ? __pfx_kthread+0x10/0x10
[   14.051539]  ret_from_fork+0x116/0x1d0
[   14.051557]  ? __pfx_kthread+0x10/0x10
[   14.051577]  ret_from_fork_asm+0x1a/0x30
[   14.051607]  </TASK>
[   14.051619] 
[   14.065173] Allocated by task 283:
[   14.065551]  kasan_save_stack+0x45/0x70
[   14.065761]  kasan_save_track+0x18/0x40
[   14.066127]  kasan_save_alloc_info+0x3b/0x50
[   14.066422]  __kasan_kmalloc+0xb7/0xc0
[   14.066732]  __kmalloc_cache_noprof+0x189/0x420
[   14.066982]  kasan_atomics+0x95/0x310
[   14.067157]  kunit_try_run_case+0x1a5/0x480
[   14.067609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.067983]  kthread+0x337/0x6f0
[   14.068253]  ret_from_fork+0x116/0x1d0
[   14.068611]  ret_from_fork_asm+0x1a/0x30
[   14.068869] 
[   14.068971] The buggy address belongs to the object at ffff8881031c4500
[   14.068971]  which belongs to the cache kmalloc-64 of size 64
[   14.069712] The buggy address is located 0 bytes to the right of
[   14.069712]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.070443] 
[   14.070569] The buggy address belongs to the physical page:
[   14.071020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.071509] flags: 0x200000000000000(node=0|zone=2)
[   14.071845] page_type: f5(slab)
[   14.072141] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.072637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.073242] page dumped because: kasan: bad access detected
[   14.073604] 
[   14.073695] Memory state around the buggy address:
[   14.074057]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.074632]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.075052] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.075512]                                      ^
[   14.075871]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.076261]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.076765] ==================================================================
[   15.055880] ==================================================================
[   15.056194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.057029] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.057404] 
[   15.057517] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.057714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.057799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.057825] Call Trace:
[   15.057839]  <TASK>
[   15.057857]  dump_stack_lvl+0x73/0xb0
[   15.057889]  print_report+0xd1/0x650
[   15.057914]  ? __virt_addr_valid+0x1db/0x2d0
[   15.057938]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.057961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.057984]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.058007]  kasan_report+0x141/0x180
[   15.058030]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.058057]  kasan_check_range+0x10c/0x1c0
[   15.058083]  __kasan_check_write+0x18/0x20
[   15.058104]  kasan_atomics_helper+0x18b1/0x5450
[   15.058127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.058151]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.058177]  ? kasan_atomics+0x152/0x310
[   15.058205]  kasan_atomics+0x1dc/0x310
[   15.058229]  ? __pfx_kasan_atomics+0x10/0x10
[   15.058255]  ? __pfx_read_tsc+0x10/0x10
[   15.058276]  ? ktime_get_ts64+0x86/0x230
[   15.058301]  kunit_try_run_case+0x1a5/0x480
[   15.058326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.058350]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.058374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.058399]  ? __kthread_parkme+0x82/0x180
[   15.058419]  ? preempt_count_sub+0x50/0x80
[   15.058445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.058483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.058507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.058532]  kthread+0x337/0x6f0
[   15.058552]  ? trace_preempt_on+0x20/0xc0
[   15.058578]  ? __pfx_kthread+0x10/0x10
[   15.058600]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.058622]  ? calculate_sigpending+0x7b/0xa0
[   15.058648]  ? __pfx_kthread+0x10/0x10
[   15.058671]  ret_from_fork+0x116/0x1d0
[   15.058699]  ? __pfx_kthread+0x10/0x10
[   15.058721]  ret_from_fork_asm+0x1a/0x30
[   15.058753]  </TASK>
[   15.058767] 
[   15.068588] Allocated by task 283:
[   15.068934]  kasan_save_stack+0x45/0x70
[   15.069106]  kasan_save_track+0x18/0x40
[   15.069309]  kasan_save_alloc_info+0x3b/0x50
[   15.069698]  __kasan_kmalloc+0xb7/0xc0
[   15.069874]  __kmalloc_cache_noprof+0x189/0x420
[   15.070076]  kasan_atomics+0x95/0x310
[   15.070259]  kunit_try_run_case+0x1a5/0x480
[   15.070450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.070698]  kthread+0x337/0x6f0
[   15.071129]  ret_from_fork+0x116/0x1d0
[   15.071286]  ret_from_fork_asm+0x1a/0x30
[   15.071577] 
[   15.071772] The buggy address belongs to the object at ffff8881031c4500
[   15.071772]  which belongs to the cache kmalloc-64 of size 64
[   15.072314] The buggy address is located 0 bytes to the right of
[   15.072314]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.072976] 
[   15.073198] The buggy address belongs to the physical page:
[   15.073537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.074008] flags: 0x200000000000000(node=0|zone=2)
[   15.074281] page_type: f5(slab)
[   15.074469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.074976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.075342] page dumped because: kasan: bad access detected
[   15.075691] 
[   15.075776] Memory state around the buggy address:
[   15.075993]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.076288]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.076626] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.077197]                                      ^
[   15.077400]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.077847]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.078211] ==================================================================
[   14.421527] ==================================================================
[   14.421892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.422274] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.422602] 
[   14.422733] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.422777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.422791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.422832] Call Trace:
[   14.422849]  <TASK>
[   14.422865]  dump_stack_lvl+0x73/0xb0
[   14.422896]  print_report+0xd1/0x650
[   14.422919]  ? __virt_addr_valid+0x1db/0x2d0
[   14.422943]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.422966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.422989]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.423032]  kasan_report+0x141/0x180
[   14.423056]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.423084]  kasan_check_range+0x10c/0x1c0
[   14.423108]  __kasan_check_write+0x18/0x20
[   14.423129]  kasan_atomics_helper+0xa2b/0x5450
[   14.423153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.423175]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.423268]  ? kasan_atomics+0x152/0x310
[   14.423295]  kasan_atomics+0x1dc/0x310
[   14.423320]  ? __pfx_kasan_atomics+0x10/0x10
[   14.423345]  ? __pfx_read_tsc+0x10/0x10
[   14.423367]  ? ktime_get_ts64+0x86/0x230
[   14.423390]  kunit_try_run_case+0x1a5/0x480
[   14.423416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.423439]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.423473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.423498]  ? __kthread_parkme+0x82/0x180
[   14.423538]  ? preempt_count_sub+0x50/0x80
[   14.423563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.423587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.423611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.423635]  kthread+0x337/0x6f0
[   14.423656]  ? trace_preempt_on+0x20/0xc0
[   14.423681]  ? __pfx_kthread+0x10/0x10
[   14.423721]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.423744]  ? calculate_sigpending+0x7b/0xa0
[   14.423769]  ? __pfx_kthread+0x10/0x10
[   14.423792]  ret_from_fork+0x116/0x1d0
[   14.423811]  ? __pfx_kthread+0x10/0x10
[   14.423832]  ret_from_fork_asm+0x1a/0x30
[   14.423864]  </TASK>
[   14.423877] 
[   14.433447] Allocated by task 283:
[   14.433635]  kasan_save_stack+0x45/0x70
[   14.433948]  kasan_save_track+0x18/0x40
[   14.434300]  kasan_save_alloc_info+0x3b/0x50
[   14.434636]  __kasan_kmalloc+0xb7/0xc0
[   14.434942]  __kmalloc_cache_noprof+0x189/0x420
[   14.435267]  kasan_atomics+0x95/0x310
[   14.435433]  kunit_try_run_case+0x1a5/0x480
[   14.435650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.436173]  kthread+0x337/0x6f0
[   14.436499]  ret_from_fork+0x116/0x1d0
[   14.436823]  ret_from_fork_asm+0x1a/0x30
[   14.437020] 
[   14.437114] The buggy address belongs to the object at ffff8881031c4500
[   14.437114]  which belongs to the cache kmalloc-64 of size 64
[   14.438138] The buggy address is located 0 bytes to the right of
[   14.438138]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.438729] 
[   14.438822] The buggy address belongs to the physical page:
[   14.439063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.439743] flags: 0x200000000000000(node=0|zone=2)
[   14.439980] page_type: f5(slab)
[   14.440328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.440698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.441085] page dumped because: kasan: bad access detected
[   14.441554] 
[   14.441652] Memory state around the buggy address:
[   14.442021]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.442615]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.443133] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.443695]                                      ^
[   14.443917]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.444167]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.444461] ==================================================================
[   14.946152] ==================================================================
[   14.946835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.947650] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.948097] 
[   14.948191] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.948235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.948249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.948272] Call Trace:
[   14.948288]  <TASK>
[   14.948304]  dump_stack_lvl+0x73/0xb0
[   14.948336]  print_report+0xd1/0x650
[   14.948359]  ? __virt_addr_valid+0x1db/0x2d0
[   14.948381]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.948404]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.948427]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.948464]  kasan_report+0x141/0x180
[   14.948489]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.948518]  kasan_check_range+0x10c/0x1c0
[   14.948543]  __kasan_check_write+0x18/0x20
[   14.948564]  kasan_atomics_helper+0x15b6/0x5450
[   14.948588]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.948612]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.948638]  ? kasan_atomics+0x152/0x310
[   14.948668]  kasan_atomics+0x1dc/0x310
[   14.948710]  ? __pfx_kasan_atomics+0x10/0x10
[   14.948736]  ? __pfx_read_tsc+0x10/0x10
[   14.948758]  ? ktime_get_ts64+0x86/0x230
[   14.948784]  kunit_try_run_case+0x1a5/0x480
[   14.948810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.948833]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.948857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.948882]  ? __kthread_parkme+0x82/0x180
[   14.948904]  ? preempt_count_sub+0x50/0x80
[   14.948928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.948953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.948977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.949001]  kthread+0x337/0x6f0
[   14.949023]  ? trace_preempt_on+0x20/0xc0
[   14.949048]  ? __pfx_kthread+0x10/0x10
[   14.949070]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.949091]  ? calculate_sigpending+0x7b/0xa0
[   14.949116]  ? __pfx_kthread+0x10/0x10
[   14.949140]  ret_from_fork+0x116/0x1d0
[   14.949161]  ? __pfx_kthread+0x10/0x10
[   14.949183]  ret_from_fork_asm+0x1a/0x30
[   14.949216]  </TASK>
[   14.949229] 
[   14.959210] Allocated by task 283:
[   14.959344]  kasan_save_stack+0x45/0x70
[   14.959575]  kasan_save_track+0x18/0x40
[   14.959767]  kasan_save_alloc_info+0x3b/0x50
[   14.960030]  __kasan_kmalloc+0xb7/0xc0
[   14.960229]  __kmalloc_cache_noprof+0x189/0x420
[   14.960468]  kasan_atomics+0x95/0x310
[   14.960651]  kunit_try_run_case+0x1a5/0x480
[   14.961182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.961435]  kthread+0x337/0x6f0
[   14.961605]  ret_from_fork+0x116/0x1d0
[   14.961804]  ret_from_fork_asm+0x1a/0x30
[   14.962567] 
[   14.962658] The buggy address belongs to the object at ffff8881031c4500
[   14.962658]  which belongs to the cache kmalloc-64 of size 64
[   14.963024] The buggy address is located 0 bytes to the right of
[   14.963024]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.963388] 
[   14.963472] The buggy address belongs to the physical page:
[   14.963983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.964238] flags: 0x200000000000000(node=0|zone=2)
[   14.964407] page_type: f5(slab)
[   14.964815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.965524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.966240] page dumped because: kasan: bad access detected
[   14.966804] 
[   14.966968] Memory state around the buggy address:
[   14.967318]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.967553]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.968076] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.968759]                                      ^
[   14.969236]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.969896]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.970118] ==================================================================
[   14.775538] ==================================================================
[   14.776239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.776548] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.777009] 
[   14.777131] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.777175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.777190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.777213] Call Trace:
[   14.777229]  <TASK>
[   14.777245]  dump_stack_lvl+0x73/0xb0
[   14.777276]  print_report+0xd1/0x650
[   14.777299]  ? __virt_addr_valid+0x1db/0x2d0
[   14.777323]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.777347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.777371]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.777400]  kasan_report+0x141/0x180
[   14.777424]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.777465]  __asan_report_load4_noabort+0x18/0x20
[   14.777491]  kasan_atomics_helper+0x49e8/0x5450
[   14.777516]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.777538]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.777565]  ? kasan_atomics+0x152/0x310
[   14.777593]  kasan_atomics+0x1dc/0x310
[   14.777617]  ? __pfx_kasan_atomics+0x10/0x10
[   14.777643]  ? __pfx_read_tsc+0x10/0x10
[   14.777665]  ? ktime_get_ts64+0x86/0x230
[   14.777701]  kunit_try_run_case+0x1a5/0x480
[   14.777726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.777749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.777774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.777798]  ? __kthread_parkme+0x82/0x180
[   14.777819]  ? preempt_count_sub+0x50/0x80
[   14.777843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.777868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.777892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.777917]  kthread+0x337/0x6f0
[   14.777938]  ? trace_preempt_on+0x20/0xc0
[   14.777963]  ? __pfx_kthread+0x10/0x10
[   14.777985]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.778007]  ? calculate_sigpending+0x7b/0xa0
[   14.778032]  ? __pfx_kthread+0x10/0x10
[   14.778054]  ret_from_fork+0x116/0x1d0
[   14.778074]  ? __pfx_kthread+0x10/0x10
[   14.778095]  ret_from_fork_asm+0x1a/0x30
[   14.778129]  </TASK>
[   14.778142] 
[   14.785420] Allocated by task 283:
[   14.785582]  kasan_save_stack+0x45/0x70
[   14.785911]  kasan_save_track+0x18/0x40
[   14.786113]  kasan_save_alloc_info+0x3b/0x50
[   14.786330]  __kasan_kmalloc+0xb7/0xc0
[   14.786533]  __kmalloc_cache_noprof+0x189/0x420
[   14.786867]  kasan_atomics+0x95/0x310
[   14.787051]  kunit_try_run_case+0x1a5/0x480
[   14.787233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.787477]  kthread+0x337/0x6f0
[   14.787642]  ret_from_fork+0x116/0x1d0
[   14.787850]  ret_from_fork_asm+0x1a/0x30
[   14.787995] 
[   14.788071] The buggy address belongs to the object at ffff8881031c4500
[   14.788071]  which belongs to the cache kmalloc-64 of size 64
[   14.788603] The buggy address is located 0 bytes to the right of
[   14.788603]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.789205] 
[   14.789286] The buggy address belongs to the physical page:
[   14.789514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.790010] flags: 0x200000000000000(node=0|zone=2)
[   14.790218] page_type: f5(slab)
[   14.790370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.790672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.790967] page dumped because: kasan: bad access detected
[   14.791211] 
[   14.791308] Memory state around the buggy address:
[   14.791524]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.791746]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.791967] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.792201]                                      ^
[   14.792441]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.792876]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.793193] ==================================================================
[   14.634317] ==================================================================
[   14.635913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.636270] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.636571] 
[   14.636674] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.636899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.636914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.636938] Call Trace:
[   14.636956]  <TASK>
[   14.636972]  dump_stack_lvl+0x73/0xb0
[   14.637002]  print_report+0xd1/0x650
[   14.637026]  ? __virt_addr_valid+0x1db/0x2d0
[   14.638268]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.638311]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.638337]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.638360]  kasan_report+0x141/0x180
[   14.638387]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.638415]  __asan_report_load4_noabort+0x18/0x20
[   14.638442]  kasan_atomics_helper+0x4a36/0x5450
[   14.638479]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.638503]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.638531]  ? kasan_atomics+0x152/0x310
[   14.638559]  kasan_atomics+0x1dc/0x310
[   14.638582]  ? __pfx_kasan_atomics+0x10/0x10
[   14.638608]  ? __pfx_read_tsc+0x10/0x10
[   14.638629]  ? ktime_get_ts64+0x86/0x230
[   14.638654]  kunit_try_run_case+0x1a5/0x480
[   14.638705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.638738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.638763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.638788]  ? __kthread_parkme+0x82/0x180
[   14.638809]  ? preempt_count_sub+0x50/0x80
[   14.638835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.638901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.638927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.638952]  kthread+0x337/0x6f0
[   14.638973]  ? trace_preempt_on+0x20/0xc0
[   14.638998]  ? __pfx_kthread+0x10/0x10
[   14.639020]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.639042]  ? calculate_sigpending+0x7b/0xa0
[   14.639067]  ? __pfx_kthread+0x10/0x10
[   14.639090]  ret_from_fork+0x116/0x1d0
[   14.639109]  ? __pfx_kthread+0x10/0x10
[   14.639131]  ret_from_fork_asm+0x1a/0x30
[   14.639163]  </TASK>
[   14.639233] 
[   14.649373] Allocated by task 283:
[   14.649555]  kasan_save_stack+0x45/0x70
[   14.650076]  kasan_save_track+0x18/0x40
[   14.650332]  kasan_save_alloc_info+0x3b/0x50
[   14.650548]  __kasan_kmalloc+0xb7/0xc0
[   14.650737]  __kmalloc_cache_noprof+0x189/0x420
[   14.650954]  kasan_atomics+0x95/0x310
[   14.651120]  kunit_try_run_case+0x1a5/0x480
[   14.651577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.651791]  kthread+0x337/0x6f0
[   14.652109]  ret_from_fork+0x116/0x1d0
[   14.652604]  ret_from_fork_asm+0x1a/0x30
[   14.652885] 
[   14.653199] The buggy address belongs to the object at ffff8881031c4500
[   14.653199]  which belongs to the cache kmalloc-64 of size 64
[   14.653806] The buggy address is located 0 bytes to the right of
[   14.653806]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.654621] 
[   14.654793] The buggy address belongs to the physical page:
[   14.655145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.655595] flags: 0x200000000000000(node=0|zone=2)
[   14.656042] page_type: f5(slab)
[   14.656207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.656683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.657015] page dumped because: kasan: bad access detected
[   14.657577] 
[   14.657676] Memory state around the buggy address:
[   14.657911]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.658175]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.658553] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.658972]                                      ^
[   14.659186]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.659531]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.659816] ==================================================================
[   14.883594] ==================================================================
[   14.884052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.884550] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.884957] 
[   14.885079] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.885134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.885148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.885173] Call Trace:
[   14.885202]  <TASK>
[   14.885219]  dump_stack_lvl+0x73/0xb0
[   14.885249]  print_report+0xd1/0x650
[   14.885273]  ? __virt_addr_valid+0x1db/0x2d0
[   14.885297]  ? kasan_atomics_helper+0x1467/0x5450
[   14.885319]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.885353]  ? kasan_atomics_helper+0x1467/0x5450
[   14.885375]  kasan_report+0x141/0x180
[   14.885403]  ? kasan_atomics_helper+0x1467/0x5450
[   14.885442]  kasan_check_range+0x10c/0x1c0
[   14.885476]  __kasan_check_write+0x18/0x20
[   14.885496]  kasan_atomics_helper+0x1467/0x5450
[   14.885520]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.885543]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.885569]  ? kasan_atomics+0x152/0x310
[   14.885606]  kasan_atomics+0x1dc/0x310
[   14.885629]  ? __pfx_kasan_atomics+0x10/0x10
[   14.885666]  ? __pfx_read_tsc+0x10/0x10
[   14.885688]  ? ktime_get_ts64+0x86/0x230
[   14.885712]  kunit_try_run_case+0x1a5/0x480
[   14.885737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.885761]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.885794]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.885818]  ? __kthread_parkme+0x82/0x180
[   14.885840]  ? preempt_count_sub+0x50/0x80
[   14.885875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.885900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.885925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.885949]  kthread+0x337/0x6f0
[   14.885971]  ? trace_preempt_on+0x20/0xc0
[   14.885996]  ? __pfx_kthread+0x10/0x10
[   14.886018]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.886040]  ? calculate_sigpending+0x7b/0xa0
[   14.886065]  ? __pfx_kthread+0x10/0x10
[   14.886087]  ret_from_fork+0x116/0x1d0
[   14.886106]  ? __pfx_kthread+0x10/0x10
[   14.886129]  ret_from_fork_asm+0x1a/0x30
[   14.886161]  </TASK>
[   14.886173] 
[   14.894232] Allocated by task 283:
[   14.894443]  kasan_save_stack+0x45/0x70
[   14.894659]  kasan_save_track+0x18/0x40
[   14.894850]  kasan_save_alloc_info+0x3b/0x50
[   14.895061]  __kasan_kmalloc+0xb7/0xc0
[   14.895233]  __kmalloc_cache_noprof+0x189/0x420
[   14.895462]  kasan_atomics+0x95/0x310
[   14.895650]  kunit_try_run_case+0x1a5/0x480
[   14.895882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.896068]  kthread+0x337/0x6f0
[   14.896193]  ret_from_fork+0x116/0x1d0
[   14.896361]  ret_from_fork_asm+0x1a/0x30
[   14.896585] 
[   14.896681] The buggy address belongs to the object at ffff8881031c4500
[   14.896681]  which belongs to the cache kmalloc-64 of size 64
[   14.897214] The buggy address is located 0 bytes to the right of
[   14.897214]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.897674] 
[   14.897851] The buggy address belongs to the physical page:
[   14.898132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.898469] flags: 0x200000000000000(node=0|zone=2)
[   14.898660] page_type: f5(slab)
[   14.898856] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.899233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.899550] page dumped because: kasan: bad access detected
[   14.899851] 
[   14.899965] Memory state around the buggy address:
[   14.900167]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.900488]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.900814] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.901125]                                      ^
[   14.901366]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901602]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901818] ==================================================================
[   14.165560] ==================================================================
[   14.165876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.166264] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.166542] 
[   14.166659] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.166722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.166736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.166758] Call Trace:
[   14.166774]  <TASK>
[   14.166791]  dump_stack_lvl+0x73/0xb0
[   14.166823]  print_report+0xd1/0x650
[   14.166847]  ? __virt_addr_valid+0x1db/0x2d0
[   14.166870]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.166892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.166916]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.166939]  kasan_report+0x141/0x180
[   14.166962]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.166990]  __asan_report_load4_noabort+0x18/0x20
[   14.167015]  kasan_atomics_helper+0x4b54/0x5450
[   14.167038]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.167063]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.167089]  ? kasan_atomics+0x152/0x310
[   14.167117]  kasan_atomics+0x1dc/0x310
[   14.167141]  ? __pfx_kasan_atomics+0x10/0x10
[   14.167166]  ? __pfx_read_tsc+0x10/0x10
[   14.167249]  ? ktime_get_ts64+0x86/0x230
[   14.167274]  kunit_try_run_case+0x1a5/0x480
[   14.167301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.167324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.167349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.167373]  ? __kthread_parkme+0x82/0x180
[   14.167394]  ? preempt_count_sub+0x50/0x80
[   14.167418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.167443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.167478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.167502]  kthread+0x337/0x6f0
[   14.167522]  ? trace_preempt_on+0x20/0xc0
[   14.167547]  ? __pfx_kthread+0x10/0x10
[   14.167568]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.167590]  ? calculate_sigpending+0x7b/0xa0
[   14.167614]  ? __pfx_kthread+0x10/0x10
[   14.167637]  ret_from_fork+0x116/0x1d0
[   14.167656]  ? __pfx_kthread+0x10/0x10
[   14.167677]  ret_from_fork_asm+0x1a/0x30
[   14.167727]  </TASK>
[   14.167741] 
[   14.175680] Allocated by task 283:
[   14.175869]  kasan_save_stack+0x45/0x70
[   14.176076]  kasan_save_track+0x18/0x40
[   14.176311]  kasan_save_alloc_info+0x3b/0x50
[   14.176530]  __kasan_kmalloc+0xb7/0xc0
[   14.176686]  __kmalloc_cache_noprof+0x189/0x420
[   14.176886]  kasan_atomics+0x95/0x310
[   14.177078]  kunit_try_run_case+0x1a5/0x480
[   14.177543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.177751]  kthread+0x337/0x6f0
[   14.177973]  ret_from_fork+0x116/0x1d0
[   14.178167]  ret_from_fork_asm+0x1a/0x30
[   14.178424] 
[   14.178513] The buggy address belongs to the object at ffff8881031c4500
[   14.178513]  which belongs to the cache kmalloc-64 of size 64
[   14.179041] The buggy address is located 0 bytes to the right of
[   14.179041]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.179686] 
[   14.179775] The buggy address belongs to the physical page:
[   14.179951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.180286] flags: 0x200000000000000(node=0|zone=2)
[   14.180532] page_type: f5(slab)
[   14.180701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.181056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.181337] page dumped because: kasan: bad access detected
[   14.181715] 
[   14.181818] Memory state around the buggy address:
[   14.182055]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.182427]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.182742] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.182963]                                      ^
[   14.183123]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.183693]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.184081] ==================================================================
[   15.250701] ==================================================================
[   15.251056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.251508] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.251863] 
[   15.252006] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.252051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.252077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.252099] Call Trace:
[   15.252142]  <TASK>
[   15.252161]  dump_stack_lvl+0x73/0xb0
[   15.252191]  print_report+0xd1/0x650
[   15.252224]  ? __virt_addr_valid+0x1db/0x2d0
[   15.252247]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.252271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.252295]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.252318]  kasan_report+0x141/0x180
[   15.252340]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.252368]  kasan_check_range+0x10c/0x1c0
[   15.252392]  __kasan_check_write+0x18/0x20
[   15.252414]  kasan_atomics_helper+0x1e12/0x5450
[   15.252438]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.252471]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.252497]  ? kasan_atomics+0x152/0x310
[   15.252526]  kasan_atomics+0x1dc/0x310
[   15.252550]  ? __pfx_kasan_atomics+0x10/0x10
[   15.252576]  ? __pfx_read_tsc+0x10/0x10
[   15.252598]  ? ktime_get_ts64+0x86/0x230
[   15.252622]  kunit_try_run_case+0x1a5/0x480
[   15.252648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.252673]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.252727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.252752]  ? __kthread_parkme+0x82/0x180
[   15.252774]  ? preempt_count_sub+0x50/0x80
[   15.252809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.252834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.252860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.252885]  kthread+0x337/0x6f0
[   15.252906]  ? trace_preempt_on+0x20/0xc0
[   15.252930]  ? __pfx_kthread+0x10/0x10
[   15.252952]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.252974]  ? calculate_sigpending+0x7b/0xa0
[   15.252999]  ? __pfx_kthread+0x10/0x10
[   15.253022]  ret_from_fork+0x116/0x1d0
[   15.253069]  ? __pfx_kthread+0x10/0x10
[   15.253091]  ret_from_fork_asm+0x1a/0x30
[   15.253122]  </TASK>
[   15.253146] 
[   15.261584] Allocated by task 283:
[   15.261814]  kasan_save_stack+0x45/0x70
[   15.262043]  kasan_save_track+0x18/0x40
[   15.262235]  kasan_save_alloc_info+0x3b/0x50
[   15.262474]  __kasan_kmalloc+0xb7/0xc0
[   15.262673]  __kmalloc_cache_noprof+0x189/0x420
[   15.262962]  kasan_atomics+0x95/0x310
[   15.263142]  kunit_try_run_case+0x1a5/0x480
[   15.263371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.263624]  kthread+0x337/0x6f0
[   15.263964]  ret_from_fork+0x116/0x1d0
[   15.264145]  ret_from_fork_asm+0x1a/0x30
[   15.264355] 
[   15.264489] The buggy address belongs to the object at ffff8881031c4500
[   15.264489]  which belongs to the cache kmalloc-64 of size 64
[   15.265049] The buggy address is located 0 bytes to the right of
[   15.265049]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.265644] 
[   15.265785] The buggy address belongs to the physical page:
[   15.266132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.266518] flags: 0x200000000000000(node=0|zone=2)
[   15.266791] page_type: f5(slab)
[   15.267023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.267404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.267788] page dumped because: kasan: bad access detected
[   15.268085] 
[   15.268184] Memory state around the buggy address:
[   15.268464]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.268780]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.269002] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.269217]                                      ^
[   15.269476]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.269957]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.270389] ==================================================================
[   14.834063] ==================================================================
[   14.834782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.835104] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   14.835331] 
[   14.835421] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.835474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.835488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.835511] Call Trace:
[   14.835529]  <TASK>
[   14.835546]  dump_stack_lvl+0x73/0xb0
[   14.835575]  print_report+0xd1/0x650
[   14.835599]  ? __virt_addr_valid+0x1db/0x2d0
[   14.835622]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.835645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.835728]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.835753]  kasan_report+0x141/0x180
[   14.835788]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.835816]  kasan_check_range+0x10c/0x1c0
[   14.835841]  __kasan_check_read+0x15/0x20
[   14.835862]  kasan_atomics_helper+0x13b5/0x5450
[   14.835885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.835909]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.835935]  ? kasan_atomics+0x152/0x310
[   14.835963]  kasan_atomics+0x1dc/0x310
[   14.835986]  ? __pfx_kasan_atomics+0x10/0x10
[   14.836012]  ? __pfx_read_tsc+0x10/0x10
[   14.836033]  ? ktime_get_ts64+0x86/0x230
[   14.836058]  kunit_try_run_case+0x1a5/0x480
[   14.836082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.836106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.836130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.836154]  ? __kthread_parkme+0x82/0x180
[   14.836176]  ? preempt_count_sub+0x50/0x80
[   14.836232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.836257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.836319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.836344]  kthread+0x337/0x6f0
[   14.836365]  ? trace_preempt_on+0x20/0xc0
[   14.836400]  ? __pfx_kthread+0x10/0x10
[   14.836422]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.836445]  ? calculate_sigpending+0x7b/0xa0
[   14.836476]  ? __pfx_kthread+0x10/0x10
[   14.836500]  ret_from_fork+0x116/0x1d0
[   14.836519]  ? __pfx_kthread+0x10/0x10
[   14.836541]  ret_from_fork_asm+0x1a/0x30
[   14.836572]  </TASK>
[   14.836584] 
[   14.845515] Allocated by task 283:
[   14.846006]  kasan_save_stack+0x45/0x70
[   14.846274]  kasan_save_track+0x18/0x40
[   14.846601]  kasan_save_alloc_info+0x3b/0x50
[   14.846971]  __kasan_kmalloc+0xb7/0xc0
[   14.847154]  __kmalloc_cache_noprof+0x189/0x420
[   14.847369]  kasan_atomics+0x95/0x310
[   14.847557]  kunit_try_run_case+0x1a5/0x480
[   14.848088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.848385]  kthread+0x337/0x6f0
[   14.848817]  ret_from_fork+0x116/0x1d0
[   14.849082]  ret_from_fork_asm+0x1a/0x30
[   14.849282] 
[   14.849381] The buggy address belongs to the object at ffff8881031c4500
[   14.849381]  which belongs to the cache kmalloc-64 of size 64
[   14.850190] The buggy address is located 0 bytes to the right of
[   14.850190]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   14.851067] 
[   14.851174] The buggy address belongs to the physical page:
[   14.851418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   14.851681] flags: 0x200000000000000(node=0|zone=2)
[   14.852054] page_type: f5(slab)
[   14.852328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.852764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.853156] page dumped because: kasan: bad access detected
[   14.853514] 
[   14.853971] Memory state around the buggy address:
[   14.854202]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.854604]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.855008] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.855381]                                      ^
[   14.855717]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.856120]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.856400] ==================================================================
[   15.114959] ==================================================================
[   15.115324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.115690] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.115983] 
[   15.116665] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.116711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.116725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.116748] Call Trace:
[   15.116821]  <TASK>
[   15.116837]  dump_stack_lvl+0x73/0xb0
[   15.116866]  print_report+0xd1/0x650
[   15.116890]  ? __virt_addr_valid+0x1db/0x2d0
[   15.116913]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.116937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.116960]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.116984]  kasan_report+0x141/0x180
[   15.117008]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.117674]  kasan_check_range+0x10c/0x1c0
[   15.117705]  __kasan_check_write+0x18/0x20
[   15.117727]  kasan_atomics_helper+0x1a7f/0x5450
[   15.117752]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.117776]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.117803]  ? kasan_atomics+0x152/0x310
[   15.117831]  kasan_atomics+0x1dc/0x310
[   15.117854]  ? __pfx_kasan_atomics+0x10/0x10
[   15.117881]  ? __pfx_read_tsc+0x10/0x10
[   15.117902]  ? ktime_get_ts64+0x86/0x230
[   15.117928]  kunit_try_run_case+0x1a5/0x480
[   15.117952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.117976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.118001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.118024]  ? __kthread_parkme+0x82/0x180
[   15.118217]  ? preempt_count_sub+0x50/0x80
[   15.118243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.118269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.118295]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.118319]  kthread+0x337/0x6f0
[   15.118340]  ? trace_preempt_on+0x20/0xc0
[   15.118365]  ? __pfx_kthread+0x10/0x10
[   15.118387]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.118409]  ? calculate_sigpending+0x7b/0xa0
[   15.118434]  ? __pfx_kthread+0x10/0x10
[   15.118471]  ret_from_fork+0x116/0x1d0
[   15.118491]  ? __pfx_kthread+0x10/0x10
[   15.118514]  ret_from_fork_asm+0x1a/0x30
[   15.118546]  </TASK>
[   15.118559] 
[   15.132836] Allocated by task 283:
[   15.133110]  kasan_save_stack+0x45/0x70
[   15.133429]  kasan_save_track+0x18/0x40
[   15.133582]  kasan_save_alloc_info+0x3b/0x50
[   15.133913]  __kasan_kmalloc+0xb7/0xc0
[   15.134279]  __kmalloc_cache_noprof+0x189/0x420
[   15.134725]  kasan_atomics+0x95/0x310
[   15.134865]  kunit_try_run_case+0x1a5/0x480
[   15.135017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.135195]  kthread+0x337/0x6f0
[   15.135317]  ret_from_fork+0x116/0x1d0
[   15.135462]  ret_from_fork_asm+0x1a/0x30
[   15.135648] 
[   15.135745] The buggy address belongs to the object at ffff8881031c4500
[   15.135745]  which belongs to the cache kmalloc-64 of size 64
[   15.136270] The buggy address is located 0 bytes to the right of
[   15.136270]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.137116] 
[   15.137202] The buggy address belongs to the physical page:
[   15.137439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.137698] flags: 0x200000000000000(node=0|zone=2)
[   15.138053] page_type: f5(slab)
[   15.138535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.139063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.139551] page dumped because: kasan: bad access detected
[   15.140144] 
[   15.140401] Memory state around the buggy address:
[   15.140889]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.141225]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.141544] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.142137]                                      ^
[   15.142439]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.143058]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.143363] ==================================================================
[   15.188932] ==================================================================
[   15.189484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.189964] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.190291] 
[   15.190434] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.190522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.190537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.190587] Call Trace:
[   15.190604]  <TASK>
[   15.190621]  dump_stack_lvl+0x73/0xb0
[   15.190653]  print_report+0xd1/0x650
[   15.190677]  ? __virt_addr_valid+0x1db/0x2d0
[   15.190700]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.190723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.190756]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.190780]  kasan_report+0x141/0x180
[   15.190822]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.190859]  __asan_report_load8_noabort+0x18/0x20
[   15.190884]  kasan_atomics_helper+0x4f30/0x5450
[   15.190919]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.190944]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.190996]  ? kasan_atomics+0x152/0x310
[   15.191024]  kasan_atomics+0x1dc/0x310
[   15.191048]  ? __pfx_kasan_atomics+0x10/0x10
[   15.191084]  ? __pfx_read_tsc+0x10/0x10
[   15.191107]  ? ktime_get_ts64+0x86/0x230
[   15.191157]  kunit_try_run_case+0x1a5/0x480
[   15.191182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.191205]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.191240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.191289]  ? __kthread_parkme+0x82/0x180
[   15.191310]  ? preempt_count_sub+0x50/0x80
[   15.191336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.191371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.191394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.191443]  kthread+0x337/0x6f0
[   15.191480]  ? trace_preempt_on+0x20/0xc0
[   15.191504]  ? __pfx_kthread+0x10/0x10
[   15.191527]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.191548]  ? calculate_sigpending+0x7b/0xa0
[   15.191599]  ? __pfx_kthread+0x10/0x10
[   15.191621]  ret_from_fork+0x116/0x1d0
[   15.191642]  ? __pfx_kthread+0x10/0x10
[   15.191674]  ret_from_fork_asm+0x1a/0x30
[   15.191712]  </TASK>
[   15.191725] 
[   15.200054] Allocated by task 283:
[   15.200298]  kasan_save_stack+0x45/0x70
[   15.200466]  kasan_save_track+0x18/0x40
[   15.200602]  kasan_save_alloc_info+0x3b/0x50
[   15.200933]  __kasan_kmalloc+0xb7/0xc0
[   15.201125]  __kmalloc_cache_noprof+0x189/0x420
[   15.201417]  kasan_atomics+0x95/0x310
[   15.201685]  kunit_try_run_case+0x1a5/0x480
[   15.201943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.202192]  kthread+0x337/0x6f0
[   15.202319]  ret_from_fork+0x116/0x1d0
[   15.202566]  ret_from_fork_asm+0x1a/0x30
[   15.202889] 
[   15.203029] The buggy address belongs to the object at ffff8881031c4500
[   15.203029]  which belongs to the cache kmalloc-64 of size 64
[   15.203541] The buggy address is located 0 bytes to the right of
[   15.203541]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.204138] 
[   15.204237] The buggy address belongs to the physical page:
[   15.204537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.204881] flags: 0x200000000000000(node=0|zone=2)
[   15.205050] page_type: f5(slab)
[   15.205175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.205525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.206138] page dumped because: kasan: bad access detected
[   15.206391] 
[   15.206479] Memory state around the buggy address:
[   15.206639]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.206860]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.207166] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.207603]                                      ^
[   15.207953]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.208379]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.208719] ==================================================================
[   15.371352] ==================================================================
[   15.371889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.372282] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.372630] 
[   15.372746] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.372819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.372833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.372868] Call Trace:
[   15.372884]  <TASK>
[   15.372900]  dump_stack_lvl+0x73/0xb0
[   15.372931]  print_report+0xd1/0x650
[   15.372982]  ? __virt_addr_valid+0x1db/0x2d0
[   15.373005]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.373027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.373084]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.373107]  kasan_report+0x141/0x180
[   15.373131]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.373170]  kasan_check_range+0x10c/0x1c0
[   15.373195]  __kasan_check_write+0x18/0x20
[   15.373215]  kasan_atomics_helper+0x20c8/0x5450
[   15.373240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.373263]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.373316]  ? kasan_atomics+0x152/0x310
[   15.373344]  kasan_atomics+0x1dc/0x310
[   15.373384]  ? __pfx_kasan_atomics+0x10/0x10
[   15.373411]  ? __pfx_read_tsc+0x10/0x10
[   15.373432]  ? ktime_get_ts64+0x86/0x230
[   15.373465]  kunit_try_run_case+0x1a5/0x480
[   15.373491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.373515]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.373539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.373564]  ? __kthread_parkme+0x82/0x180
[   15.373585]  ? preempt_count_sub+0x50/0x80
[   15.373609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.373635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.373659]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.373712]  kthread+0x337/0x6f0
[   15.373735]  ? trace_preempt_on+0x20/0xc0
[   15.373758]  ? __pfx_kthread+0x10/0x10
[   15.373791]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.373814]  ? calculate_sigpending+0x7b/0xa0
[   15.373838]  ? __pfx_kthread+0x10/0x10
[   15.373861]  ret_from_fork+0x116/0x1d0
[   15.373881]  ? __pfx_kthread+0x10/0x10
[   15.373903]  ret_from_fork_asm+0x1a/0x30
[   15.373937]  </TASK>
[   15.373950] 
[   15.381907] Allocated by task 283:
[   15.382041]  kasan_save_stack+0x45/0x70
[   15.382184]  kasan_save_track+0x18/0x40
[   15.382321]  kasan_save_alloc_info+0x3b/0x50
[   15.382486]  __kasan_kmalloc+0xb7/0xc0
[   15.382622]  __kmalloc_cache_noprof+0x189/0x420
[   15.383590]  kasan_atomics+0x95/0x310
[   15.383822]  kunit_try_run_case+0x1a5/0x480
[   15.384035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.384293]  kthread+0x337/0x6f0
[   15.384427]  ret_from_fork+0x116/0x1d0
[   15.384575]  ret_from_fork_asm+0x1a/0x30
[   15.384718] 
[   15.384794] The buggy address belongs to the object at ffff8881031c4500
[   15.384794]  which belongs to the cache kmalloc-64 of size 64
[   15.385340] The buggy address is located 0 bytes to the right of
[   15.385340]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.385739] 
[   15.385849] The buggy address belongs to the physical page:
[   15.386136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.386558] flags: 0x200000000000000(node=0|zone=2)
[   15.387423] page_type: f5(slab)
[   15.387582] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.387873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.388212] page dumped because: kasan: bad access detected
[   15.388835] 
[   15.388988] Memory state around the buggy address:
[   15.389149]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.389365]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.389606] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.390445]                                      ^
[   15.390690]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.390927]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.391149] ==================================================================
[   15.419920] ==================================================================
[   15.420222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.420913] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.421262] 
[   15.421370] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.421423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.421437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.421472] Call Trace:
[   15.421490]  <TASK>
[   15.421507]  dump_stack_lvl+0x73/0xb0
[   15.421538]  print_report+0xd1/0x650
[   15.421563]  ? __virt_addr_valid+0x1db/0x2d0
[   15.421587]  ? kasan_atomics_helper+0x218a/0x5450
[   15.421609]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.421634]  ? kasan_atomics_helper+0x218a/0x5450
[   15.421657]  kasan_report+0x141/0x180
[   15.421681]  ? kasan_atomics_helper+0x218a/0x5450
[   15.421709]  kasan_check_range+0x10c/0x1c0
[   15.421734]  __kasan_check_write+0x18/0x20
[   15.421755]  kasan_atomics_helper+0x218a/0x5450
[   15.421779]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.421803]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.421847]  ? kasan_atomics+0x152/0x310
[   15.421876]  kasan_atomics+0x1dc/0x310
[   15.421900]  ? __pfx_kasan_atomics+0x10/0x10
[   15.421925]  ? __pfx_read_tsc+0x10/0x10
[   15.421947]  ? ktime_get_ts64+0x86/0x230
[   15.421972]  kunit_try_run_case+0x1a5/0x480
[   15.421998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.422021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.422045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.422070]  ? __kthread_parkme+0x82/0x180
[   15.422091]  ? preempt_count_sub+0x50/0x80
[   15.422115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.422141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.422165]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.422192]  kthread+0x337/0x6f0
[   15.422213]  ? trace_preempt_on+0x20/0xc0
[   15.422238]  ? __pfx_kthread+0x10/0x10
[   15.422261]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.422283]  ? calculate_sigpending+0x7b/0xa0
[   15.422308]  ? __pfx_kthread+0x10/0x10
[   15.422330]  ret_from_fork+0x116/0x1d0
[   15.422350]  ? __pfx_kthread+0x10/0x10
[   15.422371]  ret_from_fork_asm+0x1a/0x30
[   15.422403]  </TASK>
[   15.422416] 
[   15.432297] Allocated by task 283:
[   15.432472]  kasan_save_stack+0x45/0x70
[   15.432620]  kasan_save_track+0x18/0x40
[   15.432981]  kasan_save_alloc_info+0x3b/0x50
[   15.433191]  __kasan_kmalloc+0xb7/0xc0
[   15.433361]  __kmalloc_cache_noprof+0x189/0x420
[   15.433588]  kasan_atomics+0x95/0x310
[   15.433810]  kunit_try_run_case+0x1a5/0x480
[   15.433979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.434255]  kthread+0x337/0x6f0
[   15.434424]  ret_from_fork+0x116/0x1d0
[   15.434581]  ret_from_fork_asm+0x1a/0x30
[   15.434764] 
[   15.434841] The buggy address belongs to the object at ffff8881031c4500
[   15.434841]  which belongs to the cache kmalloc-64 of size 64
[   15.435345] The buggy address is located 0 bytes to the right of
[   15.435345]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.435729] 
[   15.435809] The buggy address belongs to the physical page:
[   15.436066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.436419] flags: 0x200000000000000(node=0|zone=2)
[   15.437179] page_type: f5(slab)
[   15.437357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.437610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.438178] page dumped because: kasan: bad access detected
[   15.438439] 
[   15.438530] Memory state around the buggy address:
[   15.438777]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.439081]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.439396] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.439710]                                      ^
[   15.439929]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.440251]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.440510] ==================================================================
[   15.033340] ==================================================================
[   15.033657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.034304] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283
[   15.034845] 
[   15.034958] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.035162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.035178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.035203] Call Trace:
[   15.035220]  <TASK>
[   15.035239]  dump_stack_lvl+0x73/0xb0
[   15.035270]  print_report+0xd1/0x650
[   15.035293]  ? __virt_addr_valid+0x1db/0x2d0
[   15.035317]  ? kasan_atomics_helper+0x1818/0x5450
[   15.035339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.035363]  ? kasan_atomics_helper+0x1818/0x5450
[   15.035386]  kasan_report+0x141/0x180
[   15.035410]  ? kasan_atomics_helper+0x1818/0x5450
[   15.035438]  kasan_check_range+0x10c/0x1c0
[   15.035477]  __kasan_check_write+0x18/0x20
[   15.035499]  kasan_atomics_helper+0x1818/0x5450
[   15.035522]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.035546]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.035571]  ? kasan_atomics+0x152/0x310
[   15.035600]  kasan_atomics+0x1dc/0x310
[   15.035624]  ? __pfx_kasan_atomics+0x10/0x10
[   15.035650]  ? __pfx_read_tsc+0x10/0x10
[   15.035695]  ? ktime_get_ts64+0x86/0x230
[   15.035720]  kunit_try_run_case+0x1a5/0x480
[   15.035745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.035769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.035793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.035818]  ? __kthread_parkme+0x82/0x180
[   15.035840]  ? preempt_count_sub+0x50/0x80
[   15.035863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.035888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.035913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.035937]  kthread+0x337/0x6f0
[   15.035959]  ? trace_preempt_on+0x20/0xc0
[   15.035982]  ? __pfx_kthread+0x10/0x10
[   15.036005]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.036027]  ? calculate_sigpending+0x7b/0xa0
[   15.036052]  ? __pfx_kthread+0x10/0x10
[   15.036074]  ret_from_fork+0x116/0x1d0
[   15.036094]  ? __pfx_kthread+0x10/0x10
[   15.036116]  ret_from_fork_asm+0x1a/0x30
[   15.036148]  </TASK>
[   15.036161] 
[   15.045461] Allocated by task 283:
[   15.045604]  kasan_save_stack+0x45/0x70
[   15.046249]  kasan_save_track+0x18/0x40
[   15.046436]  kasan_save_alloc_info+0x3b/0x50
[   15.046606]  __kasan_kmalloc+0xb7/0xc0
[   15.046957]  __kmalloc_cache_noprof+0x189/0x420
[   15.047287]  kasan_atomics+0x95/0x310
[   15.047533]  kunit_try_run_case+0x1a5/0x480
[   15.047866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.048172]  kthread+0x337/0x6f0
[   15.048300]  ret_from_fork+0x116/0x1d0
[   15.048620]  ret_from_fork_asm+0x1a/0x30
[   15.048784] 
[   15.049005] The buggy address belongs to the object at ffff8881031c4500
[   15.049005]  which belongs to the cache kmalloc-64 of size 64
[   15.049477] The buggy address is located 0 bytes to the right of
[   15.049477]  allocated 48-byte region [ffff8881031c4500, ffff8881031c4530)
[   15.050155] 
[   15.050327] The buggy address belongs to the physical page:
[   15.050697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4
[   15.051102] flags: 0x200000000000000(node=0|zone=2)
[   15.051297] page_type: f5(slab)
[   15.051593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.052018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.052445] page dumped because: kasan: bad access detected
[   15.052820] 
[   15.052922] Memory state around the buggy address:
[   15.053223]  ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.053553]  ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.054049] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.054344]                                      ^
[   15.054668]  ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.054993]  ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.055282] ==================================================================