Hay
Date
July 4, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.746458] ==================================================================
[   20.746509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.746897] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.747069] 
[   20.747139] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.747246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.747368] Hardware name: linux,dummy-virt (DT)
[   20.747444] Call trace:
[   20.747589]  show_stack+0x20/0x38 (C)
[   20.747662]  dump_stack_lvl+0x8c/0xd0
[   20.747713]  print_report+0x118/0x608
[   20.747796]  kasan_report+0xdc/0x128
[   20.747857]  kasan_check_range+0x100/0x1a8
[   20.747910]  __kasan_check_write+0x20/0x30
[   20.747959]  kasan_atomics_helper+0xe44/0x4858
[   20.748165]  kasan_atomics+0x198/0x2e0
[   20.748295]  kunit_try_run_case+0x170/0x3f0
[   20.748606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.748736]  kthread+0x328/0x630
[   20.748872]  ret_from_fork+0x10/0x20
[   20.748996] 
[   20.749066] Allocated by task 265:
[   20.749240]  kasan_save_stack+0x3c/0x68
[   20.749405]  kasan_save_track+0x20/0x40
[   20.749467]  kasan_save_alloc_info+0x40/0x58
[   20.749511]  __kasan_kmalloc+0xd4/0xd8
[   20.749841]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.749948]  kasan_atomics+0xb8/0x2e0
[   20.750062]  kunit_try_run_case+0x170/0x3f0
[   20.750366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.750504]  kthread+0x328/0x630
[   20.750590]  ret_from_fork+0x10/0x20
[   20.750629] 
[   20.750651] The buggy address belongs to the object at fff00000c6f13780
[   20.750651]  which belongs to the cache kmalloc-64 of size 64
[   20.750934] The buggy address is located 0 bytes to the right of
[   20.750934]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.751219] 
[   20.751269] The buggy address belongs to the physical page:
[   20.751489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.751793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.751951] page_type: f5(slab)
[   20.752030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.752081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.752148] page dumped because: kasan: bad access detected
[   20.752180] 
[   20.752200] Memory state around the buggy address:
[   20.752358]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.752448]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.752574] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.752630]                                      ^
[   20.752671]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.752716]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.752756] ==================================================================
[   20.758147] ==================================================================
[   20.758198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.758403] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.758589] 
[   20.758678] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.758878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.759002] Hardware name: linux,dummy-virt (DT)
[   20.759206] Call trace:
[   20.759245]  show_stack+0x20/0x38 (C)
[   20.759344]  dump_stack_lvl+0x8c/0xd0
[   20.759464]  print_report+0x118/0x608
[   20.759552]  kasan_report+0xdc/0x128
[   20.759629]  kasan_check_range+0x100/0x1a8
[   20.759680]  __kasan_check_write+0x20/0x30
[   20.759748]  kasan_atomics_helper+0xeb8/0x4858
[   20.759801]  kasan_atomics+0x198/0x2e0
[   20.760037]  kunit_try_run_case+0x170/0x3f0
[   20.760206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.760283]  kthread+0x328/0x630
[   20.760375]  ret_from_fork+0x10/0x20
[   20.760730] 
[   20.760857] Allocated by task 265:
[   20.760963]  kasan_save_stack+0x3c/0x68
[   20.761088]  kasan_save_track+0x20/0x40
[   20.761180]  kasan_save_alloc_info+0x40/0x58
[   20.761282]  __kasan_kmalloc+0xd4/0xd8
[   20.761369]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.761536]  kasan_atomics+0xb8/0x2e0
[   20.761660]  kunit_try_run_case+0x170/0x3f0
[   20.761722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.761769]  kthread+0x328/0x630
[   20.762041]  ret_from_fork+0x10/0x20
[   20.762234] 
[   20.762342] The buggy address belongs to the object at fff00000c6f13780
[   20.762342]  which belongs to the cache kmalloc-64 of size 64
[   20.762595] The buggy address is located 0 bytes to the right of
[   20.762595]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.762814] 
[   20.762873] The buggy address belongs to the physical page:
[   20.763025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.763081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.763130] page_type: f5(slab)
[   20.763307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.763477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.763614] page dumped because: kasan: bad access detected
[   20.763734] 
[   20.764027] Memory state around the buggy address:
[   20.764170]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.764266]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.764399] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.764440]                                      ^
[   20.764474]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.764541]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.764582] ==================================================================
[   20.863578] ==================================================================
[   20.863720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.863780] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.863939] 
[   20.863973] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.864266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.864396] Hardware name: linux,dummy-virt (DT)
[   20.864467] Call trace:
[   20.864495]  show_stack+0x20/0x38 (C)
[   20.864591]  dump_stack_lvl+0x8c/0xd0
[   20.864641]  print_report+0x118/0x608
[   20.864687]  kasan_report+0xdc/0x128
[   20.864772]  kasan_check_range+0x100/0x1a8
[   20.864833]  __kasan_check_write+0x20/0x30
[   20.864880]  kasan_atomics_helper+0x14e4/0x4858
[   20.864984]  kasan_atomics+0x198/0x2e0
[   20.865102]  kunit_try_run_case+0x170/0x3f0
[   20.865167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.865221]  kthread+0x328/0x630
[   20.865267]  ret_from_fork+0x10/0x20
[   20.865474] 
[   20.865504] Allocated by task 265:
[   20.865537]  kasan_save_stack+0x3c/0x68
[   20.865584]  kasan_save_track+0x20/0x40
[   20.865623]  kasan_save_alloc_info+0x40/0x58
[   20.865665]  __kasan_kmalloc+0xd4/0xd8
[   20.865716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.865756]  kasan_atomics+0xb8/0x2e0
[   20.865795]  kunit_try_run_case+0x170/0x3f0
[   20.866036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866102]  kthread+0x328/0x630
[   20.866198]  ret_from_fork+0x10/0x20
[   20.866238] 
[   20.866259] The buggy address belongs to the object at fff00000c6f13780
[   20.866259]  which belongs to the cache kmalloc-64 of size 64
[   20.866344] The buggy address is located 0 bytes to the right of
[   20.866344]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.866410] 
[   20.866431] The buggy address belongs to the physical page:
[   20.866589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.866769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.866943] page_type: f5(slab)
[   20.867020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.867811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.867942] page dumped because: kasan: bad access detected
[   20.867977] 
[   20.868013] Memory state around the buggy address:
[   20.868049]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.868118]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.868163] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.868220]                                      ^
[   20.868254]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.868408]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.868483] ==================================================================
[   20.872857] ==================================================================
[   20.873165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.873289] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.873361] 
[   20.873424] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.873530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.873589] Hardware name: linux,dummy-virt (DT)
[   20.873683] Call trace:
[   20.873788]  show_stack+0x20/0x38 (C)
[   20.873876]  dump_stack_lvl+0x8c/0xd0
[   20.873952]  print_report+0x118/0x608
[   20.874001]  kasan_report+0xdc/0x128
[   20.874053]  kasan_check_range+0x100/0x1a8
[   20.874108]  __kasan_check_write+0x20/0x30
[   20.874210]  kasan_atomics_helper+0x15b4/0x4858
[   20.874299]  kasan_atomics+0x198/0x2e0
[   20.874364]  kunit_try_run_case+0x170/0x3f0
[   20.874469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.874524]  kthread+0x328/0x630
[   20.874570]  ret_from_fork+0x10/0x20
[   20.874749] 
[   20.874770] Allocated by task 265:
[   20.874941]  kasan_save_stack+0x3c/0x68
[   20.875241]  kasan_save_track+0x20/0x40
[   20.875551]  kasan_save_alloc_info+0x40/0x58
[   20.875722]  __kasan_kmalloc+0xd4/0xd8
[   20.875888]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.876009]  kasan_atomics+0xb8/0x2e0
[   20.876097]  kunit_try_run_case+0x170/0x3f0
[   20.876186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.876231]  kthread+0x328/0x630
[   20.876266]  ret_from_fork+0x10/0x20
[   20.876305] 
[   20.876326] The buggy address belongs to the object at fff00000c6f13780
[   20.876326]  which belongs to the cache kmalloc-64 of size 64
[   20.876718] The buggy address is located 0 bytes to the right of
[   20.876718]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.876964] 
[   20.877152] The buggy address belongs to the physical page:
[   20.877362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.877424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.877665] page_type: f5(slab)
[   20.877722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.877909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.878031] page dumped because: kasan: bad access detected
[   20.878369] 
[   20.878481] Memory state around the buggy address:
[   20.878567]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.878677]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.878771] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.878823]                                      ^
[   20.878857]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.879166]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.879377] ==================================================================
[   20.838182] ==================================================================
[   20.838236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.838286] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.838338] 
[   20.838368] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.838458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.838485] Hardware name: linux,dummy-virt (DT)
[   20.838518] Call trace:
[   20.838541]  show_stack+0x20/0x38 (C)
[   20.838591]  dump_stack_lvl+0x8c/0xd0
[   20.838638]  print_report+0x118/0x608
[   20.838686]  kasan_report+0xdc/0x128
[   20.838732]  kasan_check_range+0x100/0x1a8
[   20.838782]  __kasan_check_write+0x20/0x30
[   20.838847]  kasan_atomics_helper+0x12d8/0x4858
[   20.838896]  kasan_atomics+0x198/0x2e0
[   20.838975]  kunit_try_run_case+0x170/0x3f0
[   20.839332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.839407]  kthread+0x328/0x630
[   20.839567]  ret_from_fork+0x10/0x20
[   20.839728] 
[   20.839874] Allocated by task 265:
[   20.839976]  kasan_save_stack+0x3c/0x68
[   20.840071]  kasan_save_track+0x20/0x40
[   20.840176]  kasan_save_alloc_info+0x40/0x58
[   20.840251]  __kasan_kmalloc+0xd4/0xd8
[   20.840290]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.840357]  kasan_atomics+0xb8/0x2e0
[   20.840396]  kunit_try_run_case+0x170/0x3f0
[   20.840438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.840526]  kthread+0x328/0x630
[   20.840562]  ret_from_fork+0x10/0x20
[   20.840774] 
[   20.840873] The buggy address belongs to the object at fff00000c6f13780
[   20.840873]  which belongs to the cache kmalloc-64 of size 64
[   20.841303] The buggy address is located 0 bytes to the right of
[   20.841303]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.841486] 
[   20.841558] The buggy address belongs to the physical page:
[   20.841608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.841693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.841745] page_type: f5(slab)
[   20.841783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.842033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.842165] page dumped because: kasan: bad access detected
[   20.842214] 
[   20.842235] Memory state around the buggy address:
[   20.842298]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.842374]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.842419] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.842459]                                      ^
[   20.842777]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.842943]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.843049] ==================================================================
[   20.713656] ==================================================================
[   20.713709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.713761] Write of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.713822] 
[   20.713853] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.713934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.713963] Hardware name: linux,dummy-virt (DT)
[   20.714030] Call trace:
[   20.714058]  show_stack+0x20/0x38 (C)
[   20.714127]  dump_stack_lvl+0x8c/0xd0
[   20.714185]  print_report+0x118/0x608
[   20.714242]  kasan_report+0xdc/0x128
[   20.714288]  kasan_check_range+0x100/0x1a8
[   20.714339]  __kasan_check_write+0x20/0x30
[   20.714385]  kasan_atomics_helper+0xd3c/0x4858
[   20.714434]  kasan_atomics+0x198/0x2e0
[   20.714488]  kunit_try_run_case+0x170/0x3f0
[   20.714538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.714592]  kthread+0x328/0x630
[   20.714635]  ret_from_fork+0x10/0x20
[   20.714691] 
[   20.714714] Allocated by task 265:
[   20.714745]  kasan_save_stack+0x3c/0x68
[   20.714788]  kasan_save_track+0x20/0x40
[   20.714838]  kasan_save_alloc_info+0x40/0x58
[   20.714881]  __kasan_kmalloc+0xd4/0xd8
[   20.715826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.716113]  kasan_atomics+0xb8/0x2e0
[   20.716170]  kunit_try_run_case+0x170/0x3f0
[   20.716338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.716617]  kthread+0x328/0x630
[   20.716972]  ret_from_fork+0x10/0x20
[   20.717059] 
[   20.717235] The buggy address belongs to the object at fff00000c6f13780
[   20.717235]  which belongs to the cache kmalloc-64 of size 64
[   20.717654] The buggy address is located 0 bytes to the right of
[   20.717654]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.717982] 
[   20.718055] The buggy address belongs to the physical page:
[   20.718254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.718654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.718735] page_type: f5(slab)
[   20.718881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.719545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.719615] page dumped because: kasan: bad access detected
[   20.719669] 
[   20.719690] Memory state around the buggy address:
[   20.720354]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.720420]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.720511] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.720789]                                      ^
[   20.720897]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.721231]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.721460] ==================================================================
[   20.847527] ==================================================================
[   20.847580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.847649] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.847738] 
[   20.847798] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.847907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.848005] Hardware name: linux,dummy-virt (DT)
[   20.848043] Call trace:
[   20.848070]  show_stack+0x20/0x38 (C)
[   20.848256]  dump_stack_lvl+0x8c/0xd0
[   20.848392]  print_report+0x118/0x608
[   20.848516]  kasan_report+0xdc/0x128
[   20.848587]  __asan_report_load8_noabort+0x20/0x30
[   20.848654]  kasan_atomics_helper+0x3f04/0x4858
[   20.848720]  kasan_atomics+0x198/0x2e0
[   20.848856]  kunit_try_run_case+0x170/0x3f0
[   20.848909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.848969]  kthread+0x328/0x630
[   20.849044]  ret_from_fork+0x10/0x20
[   20.849114] 
[   20.849134] Allocated by task 265:
[   20.849165]  kasan_save_stack+0x3c/0x68
[   20.849228]  kasan_save_track+0x20/0x40
[   20.849269]  kasan_save_alloc_info+0x40/0x58
[   20.849312]  __kasan_kmalloc+0xd4/0xd8
[   20.849374]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.849415]  kasan_atomics+0xb8/0x2e0
[   20.849451]  kunit_try_run_case+0x170/0x3f0
[   20.849598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.849651]  kthread+0x328/0x630
[   20.849721]  ret_from_fork+0x10/0x20
[   20.849845] 
[   20.849889] The buggy address belongs to the object at fff00000c6f13780
[   20.849889]  which belongs to the cache kmalloc-64 of size 64
[   20.850124] The buggy address is located 0 bytes to the right of
[   20.850124]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.850201] 
[   20.850222] The buggy address belongs to the physical page:
[   20.850254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.850403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.850577] page_type: f5(slab)
[   20.850620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.850673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.850774] page dumped because: kasan: bad access detected
[   20.850849] 
[   20.851005] Memory state around the buggy address:
[   20.851154]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.851334]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.851467] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.851508]                                      ^
[   20.851566]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.851609]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.851648] ==================================================================
[   20.892168] ==================================================================
[   20.892225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.892271] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.892320] 
[   20.892349] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.892430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.892459] Hardware name: linux,dummy-virt (DT)
[   20.892962] Call trace:
[   20.893047]  show_stack+0x20/0x38 (C)
[   20.893298]  dump_stack_lvl+0x8c/0xd0
[   20.893459]  print_report+0x118/0x608
[   20.893549]  kasan_report+0xdc/0x128
[   20.893642]  kasan_check_range+0x100/0x1a8
[   20.893821]  __kasan_check_write+0x20/0x30
[   20.893899]  kasan_atomics_helper+0x16d0/0x4858
[   20.893949]  kasan_atomics+0x198/0x2e0
[   20.893995]  kunit_try_run_case+0x170/0x3f0
[   20.894043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.894330]  kthread+0x328/0x630
[   20.894448]  ret_from_fork+0x10/0x20
[   20.894892] 
[   20.894944] Allocated by task 265:
[   20.894976]  kasan_save_stack+0x3c/0x68
[   20.895067]  kasan_save_track+0x20/0x40
[   20.895140]  kasan_save_alloc_info+0x40/0x58
[   20.895251]  __kasan_kmalloc+0xd4/0xd8
[   20.895328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.895434]  kasan_atomics+0xb8/0x2e0
[   20.895523]  kunit_try_run_case+0x170/0x3f0
[   20.895618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.895692]  kthread+0x328/0x630
[   20.895725]  ret_from_fork+0x10/0x20
[   20.895762] 
[   20.895782] The buggy address belongs to the object at fff00000c6f13780
[   20.895782]  which belongs to the cache kmalloc-64 of size 64
[   20.895871] The buggy address is located 0 bytes to the right of
[   20.895871]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.896035] 
[   20.896058] The buggy address belongs to the physical page:
[   20.896091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.896212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.896379] page_type: f5(slab)
[   20.896484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.896561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.896679] page dumped because: kasan: bad access detected
[   20.896714] 
[   20.896733] Memory state around the buggy address:
[   20.896768]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.896977]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.897070] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.897183]                                      ^
[   20.897298]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.897344]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.897384] ==================================================================
[   20.898390] ==================================================================
[   20.898440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.898768] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.898911] 
[   20.898944] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.899032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.899079] Hardware name: linux,dummy-virt (DT)
[   20.899147] Call trace:
[   20.899192]  show_stack+0x20/0x38 (C)
[   20.899340]  dump_stack_lvl+0x8c/0xd0
[   20.899390]  print_report+0x118/0x608
[   20.899462]  kasan_report+0xdc/0x128
[   20.899510]  __asan_report_load8_noabort+0x20/0x30
[   20.899878]  kasan_atomics_helper+0x3e10/0x4858
[   20.900073]  kasan_atomics+0x198/0x2e0
[   20.900174]  kunit_try_run_case+0x170/0x3f0
[   20.900392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.900650]  kthread+0x328/0x630
[   20.900884]  ret_from_fork+0x10/0x20
[   20.901107] 
[   20.901260] Allocated by task 265:
[   20.901293]  kasan_save_stack+0x3c/0x68
[   20.901335]  kasan_save_track+0x20/0x40
[   20.901404]  kasan_save_alloc_info+0x40/0x58
[   20.901796]  __kasan_kmalloc+0xd4/0xd8
[   20.902070]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.902296]  kasan_atomics+0xb8/0x2e0
[   20.902441]  kunit_try_run_case+0x170/0x3f0
[   20.902556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.902739]  kthread+0x328/0x630
[   20.902941]  ret_from_fork+0x10/0x20
[   20.903032] 
[   20.903064] The buggy address belongs to the object at fff00000c6f13780
[   20.903064]  which belongs to the cache kmalloc-64 of size 64
[   20.903146] The buggy address is located 0 bytes to the right of
[   20.903146]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.903215] 
[   20.903236] The buggy address belongs to the physical page:
[   20.903269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.903325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.903376] page_type: f5(slab)
[   20.903523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.903625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.903797] page dumped because: kasan: bad access detected
[   20.903874] 
[   20.903894] Memory state around the buggy address:
[   20.903933]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.903979]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.904171] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.904289]                                      ^
[   20.904413]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.904509]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.904611] ==================================================================
[   20.635705] ==================================================================
[   20.635746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.635818] Write of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.635869] 
[   20.635902] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.636159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.636438] Hardware name: linux,dummy-virt (DT)
[   20.636495] Call trace:
[   20.636520]  show_stack+0x20/0x38 (C)
[   20.636573]  dump_stack_lvl+0x8c/0xd0
[   20.636620]  print_report+0x118/0x608
[   20.636971]  kasan_report+0xdc/0x128
[   20.637043]  kasan_check_range+0x100/0x1a8
[   20.637096]  __kasan_check_write+0x20/0x30
[   20.637221]  kasan_atomics_helper+0xa6c/0x4858
[   20.637273]  kasan_atomics+0x198/0x2e0
[   20.638402]  kasan_save_alloc_info+0x40/0x58
[   20.638443]  __kasan_kmalloc+0xd4/0xd8
[   20.638482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.638713]  kasan_atomics+0xb8/0x2e0
[   20.638815]  kunit_try_run_case+0x170/0x3f0
[   20.638888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.638944]  kthread+0x328/0x630
[   20.639006]  ret_from_fork+0x10/0x20
[   20.639323] 
[   20.640487] 
[   20.641296]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.642994] 
[   20.643817]  kasan_atomics_helper+0xad4/0x4858
[   20.645469]  kasan_save_alloc_info+0x40/0x58
[   20.645613]  __kasan_kmalloc+0xd4/0xd8
[   20.645666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.645965]  kasan_atomics+0xb8/0x2e0
[   20.646070]  kunit_try_run_case+0x170/0x3f0
[   20.646112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.646276] The buggy address belongs to the object at fff00000c6f13780
[   20.646276]  which belongs to the cache kmalloc-64 of size 64
[   20.648430]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.650136]  kasan_atomics_helper+0x3dcc/0x4858
[   20.651741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.653991] The buggy address belongs to the physical page:
[   20.655249] 
[   20.655969]                                      ^
[   20.657932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.658775]  kasan_save_stack+0x3c/0x68
[   20.661061] 
[   20.661955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.664172]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.666683]  show_stack+0x20/0x38 (C)
[   20.669397]  kasan_save_stack+0x3c/0x68
[   20.672230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.672687]                                      ^
[   20.679080]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.679440]  kunit_try_run_case+0x170/0x3f0
[   20.681483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.682708]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.683239]                                      ^
[   20.685202] Read of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.685508] Hardware name: linux,dummy-virt (DT)
[   20.686536]  kasan_atomics_helper+0x3de4/0x4858
[   20.688244]  kasan_save_track+0x20/0x40
[   20.689521]  kthread+0x328/0x630
[   20.689793] 
[   20.690343] 
[   20.690761] The buggy address belongs to the physical page:
[   20.690930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.691862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.692638]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.692873]                                      ^
[   20.693262]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.695253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.696235]  print_report+0x118/0x608
[   20.697254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.699007]  __kasan_kmalloc+0xd4/0xd8
[   20.700508]  ret_from_fork+0x10/0x20
[   20.700667] 
[   20.700693] The buggy address belongs to the object at fff00000c6f13780
[   20.700693]  which belongs to the cache kmalloc-64 of size 64
[   20.700791] The buggy address is located 0 bytes to the right of
[   20.700791]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.700891] 
[   20.700922] The buggy address belongs to the physical page:
[   20.700964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.701027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.701076] page_type: f5(slab)
[   20.701114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.701165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.701207] page dumped because: kasan: bad access detected
[   20.701250] 
[   20.701281] Memory state around the buggy address:
[   20.701314]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.701364]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.701417] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.701461]                                      ^
[   20.701496]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.701545]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.701586] ==================================================================
[   20.722281] ==================================================================
[   20.722430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.722536] Read of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.722589] 
[   20.722703] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.723036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.723222] Hardware name: linux,dummy-virt (DT)
[   20.723289] Call trace:
[   20.723443]  show_stack+0x20/0x38 (C)
[   20.723647]  dump_stack_lvl+0x8c/0xd0
[   20.723799]  print_report+0x118/0x608
[   20.723949]  kasan_report+0xdc/0x128
[   20.724123]  __asan_report_load4_noabort+0x20/0x30
[   20.724268]  kasan_atomics_helper+0x3e04/0x4858
[   20.724421]  kasan_atomics+0x198/0x2e0
[   20.725223]  kunit_try_run_case+0x170/0x3f0
[   20.725311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.725393]  kthread+0x328/0x630
[   20.725476]  ret_from_fork+0x10/0x20
[   20.725549] 
[   20.725571] Allocated by task 265:
[   20.726028]  kasan_save_stack+0x3c/0x68
[   20.726391]  kasan_save_track+0x20/0x40
[   20.726433]  kasan_save_alloc_info+0x40/0x58
[   20.726476]  __kasan_kmalloc+0xd4/0xd8
[   20.726703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.727167]  kasan_atomics+0xb8/0x2e0
[   20.727238]  kunit_try_run_case+0x170/0x3f0
[   20.727421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.727538]  kthread+0x328/0x630
[   20.727573]  ret_from_fork+0x10/0x20
[   20.727611] 
[   20.728355] The buggy address belongs to the object at fff00000c6f13780
[   20.728355]  which belongs to the cache kmalloc-64 of size 64
[   20.728446] The buggy address is located 0 bytes to the right of
[   20.728446]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.728860] 
[   20.729007] The buggy address belongs to the physical page:
[   20.729285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.729362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.729770] page_type: f5(slab)
[   20.729863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.730195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.730379] page dumped because: kasan: bad access detected
[   20.730507] 
[   20.730539] Memory state around the buggy address:
[   20.730595]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.730652]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.730705] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.730752]                                      ^
[   20.730788]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.730843]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.730895] ==================================================================
[   20.790593] ==================================================================
[   20.790687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.790827] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.790890] 
[   20.790951] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.791464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.791678] Hardware name: linux,dummy-virt (DT)
[   20.791761] Call trace:
[   20.791882]  show_stack+0x20/0x38 (C)
[   20.791990]  dump_stack_lvl+0x8c/0xd0
[   20.792044]  print_report+0x118/0x608
[   20.792116]  kasan_report+0xdc/0x128
[   20.792485]  kasan_check_range+0x100/0x1a8
[   20.792747]  __kasan_check_write+0x20/0x30
[   20.792896]  kasan_atomics_helper+0x1058/0x4858
[   20.793304]  kasan_atomics+0x198/0x2e0
[   20.793505]  kunit_try_run_case+0x170/0x3f0
[   20.794003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.794272]  kthread+0x328/0x630
[   20.794413]  ret_from_fork+0x10/0x20
[   20.794585] 
[   20.794609] Allocated by task 265:
[   20.794638]  kasan_save_stack+0x3c/0x68
[   20.795079]  kasan_save_track+0x20/0x40
[   20.795342]  kasan_save_alloc_info+0x40/0x58
[   20.795569]  __kasan_kmalloc+0xd4/0xd8
[   20.795696]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.796061]  kasan_atomics+0xb8/0x2e0
[   20.796101]  kunit_try_run_case+0x170/0x3f0
[   20.796140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.796185]  kthread+0x328/0x630
[   20.796667]  ret_from_fork+0x10/0x20
[   20.796765] 
[   20.797055] The buggy address belongs to the object at fff00000c6f13780
[   20.797055]  which belongs to the cache kmalloc-64 of size 64
[   20.797246] The buggy address is located 0 bytes to the right of
[   20.797246]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.797463] 
[   20.797521] The buggy address belongs to the physical page:
[   20.797887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.798086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.798168] page_type: f5(slab)
[   20.798211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.798651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.799100] page dumped because: kasan: bad access detected
[   20.799276] 
[   20.799337] Memory state around the buggy address:
[   20.799756]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.799957]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.800175] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.800360]                                      ^
[   20.800417]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.800569]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.800777] ==================================================================
[   20.616122] ==================================================================
[   20.616175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.616568] Read of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.616699] 
[   20.616733] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.616919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.616976] Hardware name: linux,dummy-virt (DT)
[   20.617011] Call trace:
[   20.617088]  show_stack+0x20/0x38 (C)
[   20.617142]  dump_stack_lvl+0x8c/0xd0
[   20.617212]  print_report+0x118/0x608
[   20.617265]  kasan_report+0xdc/0x128
[   20.617349]  __asan_report_load4_noabort+0x20/0x30
[   20.617694]  kasan_atomics_helper+0x42d8/0x4858
[   20.617821]  kasan_atomics+0x198/0x2e0
[   20.617917]  kunit_try_run_case+0x170/0x3f0
[   20.617966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.618021]  kthread+0x328/0x630
[   20.618105]  ret_from_fork+0x10/0x20
[   20.618155] 
[   20.618193] Allocated by task 265:
[   20.618389]  kasan_save_stack+0x3c/0x68
[   20.618443]  kasan_save_track+0x20/0x40
[   20.618627]  kasan_save_alloc_info+0x40/0x58
[   20.618679]  __kasan_kmalloc+0xd4/0xd8
[   20.618726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.618768]  kasan_atomics+0xb8/0x2e0
[   20.618920]  kunit_try_run_case+0x170/0x3f0
[   20.619108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.619245]  kthread+0x328/0x630
[   20.619571]  ret_from_fork+0x10/0x20
[   20.619686] 
[   20.619816] The buggy address belongs to the object at fff00000c6f13780
[   20.619816]  which belongs to the cache kmalloc-64 of size 64
[   20.619922] The buggy address is located 0 bytes to the right of
[   20.619922]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.620000] 
[   20.620023] The buggy address belongs to the physical page:
[   20.620097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.620168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.620217] page_type: f5(slab)
[   20.620255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.620308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.620434]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.621777] 
[   20.622020] Hardware name: linux,dummy-virt (DT)
[   20.622076]  show_stack+0x20/0x38 (C)
[   20.622127]  dump_stack_lvl+0x8c/0xd0
[   20.622175]  print_report+0x118/0x608
[   20.622233]  kasan_report+0xdc/0x128
[   20.622288]  kasan_check_range+0x100/0x1a8
[   20.622338]  __kasan_check_write+0x20/0x30
[   20.622391]  kasan_atomics_helper+0x934/0x4858
[   20.622443]  kasan_atomics+0x198/0x2e0
[   20.622488]  kunit_try_run_case+0x170/0x3f0
[   20.622535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.622596]  kthread+0x328/0x630
[   20.622639]  ret_from_fork+0x10/0x20
[   20.622686] 
[   20.622707] Allocated by task 265:
[   20.622734]  kasan_save_stack+0x3c/0x68
[   20.622775]  kasan_save_track+0x20/0x40
[   20.623119]  kasan_save_alloc_info+0x40/0x58
[   20.623324]  __kasan_kmalloc+0xd4/0xd8
[   20.623368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.623408]  kasan_atomics+0xb8/0x2e0
[   20.623638]  kunit_try_run_case+0x170/0x3f0
[   20.623786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.623935]  kthread+0x328/0x630
[   20.623970]  ret_from_fork+0x10/0x20
[   20.624031] 
[   20.624161] The buggy address belongs to the object at fff00000c6f13780
[   20.624161]  which belongs to the cache kmalloc-64 of size 64
[   20.624350] The buggy address is located 0 bytes to the right of
[   20.624350]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.624740] 
[   20.624774] The buggy address belongs to the physical page:
[   20.624880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.625040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.625178] page_type: f5(slab)
[   20.625307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.625420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.625567] page dumped because: kasan: bad access detected
[   20.625676] 
[   20.625783] Memory state around the buggy address:
[   20.625895]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.625968]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.626013] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.626066]                                      ^
[   20.626106]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.626150]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.626191] ==================================================================
[   20.934714] ==================================================================
[   20.934931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.935547] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.935626] 
[   20.935662] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.936304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.936702] Hardware name: linux,dummy-virt (DT)
[   20.936837] Call trace:
[   20.937139]  show_stack+0x20/0x38 (C)
[   20.937645]  dump_stack_lvl+0x8c/0xd0
[   20.938547]  print_report+0x118/0x608
[   20.939288]  kasan_report+0xdc/0x128
[   20.939520]  kasan_check_range+0x100/0x1a8
[   20.939604]  __kasan_check_write+0x20/0x30
[   20.939651]  kasan_atomics_helper+0x17ec/0x4858
[   20.939701]  kasan_atomics+0x198/0x2e0
[   20.939746]  kunit_try_run_case+0x170/0x3f0
[   20.939796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.941095]  kthread+0x328/0x630
[   20.941426]  ret_from_fork+0x10/0x20
[   20.941518] 
[   20.942015] Allocated by task 265:
[   20.942140]  kasan_save_stack+0x3c/0x68
[   20.942725]  kasan_save_track+0x20/0x40
[   20.942896]  kasan_save_alloc_info+0x40/0x58
[   20.942942]  __kasan_kmalloc+0xd4/0xd8
[   20.943546]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.943599]  kasan_atomics+0xb8/0x2e0
[   20.944668]  kunit_try_run_case+0x170/0x3f0
[   20.945137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.945568]  kthread+0x328/0x630
[   20.945642]  ret_from_fork+0x10/0x20
[   20.945682] 
[   20.945704] The buggy address belongs to the object at fff00000c6f13780
[   20.945704]  which belongs to the cache kmalloc-64 of size 64
[   20.946938] The buggy address is located 0 bytes to the right of
[   20.946938]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.947173] 
[   20.947196] The buggy address belongs to the physical page:
[   20.947231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.947976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.948186] page_type: f5(slab)
[   20.948230] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.949193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.949651] page dumped because: kasan: bad access detected
[   20.950499] 
[   20.950902] Memory state around the buggy address:
[   20.951022]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.951085]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.951721] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.952414]                                      ^
[   20.952613]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.952672]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.953401] ==================================================================
[   20.825563] ==================================================================
[   20.825768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.825931] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.826156] 
[   20.826265] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.826365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.826456] Hardware name: linux,dummy-virt (DT)
[   20.826526] Call trace:
[   20.826551]  show_stack+0x20/0x38 (C)
[   20.826603]  dump_stack_lvl+0x8c/0xd0
[   20.826980]  print_report+0x118/0x608
[   20.827396]  kasan_report+0xdc/0x128
[   20.827546]  kasan_check_range+0x100/0x1a8
[   20.827695]  __kasan_check_write+0x20/0x30
[   20.827800]  kasan_atomics_helper+0x11f8/0x4858
[   20.827934]  kasan_atomics+0x198/0x2e0
[   20.828106]  kunit_try_run_case+0x170/0x3f0
[   20.828164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.828217]  kthread+0x328/0x630
[   20.828264]  ret_from_fork+0x10/0x20
[   20.828311] 
[   20.828355] Allocated by task 265:
[   20.828386]  kasan_save_stack+0x3c/0x68
[   20.828428]  kasan_save_track+0x20/0x40
[   20.828664]  kasan_save_alloc_info+0x40/0x58
[   20.828812]  __kasan_kmalloc+0xd4/0xd8
[   20.828915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.829233]  kasan_atomics+0xb8/0x2e0
[   20.829317]  kunit_try_run_case+0x170/0x3f0
[   20.829444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.829568]  kthread+0x328/0x630
[   20.829684]  ret_from_fork+0x10/0x20
[   20.829838] 
[   20.829940] The buggy address belongs to the object at fff00000c6f13780
[   20.829940]  which belongs to the cache kmalloc-64 of size 64
[   20.830003] The buggy address is located 0 bytes to the right of
[   20.830003]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.830361] 
[   20.830410] The buggy address belongs to the physical page:
[   20.830452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.830506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.830555] page_type: f5(slab)
[   20.830604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.830658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.830699] page dumped because: kasan: bad access detected
[   20.830743] 
[   20.830772] Memory state around the buggy address:
[   20.830824]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.830868]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.830912] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.831191]                                      ^
[   20.831282]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.831325]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.831551] ==================================================================
[   20.702602] ==================================================================
[   20.702654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.702706] Read of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.702919] 
[   20.702965] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.703218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.703409] Hardware name: linux,dummy-virt (DT)
[   20.703736] Call trace:
[   20.703859]  show_stack+0x20/0x38 (C)
[   20.704122]  dump_stack_lvl+0x8c/0xd0
[   20.704375]  print_report+0x118/0x608
[   20.704772]  kasan_report+0xdc/0x128
[   20.705006]  __asan_report_load4_noabort+0x20/0x30
[   20.705111]  kasan_atomics_helper+0x3dd8/0x4858
[   20.705543]  kasan_atomics+0x198/0x2e0
[   20.705636]  kunit_try_run_case+0x170/0x3f0
[   20.705841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.706450]  kthread+0x328/0x630
[   20.706674]  ret_from_fork+0x10/0x20
[   20.706904] 
[   20.707172] Allocated by task 265:
[   20.707349]  kasan_save_stack+0x3c/0x68
[   20.707449]  kasan_save_track+0x20/0x40
[   20.707506]  kasan_save_alloc_info+0x40/0x58
[   20.707680]  __kasan_kmalloc+0xd4/0xd8
[   20.707722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.707763]  kasan_atomics+0xb8/0x2e0
[   20.708325]  kunit_try_run_case+0x170/0x3f0
[   20.708491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.708571]  kthread+0x328/0x630
[   20.708608]  ret_from_fork+0x10/0x20
[   20.708962] 
[   20.709311] The buggy address belongs to the object at fff00000c6f13780
[   20.709311]  which belongs to the cache kmalloc-64 of size 64
[   20.709748] The buggy address is located 0 bytes to the right of
[   20.709748]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.709892] 
[   20.710212] The buggy address belongs to the physical page:
[   20.710329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.710594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.711119] page_type: f5(slab)
[   20.711335] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.711458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.711637] page dumped because: kasan: bad access detected
[   20.711801] 
[   20.712005] Memory state around the buggy address:
[   20.712133]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.712356]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.712438] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.712476]                                      ^
[   20.712512]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.712557]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.712887] ==================================================================
[   20.916107] ==================================================================
[   20.916283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.916709] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.916843] 
[   20.917515] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.918594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.918707] Hardware name: linux,dummy-virt (DT)
[   20.918743] Call trace:
[   20.918766]  show_stack+0x20/0x38 (C)
[   20.919061]  dump_stack_lvl+0x8c/0xd0
[   20.919275]  print_report+0x118/0x608
[   20.919327]  kasan_report+0xdc/0x128
[   20.919374]  __asan_report_load8_noabort+0x20/0x30
[   20.919423]  kasan_atomics_helper+0x3e20/0x4858
[   20.919473]  kasan_atomics+0x198/0x2e0
[   20.919520]  kunit_try_run_case+0x170/0x3f0
[   20.920954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.921604]  kthread+0x328/0x630
[   20.921742]  ret_from_fork+0x10/0x20
[   20.922320] 
[   20.922987] Allocated by task 265:
[   20.923154]  kasan_save_stack+0x3c/0x68
[   20.923204]  kasan_save_track+0x20/0x40
[   20.923244]  kasan_save_alloc_info+0x40/0x58
[   20.923287]  __kasan_kmalloc+0xd4/0xd8
[   20.923326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.923365]  kasan_atomics+0xb8/0x2e0
[   20.923404]  kunit_try_run_case+0x170/0x3f0
[   20.923442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.923487]  kthread+0x328/0x630
[   20.923520]  ret_from_fork+0x10/0x20
[   20.925155] 
[   20.925578] The buggy address belongs to the object at fff00000c6f13780
[   20.925578]  which belongs to the cache kmalloc-64 of size 64
[   20.926641] The buggy address is located 0 bytes to the right of
[   20.926641]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.926930] 
[   20.926960] The buggy address belongs to the physical page:
[   20.926993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.927051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.927100] page_type: f5(slab)
[   20.927141] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.928473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.928858] page dumped because: kasan: bad access detected
[   20.928900] 
[   20.929794] Memory state around the buggy address:
[   20.929962]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.930282]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.930502] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.930769]                                      ^
[   20.931364]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.931414]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.932275] ==================================================================
[   20.809555] ==================================================================
[   20.809604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.809653] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.809704] 
[   20.809735] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.809832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.809861] Hardware name: linux,dummy-virt (DT)
[   20.809894] Call trace:
[   20.809918]  show_stack+0x20/0x38 (C)
[   20.809966]  dump_stack_lvl+0x8c/0xd0
[   20.810013]  print_report+0x118/0x608
[   20.810061]  kasan_report+0xdc/0x128
[   20.810106]  kasan_check_range+0x100/0x1a8
[   20.810156]  __kasan_check_write+0x20/0x30
[   20.810200]  kasan_atomics_helper+0x1128/0x4858
[   20.810250]  kasan_atomics+0x198/0x2e0
[   20.810297]  kunit_try_run_case+0x170/0x3f0
[   20.810343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.810396]  kthread+0x328/0x630
[   20.810438]  ret_from_fork+0x10/0x20
[   20.810486] 
[   20.810506] Allocated by task 265:
[   20.811185]  kasan_save_stack+0x3c/0x68
[   20.811238]  kasan_save_track+0x20/0x40
[   20.811309]  kasan_save_alloc_info+0x40/0x58
[   20.811354]  __kasan_kmalloc+0xd4/0xd8
[   20.811392]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.811433]  kasan_atomics+0xb8/0x2e0
[   20.811470]  kunit_try_run_case+0x170/0x3f0
[   20.811510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.811554]  kthread+0x328/0x630
[   20.811590]  ret_from_fork+0x10/0x20
[   20.811627] 
[   20.811648] The buggy address belongs to the object at fff00000c6f13780
[   20.811648]  which belongs to the cache kmalloc-64 of size 64
[   20.811707] The buggy address is located 0 bytes to the right of
[   20.811707]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.811773] 
[   20.811794] The buggy address belongs to the physical page:
[   20.811842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.811893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.811947] page_type: f5(slab)
[   20.811987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.812039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.812081] page dumped because: kasan: bad access detected
[   20.812115] 
[   20.813094] Memory state around the buggy address:
[   20.813140]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.814211]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.817122] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.817249]                                      ^
[   20.817350]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.817435]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.817673] ==================================================================
[   20.856362] ==================================================================
[   20.856420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.856626] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.856715] 
[   20.856745] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.856839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.856973] Hardware name: linux,dummy-virt (DT)
[   20.857150] Call trace:
[   20.857270]  show_stack+0x20/0x38 (C)
[   20.857456]  dump_stack_lvl+0x8c/0xd0
[   20.857748]  print_report+0x118/0x608
[   20.857816]  kasan_report+0xdc/0x128
[   20.857865]  kasan_check_range+0x100/0x1a8
[   20.858102]  __kasan_check_write+0x20/0x30
[   20.858297]  kasan_atomics_helper+0x147c/0x4858
[   20.858611]  kasan_atomics+0x198/0x2e0
[   20.858749]  kunit_try_run_case+0x170/0x3f0
[   20.858898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.859091]  kthread+0x328/0x630
[   20.859205]  ret_from_fork+0x10/0x20
[   20.859326] 
[   20.859419] Allocated by task 265:
[   20.859491]  kasan_save_stack+0x3c/0x68
[   20.859534]  kasan_save_track+0x20/0x40
[   20.859597]  kasan_save_alloc_info+0x40/0x58
[   20.859639]  __kasan_kmalloc+0xd4/0xd8
[   20.859678]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.859718]  kasan_atomics+0xb8/0x2e0
[   20.860058]  kunit_try_run_case+0x170/0x3f0
[   20.860159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.860256]  kthread+0x328/0x630
[   20.860335]  ret_from_fork+0x10/0x20
[   20.860425] 
[   20.860649] The buggy address belongs to the object at fff00000c6f13780
[   20.860649]  which belongs to the cache kmalloc-64 of size 64
[   20.860714] The buggy address is located 0 bytes to the right of
[   20.860714]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.860975] 
[   20.861012] The buggy address belongs to the physical page:
[   20.861112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.861277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.861576] page_type: f5(slab)
[   20.861659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.861859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.861921] page dumped because: kasan: bad access detected
[   20.861955] 
[   20.861975] Memory state around the buggy address:
[   20.862122]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.862383]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.862469] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.862564]                                      ^
[   20.862916]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.863060]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.863174] ==================================================================
[   20.880119] ==================================================================
[   20.880167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.880216] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.880267] 
[   20.880298] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.880376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.880405] Hardware name: linux,dummy-virt (DT)
[   20.880436] Call trace:
[   20.880461]  show_stack+0x20/0x38 (C)
[   20.880509]  dump_stack_lvl+0x8c/0xd0
[   20.880557]  print_report+0x118/0x608
[   20.880604]  kasan_report+0xdc/0x128
[   20.880651]  __asan_report_load8_noabort+0x20/0x30
[   20.880700]  kasan_atomics_helper+0x3db0/0x4858
[   20.880749]  kasan_atomics+0x198/0x2e0
[   20.880796]  kunit_try_run_case+0x170/0x3f0
[   20.880889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.880963]  kthread+0x328/0x630
[   20.881064]  ret_from_fork+0x10/0x20
[   20.881141] 
[   20.881185] Allocated by task 265:
[   20.881242]  kasan_save_stack+0x3c/0x68
[   20.881454]  kasan_save_track+0x20/0x40
[   20.881565]  kasan_save_alloc_info+0x40/0x58
[   20.881701]  __kasan_kmalloc+0xd4/0xd8
[   20.881797]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.881883]  kasan_atomics+0xb8/0x2e0
[   20.881948]  kunit_try_run_case+0x170/0x3f0
[   20.882026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.882115]  kthread+0x328/0x630
[   20.882150]  ret_from_fork+0x10/0x20
[   20.882205] 
[   20.882227] The buggy address belongs to the object at fff00000c6f13780
[   20.882227]  which belongs to the cache kmalloc-64 of size 64
[   20.882288] The buggy address is located 0 bytes to the right of
[   20.882288]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.882354] 
[   20.882374] The buggy address belongs to the physical page:
[   20.882405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.882581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.882722] page_type: f5(slab)
[   20.882857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.882954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.883096] page dumped because: kasan: bad access detected
[   20.883313] 
[   20.883523] Memory state around the buggy address:
[   20.883591]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.883696]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.883813] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.883855]                                      ^
[   20.883896]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.883942]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.883982] ==================================================================
[   20.884223] ==================================================================
[   20.884418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.884501] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.884554] 
[   20.884602] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.884703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.884842] Hardware name: linux,dummy-virt (DT)
[   20.884997] Call trace:
[   20.885097]  show_stack+0x20/0x38 (C)
[   20.885212]  dump_stack_lvl+0x8c/0xd0
[   20.885278]  print_report+0x118/0x608
[   20.885333]  kasan_report+0xdc/0x128
[   20.885395]  kasan_check_range+0x100/0x1a8
[   20.885445]  __kasan_check_write+0x20/0x30
[   20.885598]  kasan_atomics_helper+0x1644/0x4858
[   20.885654]  kasan_atomics+0x198/0x2e0
[   20.885880]  kunit_try_run_case+0x170/0x3f0
[   20.885973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.886029]  kthread+0x328/0x630
[   20.886154]  ret_from_fork+0x10/0x20
[   20.886227] 
[   20.886304] Allocated by task 265:
[   20.886405]  kasan_save_stack+0x3c/0x68
[   20.886493]  kasan_save_track+0x20/0x40
[   20.886536]  kasan_save_alloc_info+0x40/0x58
[   20.886579]  __kasan_kmalloc+0xd4/0xd8
[   20.886627]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.886669]  kasan_atomics+0xb8/0x2e0
[   20.886705]  kunit_try_run_case+0x170/0x3f0
[   20.886754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.886799]  kthread+0x328/0x630
[   20.886843]  ret_from_fork+0x10/0x20
[   20.886880] 
[   20.886901] The buggy address belongs to the object at fff00000c6f13780
[   20.886901]  which belongs to the cache kmalloc-64 of size 64
[   20.886999] The buggy address is located 0 bytes to the right of
[   20.886999]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.887214] 
[   20.887340] The buggy address belongs to the physical page:
[   20.887445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.887680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.887983] page_type: f5(slab)
[   20.888075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.888128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.888170] page dumped because: kasan: bad access detected
[   20.888326] 
[   20.888347] Memory state around the buggy address:
[   20.888382]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.888594]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.888726] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.888828]                                      ^
[   20.889146]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.889248]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.889289] ==================================================================
[   20.832111] ==================================================================
[   20.832166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.832374] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.832435] 
[   20.832543] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.832700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.832848] Hardware name: linux,dummy-virt (DT)
[   20.832885] Call trace:
[   20.833059]  show_stack+0x20/0x38 (C)
[   20.833163]  dump_stack_lvl+0x8c/0xd0
[   20.833261]  print_report+0x118/0x608
[   20.833311]  kasan_report+0xdc/0x128
[   20.833405]  kasan_check_range+0x100/0x1a8
[   20.833504]  __kasan_check_write+0x20/0x30
[   20.833567]  kasan_atomics_helper+0x126c/0x4858
[   20.833616]  kasan_atomics+0x198/0x2e0
[   20.833682]  kunit_try_run_case+0x170/0x3f0
[   20.833731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.833977]  kthread+0x328/0x630
[   20.834087]  ret_from_fork+0x10/0x20
[   20.834426] 
[   20.834486] Allocated by task 265:
[   20.834520]  kasan_save_stack+0x3c/0x68
[   20.834617]  kasan_save_track+0x20/0x40
[   20.834695]  kasan_save_alloc_info+0x40/0x58
[   20.834740]  __kasan_kmalloc+0xd4/0xd8
[   20.834777]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.834830]  kasan_atomics+0xb8/0x2e0
[   20.834867]  kunit_try_run_case+0x170/0x3f0
[   20.834908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.834958]  kthread+0x328/0x630
[   20.834991]  ret_from_fork+0x10/0x20
[   20.835029] 
[   20.835073] The buggy address belongs to the object at fff00000c6f13780
[   20.835073]  which belongs to the cache kmalloc-64 of size 64
[   20.835135] The buggy address is located 0 bytes to the right of
[   20.835135]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.835200] 
[   20.835393] The buggy address belongs to the physical page:
[   20.835432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.835510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.835560] page_type: f5(slab)
[   20.835598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.835686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.835836] page dumped because: kasan: bad access detected
[   20.835922] 
[   20.836017] Memory state around the buggy address:
[   20.836102]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.836199]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.836662] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.836735]                                      ^
[   20.836771]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.836946]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.837150] ==================================================================
[   20.732119] ==================================================================
[   20.732172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.732602] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.732739] 
[   20.732782] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.732875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.733220] Hardware name: linux,dummy-virt (DT)
[   20.733455] Call trace:
[   20.733487]  show_stack+0x20/0x38 (C)
[   20.733733]  dump_stack_lvl+0x8c/0xd0
[   20.733862]  print_report+0x118/0x608
[   20.733933]  kasan_report+0xdc/0x128
[   20.734002]  kasan_check_range+0x100/0x1a8
[   20.734052]  __kasan_check_read+0x20/0x30
[   20.734386]  kasan_atomics_helper+0xdd4/0x4858
[   20.734605]  kasan_atomics+0x198/0x2e0
[   20.734817]  kunit_try_run_case+0x170/0x3f0
[   20.734881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.735001]  kthread+0x328/0x630
[   20.735123]  ret_from_fork+0x10/0x20
[   20.735238] 
[   20.735260] Allocated by task 265:
[   20.735291]  kasan_save_stack+0x3c/0x68
[   20.735562]  kasan_save_track+0x20/0x40
[   20.735726]  kasan_save_alloc_info+0x40/0x58
[   20.735962]  __kasan_kmalloc+0xd4/0xd8
[   20.736150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.736203]  kasan_atomics+0xb8/0x2e0
[   20.736242]  kunit_try_run_case+0x170/0x3f0
[   20.736543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.736858]  kthread+0x328/0x630
[   20.737011]  ret_from_fork+0x10/0x20
[   20.737328] 
[   20.737446] The buggy address belongs to the object at fff00000c6f13780
[   20.737446]  which belongs to the cache kmalloc-64 of size 64
[   20.738055] The buggy address is located 0 bytes to the right of
[   20.738055]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.738470] 
[   20.738628] The buggy address belongs to the physical page:
[   20.738673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.738776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.738844] page_type: f5(slab)
[   20.738892] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.739182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.739394] page dumped because: kasan: bad access detected
[   20.739431] 
[   20.739454] Memory state around the buggy address:
[   20.739650]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.740068]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.740298] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.740485]                                      ^
[   20.740606]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.740652]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.740705] ==================================================================
[   20.626588] ==================================================================
[   20.626639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.626707] Write of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.626759] 
[   20.626824] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.626929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.627097] Hardware name: linux,dummy-virt (DT)
[   20.627352] Call trace:
[   20.627429]  show_stack+0x20/0x38 (C)
[   20.627532]  dump_stack_lvl+0x8c/0xd0
[   20.627583]  print_report+0x118/0x608
[   20.627755]  kasan_report+0xdc/0x128
[   20.627815]  kasan_check_range+0x100/0x1a8
[   20.628019]  __kasan_check_write+0x20/0x30
[   20.628118]  kasan_atomics_helper+0x99c/0x4858
[   20.628278]  kasan_atomics+0x198/0x2e0
[   20.628383]  kunit_try_run_case+0x170/0x3f0
[   20.628720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.628868]  kthread+0x328/0x630
[   20.629016]  ret_from_fork+0x10/0x20
[   20.629153] 
[   20.629250] Allocated by task 265:
[   20.629390]  kasan_save_stack+0x3c/0x68
[   20.629515]  kasan_save_track+0x20/0x40
[   20.629556]  kasan_save_alloc_info+0x40/0x58
[   20.629839]  __kasan_kmalloc+0xd4/0xd8
[   20.629956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.630020]  kasan_atomics+0xb8/0x2e0
[   20.630126]  kunit_try_run_case+0x170/0x3f0
[   20.630500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.630651]  kthread+0x328/0x630
[   20.630698]  ret_from_fork+0x10/0x20
[   20.630737] 
[   20.630765] The buggy address belongs to the object at fff00000c6f13780
[   20.630765]  which belongs to the cache kmalloc-64 of size 64
[   20.630836] The buggy address is located 0 bytes to the right of
[   20.630836]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.630899] 
[   20.630940] The buggy address belongs to the physical page:
[   20.630972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.631024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.631073] page_type: f5(slab)
[   20.631111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.631162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.631204] page dumped because: kasan: bad access detected
[   20.631238] 
[   20.631258] Memory state around the buggy address:
[   20.631291]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.631532]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.631671] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.631818]                                      ^
[   20.632199]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.632283]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.633024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.633976]  __kasan_check_write+0x20/0x30
[   20.634318] 
[   20.634338] Allocated by task 265:
[   20.634377]  kasan_save_stack+0x3c/0x68
[   20.634418]  kasan_save_track+0x20/0x40
[   20.634467]  kasan_save_alloc_info+0x40/0x58
[   20.634508]  __kasan_kmalloc+0xd4/0xd8
[   20.634548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.634588]  kasan_atomics+0xb8/0x2e0
[   20.634631]  kunit_try_run_case+0x170/0x3f0
[   20.634670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.634724]  kthread+0x328/0x630
[   20.634758]  ret_from_fork+0x10/0x20
[   20.634796] 
[   20.634828] The buggy address belongs to the object at fff00000c6f13780
[   20.634828]  which belongs to the cache kmalloc-64 of size 64
[   20.634885] The buggy address is located 0 bytes to the right of
[   20.634885]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.634947] 
[   20.634970] The buggy address belongs to the physical page:
[   20.635019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.635072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.635118] page_type: f5(slab)
[   20.635155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.635212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.635255] page dumped because: kasan: bad access detected
[   20.635288] 
[   20.635308] Memory state around the buggy address:
[   20.635346]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.635394]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.635438] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.635478]                                      ^
[   20.635512]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.635555]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.635595] ==================================================================
[   20.851869] ==================================================================
[   20.852236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.852528] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.852675] 
[   20.852753] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.852914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.852971] Hardware name: linux,dummy-virt (DT)
[   20.853006] Call trace:
[   20.853051]  show_stack+0x20/0x38 (C)
[   20.853105]  dump_stack_lvl+0x8c/0xd0
[   20.853151]  print_report+0x118/0x608
[   20.853219]  kasan_report+0xdc/0x128
[   20.853441]  kasan_check_range+0x100/0x1a8
[   20.853533]  __kasan_check_write+0x20/0x30
[   20.853652]  kasan_atomics_helper+0x1414/0x4858
[   20.853702]  kasan_atomics+0x198/0x2e0
[   20.853778]  kunit_try_run_case+0x170/0x3f0
[   20.854109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.854177]  kthread+0x328/0x630
[   20.854263]  ret_from_fork+0x10/0x20
[   20.854317] 
[   20.854366] Allocated by task 265:
[   20.854400]  kasan_save_stack+0x3c/0x68
[   20.854467]  kasan_save_track+0x20/0x40
[   20.854555]  kasan_save_alloc_info+0x40/0x58
[   20.854636]  __kasan_kmalloc+0xd4/0xd8
[   20.854702]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.854744]  kasan_atomics+0xb8/0x2e0
[   20.854781]  kunit_try_run_case+0x170/0x3f0
[   20.854834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.854877]  kthread+0x328/0x630
[   20.854926]  ret_from_fork+0x10/0x20
[   20.854965] 
[   20.854986] The buggy address belongs to the object at fff00000c6f13780
[   20.854986]  which belongs to the cache kmalloc-64 of size 64
[   20.855045] The buggy address is located 0 bytes to the right of
[   20.855045]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.855109] 
[   20.855130] The buggy address belongs to the physical page:
[   20.855162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.855216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.855264] page_type: f5(slab)
[   20.855302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.855355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.855398] page dumped because: kasan: bad access detected
[   20.855433] 
[   20.855453] Memory state around the buggy address:
[   20.855486]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.855531]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.855575] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.855616]                                      ^
[   20.855649]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855692]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855730] ==================================================================
[   20.752970] ==================================================================
[   20.753019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.753069] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.753119] 
[   20.753150] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.753231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.753259] Hardware name: linux,dummy-virt (DT)
[   20.753292] Call trace:
[   20.753340]  show_stack+0x20/0x38 (C)
[   20.753391]  dump_stack_lvl+0x8c/0xd0
[   20.753448]  print_report+0x118/0x608
[   20.753506]  kasan_report+0xdc/0x128
[   20.753553]  __asan_report_store8_noabort+0x20/0x30
[   20.753603]  kasan_atomics_helper+0x3e5c/0x4858
[   20.753661]  kasan_atomics+0x198/0x2e0
[   20.753709]  kunit_try_run_case+0x170/0x3f0
[   20.753757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.753824]  kthread+0x328/0x630
[   20.753867]  ret_from_fork+0x10/0x20
[   20.753916] 
[   20.753936] Allocated by task 265:
[   20.753963]  kasan_save_stack+0x3c/0x68
[   20.754006]  kasan_save_track+0x20/0x40
[   20.754044]  kasan_save_alloc_info+0x40/0x58
[   20.754451]  __kasan_kmalloc+0xd4/0xd8
[   20.754606]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.754660]  kasan_atomics+0xb8/0x2e0
[   20.754849]  kunit_try_run_case+0x170/0x3f0
[   20.754901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.755068]  kthread+0x328/0x630
[   20.755214]  ret_from_fork+0x10/0x20
[   20.755389] 
[   20.755487] The buggy address belongs to the object at fff00000c6f13780
[   20.755487]  which belongs to the cache kmalloc-64 of size 64
[   20.755547] The buggy address is located 0 bytes to the right of
[   20.755547]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.755728] 
[   20.755753] The buggy address belongs to the physical page:
[   20.755786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.755852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.755967] page_type: f5(slab)
[   20.756139] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.756216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.756350] page dumped because: kasan: bad access detected
[   20.756630] 
[   20.756712] Memory state around the buggy address:
[   20.756813]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.756917]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.756990] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.757031]                                      ^
[   20.757066]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.757109]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.757285] ==================================================================
[   20.779131] ==================================================================
[   20.779439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.780196] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.780300] 
[   20.780506] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.780893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.780986] Hardware name: linux,dummy-virt (DT)
[   20.781147] Call trace:
[   20.781254]  show_stack+0x20/0x38 (C)
[   20.781329]  dump_stack_lvl+0x8c/0xd0
[   20.781657]  print_report+0x118/0x608
[   20.781781]  kasan_report+0xdc/0x128
[   20.782182]  kasan_check_range+0x100/0x1a8
[   20.782363]  __kasan_check_write+0x20/0x30
[   20.782514]  kasan_atomics_helper+0xff0/0x4858
[   20.782658]  kasan_atomics+0x198/0x2e0
[   20.782862]  kunit_try_run_case+0x170/0x3f0
[   20.783076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.783429]  kthread+0x328/0x630
[   20.783593]  ret_from_fork+0x10/0x20
[   20.783850] 
[   20.783880] Allocated by task 265:
[   20.783916]  kasan_save_stack+0x3c/0x68
[   20.784275]  kasan_save_track+0x20/0x40
[   20.784362]  kasan_save_alloc_info+0x40/0x58
[   20.784670]  __kasan_kmalloc+0xd4/0xd8
[   20.784778]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.784891]  kasan_atomics+0xb8/0x2e0
[   20.785009]  kunit_try_run_case+0x170/0x3f0
[   20.785239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.785290]  kthread+0x328/0x630
[   20.785517]  ret_from_fork+0x10/0x20
[   20.785721] 
[   20.785774] The buggy address belongs to the object at fff00000c6f13780
[   20.785774]  which belongs to the cache kmalloc-64 of size 64
[   20.786015] The buggy address is located 0 bytes to the right of
[   20.786015]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.786096] 
[   20.786118] The buggy address belongs to the physical page:
[   20.786761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.786848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.787118] page_type: f5(slab)
[   20.787165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.787496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.787906] page dumped because: kasan: bad access detected
[   20.788011] 
[   20.788032] Memory state around the buggy address:
[   20.788069]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.788629]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.788895] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.788938]                                      ^
[   20.788974]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.789210]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.789517] ==================================================================
[   20.869186] ==================================================================
[   20.869236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.869287] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.869338] 
[   20.869370] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.869473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.869503] Hardware name: linux,dummy-virt (DT)
[   20.869539] Call trace:
[   20.869565]  show_stack+0x20/0x38 (C)
[   20.869613]  dump_stack_lvl+0x8c/0xd0
[   20.869666]  print_report+0x118/0x608
[   20.869713]  kasan_report+0xdc/0x128
[   20.869760]  kasan_check_range+0x100/0x1a8
[   20.869821]  __kasan_check_write+0x20/0x30
[   20.869875]  kasan_atomics_helper+0x154c/0x4858
[   20.869926]  kasan_atomics+0x198/0x2e0
[   20.869980]  kunit_try_run_case+0x170/0x3f0
[   20.870030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.870083]  kthread+0x328/0x630
[   20.870125]  ret_from_fork+0x10/0x20
[   20.870173] 
[   20.870202] Allocated by task 265:
[   20.870231]  kasan_save_stack+0x3c/0x68
[   20.870273]  kasan_save_track+0x20/0x40
[   20.870312]  kasan_save_alloc_info+0x40/0x58
[   20.870354]  __kasan_kmalloc+0xd4/0xd8
[   20.870392]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.870432]  kasan_atomics+0xb8/0x2e0
[   20.870478]  kunit_try_run_case+0x170/0x3f0
[   20.870518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.870561]  kthread+0x328/0x630
[   20.870611]  ret_from_fork+0x10/0x20
[   20.870650] 
[   20.870670] The buggy address belongs to the object at fff00000c6f13780
[   20.870670]  which belongs to the cache kmalloc-64 of size 64
[   20.870738] The buggy address is located 0 bytes to the right of
[   20.870738]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.870812] 
[   20.870832] The buggy address belongs to the physical page:
[   20.870866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.870924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.870971] page_type: f5(slab)
[   20.871008] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.871060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.871102] page dumped because: kasan: bad access detected
[   20.871136] 
[   20.871353] Memory state around the buggy address:
[   20.871724]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.871776]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.871857] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.871902]                                      ^
[   20.871965]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.872010]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.872172] ==================================================================
[   20.802059] ==================================================================
[   20.802488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.802611] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.802663] 
[   20.802697] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.803106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.803503] Hardware name: linux,dummy-virt (DT)
[   20.803593] Call trace:
[   20.803638]  show_stack+0x20/0x38 (C)
[   20.803691]  dump_stack_lvl+0x8c/0xd0
[   20.803778]  print_report+0x118/0x608
[   20.804136]  kasan_report+0xdc/0x128
[   20.804276]  kasan_check_range+0x100/0x1a8
[   20.804619]  __kasan_check_write+0x20/0x30
[   20.804788]  kasan_atomics_helper+0x10c0/0x4858
[   20.805036]  kasan_atomics+0x198/0x2e0
[   20.805085]  kunit_try_run_case+0x170/0x3f0
[   20.805429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.805512]  kthread+0x328/0x630
[   20.805859]  ret_from_fork+0x10/0x20
[   20.805930] 
[   20.805953] Allocated by task 265:
[   20.805982]  kasan_save_stack+0x3c/0x68
[   20.806063]  kasan_save_track+0x20/0x40
[   20.806104]  kasan_save_alloc_info+0x40/0x58
[   20.806145]  __kasan_kmalloc+0xd4/0xd8
[   20.806212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.806252]  kasan_atomics+0xb8/0x2e0
[   20.806293]  kunit_try_run_case+0x170/0x3f0
[   20.806342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.806388]  kthread+0x328/0x630
[   20.806430]  ret_from_fork+0x10/0x20
[   20.806469] 
[   20.806492] The buggy address belongs to the object at fff00000c6f13780
[   20.806492]  which belongs to the cache kmalloc-64 of size 64
[   20.806551] The buggy address is located 0 bytes to the right of
[   20.806551]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.806616] 
[   20.806646] The buggy address belongs to the physical page:
[   20.806681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.806745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.808844] page_type: f5(slab)
[   20.808909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.808962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.809005] page dumped because: kasan: bad access detected
[   20.809040] 
[   20.809060] Memory state around the buggy address:
[   20.809094]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.809140]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.809185] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.809226]                                      ^
[   20.809260]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.809303]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.809341] ==================================================================
[   20.765375] ==================================================================
[   20.765431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.765483] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.765534] 
[   20.765566] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.765647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.765773] Hardware name: linux,dummy-virt (DT)
[   20.765830] Call trace:
[   20.765855]  show_stack+0x20/0x38 (C)
[   20.765907]  dump_stack_lvl+0x8c/0xd0
[   20.765955]  print_report+0x118/0x608
[   20.766196]  kasan_report+0xdc/0x128
[   20.766370]  kasan_check_range+0x100/0x1a8
[   20.766433]  __kasan_check_write+0x20/0x30
[   20.766721]  kasan_atomics_helper+0xf20/0x4858
[   20.767062]  kasan_atomics+0x198/0x2e0
[   20.767383]  kunit_try_run_case+0x170/0x3f0
[   20.767594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.767720]  kthread+0x328/0x630
[   20.767948]  ret_from_fork+0x10/0x20
[   20.768024] 
[   20.768046] Allocated by task 265:
[   20.768270]  kasan_save_stack+0x3c/0x68
[   20.768441]  kasan_save_track+0x20/0x40
[   20.768961]  kasan_save_alloc_info+0x40/0x58
[   20.769378]  __kasan_kmalloc+0xd4/0xd8
[   20.769643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.769692]  kasan_atomics+0xb8/0x2e0
[   20.770048]  kunit_try_run_case+0x170/0x3f0
[   20.770547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.770743]  kthread+0x328/0x630
[   20.770787]  ret_from_fork+0x10/0x20
[   20.770850] 
[   20.770884] The buggy address belongs to the object at fff00000c6f13780
[   20.770884]  which belongs to the cache kmalloc-64 of size 64
[   20.771172] The buggy address is located 0 bytes to the right of
[   20.771172]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.771480] 
[   20.771661] The buggy address belongs to the physical page:
[   20.771821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.771884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.771942] page_type: f5(slab)
[   20.771984] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.772595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.772743] page dumped because: kasan: bad access detected
[   20.772823] 
[   20.772975] Memory state around the buggy address:
[   20.773214]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.773568]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.773751] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.773987]                                      ^
[   20.774086]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.774294]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.774479] ==================================================================
[   20.741630] ==================================================================
[   20.741685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.741765] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.741971] 
[   20.742006] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.742086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.742427] Hardware name: linux,dummy-virt (DT)
[   20.742495] Call trace:
[   20.742522]  show_stack+0x20/0x38 (C)
[   20.742585]  dump_stack_lvl+0x8c/0xd0
[   20.742638]  print_report+0x118/0x608
[   20.742687]  kasan_report+0xdc/0x128
[   20.742735]  __asan_report_load8_noabort+0x20/0x30
[   20.742782]  kasan_atomics_helper+0x3f58/0x4858
[   20.742847]  kasan_atomics+0x198/0x2e0
[   20.742894]  kunit_try_run_case+0x170/0x3f0
[   20.742980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.743033]  kthread+0x328/0x630
[   20.743156]  ret_from_fork+0x10/0x20
[   20.743435] 
[   20.743718] Allocated by task 265:
[   20.744036]  kasan_save_stack+0x3c/0x68
[   20.744176]  kasan_save_track+0x20/0x40
[   20.744249]  kasan_save_alloc_info+0x40/0x58
[   20.744290]  __kasan_kmalloc+0xd4/0xd8
[   20.744329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.744397]  kasan_atomics+0xb8/0x2e0
[   20.744435]  kunit_try_run_case+0x170/0x3f0
[   20.744507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.744553]  kthread+0x328/0x630
[   20.744671]  ret_from_fork+0x10/0x20
[   20.744853] 
[   20.744994] The buggy address belongs to the object at fff00000c6f13780
[   20.744994]  which belongs to the cache kmalloc-64 of size 64
[   20.745091] The buggy address is located 0 bytes to the right of
[   20.745091]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.745378] 
[   20.745414] The buggy address belongs to the physical page:
[   20.745531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.745598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.745648] page_type: f5(slab)
[   20.745686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.745749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.745797] page dumped because: kasan: bad access detected
[   20.745868] 
[   20.745899] Memory state around the buggy address:
[   20.745939]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.745992]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.746037] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.746076]                                      ^
[   20.746113]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.746157]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.746207] ==================================================================
[   20.818646] ==================================================================
[   20.818703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.818963] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.819076] 
[   20.819204] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.819393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.819748] Hardware name: linux,dummy-virt (DT)
[   20.819920] Call trace:
[   20.820021]  show_stack+0x20/0x38 (C)
[   20.820204]  dump_stack_lvl+0x8c/0xd0
[   20.820357]  print_report+0x118/0x608
[   20.820478]  kasan_report+0xdc/0x128
[   20.820547]  kasan_check_range+0x100/0x1a8
[   20.820596]  __kasan_check_write+0x20/0x30
[   20.820642]  kasan_atomics_helper+0x1190/0x4858
[   20.820692]  kasan_atomics+0x198/0x2e0
[   20.821061]  kunit_try_run_case+0x170/0x3f0
[   20.821211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.821393]  kthread+0x328/0x630
[   20.821485]  ret_from_fork+0x10/0x20
[   20.821877] 
[   20.821926] Allocated by task 265:
[   20.822072]  kasan_save_stack+0x3c/0x68
[   20.822157]  kasan_save_track+0x20/0x40
[   20.822197]  kasan_save_alloc_info+0x40/0x58
[   20.822546]  __kasan_kmalloc+0xd4/0xd8
[   20.822687]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.822778]  kasan_atomics+0xb8/0x2e0
[   20.822885]  kunit_try_run_case+0x170/0x3f0
[   20.822954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.823002]  kthread+0x328/0x630
[   20.823216]  ret_from_fork+0x10/0x20
[   20.823371] 
[   20.823470] The buggy address belongs to the object at fff00000c6f13780
[   20.823470]  which belongs to the cache kmalloc-64 of size 64
[   20.823641] The buggy address is located 0 bytes to the right of
[   20.823641]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.823769] 
[   20.823882] The buggy address belongs to the physical page:
[   20.823934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.823989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.824065] page_type: f5(slab)
[   20.824104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.824157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.824200] page dumped because: kasan: bad access detected
[   20.824235] 
[   20.824255] Memory state around the buggy address:
[   20.824290]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.824852]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.824936] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.824979]                                      ^
[   20.825016]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.825059]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.825109] ==================================================================
[   20.889458] ==================================================================
[   20.889646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.889695] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.889877] 
[   20.889920] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.890060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.890104] Hardware name: linux,dummy-virt (DT)
[   20.890138] Call trace:
[   20.890161]  show_stack+0x20/0x38 (C)
[   20.890225]  dump_stack_lvl+0x8c/0xd0
[   20.890273]  print_report+0x118/0x608
[   20.890322]  kasan_report+0xdc/0x128
[   20.890368]  __asan_report_load8_noabort+0x20/0x30
[   20.890417]  kasan_atomics_helper+0x3df4/0x4858
[   20.890467]  kasan_atomics+0x198/0x2e0
[   20.890521]  kunit_try_run_case+0x170/0x3f0
[   20.890584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.890648]  kthread+0x328/0x630
[   20.890691]  ret_from_fork+0x10/0x20
[   20.890741] 
[   20.890769] Allocated by task 265:
[   20.890797]  kasan_save_stack+0x3c/0x68
[   20.890853]  kasan_save_track+0x20/0x40
[   20.890893]  kasan_save_alloc_info+0x40/0x58
[   20.890936]  __kasan_kmalloc+0xd4/0xd8
[   20.890975]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.891015]  kasan_atomics+0xb8/0x2e0
[   20.891053]  kunit_try_run_case+0x170/0x3f0
[   20.891090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.891136]  kthread+0x328/0x630
[   20.891178]  ret_from_fork+0x10/0x20
[   20.891215] 
[   20.891236] The buggy address belongs to the object at fff00000c6f13780
[   20.891236]  which belongs to the cache kmalloc-64 of size 64
[   20.891304] The buggy address is located 0 bytes to the right of
[   20.891304]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.891370] 
[   20.891390] The buggy address belongs to the physical page:
[   20.891423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.891475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.891524] page_type: f5(slab)
[   20.891572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.891624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.891675] page dumped because: kasan: bad access detected
[   20.891710] 
[   20.891743] Memory state around the buggy address:
[   20.891777]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.891831]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.891875] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.891919]                                      ^
[   20.891953]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.891997]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.892036] ==================================================================
[   20.775337] ==================================================================
[   20.775393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.775445] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.775772] 
[   20.775873] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.775970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.775998] Hardware name: linux,dummy-virt (DT)
[   20.776031] Call trace:
[   20.776065]  show_stack+0x20/0x38 (C)
[   20.776120]  dump_stack_lvl+0x8c/0xd0
[   20.776169]  print_report+0x118/0x608
[   20.776218]  kasan_report+0xdc/0x128
[   20.776265]  kasan_check_range+0x100/0x1a8
[   20.776315]  __kasan_check_write+0x20/0x30
[   20.776361]  kasan_atomics_helper+0xf88/0x4858
[   20.776416]  kasan_atomics+0x198/0x2e0
[   20.776474]  kunit_try_run_case+0x170/0x3f0
[   20.776521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.776574]  kthread+0x328/0x630
[   20.776628]  ret_from_fork+0x10/0x20
[   20.776675] 
[   20.776696] Allocated by task 265:
[   20.776725]  kasan_save_stack+0x3c/0x68
[   20.776776]  kasan_save_track+0x20/0x40
[   20.776827]  kasan_save_alloc_info+0x40/0x58
[   20.776872]  __kasan_kmalloc+0xd4/0xd8
[   20.776910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.776952]  kasan_atomics+0xb8/0x2e0
[   20.776989]  kunit_try_run_case+0x170/0x3f0
[   20.777038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.777085]  kthread+0x328/0x630
[   20.777136]  ret_from_fork+0x10/0x20
[   20.777174] 
[   20.777195] The buggy address belongs to the object at fff00000c6f13780
[   20.777195]  which belongs to the cache kmalloc-64 of size 64
[   20.777254] The buggy address is located 0 bytes to the right of
[   20.777254]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.777318] 
[   20.777340] The buggy address belongs to the physical page:
[   20.777373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.777426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.777474] page_type: f5(slab)
[   20.777512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.777563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.777605] page dumped because: kasan: bad access detected
[   20.777638] 
[   20.777659] Memory state around the buggy address:
[   20.777692]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.777738]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.777780] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.778309]                                      ^
[   20.778353]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.778427]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.778471] ==================================================================
[   20.843277] ==================================================================
[   20.843325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.843399] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.843566] 
[   20.843632] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.843736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.843794] Hardware name: linux,dummy-virt (DT)
[   20.843843] Call trace:
[   20.843906]  show_stack+0x20/0x38 (C)
[   20.843990]  dump_stack_lvl+0x8c/0xd0
[   20.844040]  print_report+0x118/0x608
[   20.844088]  kasan_report+0xdc/0x128
[   20.844134]  kasan_check_range+0x100/0x1a8
[   20.844254]  __kasan_check_write+0x20/0x30
[   20.844309]  kasan_atomics_helper+0x1384/0x4858
[   20.844454]  kasan_atomics+0x198/0x2e0
[   20.844548]  kunit_try_run_case+0x170/0x3f0
[   20.844598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.844651]  kthread+0x328/0x630
[   20.844696]  ret_from_fork+0x10/0x20
[   20.844742] 
[   20.844763] Allocated by task 265:
[   20.844793]  kasan_save_stack+0x3c/0x68
[   20.844848]  kasan_save_track+0x20/0x40
[   20.844888]  kasan_save_alloc_info+0x40/0x58
[   20.844941]  __kasan_kmalloc+0xd4/0xd8
[   20.844979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.845020]  kasan_atomics+0xb8/0x2e0
[   20.845066]  kunit_try_run_case+0x170/0x3f0
[   20.845108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.845152]  kthread+0x328/0x630
[   20.845195]  ret_from_fork+0x10/0x20
[   20.845233] 
[   20.845259] The buggy address belongs to the object at fff00000c6f13780
[   20.845259]  which belongs to the cache kmalloc-64 of size 64
[   20.845319] The buggy address is located 0 bytes to the right of
[   20.845319]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.845384] 
[   20.845413] The buggy address belongs to the physical page:
[   20.845446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.845497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.845545] page_type: f5(slab)
[   20.845583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.845635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.845677] page dumped because: kasan: bad access detected
[   20.845711] 
[   20.845730] Memory state around the buggy address:
[   20.845763]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.846351]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.846412] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.846548]                                      ^
[   20.846587]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.846631]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.846895] ==================================================================
[   20.610967] ==================================================================
[   20.611058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   20.611196] Write of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.611266] 
[   20.611297] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.611378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.611463] Hardware name: linux,dummy-virt (DT)
[   20.611500] Call trace:
[   20.611524]  show_stack+0x20/0x38 (C)
[   20.611707]  dump_stack_lvl+0x8c/0xd0
[   20.611871]  print_report+0x118/0x608
[   20.611942]  kasan_report+0xdc/0x128
[   20.612018]  kasan_check_range+0x100/0x1a8
[   20.612113]  kasan_atomics_helper+0x894/0x4858
[   20.612171]  kasan_atomics+0x198/0x2e0
[   20.612218]  kunit_try_run_case+0x170/0x3f0
[   20.612326]  kthread+0x328/0x630
[   20.612370]  ret_from_fork+0x10/0x20
[   20.612419] 
[   20.612440] Allocated by task 265:
[   20.612480]  kasan_save_stack+0x3c/0x68
[   20.612531]  kasan_save_track+0x20/0x40
[   20.612581]  kasan_save_alloc_info+0x40/0x58
[   20.612719]  kasan_atomics+0xb8/0x2e0
[   20.612758]  kunit_try_run_case+0x170/0x3f0
[   20.612798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.613581] 
[   20.613654] The buggy address belongs to the object at fff00000c6f13780
[   20.613654]  which belongs to the cache kmalloc-64 of size 64
[   20.613923] 
[   20.614055] The buggy address belongs to the physical page:
[   20.614121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.614185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.614251] page_type: f5(slab)
[   20.614313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.614364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.614580] page dumped because: kasan: bad access detected
[   20.614699] 
[   20.614820] Memory state around the buggy address:
[   20.614858]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.615034]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.615325] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.615495]                                      ^
[   20.615542]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.615585]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.615770] ==================================================================
[   20.905233] ==================================================================
[   20.905285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.905336] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265
[   20.905385] 
[   20.905420] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.905502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.905529] Hardware name: linux,dummy-virt (DT)
[   20.905562] Call trace:
[   20.905586]  show_stack+0x20/0x38 (C)
[   20.905635]  dump_stack_lvl+0x8c/0xd0
[   20.905681]  print_report+0x118/0x608
[   20.905730]  kasan_report+0xdc/0x128
[   20.905776]  kasan_check_range+0x100/0x1a8
[   20.905926]  __kasan_check_write+0x20/0x30
[   20.906072]  kasan_atomics_helper+0x175c/0x4858
[   20.906134]  kasan_atomics+0x198/0x2e0
[   20.906231]  kunit_try_run_case+0x170/0x3f0
[   20.906285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.906339]  kthread+0x328/0x630
[   20.906383]  ret_from_fork+0x10/0x20
[   20.906430] 
[   20.906486] Allocated by task 265:
[   20.906537]  kasan_save_stack+0x3c/0x68
[   20.906587]  kasan_save_track+0x20/0x40
[   20.906726]  kasan_save_alloc_info+0x40/0x58
[   20.906769]  __kasan_kmalloc+0xd4/0xd8
[   20.906817]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.906860]  kasan_atomics+0xb8/0x2e0
[   20.906896]  kunit_try_run_case+0x170/0x3f0
[   20.907661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.907727]  kthread+0x328/0x630
[   20.907770]  ret_from_fork+0x10/0x20
[   20.908763] 
[   20.908866] The buggy address belongs to the object at fff00000c6f13780
[   20.908866]  which belongs to the cache kmalloc-64 of size 64
[   20.909385] The buggy address is located 0 bytes to the right of
[   20.909385]  allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0)
[   20.909896] 
[   20.910308] The buggy address belongs to the physical page:
[   20.910470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13
[   20.910628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.910706] page_type: f5(slab)
[   20.911756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.911940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.912373] page dumped because: kasan: bad access detected
[   20.912427] 
[   20.912700] Memory state around the buggy address:
[   20.912833]  fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.912881]  fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.913533] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.913581]                                      ^
[   20.913618]  fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.915064]  fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.915315] ==================================================================

[   15.377868] ==================================================================
[   15.378134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.378496] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.379035] 
[   15.379130] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.379178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.379192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.379228] Call Trace:
[   15.379250]  <TASK>
[   15.379271]  dump_stack_lvl+0x73/0xb0
[   15.379302]  print_report+0xd1/0x650
[   15.379326]  ? __virt_addr_valid+0x1db/0x2d0
[   15.379350]  ? kasan_atomics_helper+0x1467/0x5450
[   15.379371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.379394]  ? kasan_atomics_helper+0x1467/0x5450
[   15.379416]  kasan_report+0x141/0x180
[   15.379438]  ? kasan_atomics_helper+0x1467/0x5450
[   15.379464]  kasan_check_range+0x10c/0x1c0
[   15.379489]  __kasan_check_write+0x18/0x20
[   15.379508]  kasan_atomics_helper+0x1467/0x5450
[   15.379531]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.379554]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.379578]  ? ret_from_fork_asm+0x1a/0x30
[   15.379602]  ? kasan_atomics+0x152/0x310
[   15.379629]  kasan_atomics+0x1dc/0x310
[   15.379652]  ? __pfx_kasan_atomics+0x10/0x10
[   15.379676]  ? __pfx_read_tsc+0x10/0x10
[   15.379699]  ? ktime_get_ts64+0x86/0x230
[   15.379723]  kunit_try_run_case+0x1a5/0x480
[   15.379749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.379771]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.379795]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.379818]  ? __kthread_parkme+0x82/0x180
[   15.379839]  ? preempt_count_sub+0x50/0x80
[   15.379863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.379886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.379908]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.379932]  kthread+0x337/0x6f0
[   15.379952]  ? trace_preempt_on+0x20/0xc0
[   15.379976]  ? __pfx_kthread+0x10/0x10
[   15.380009]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.380032]  ? calculate_sigpending+0x7b/0xa0
[   15.380057]  ? __pfx_kthread+0x10/0x10
[   15.380078]  ret_from_fork+0x116/0x1d0
[   15.380097]  ? __pfx_kthread+0x10/0x10
[   15.380118]  ret_from_fork_asm+0x1a/0x30
[   15.380148]  </TASK>
[   15.380160] 
[   15.387812] Allocated by task 282:
[   15.388003]  kasan_save_stack+0x45/0x70
[   15.388196]  kasan_save_track+0x18/0x40
[   15.388404]  kasan_save_alloc_info+0x3b/0x50
[   15.388601]  __kasan_kmalloc+0xb7/0xc0
[   15.388745]  __kmalloc_cache_noprof+0x189/0x420
[   15.388912]  kasan_atomics+0x95/0x310
[   15.389045]  kunit_try_run_case+0x1a5/0x480
[   15.389193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.389698]  kthread+0x337/0x6f0
[   15.389879]  ret_from_fork+0x116/0x1d0
[   15.390037]  ret_from_fork_asm+0x1a/0x30
[   15.390181] 
[   15.390274] The buggy address belongs to the object at ffff888103991d00
[   15.390274]  which belongs to the cache kmalloc-64 of size 64
[   15.390817] The buggy address is located 0 bytes to the right of
[   15.390817]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.391197] 
[   15.391281] The buggy address belongs to the physical page:
[   15.391457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.391702] flags: 0x200000000000000(node=0|zone=2)
[   15.391920] page_type: f5(slab)
[   15.392089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.392435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.392978] page dumped because: kasan: bad access detected
[   15.393375] 
[   15.393571] Memory state around the buggy address:
[   15.393799]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.394024]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.394255] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.394586]                                      ^
[   15.394814]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.395121]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.395568] ==================================================================
[   15.396120] ==================================================================
[   15.396495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.397033] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.397381] 
[   15.397521] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.397575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.397589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.397613] Call Trace:
[   15.397639]  <TASK>
[   15.397661]  dump_stack_lvl+0x73/0xb0
[   15.397692]  print_report+0xd1/0x650
[   15.397718]  ? __virt_addr_valid+0x1db/0x2d0
[   15.397742]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.397764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.397786]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.397809]  kasan_report+0x141/0x180
[   15.397831]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.397857]  __asan_report_store8_noabort+0x1b/0x30
[   15.397878]  kasan_atomics_helper+0x50d4/0x5450
[   15.397901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.397922]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.397948]  ? ret_from_fork_asm+0x1a/0x30
[   15.397971]  ? kasan_atomics+0x152/0x310
[   15.397997]  kasan_atomics+0x1dc/0x310
[   15.398021]  ? __pfx_kasan_atomics+0x10/0x10
[   15.398045]  ? __pfx_read_tsc+0x10/0x10
[   15.398066]  ? ktime_get_ts64+0x86/0x230
[   15.398091]  kunit_try_run_case+0x1a5/0x480
[   15.398116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.398139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.398162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.398185]  ? __kthread_parkme+0x82/0x180
[   15.398207]  ? preempt_count_sub+0x50/0x80
[   15.398243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.398279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.398303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.398326]  kthread+0x337/0x6f0
[   15.398346]  ? trace_preempt_on+0x20/0xc0
[   15.398370]  ? __pfx_kthread+0x10/0x10
[   15.398390]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.398411]  ? calculate_sigpending+0x7b/0xa0
[   15.398436]  ? __pfx_kthread+0x10/0x10
[   15.398458]  ret_from_fork+0x116/0x1d0
[   15.398476]  ? __pfx_kthread+0x10/0x10
[   15.398497]  ret_from_fork_asm+0x1a/0x30
[   15.398527]  </TASK>
[   15.398540] 
[   15.406132] Allocated by task 282:
[   15.406398]  kasan_save_stack+0x45/0x70
[   15.406556]  kasan_save_track+0x18/0x40
[   15.406691]  kasan_save_alloc_info+0x3b/0x50
[   15.406839]  __kasan_kmalloc+0xb7/0xc0
[   15.407017]  __kmalloc_cache_noprof+0x189/0x420
[   15.407250]  kasan_atomics+0x95/0x310
[   15.407441]  kunit_try_run_case+0x1a5/0x480
[   15.407663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.407913]  kthread+0x337/0x6f0
[   15.408086]  ret_from_fork+0x116/0x1d0
[   15.408270]  ret_from_fork_asm+0x1a/0x30
[   15.408441] 
[   15.408522] The buggy address belongs to the object at ffff888103991d00
[   15.408522]  which belongs to the cache kmalloc-64 of size 64
[   15.408991] The buggy address is located 0 bytes to the right of
[   15.408991]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.409514] 
[   15.409616] The buggy address belongs to the physical page:
[   15.409863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.410170] flags: 0x200000000000000(node=0|zone=2)
[   15.410396] page_type: f5(slab)
[   15.410558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.410875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.411162] page dumped because: kasan: bad access detected
[   15.411485] 
[   15.411558] Memory state around the buggy address:
[   15.411765]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.412026]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.412255] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.412590]                                      ^
[   15.412820]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.413079]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.413474] ==================================================================
[   15.937711] ==================================================================
[   15.937963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.938212] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.938768] 
[   15.938885] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.938932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.938944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.938968] Call Trace:
[   15.938988]  <TASK>
[   15.939009]  dump_stack_lvl+0x73/0xb0
[   15.939039]  print_report+0xd1/0x650
[   15.939067]  ? __virt_addr_valid+0x1db/0x2d0
[   15.939091]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.939113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.939135]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.939157]  kasan_report+0x141/0x180
[   15.939180]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.939247]  __asan_report_load8_noabort+0x18/0x20
[   15.939286]  kasan_atomics_helper+0x4fa5/0x5450
[   15.939322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.939346]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.939370]  ? ret_from_fork_asm+0x1a/0x30
[   15.939394]  ? kasan_atomics+0x152/0x310
[   15.939421]  kasan_atomics+0x1dc/0x310
[   15.939444]  ? __pfx_kasan_atomics+0x10/0x10
[   15.939469]  ? __pfx_read_tsc+0x10/0x10
[   15.939490]  ? ktime_get_ts64+0x86/0x230
[   15.939515]  kunit_try_run_case+0x1a5/0x480
[   15.939540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.939563]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.939589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.939612]  ? __kthread_parkme+0x82/0x180
[   15.939634]  ? preempt_count_sub+0x50/0x80
[   15.939658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.939691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.939715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.939748]  kthread+0x337/0x6f0
[   15.939768]  ? trace_preempt_on+0x20/0xc0
[   15.939793]  ? __pfx_kthread+0x10/0x10
[   15.939813]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.939834]  ? calculate_sigpending+0x7b/0xa0
[   15.939859]  ? __pfx_kthread+0x10/0x10
[   15.939881]  ret_from_fork+0x116/0x1d0
[   15.939900]  ? __pfx_kthread+0x10/0x10
[   15.939921]  ret_from_fork_asm+0x1a/0x30
[   15.939952]  </TASK>
[   15.939964] 
[   15.948231] Allocated by task 282:
[   15.948464]  kasan_save_stack+0x45/0x70
[   15.948684]  kasan_save_track+0x18/0x40
[   15.948912]  kasan_save_alloc_info+0x3b/0x50
[   15.949122]  __kasan_kmalloc+0xb7/0xc0
[   15.949370]  __kmalloc_cache_noprof+0x189/0x420
[   15.949576]  kasan_atomics+0x95/0x310
[   15.949808]  kunit_try_run_case+0x1a5/0x480
[   15.949985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.950266]  kthread+0x337/0x6f0
[   15.950488]  ret_from_fork+0x116/0x1d0
[   15.950653]  ret_from_fork_asm+0x1a/0x30
[   15.950821] 
[   15.950906] The buggy address belongs to the object at ffff888103991d00
[   15.950906]  which belongs to the cache kmalloc-64 of size 64
[   15.951426] The buggy address is located 0 bytes to the right of
[   15.951426]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.951985] 
[   15.952084] The buggy address belongs to the physical page:
[   15.952799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.953058] flags: 0x200000000000000(node=0|zone=2)
[   15.953237] page_type: f5(slab)
[   15.953361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.953586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.955970] page dumped because: kasan: bad access detected
[   15.956289] 
[   15.956445] Memory state around the buggy address:
[   15.956681]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.957017]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.957370] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.957589]                                      ^
[   15.957749]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.958076]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.958356] ==================================================================
[   15.148454] ==================================================================
[   15.148751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.149079] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.149599] 
[   15.149733] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.149784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.149797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.149822] Call Trace:
[   15.149844]  <TASK>
[   15.149865]  dump_stack_lvl+0x73/0xb0
[   15.149902]  print_report+0xd1/0x650
[   15.149926]  ? __virt_addr_valid+0x1db/0x2d0
[   15.149949]  ? kasan_atomics_helper+0x1079/0x5450
[   15.149972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.149995]  ? kasan_atomics_helper+0x1079/0x5450
[   15.150017]  kasan_report+0x141/0x180
[   15.150040]  ? kasan_atomics_helper+0x1079/0x5450
[   15.150067]  kasan_check_range+0x10c/0x1c0
[   15.150092]  __kasan_check_write+0x18/0x20
[   15.150111]  kasan_atomics_helper+0x1079/0x5450
[   15.150134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.150157]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.150182]  ? ret_from_fork_asm+0x1a/0x30
[   15.150205]  ? kasan_atomics+0x152/0x310
[   15.150244]  kasan_atomics+0x1dc/0x310
[   15.150288]  ? __pfx_kasan_atomics+0x10/0x10
[   15.150314]  ? __pfx_read_tsc+0x10/0x10
[   15.150336]  ? ktime_get_ts64+0x86/0x230
[   15.150362]  kunit_try_run_case+0x1a5/0x480
[   15.150387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.150411]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.150435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.150458]  ? __kthread_parkme+0x82/0x180
[   15.150481]  ? preempt_count_sub+0x50/0x80
[   15.150505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.150529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.150552]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.150575]  kthread+0x337/0x6f0
[   15.150596]  ? trace_preempt_on+0x20/0xc0
[   15.150620]  ? __pfx_kthread+0x10/0x10
[   15.150641]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.150663]  ? calculate_sigpending+0x7b/0xa0
[   15.150688]  ? __pfx_kthread+0x10/0x10
[   15.150710]  ret_from_fork+0x116/0x1d0
[   15.150729]  ? __pfx_kthread+0x10/0x10
[   15.150751]  ret_from_fork_asm+0x1a/0x30
[   15.150781]  </TASK>
[   15.150794] 
[   15.160534] Allocated by task 282:
[   15.160748]  kasan_save_stack+0x45/0x70
[   15.160969]  kasan_save_track+0x18/0x40
[   15.161154]  kasan_save_alloc_info+0x3b/0x50
[   15.161763]  __kasan_kmalloc+0xb7/0xc0
[   15.162016]  __kmalloc_cache_noprof+0x189/0x420
[   15.162449]  kasan_atomics+0x95/0x310
[   15.162760]  kunit_try_run_case+0x1a5/0x480
[   15.163158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.163612]  kthread+0x337/0x6f0
[   15.163795]  ret_from_fork+0x116/0x1d0
[   15.163970]  ret_from_fork_asm+0x1a/0x30
[   15.164151] 
[   15.164253] The buggy address belongs to the object at ffff888103991d00
[   15.164253]  which belongs to the cache kmalloc-64 of size 64
[   15.164743] The buggy address is located 0 bytes to the right of
[   15.164743]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.167288] 
[   15.167480] The buggy address belongs to the physical page:
[   15.167990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.168552] flags: 0x200000000000000(node=0|zone=2)
[   15.169644] page_type: f5(slab)
[   15.169793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.170034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.170289] page dumped because: kasan: bad access detected
[   15.170467] 
[   15.170540] Memory state around the buggy address:
[   15.170705]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.170923]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.171141] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.171924]                                      ^
[   15.173043]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.173700]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.174591] ==================================================================
[   14.493375] ==================================================================
[   14.493713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.494091] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.494505] 
[   14.494621] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.494671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.494706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.494729] Call Trace:
[   14.494744]  <TASK>
[   14.494763]  dump_stack_lvl+0x73/0xb0
[   14.494793]  print_report+0xd1/0x650
[   14.494817]  ? __virt_addr_valid+0x1db/0x2d0
[   14.494839]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.494861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.494883]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.494905]  kasan_report+0x141/0x180
[   14.494927]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.494951]  __asan_report_store4_noabort+0x1b/0x30
[   14.494971]  kasan_atomics_helper+0x4ba2/0x5450
[   14.494992]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.495014]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.495037]  ? ret_from_fork_asm+0x1a/0x30
[   14.495057]  ? kasan_atomics+0x152/0x310
[   14.495239]  kasan_atomics+0x1dc/0x310
[   14.495270]  ? __pfx_kasan_atomics+0x10/0x10
[   14.495390]  ? __pfx_read_tsc+0x10/0x10
[   14.495419]  ? ktime_get_ts64+0x86/0x230
[   14.495445]  kunit_try_run_case+0x1a5/0x480
[   14.495471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.495492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.495516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.495538]  ? __kthread_parkme+0x82/0x180
[   14.495558]  ? preempt_count_sub+0x50/0x80
[   14.495582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.495606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.495627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.495650]  kthread+0x337/0x6f0
[   14.495668]  ? trace_preempt_on+0x20/0xc0
[   14.495691]  ? __pfx_kthread+0x10/0x10
[   14.495711]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.495731]  ? calculate_sigpending+0x7b/0xa0
[   14.495756]  ? __pfx_kthread+0x10/0x10
[   14.495776]  ret_from_fork+0x116/0x1d0
[   14.495794]  ? __pfx_kthread+0x10/0x10
[   14.495814]  ret_from_fork_asm+0x1a/0x30
[   14.495842]  </TASK>
[   14.495854] 
[   14.508048] Allocated by task 282:
[   14.508447]  kasan_save_stack+0x45/0x70
[   14.508911]  kasan_save_track+0x18/0x40
[   14.509117]  kasan_save_alloc_info+0x3b/0x50
[   14.509538]  __kasan_kmalloc+0xb7/0xc0
[   14.509989]  __kmalloc_cache_noprof+0x189/0x420
[   14.510514]  kasan_atomics+0x95/0x310
[   14.510683]  kunit_try_run_case+0x1a5/0x480
[   14.510895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.511129]  kthread+0x337/0x6f0
[   14.511634]  ret_from_fork+0x116/0x1d0
[   14.511915]  ret_from_fork_asm+0x1a/0x30
[   14.512363] 
[   14.512615] The buggy address belongs to the object at ffff888103991d00
[   14.512615]  which belongs to the cache kmalloc-64 of size 64
[   14.513397] The buggy address is located 0 bytes to the right of
[   14.513397]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.514413] 
[   14.514526] The buggy address belongs to the physical page:
[   14.514763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.515083] flags: 0x200000000000000(node=0|zone=2)
[   14.515742] page_type: f5(slab)
[   14.516041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.516574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.517119] page dumped because: kasan: bad access detected
[   14.517670] 
[   14.517916] Memory state around the buggy address:
[   14.518152]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.518879]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.519183] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.519684]                                      ^
[   14.519908]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.520439]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.520703] ==================================================================
[   15.548333] ==================================================================
[   15.548962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.549595] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.550160] 
[   15.550452] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.550512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.550527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.550594] Call Trace:
[   15.550619]  <TASK>
[   15.550642]  dump_stack_lvl+0x73/0xb0
[   15.550679]  print_report+0xd1/0x650
[   15.550704]  ? __virt_addr_valid+0x1db/0x2d0
[   15.550728]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.550750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.550774]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.550796]  kasan_report+0x141/0x180
[   15.550817]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.550843]  kasan_check_range+0x10c/0x1c0
[   15.550867]  __kasan_check_write+0x18/0x20
[   15.550887]  kasan_atomics_helper+0x18b1/0x5450
[   15.550910]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.550933]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.550958]  ? ret_from_fork_asm+0x1a/0x30
[   15.550981]  ? kasan_atomics+0x152/0x310
[   15.551008]  kasan_atomics+0x1dc/0x310
[   15.551031]  ? __pfx_kasan_atomics+0x10/0x10
[   15.551056]  ? __pfx_read_tsc+0x10/0x10
[   15.551078]  ? ktime_get_ts64+0x86/0x230
[   15.551102]  kunit_try_run_case+0x1a5/0x480
[   15.551128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.551150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.551174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.551197]  ? __kthread_parkme+0x82/0x180
[   15.551229]  ? preempt_count_sub+0x50/0x80
[   15.551253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.551277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.551301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.551324]  kthread+0x337/0x6f0
[   15.551344]  ? trace_preempt_on+0x20/0xc0
[   15.551369]  ? __pfx_kthread+0x10/0x10
[   15.551390]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.551411]  ? calculate_sigpending+0x7b/0xa0
[   15.551437]  ? __pfx_kthread+0x10/0x10
[   15.551459]  ret_from_fork+0x116/0x1d0
[   15.551478]  ? __pfx_kthread+0x10/0x10
[   15.551499]  ret_from_fork_asm+0x1a/0x30
[   15.551529]  </TASK>
[   15.551542] 
[   15.559194] Allocated by task 282:
[   15.559462]  kasan_save_stack+0x45/0x70
[   15.559701]  kasan_save_track+0x18/0x40
[   15.559873]  kasan_save_alloc_info+0x3b/0x50
[   15.560067]  __kasan_kmalloc+0xb7/0xc0
[   15.560320]  __kmalloc_cache_noprof+0x189/0x420
[   15.560523]  kasan_atomics+0x95/0x310
[   15.560659]  kunit_try_run_case+0x1a5/0x480
[   15.560878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.561163]  kthread+0x337/0x6f0
[   15.561382]  ret_from_fork+0x116/0x1d0
[   15.561553]  ret_from_fork_asm+0x1a/0x30
[   15.561757] 
[   15.561858] The buggy address belongs to the object at ffff888103991d00
[   15.561858]  which belongs to the cache kmalloc-64 of size 64
[   15.562448] The buggy address is located 0 bytes to the right of
[   15.562448]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.562823] 
[   15.562900] The buggy address belongs to the physical page:
[   15.563097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.563526] flags: 0x200000000000000(node=0|zone=2)
[   15.564003] page_type: f5(slab)
[   15.564175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.564511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.564804] page dumped because: kasan: bad access detected
[   15.564978] 
[   15.565050] Memory state around the buggy address:
[   15.565211]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.565537]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.565889] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.566213]                                      ^
[   15.566502]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.566855]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.567144] ==================================================================
[   15.764901] ==================================================================
[   15.765356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.765659] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.765889] 
[   15.765979] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.766027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.766041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.766065] Call Trace:
[   15.766086]  <TASK>
[   15.766107]  dump_stack_lvl+0x73/0xb0
[   15.766137]  print_report+0xd1/0x650
[   15.766160]  ? __virt_addr_valid+0x1db/0x2d0
[   15.766184]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.766206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.766241]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.766271]  kasan_report+0x141/0x180
[   15.766293]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.766319]  kasan_check_range+0x10c/0x1c0
[   15.766342]  __kasan_check_write+0x18/0x20
[   15.766361]  kasan_atomics_helper+0x1eaa/0x5450
[   15.766384]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.766406]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.766430]  ? ret_from_fork_asm+0x1a/0x30
[   15.766453]  ? kasan_atomics+0x152/0x310
[   15.766480]  kasan_atomics+0x1dc/0x310
[   15.766503]  ? __pfx_kasan_atomics+0x10/0x10
[   15.766527]  ? __pfx_read_tsc+0x10/0x10
[   15.766549]  ? ktime_get_ts64+0x86/0x230
[   15.766574]  kunit_try_run_case+0x1a5/0x480
[   15.766599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.766621]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.766645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.766668]  ? __kthread_parkme+0x82/0x180
[   15.766689]  ? preempt_count_sub+0x50/0x80
[   15.766713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.766737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.766760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.766783]  kthread+0x337/0x6f0
[   15.766803]  ? trace_preempt_on+0x20/0xc0
[   15.766827]  ? __pfx_kthread+0x10/0x10
[   15.766848]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.766869]  ? calculate_sigpending+0x7b/0xa0
[   15.766894]  ? __pfx_kthread+0x10/0x10
[   15.766916]  ret_from_fork+0x116/0x1d0
[   15.766935]  ? __pfx_kthread+0x10/0x10
[   15.766956]  ret_from_fork_asm+0x1a/0x30
[   15.766988]  </TASK>
[   15.767000] 
[   15.775002] Allocated by task 282:
[   15.775193]  kasan_save_stack+0x45/0x70
[   15.775483]  kasan_save_track+0x18/0x40
[   15.775653]  kasan_save_alloc_info+0x3b/0x50
[   15.775856]  __kasan_kmalloc+0xb7/0xc0
[   15.775988]  __kmalloc_cache_noprof+0x189/0x420
[   15.776146]  kasan_atomics+0x95/0x310
[   15.777133]  kunit_try_run_case+0x1a5/0x480
[   15.777820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.778527]  kthread+0x337/0x6f0
[   15.778976]  ret_from_fork+0x116/0x1d0
[   15.779428]  ret_from_fork_asm+0x1a/0x30
[   15.779582] 
[   15.779659] The buggy address belongs to the object at ffff888103991d00
[   15.779659]  which belongs to the cache kmalloc-64 of size 64
[   15.780016] The buggy address is located 0 bytes to the right of
[   15.780016]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.780445] 
[   15.780550] The buggy address belongs to the physical page:
[   15.780776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.781112] flags: 0x200000000000000(node=0|zone=2)
[   15.781292] page_type: f5(slab)
[   15.781463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.781819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.782098] page dumped because: kasan: bad access detected
[   15.782381] 
[   15.782479] Memory state around the buggy address:
[   15.782713]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.782993]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.783291] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.783565]                                      ^
[   15.783773]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.784049]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.784280] ==================================================================
[   15.980724] ==================================================================
[   15.981308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.981621] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.981919] 
[   15.982039] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.982088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.982101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.982126] Call Trace:
[   15.982149]  <TASK>
[   15.982171]  dump_stack_lvl+0x73/0xb0
[   15.982202]  print_report+0xd1/0x650
[   15.982238]  ? __virt_addr_valid+0x1db/0x2d0
[   15.982263]  ? kasan_atomics_helper+0x5115/0x5450
[   15.982284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.982307]  ? kasan_atomics_helper+0x5115/0x5450
[   15.982329]  kasan_report+0x141/0x180
[   15.982350]  ? kasan_atomics_helper+0x5115/0x5450
[   15.982377]  __asan_report_load8_noabort+0x18/0x20
[   15.982403]  kasan_atomics_helper+0x5115/0x5450
[   15.982426]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.982449]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.982475]  ? ret_from_fork_asm+0x1a/0x30
[   15.982497]  ? kasan_atomics+0x152/0x310
[   15.982524]  kasan_atomics+0x1dc/0x310
[   15.982547]  ? __pfx_kasan_atomics+0x10/0x10
[   15.982570]  ? __pfx_read_tsc+0x10/0x10
[   15.982592]  ? ktime_get_ts64+0x86/0x230
[   15.982616]  kunit_try_run_case+0x1a5/0x480
[   15.982642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.982688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.982711]  ? __kthread_parkme+0x82/0x180
[   15.982732]  ? preempt_count_sub+0x50/0x80
[   15.982770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.982820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.982843]  kthread+0x337/0x6f0
[   15.982864]  ? trace_preempt_on+0x20/0xc0
[   15.982887]  ? __pfx_kthread+0x10/0x10
[   15.982907]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.982929]  ? calculate_sigpending+0x7b/0xa0
[   15.982954]  ? __pfx_kthread+0x10/0x10
[   15.982979]  ret_from_fork+0x116/0x1d0
[   15.982999]  ? __pfx_kthread+0x10/0x10
[   15.983020]  ret_from_fork_asm+0x1a/0x30
[   15.983051]  </TASK>
[   15.983064] 
[   15.990773] Allocated by task 282:
[   15.990955]  kasan_save_stack+0x45/0x70
[   15.991168]  kasan_save_track+0x18/0x40
[   15.991316]  kasan_save_alloc_info+0x3b/0x50
[   15.991714]  __kasan_kmalloc+0xb7/0xc0
[   15.991883]  __kmalloc_cache_noprof+0x189/0x420
[   15.992063]  kasan_atomics+0x95/0x310
[   15.992199]  kunit_try_run_case+0x1a5/0x480
[   15.992614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.992858]  kthread+0x337/0x6f0
[   15.992983]  ret_from_fork+0x116/0x1d0
[   15.993118]  ret_from_fork_asm+0x1a/0x30
[   15.993272] 
[   15.993345] The buggy address belongs to the object at ffff888103991d00
[   15.993345]  which belongs to the cache kmalloc-64 of size 64
[   15.993701] The buggy address is located 0 bytes to the right of
[   15.993701]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.994173] 
[   15.994280] The buggy address belongs to the physical page:
[   15.994546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.994901] flags: 0x200000000000000(node=0|zone=2)
[   15.995138] page_type: f5(slab)
[   15.995361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.995702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.996033] page dumped because: kasan: bad access detected
[   15.996264] 
[   15.996359] Memory state around the buggy address:
[   15.996544]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.996763]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.996990] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.997393]                                      ^
[   15.997622]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997943]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.998237] ==================================================================
[   14.881234] ==================================================================
[   14.881549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.881905] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.882693] 
[   14.882821] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.883286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.883307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.883332] Call Trace:
[   14.883356]  <TASK>
[   14.883380]  dump_stack_lvl+0x73/0xb0
[   14.883422]  print_report+0xd1/0x650
[   14.883448]  ? __virt_addr_valid+0x1db/0x2d0
[   14.883473]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.883495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.883517]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.883540]  kasan_report+0x141/0x180
[   14.883562]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.883588]  kasan_check_range+0x10c/0x1c0
[   14.883613]  __kasan_check_write+0x18/0x20
[   14.883633]  kasan_atomics_helper+0xa2b/0x5450
[   14.883655]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.883678]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.883702]  ? ret_from_fork_asm+0x1a/0x30
[   14.883726]  ? kasan_atomics+0x152/0x310
[   14.883753]  kasan_atomics+0x1dc/0x310
[   14.883776]  ? __pfx_kasan_atomics+0x10/0x10
[   14.883799]  ? __pfx_read_tsc+0x10/0x10
[   14.883821]  ? ktime_get_ts64+0x86/0x230
[   14.883846]  kunit_try_run_case+0x1a5/0x480
[   14.883872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.883894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.883919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.883941]  ? __kthread_parkme+0x82/0x180
[   14.883963]  ? preempt_count_sub+0x50/0x80
[   14.883987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.884011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.884035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.884058]  kthread+0x337/0x6f0
[   14.884077]  ? trace_preempt_on+0x20/0xc0
[   14.884104]  ? __pfx_kthread+0x10/0x10
[   14.884125]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.884147]  ? calculate_sigpending+0x7b/0xa0
[   14.884171]  ? __pfx_kthread+0x10/0x10
[   14.884193]  ret_from_fork+0x116/0x1d0
[   14.884214]  ? __pfx_kthread+0x10/0x10
[   14.884246]  ret_from_fork_asm+0x1a/0x30
[   14.884277]  </TASK>
[   14.884290] 
[   14.895404] Allocated by task 282:
[   14.895642]  kasan_save_stack+0x45/0x70
[   14.896142]  kasan_save_track+0x18/0x40
[   14.896504]  kasan_save_alloc_info+0x3b/0x50
[   14.896704]  __kasan_kmalloc+0xb7/0xc0
[   14.896851]  __kmalloc_cache_noprof+0x189/0x420
[   14.897010]  kasan_atomics+0x95/0x310
[   14.897212]  kunit_try_run_case+0x1a5/0x480
[   14.897650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.898236]  kthread+0x337/0x6f0
[   14.898507]  ret_from_fork+0x116/0x1d0
[   14.898711]  ret_from_fork_asm+0x1a/0x30
[   14.898933] 
[   14.899266] The buggy address belongs to the object at ffff888103991d00
[   14.899266]  which belongs to the cache kmalloc-64 of size 64
[   14.899955] The buggy address is located 0 bytes to the right of
[   14.899955]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.900718] 
[   14.900813] The buggy address belongs to the physical page:
[   14.901053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.901493] flags: 0x200000000000000(node=0|zone=2)
[   14.901741] page_type: f5(slab)
[   14.901912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.902283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.902516] page dumped because: kasan: bad access detected
[   14.903770] 
[   14.903897] Memory state around the buggy address:
[   14.904114]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.904367]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.905640] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.905889]                                      ^
[   14.906054]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.906295]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.906510] ==================================================================
[   15.747024] ==================================================================
[   15.747297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.747800] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.748239] 
[   15.748370] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.748420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.748434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.748458] Call Trace:
[   15.748479]  <TASK>
[   15.748501]  dump_stack_lvl+0x73/0xb0
[   15.748531]  print_report+0xd1/0x650
[   15.748554]  ? __virt_addr_valid+0x1db/0x2d0
[   15.748577]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.748601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.748624]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.748646]  kasan_report+0x141/0x180
[   15.748668]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.748694]  kasan_check_range+0x10c/0x1c0
[   15.748718]  __kasan_check_write+0x18/0x20
[   15.748737]  kasan_atomics_helper+0x1e12/0x5450
[   15.748760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.748783]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.748817]  ? ret_from_fork_asm+0x1a/0x30
[   15.748839]  ? kasan_atomics+0x152/0x310
[   15.748866]  kasan_atomics+0x1dc/0x310
[   15.748889]  ? __pfx_kasan_atomics+0x10/0x10
[   15.748914]  ? __pfx_read_tsc+0x10/0x10
[   15.748936]  ? ktime_get_ts64+0x86/0x230
[   15.748961]  kunit_try_run_case+0x1a5/0x480
[   15.748987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749009]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.749033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.749057]  ? __kthread_parkme+0x82/0x180
[   15.749079]  ? preempt_count_sub+0x50/0x80
[   15.749103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.749150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.749173]  kthread+0x337/0x6f0
[   15.749193]  ? trace_preempt_on+0x20/0xc0
[   15.749228]  ? __pfx_kthread+0x10/0x10
[   15.749249]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.749271]  ? calculate_sigpending+0x7b/0xa0
[   15.749306]  ? __pfx_kthread+0x10/0x10
[   15.749328]  ret_from_fork+0x116/0x1d0
[   15.749346]  ? __pfx_kthread+0x10/0x10
[   15.749367]  ret_from_fork_asm+0x1a/0x30
[   15.749398]  </TASK>
[   15.749409] 
[   15.756723] Allocated by task 282:
[   15.756930]  kasan_save_stack+0x45/0x70
[   15.757140]  kasan_save_track+0x18/0x40
[   15.757342]  kasan_save_alloc_info+0x3b/0x50
[   15.757527]  __kasan_kmalloc+0xb7/0xc0
[   15.757661]  __kmalloc_cache_noprof+0x189/0x420
[   15.757816]  kasan_atomics+0x95/0x310
[   15.758023]  kunit_try_run_case+0x1a5/0x480
[   15.758246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.758525]  kthread+0x337/0x6f0
[   15.758704]  ret_from_fork+0x116/0x1d0
[   15.758847]  ret_from_fork_asm+0x1a/0x30
[   15.758988] 
[   15.759061] The buggy address belongs to the object at ffff888103991d00
[   15.759061]  which belongs to the cache kmalloc-64 of size 64
[   15.759598] The buggy address is located 0 bytes to the right of
[   15.759598]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.760147] 
[   15.760258] The buggy address belongs to the physical page:
[   15.760478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.760722] flags: 0x200000000000000(node=0|zone=2)
[   15.760896] page_type: f5(slab)
[   15.761074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.761593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.761941] page dumped because: kasan: bad access detected
[   15.762216] 
[   15.762358] Memory state around the buggy address:
[   15.762559]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.762809]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.763027] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.763331]                                      ^
[   15.763560]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.763992]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.764215] ==================================================================
[   15.464805] ==================================================================
[   15.465176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.466061] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.466440] 
[   15.466578] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.466630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.466644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.466669] Call Trace:
[   15.466691]  <TASK>
[   15.466713]  dump_stack_lvl+0x73/0xb0
[   15.466745]  print_report+0xd1/0x650
[   15.466769]  ? __virt_addr_valid+0x1db/0x2d0
[   15.466794]  ? kasan_atomics_helper+0x164f/0x5450
[   15.466816]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.466839]  ? kasan_atomics_helper+0x164f/0x5450
[   15.466861]  kasan_report+0x141/0x180
[   15.466884]  ? kasan_atomics_helper+0x164f/0x5450
[   15.466911]  kasan_check_range+0x10c/0x1c0
[   15.466934]  __kasan_check_write+0x18/0x20
[   15.466954]  kasan_atomics_helper+0x164f/0x5450
[   15.466977]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.466999]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.467024]  ? ret_from_fork_asm+0x1a/0x30
[   15.467047]  ? kasan_atomics+0x152/0x310
[   15.467073]  kasan_atomics+0x1dc/0x310
[   15.467096]  ? __pfx_kasan_atomics+0x10/0x10
[   15.467121]  ? __pfx_read_tsc+0x10/0x10
[   15.467143]  ? ktime_get_ts64+0x86/0x230
[   15.467169]  kunit_try_run_case+0x1a5/0x480
[   15.467194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.467227]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.467251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.467275]  ? __kthread_parkme+0x82/0x180
[   15.467297]  ? preempt_count_sub+0x50/0x80
[   15.467321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.467345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.467377]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.467401]  kthread+0x337/0x6f0
[   15.467421]  ? trace_preempt_on+0x20/0xc0
[   15.467444]  ? __pfx_kthread+0x10/0x10
[   15.467465]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.467486]  ? calculate_sigpending+0x7b/0xa0
[   15.467509]  ? __pfx_kthread+0x10/0x10
[   15.467532]  ret_from_fork+0x116/0x1d0
[   15.467550]  ? __pfx_kthread+0x10/0x10
[   15.467571]  ret_from_fork_asm+0x1a/0x30
[   15.467601]  </TASK>
[   15.467614] 
[   15.475042] Allocated by task 282:
[   15.475257]  kasan_save_stack+0x45/0x70
[   15.475468]  kasan_save_track+0x18/0x40
[   15.475659]  kasan_save_alloc_info+0x3b/0x50
[   15.475937]  __kasan_kmalloc+0xb7/0xc0
[   15.476087]  __kmalloc_cache_noprof+0x189/0x420
[   15.476254]  kasan_atomics+0x95/0x310
[   15.476446]  kunit_try_run_case+0x1a5/0x480
[   15.476661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.476909]  kthread+0x337/0x6f0
[   15.477044]  ret_from_fork+0x116/0x1d0
[   15.477177]  ret_from_fork_asm+0x1a/0x30
[   15.477511] 
[   15.477613] The buggy address belongs to the object at ffff888103991d00
[   15.477613]  which belongs to the cache kmalloc-64 of size 64
[   15.478055] The buggy address is located 0 bytes to the right of
[   15.478055]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.478441] 
[   15.478520] The buggy address belongs to the physical page:
[   15.478942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.479356] flags: 0x200000000000000(node=0|zone=2)
[   15.479593] page_type: f5(slab)
[   15.479764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.480104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.480494] page dumped because: kasan: bad access detected
[   15.480721] 
[   15.480820] Memory state around the buggy address:
[   15.480999]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.481229]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.481477] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.481813]                                      ^
[   15.482039]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.482388]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.482725] ==================================================================
[   15.502807] ==================================================================
[   15.503333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.503681] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.503993] 
[   15.504141] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.504193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.504207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.504240] Call Trace:
[   15.504288]  <TASK>
[   15.504311]  dump_stack_lvl+0x73/0xb0
[   15.504354]  print_report+0xd1/0x650
[   15.504379]  ? __virt_addr_valid+0x1db/0x2d0
[   15.504404]  ? kasan_atomics_helper+0x177f/0x5450
[   15.504426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.504459]  ? kasan_atomics_helper+0x177f/0x5450
[   15.504482]  kasan_report+0x141/0x180
[   15.504505]  ? kasan_atomics_helper+0x177f/0x5450
[   15.504542]  kasan_check_range+0x10c/0x1c0
[   15.504566]  __kasan_check_write+0x18/0x20
[   15.504585]  kasan_atomics_helper+0x177f/0x5450
[   15.504617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.504640]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.504666]  ? ret_from_fork_asm+0x1a/0x30
[   15.504700]  ? kasan_atomics+0x152/0x310
[   15.504729]  kasan_atomics+0x1dc/0x310
[   15.504751]  ? __pfx_kasan_atomics+0x10/0x10
[   15.504777]  ? __pfx_read_tsc+0x10/0x10
[   15.504807]  ? ktime_get_ts64+0x86/0x230
[   15.504833]  kunit_try_run_case+0x1a5/0x480
[   15.504859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.504883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.504908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.504931]  ? __kthread_parkme+0x82/0x180
[   15.504953]  ? preempt_count_sub+0x50/0x80
[   15.504977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.505001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.505025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.505049]  kthread+0x337/0x6f0
[   15.505070]  ? trace_preempt_on+0x20/0xc0
[   15.505094]  ? __pfx_kthread+0x10/0x10
[   15.505116]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.505137]  ? calculate_sigpending+0x7b/0xa0
[   15.505162]  ? __pfx_kthread+0x10/0x10
[   15.505184]  ret_from_fork+0x116/0x1d0
[   15.505203]  ? __pfx_kthread+0x10/0x10
[   15.505233]  ret_from_fork_asm+0x1a/0x30
[   15.505292]  </TASK>
[   15.505306] 
[   15.513088] Allocated by task 282:
[   15.513322]  kasan_save_stack+0x45/0x70
[   15.513532]  kasan_save_track+0x18/0x40
[   15.513731]  kasan_save_alloc_info+0x3b/0x50
[   15.513896]  __kasan_kmalloc+0xb7/0xc0
[   15.514030]  __kmalloc_cache_noprof+0x189/0x420
[   15.514186]  kasan_atomics+0x95/0x310
[   15.514424]  kunit_try_run_case+0x1a5/0x480
[   15.514637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.514903]  kthread+0x337/0x6f0
[   15.515097]  ret_from_fork+0x116/0x1d0
[   15.515359]  ret_from_fork_asm+0x1a/0x30
[   15.515596] 
[   15.515670] The buggy address belongs to the object at ffff888103991d00
[   15.515670]  which belongs to the cache kmalloc-64 of size 64
[   15.516146] The buggy address is located 0 bytes to the right of
[   15.516146]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.516518] 
[   15.516594] The buggy address belongs to the physical page:
[   15.516846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.517263] flags: 0x200000000000000(node=0|zone=2)
[   15.517501] page_type: f5(slab)
[   15.517670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.518005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.518349] page dumped because: kasan: bad access detected
[   15.518614] 
[   15.518689] Memory state around the buggy address:
[   15.518848]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.519070]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.519429] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.519791]                                      ^
[   15.520058]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.520385]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.520713] ==================================================================
[   15.880361] ==================================================================
[   15.880733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.881122] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.881621] 
[   15.881745] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.881794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.881807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.881831] Call Trace:
[   15.881854]  <TASK>
[   15.881875]  dump_stack_lvl+0x73/0xb0
[   15.881907]  print_report+0xd1/0x650
[   15.881931]  ? __virt_addr_valid+0x1db/0x2d0
[   15.881954]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.881976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.881999]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.882021]  kasan_report+0x141/0x180
[   15.882043]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.882069]  kasan_check_range+0x10c/0x1c0
[   15.882092]  __kasan_check_write+0x18/0x20
[   15.882112]  kasan_atomics_helper+0x20c8/0x5450
[   15.882146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.882169]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.882193]  ? ret_from_fork_asm+0x1a/0x30
[   15.882237]  ? kasan_atomics+0x152/0x310
[   15.882263]  kasan_atomics+0x1dc/0x310
[   15.882286]  ? __pfx_kasan_atomics+0x10/0x10
[   15.882310]  ? __pfx_read_tsc+0x10/0x10
[   15.882331]  ? ktime_get_ts64+0x86/0x230
[   15.882356]  kunit_try_run_case+0x1a5/0x480
[   15.882381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.882428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.882451]  ? __kthread_parkme+0x82/0x180
[   15.882472]  ? preempt_count_sub+0x50/0x80
[   15.882495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.882542]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.882566]  kthread+0x337/0x6f0
[   15.882585]  ? trace_preempt_on+0x20/0xc0
[   15.882610]  ? __pfx_kthread+0x10/0x10
[   15.882631]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.882653]  ? calculate_sigpending+0x7b/0xa0
[   15.882677]  ? __pfx_kthread+0x10/0x10
[   15.882699]  ret_from_fork+0x116/0x1d0
[   15.882718]  ? __pfx_kthread+0x10/0x10
[   15.882738]  ret_from_fork_asm+0x1a/0x30
[   15.882768]  </TASK>
[   15.882781] 
[   15.890867] Allocated by task 282:
[   15.891128]  kasan_save_stack+0x45/0x70
[   15.891403]  kasan_save_track+0x18/0x40
[   15.891589]  kasan_save_alloc_info+0x3b/0x50
[   15.891740]  __kasan_kmalloc+0xb7/0xc0
[   15.891875]  __kmalloc_cache_noprof+0x189/0x420
[   15.892090]  kasan_atomics+0x95/0x310
[   15.892294]  kunit_try_run_case+0x1a5/0x480
[   15.892501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.892762]  kthread+0x337/0x6f0
[   15.892937]  ret_from_fork+0x116/0x1d0
[   15.893076]  ret_from_fork_asm+0x1a/0x30
[   15.893229] 
[   15.893401] The buggy address belongs to the object at ffff888103991d00
[   15.893401]  which belongs to the cache kmalloc-64 of size 64
[   15.893932] The buggy address is located 0 bytes to the right of
[   15.893932]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.894553] 
[   15.894676] The buggy address belongs to the physical page:
[   15.894867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.895237] flags: 0x200000000000000(node=0|zone=2)
[   15.895500] page_type: f5(slab)
[   15.895669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.896003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.896240] page dumped because: kasan: bad access detected
[   15.896533] 
[   15.896628] Memory state around the buggy address:
[   15.896829]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.897050]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.897536] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.897884]                                      ^
[   15.898102]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.898443]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.898748] ==================================================================
[   15.327649] ==================================================================
[   15.328210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.328727] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.328955] 
[   15.329352] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.329447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.329462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.329497] Call Trace:
[   15.329521]  <TASK>
[   15.329544]  dump_stack_lvl+0x73/0xb0
[   15.329577]  print_report+0xd1/0x650
[   15.329602]  ? __virt_addr_valid+0x1db/0x2d0
[   15.329690]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.329713]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.329754]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.329775]  kasan_report+0x141/0x180
[   15.329797]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.329824]  kasan_check_range+0x10c/0x1c0
[   15.329848]  __kasan_check_read+0x15/0x20
[   15.329866]  kasan_atomics_helper+0x13b5/0x5450
[   15.329890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.329913]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.329938]  ? ret_from_fork_asm+0x1a/0x30
[   15.329961]  ? kasan_atomics+0x152/0x310
[   15.329988]  kasan_atomics+0x1dc/0x310
[   15.330010]  ? __pfx_kasan_atomics+0x10/0x10
[   15.330034]  ? __pfx_read_tsc+0x10/0x10
[   15.330056]  ? ktime_get_ts64+0x86/0x230
[   15.330082]  kunit_try_run_case+0x1a5/0x480
[   15.330108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.330130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.330154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.330177]  ? __kthread_parkme+0x82/0x180
[   15.330199]  ? preempt_count_sub+0x50/0x80
[   15.330233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.330278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.330301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.330325]  kthread+0x337/0x6f0
[   15.330345]  ? trace_preempt_on+0x20/0xc0
[   15.330369]  ? __pfx_kthread+0x10/0x10
[   15.330390]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.330411]  ? calculate_sigpending+0x7b/0xa0
[   15.330436]  ? __pfx_kthread+0x10/0x10
[   15.330458]  ret_from_fork+0x116/0x1d0
[   15.330476]  ? __pfx_kthread+0x10/0x10
[   15.330497]  ret_from_fork_asm+0x1a/0x30
[   15.330527]  </TASK>
[   15.330540] 
[   15.343391] Allocated by task 282:
[   15.343770]  kasan_save_stack+0x45/0x70
[   15.344162]  kasan_save_track+0x18/0x40
[   15.344557]  kasan_save_alloc_info+0x3b/0x50
[   15.344965]  __kasan_kmalloc+0xb7/0xc0
[   15.345351]  __kmalloc_cache_noprof+0x189/0x420
[   15.345768]  kasan_atomics+0x95/0x310
[   15.346120]  kunit_try_run_case+0x1a5/0x480
[   15.346535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.346933]  kthread+0x337/0x6f0
[   15.347059]  ret_from_fork+0x116/0x1d0
[   15.347192]  ret_from_fork_asm+0x1a/0x30
[   15.347579] 
[   15.347755] The buggy address belongs to the object at ffff888103991d00
[   15.347755]  which belongs to the cache kmalloc-64 of size 64
[   15.348845] The buggy address is located 0 bytes to the right of
[   15.348845]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.349600] 
[   15.349679] The buggy address belongs to the physical page:
[   15.350187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.350910] flags: 0x200000000000000(node=0|zone=2)
[   15.351322] page_type: f5(slab)
[   15.351451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.351685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.351919] page dumped because: kasan: bad access detected
[   15.352096] 
[   15.352168] Memory state around the buggy address:
[   15.352538]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.353157]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.353803] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.354446]                                      ^
[   15.354872]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.355503]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.356116] ==================================================================
[   15.440137] ==================================================================
[   15.440804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.441664] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.442367] 
[   15.442722] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.442784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.442800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.442826] Call Trace:
[   15.442848]  <TASK>
[   15.442872]  dump_stack_lvl+0x73/0xb0
[   15.442913]  print_report+0xd1/0x650
[   15.442938]  ? __virt_addr_valid+0x1db/0x2d0
[   15.442963]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.442985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.443008]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.443030]  kasan_report+0x141/0x180
[   15.443052]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.443078]  kasan_check_range+0x10c/0x1c0
[   15.443103]  __kasan_check_write+0x18/0x20
[   15.443124]  kasan_atomics_helper+0x15b6/0x5450
[   15.443149]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.443172]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.443198]  ? ret_from_fork_asm+0x1a/0x30
[   15.443236]  ? kasan_atomics+0x152/0x310
[   15.443265]  kasan_atomics+0x1dc/0x310
[   15.443302]  ? __pfx_kasan_atomics+0x10/0x10
[   15.443328]  ? __pfx_read_tsc+0x10/0x10
[   15.443350]  ? ktime_get_ts64+0x86/0x230
[   15.443375]  kunit_try_run_case+0x1a5/0x480
[   15.443401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.443424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.443449]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.443471]  ? __kthread_parkme+0x82/0x180
[   15.443492]  ? preempt_count_sub+0x50/0x80
[   15.443517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.443545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.443569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.443592]  kthread+0x337/0x6f0
[   15.443611]  ? trace_preempt_on+0x20/0xc0
[   15.443635]  ? __pfx_kthread+0x10/0x10
[   15.443656]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.443678]  ? calculate_sigpending+0x7b/0xa0
[   15.443701]  ? __pfx_kthread+0x10/0x10
[   15.443723]  ret_from_fork+0x116/0x1d0
[   15.443742]  ? __pfx_kthread+0x10/0x10
[   15.443763]  ret_from_fork_asm+0x1a/0x30
[   15.443793]  </TASK>
[   15.443807] 
[   15.454936] Allocated by task 282:
[   15.455245]  kasan_save_stack+0x45/0x70
[   15.455470]  kasan_save_track+0x18/0x40
[   15.455660]  kasan_save_alloc_info+0x3b/0x50
[   15.455852]  __kasan_kmalloc+0xb7/0xc0
[   15.456007]  __kmalloc_cache_noprof+0x189/0x420
[   15.456206]  kasan_atomics+0x95/0x310
[   15.456843]  kunit_try_run_case+0x1a5/0x480
[   15.457113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.457423]  kthread+0x337/0x6f0
[   15.457739]  ret_from_fork+0x116/0x1d0
[   15.457950]  ret_from_fork_asm+0x1a/0x30
[   15.458269] 
[   15.458475] The buggy address belongs to the object at ffff888103991d00
[   15.458475]  which belongs to the cache kmalloc-64 of size 64
[   15.459137] The buggy address is located 0 bytes to the right of
[   15.459137]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.459745] 
[   15.459830] The buggy address belongs to the physical page:
[   15.460089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.460506] flags: 0x200000000000000(node=0|zone=2)
[   15.460725] page_type: f5(slab)
[   15.460902] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.461191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.461430] page dumped because: kasan: bad access detected
[   15.461859] 
[   15.461978] Memory state around the buggy address:
[   15.462207]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.462598]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.462944] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.463246]                                      ^
[   15.463444]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.463654]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.463953] ==================================================================
[   14.606950] ==================================================================
[   14.607708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.608077] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.608436] 
[   14.608555] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.608604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.608617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.608641] Call Trace:
[   14.608664]  <TASK>
[   14.608685]  dump_stack_lvl+0x73/0xb0
[   14.608718]  print_report+0xd1/0x650
[   14.608741]  ? __virt_addr_valid+0x1db/0x2d0
[   14.608766]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.608796]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.608819]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.608841]  kasan_report+0x141/0x180
[   14.608865]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.608890]  kasan_check_range+0x10c/0x1c0
[   14.608915]  __kasan_check_write+0x18/0x20
[   14.608936]  kasan_atomics_helper+0x4a0/0x5450
[   14.608959]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.608981]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.609006]  ? ret_from_fork_asm+0x1a/0x30
[   14.609029]  ? kasan_atomics+0x152/0x310
[   14.609055]  kasan_atomics+0x1dc/0x310
[   14.609078]  ? __pfx_kasan_atomics+0x10/0x10
[   14.609103]  ? __pfx_read_tsc+0x10/0x10
[   14.609124]  ? ktime_get_ts64+0x86/0x230
[   14.609149]  kunit_try_run_case+0x1a5/0x480
[   14.609174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.609197]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.609232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.609257]  ? __kthread_parkme+0x82/0x180
[   14.609278]  ? preempt_count_sub+0x50/0x80
[   14.609302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.609326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.609348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.609371]  kthread+0x337/0x6f0
[   14.609392]  ? trace_preempt_on+0x20/0xc0
[   14.609418]  ? __pfx_kthread+0x10/0x10
[   14.609438]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.609460]  ? calculate_sigpending+0x7b/0xa0
[   14.609485]  ? __pfx_kthread+0x10/0x10
[   14.609506]  ret_from_fork+0x116/0x1d0
[   14.609525]  ? __pfx_kthread+0x10/0x10
[   14.609547]  ret_from_fork_asm+0x1a/0x30
[   14.609577]  </TASK>
[   14.609591] 
[   14.618427] Allocated by task 282:
[   14.618779]  kasan_save_stack+0x45/0x70
[   14.619037]  kasan_save_track+0x18/0x40
[   14.619177]  kasan_save_alloc_info+0x3b/0x50
[   14.619794]  __kasan_kmalloc+0xb7/0xc0
[   14.620003]  __kmalloc_cache_noprof+0x189/0x420
[   14.620289]  kasan_atomics+0x95/0x310
[   14.620472]  kunit_try_run_case+0x1a5/0x480
[   14.620624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.620808]  kthread+0x337/0x6f0
[   14.620965]  ret_from_fork+0x116/0x1d0
[   14.621158]  ret_from_fork_asm+0x1a/0x30
[   14.621376] 
[   14.621478] The buggy address belongs to the object at ffff888103991d00
[   14.621478]  which belongs to the cache kmalloc-64 of size 64
[   14.622165] The buggy address is located 0 bytes to the right of
[   14.622165]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.622542] 
[   14.622725] The buggy address belongs to the physical page:
[   14.623113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.623555] flags: 0x200000000000000(node=0|zone=2)
[   14.623723] page_type: f5(slab)
[   14.623847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.624078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.624714] page dumped because: kasan: bad access detected
[   14.624988] 
[   14.625087] Memory state around the buggy address:
[   14.625336]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.625663]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.626010] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.626243]                                      ^
[   14.626950]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.627590]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.627834] ==================================================================
[   14.977564] ==================================================================
[   14.977836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.978150] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.979125] 
[   14.979280] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.979332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.979346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.979370] Call Trace:
[   14.979385]  <TASK>
[   14.979406]  dump_stack_lvl+0x73/0xb0
[   14.979442]  print_report+0xd1/0x650
[   14.979467]  ? __virt_addr_valid+0x1db/0x2d0
[   14.979491]  ? kasan_atomics_helper+0xc70/0x5450
[   14.979513]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.979535]  ? kasan_atomics_helper+0xc70/0x5450
[   14.979556]  kasan_report+0x141/0x180
[   14.979579]  ? kasan_atomics_helper+0xc70/0x5450
[   14.979604]  kasan_check_range+0x10c/0x1c0
[   14.979628]  __kasan_check_write+0x18/0x20
[   14.979649]  kasan_atomics_helper+0xc70/0x5450
[   14.979672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.979693]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.979718]  ? ret_from_fork_asm+0x1a/0x30
[   14.979741]  ? kasan_atomics+0x152/0x310
[   14.979766]  kasan_atomics+0x1dc/0x310
[   14.979789]  ? __pfx_kasan_atomics+0x10/0x10
[   14.979814]  ? __pfx_read_tsc+0x10/0x10
[   14.979835]  ? ktime_get_ts64+0x86/0x230
[   14.979860]  kunit_try_run_case+0x1a5/0x480
[   14.979885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.979907]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.979931]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.979955]  ? __kthread_parkme+0x82/0x180
[   14.979976]  ? preempt_count_sub+0x50/0x80
[   14.980000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.980024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.980047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.980070]  kthread+0x337/0x6f0
[   14.980089]  ? trace_preempt_on+0x20/0xc0
[   14.980113]  ? __pfx_kthread+0x10/0x10
[   14.980134]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.980155]  ? calculate_sigpending+0x7b/0xa0
[   14.980179]  ? __pfx_kthread+0x10/0x10
[   14.980201]  ret_from_fork+0x116/0x1d0
[   14.980231]  ? __pfx_kthread+0x10/0x10
[   14.980253]  ret_from_fork_asm+0x1a/0x30
[   14.980300]  </TASK>
[   14.980313] 
[   14.987671] Allocated by task 282:
[   14.987872]  kasan_save_stack+0x45/0x70
[   14.988023]  kasan_save_track+0x18/0x40
[   14.988214]  kasan_save_alloc_info+0x3b/0x50
[   14.988621]  __kasan_kmalloc+0xb7/0xc0
[   14.988794]  __kmalloc_cache_noprof+0x189/0x420
[   14.989012]  kasan_atomics+0x95/0x310
[   14.989182]  kunit_try_run_case+0x1a5/0x480
[   14.989346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.989597]  kthread+0x337/0x6f0
[   14.989762]  ret_from_fork+0x116/0x1d0
[   14.989892]  ret_from_fork_asm+0x1a/0x30
[   14.990056] 
[   14.990153] The buggy address belongs to the object at ffff888103991d00
[   14.990153]  which belongs to the cache kmalloc-64 of size 64
[   14.990786] The buggy address is located 0 bytes to the right of
[   14.990786]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.991348] 
[   14.991423] The buggy address belongs to the physical page:
[   14.991650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.992007] flags: 0x200000000000000(node=0|zone=2)
[   14.992170] page_type: f5(slab)
[   14.992329] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.992666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.993005] page dumped because: kasan: bad access detected
[   14.993172] 
[   14.993253] Memory state around the buggy address:
[   14.993483]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.993801]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.994128] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.994416]                                      ^
[   14.994570]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.994786]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.994995] ==================================================================
[   15.289601] ==================================================================
[   15.289967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.290335] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.290588] 
[   15.290681] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.290729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.290742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.290768] Call Trace:
[   15.290791]  <TASK>
[   15.290813]  dump_stack_lvl+0x73/0xb0
[   15.290845]  print_report+0xd1/0x650
[   15.290884]  ? __virt_addr_valid+0x1db/0x2d0
[   15.290907]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.290929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.290953]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.290975]  kasan_report+0x141/0x180
[   15.290998]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.291024]  kasan_check_range+0x10c/0x1c0
[   15.291048]  __kasan_check_write+0x18/0x20
[   15.291068]  kasan_atomics_helper+0x12e6/0x5450
[   15.291091]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.291114]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.291138]  ? ret_from_fork_asm+0x1a/0x30
[   15.291161]  ? kasan_atomics+0x152/0x310
[   15.291188]  kasan_atomics+0x1dc/0x310
[   15.291211]  ? __pfx_kasan_atomics+0x10/0x10
[   15.291248]  ? __pfx_read_tsc+0x10/0x10
[   15.291270]  ? ktime_get_ts64+0x86/0x230
[   15.291294]  kunit_try_run_case+0x1a5/0x480
[   15.291320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.291343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.291368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.291391]  ? __kthread_parkme+0x82/0x180
[   15.291412]  ? preempt_count_sub+0x50/0x80
[   15.291438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.291462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.291498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.291522]  kthread+0x337/0x6f0
[   15.291543]  ? trace_preempt_on+0x20/0xc0
[   15.291567]  ? __pfx_kthread+0x10/0x10
[   15.291587]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.291609]  ? calculate_sigpending+0x7b/0xa0
[   15.291634]  ? __pfx_kthread+0x10/0x10
[   15.291656]  ret_from_fork+0x116/0x1d0
[   15.291675]  ? __pfx_kthread+0x10/0x10
[   15.291696]  ret_from_fork_asm+0x1a/0x30
[   15.291727]  </TASK>
[   15.291741] 
[   15.299801] Allocated by task 282:
[   15.300001]  kasan_save_stack+0x45/0x70
[   15.300229]  kasan_save_track+0x18/0x40
[   15.300651]  kasan_save_alloc_info+0x3b/0x50
[   15.300815]  __kasan_kmalloc+0xb7/0xc0
[   15.300985]  __kmalloc_cache_noprof+0x189/0x420
[   15.301209]  kasan_atomics+0x95/0x310
[   15.301468]  kunit_try_run_case+0x1a5/0x480
[   15.301663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.301851]  kthread+0x337/0x6f0
[   15.301976]  ret_from_fork+0x116/0x1d0
[   15.302111]  ret_from_fork_asm+0x1a/0x30
[   15.302277] 
[   15.302376] The buggy address belongs to the object at ffff888103991d00
[   15.302376]  which belongs to the cache kmalloc-64 of size 64
[   15.302962] The buggy address is located 0 bytes to the right of
[   15.302962]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.303466] 
[   15.303543] The buggy address belongs to the physical page:
[   15.304050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.304417] flags: 0x200000000000000(node=0|zone=2)
[   15.304640] page_type: f5(slab)
[   15.304817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.305135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.305527] page dumped because: kasan: bad access detected
[   15.305758] 
[   15.305839] Memory state around the buggy address:
[   15.306062]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.306370]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.306667] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.306984]                                      ^
[   15.307176]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.307405]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.307622] ==================================================================
[   15.308136] ==================================================================
[   15.308903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.309261] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.309486] 
[   15.309578] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.309626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.309640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.309663] Call Trace:
[   15.309685]  <TASK>
[   15.309708]  dump_stack_lvl+0x73/0xb0
[   15.309737]  print_report+0xd1/0x650
[   15.309761]  ? __virt_addr_valid+0x1db/0x2d0
[   15.309785]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.309807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.309829]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.309852]  kasan_report+0x141/0x180
[   15.309874]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.309900]  __asan_report_load4_noabort+0x18/0x20
[   15.309925]  kasan_atomics_helper+0x49ce/0x5450
[   15.309948]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.309969]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.309995]  ? ret_from_fork_asm+0x1a/0x30
[   15.310019]  ? kasan_atomics+0x152/0x310
[   15.310046]  kasan_atomics+0x1dc/0x310
[   15.310069]  ? __pfx_kasan_atomics+0x10/0x10
[   15.310093]  ? __pfx_read_tsc+0x10/0x10
[   15.310125]  ? ktime_get_ts64+0x86/0x230
[   15.310150]  kunit_try_run_case+0x1a5/0x480
[   15.310176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.310198]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.310235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.310271]  ? __kthread_parkme+0x82/0x180
[   15.310293]  ? preempt_count_sub+0x50/0x80
[   15.310317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.310341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.310365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.310390]  kthread+0x337/0x6f0
[   15.310413]  ? trace_preempt_on+0x20/0xc0
[   15.310439]  ? __pfx_kthread+0x10/0x10
[   15.310461]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.310483]  ? calculate_sigpending+0x7b/0xa0
[   15.310508]  ? __pfx_kthread+0x10/0x10
[   15.310531]  ret_from_fork+0x116/0x1d0
[   15.310551]  ? __pfx_kthread+0x10/0x10
[   15.310572]  ret_from_fork_asm+0x1a/0x30
[   15.310604]  </TASK>
[   15.310616] 
[   15.318448] Allocated by task 282:
[   15.318662]  kasan_save_stack+0x45/0x70
[   15.318872]  kasan_save_track+0x18/0x40
[   15.319043]  kasan_save_alloc_info+0x3b/0x50
[   15.319254]  __kasan_kmalloc+0xb7/0xc0
[   15.319428]  __kmalloc_cache_noprof+0x189/0x420
[   15.319644]  kasan_atomics+0x95/0x310
[   15.319816]  kunit_try_run_case+0x1a5/0x480
[   15.320023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.320239]  kthread+0x337/0x6f0
[   15.320415]  ret_from_fork+0x116/0x1d0
[   15.320597]  ret_from_fork_asm+0x1a/0x30
[   15.320772] 
[   15.320874] The buggy address belongs to the object at ffff888103991d00
[   15.320874]  which belongs to the cache kmalloc-64 of size 64
[   15.321291] The buggy address is located 0 bytes to the right of
[   15.321291]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.321838] 
[   15.321926] The buggy address belongs to the physical page:
[   15.322168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.322477] flags: 0x200000000000000(node=0|zone=2)
[   15.322647] page_type: f5(slab)
[   15.322774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.323007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.323249] page dumped because: kasan: bad access detected
[   15.323625] 
[   15.323740] Memory state around the buggy address:
[   15.323966]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.324995]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.325280] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.325494]                                      ^
[   15.325651]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.325863]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.326071] ==================================================================
[   15.626866] ==================================================================
[   15.627382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.627830] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.628550] 
[   15.628795] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.628957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.628984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.629008] Call Trace:
[   15.629037]  <TASK>
[   15.629060]  dump_stack_lvl+0x73/0xb0
[   15.629096]  print_report+0xd1/0x650
[   15.629122]  ? __virt_addr_valid+0x1db/0x2d0
[   15.629146]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.629170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.629193]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.629215]  kasan_report+0x141/0x180
[   15.629254]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.629313]  kasan_check_range+0x10c/0x1c0
[   15.629338]  __kasan_check_write+0x18/0x20
[   15.629358]  kasan_atomics_helper+0x1b22/0x5450
[   15.629382]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.629405]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.629430]  ? ret_from_fork_asm+0x1a/0x30
[   15.629453]  ? kasan_atomics+0x152/0x310
[   15.629479]  kasan_atomics+0x1dc/0x310
[   15.629502]  ? __pfx_kasan_atomics+0x10/0x10
[   15.629526]  ? __pfx_read_tsc+0x10/0x10
[   15.629549]  ? ktime_get_ts64+0x86/0x230
[   15.629574]  kunit_try_run_case+0x1a5/0x480
[   15.629599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.629621]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.629646]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.629671]  ? __kthread_parkme+0x82/0x180
[   15.629692]  ? preempt_count_sub+0x50/0x80
[   15.629717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.629742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.629766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.629789]  kthread+0x337/0x6f0
[   15.629809]  ? trace_preempt_on+0x20/0xc0
[   15.629832]  ? __pfx_kthread+0x10/0x10
[   15.629853]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.629875]  ? calculate_sigpending+0x7b/0xa0
[   15.629899]  ? __pfx_kthread+0x10/0x10
[   15.629921]  ret_from_fork+0x116/0x1d0
[   15.629940]  ? __pfx_kthread+0x10/0x10
[   15.629960]  ret_from_fork_asm+0x1a/0x30
[   15.629991]  </TASK>
[   15.630004] 
[   15.642578] Allocated by task 282:
[   15.642790]  kasan_save_stack+0x45/0x70
[   15.642993]  kasan_save_track+0x18/0x40
[   15.643173]  kasan_save_alloc_info+0x3b/0x50
[   15.643734]  __kasan_kmalloc+0xb7/0xc0
[   15.644136]  __kmalloc_cache_noprof+0x189/0x420
[   15.644572]  kasan_atomics+0x95/0x310
[   15.644910]  kunit_try_run_case+0x1a5/0x480
[   15.645119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.645714]  kthread+0x337/0x6f0
[   15.645971]  ret_from_fork+0x116/0x1d0
[   15.646303]  ret_from_fork_asm+0x1a/0x30
[   15.646510] 
[   15.646606] The buggy address belongs to the object at ffff888103991d00
[   15.646606]  which belongs to the cache kmalloc-64 of size 64
[   15.647089] The buggy address is located 0 bytes to the right of
[   15.647089]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.648048] 
[   15.648308] The buggy address belongs to the physical page:
[   15.648761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.649526] flags: 0x200000000000000(node=0|zone=2)
[   15.649768] page_type: f5(slab)
[   15.649932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.650516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.650867] page dumped because: kasan: bad access detected
[   15.651097] 
[   15.651187] Memory state around the buggy address:
[   15.651872]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.652390]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.652865] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.653161]                                      ^
[   15.653793]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.654267]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.654720] ==================================================================
[   15.833168] ==================================================================
[   15.833945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.834501] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.835157] 
[   15.835265] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.835318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.835331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.835356] Call Trace:
[   15.835378]  <TASK>
[   15.835401]  dump_stack_lvl+0x73/0xb0
[   15.835437]  print_report+0xd1/0x650
[   15.835461]  ? __virt_addr_valid+0x1db/0x2d0
[   15.835486]  ? kasan_atomics_helper+0x2006/0x5450
[   15.835508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.835531]  ? kasan_atomics_helper+0x2006/0x5450
[   15.835553]  kasan_report+0x141/0x180
[   15.835575]  ? kasan_atomics_helper+0x2006/0x5450
[   15.835601]  kasan_check_range+0x10c/0x1c0
[   15.835624]  __kasan_check_write+0x18/0x20
[   15.835644]  kasan_atomics_helper+0x2006/0x5450
[   15.835667]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.835688]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.835713]  ? ret_from_fork_asm+0x1a/0x30
[   15.835735]  ? kasan_atomics+0x152/0x310
[   15.835762]  kasan_atomics+0x1dc/0x310
[   15.835785]  ? __pfx_kasan_atomics+0x10/0x10
[   15.835810]  ? __pfx_read_tsc+0x10/0x10
[   15.835831]  ? ktime_get_ts64+0x86/0x230
[   15.835855]  kunit_try_run_case+0x1a5/0x480
[   15.835881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.835904]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.835928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.835951]  ? __kthread_parkme+0x82/0x180
[   15.835973]  ? preempt_count_sub+0x50/0x80
[   15.835998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.836022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.836045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.836068]  kthread+0x337/0x6f0
[   15.836087]  ? trace_preempt_on+0x20/0xc0
[   15.836111]  ? __pfx_kthread+0x10/0x10
[   15.836133]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.836154]  ? calculate_sigpending+0x7b/0xa0
[   15.836179]  ? __pfx_kthread+0x10/0x10
[   15.836201]  ret_from_fork+0x116/0x1d0
[   15.836237]  ? __pfx_kthread+0x10/0x10
[   15.836258]  ret_from_fork_asm+0x1a/0x30
[   15.836289]  </TASK>
[   15.836301] 
[   15.851478] Allocated by task 282:
[   15.851868]  kasan_save_stack+0x45/0x70
[   15.852295]  kasan_save_track+0x18/0x40
[   15.852601]  kasan_save_alloc_info+0x3b/0x50
[   15.852968]  __kasan_kmalloc+0xb7/0xc0
[   15.853105]  __kmalloc_cache_noprof+0x189/0x420
[   15.853296]  kasan_atomics+0x95/0x310
[   15.853649]  kunit_try_run_case+0x1a5/0x480
[   15.854051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.854591]  kthread+0x337/0x6f0
[   15.854926]  ret_from_fork+0x116/0x1d0
[   15.855349]  ret_from_fork_asm+0x1a/0x30
[   15.855633] 
[   15.855816] The buggy address belongs to the object at ffff888103991d00
[   15.855816]  which belongs to the cache kmalloc-64 of size 64
[   15.856176] The buggy address is located 0 bytes to the right of
[   15.856176]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.856735] 
[   15.856864] The buggy address belongs to the physical page:
[   15.857091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.857434] flags: 0x200000000000000(node=0|zone=2)
[   15.857669] page_type: f5(slab)
[   15.857841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.858131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.858472] page dumped because: kasan: bad access detected
[   15.858657] 
[   15.858754] Memory state around the buggy address:
[   15.858984]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.859233]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.859575] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.859788]                                      ^
[   15.859967]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.860372]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.860636] ==================================================================
[   15.723432] ==================================================================
[   15.723766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.724096] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.724597] 
[   15.724872] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.724928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.724942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.724967] Call Trace:
[   15.724989]  <TASK>
[   15.725011]  dump_stack_lvl+0x73/0xb0
[   15.725044]  print_report+0xd1/0x650
[   15.725066]  ? __virt_addr_valid+0x1db/0x2d0
[   15.725091]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.725113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.725135]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.725158]  kasan_report+0x141/0x180
[   15.725180]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.725205]  kasan_check_range+0x10c/0x1c0
[   15.725245]  __kasan_check_write+0x18/0x20
[   15.725334]  kasan_atomics_helper+0x1d7a/0x5450
[   15.725360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.725383]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.725408]  ? ret_from_fork_asm+0x1a/0x30
[   15.725431]  ? kasan_atomics+0x152/0x310
[   15.725458]  kasan_atomics+0x1dc/0x310
[   15.725480]  ? __pfx_kasan_atomics+0x10/0x10
[   15.725505]  ? __pfx_read_tsc+0x10/0x10
[   15.725526]  ? ktime_get_ts64+0x86/0x230
[   15.725552]  kunit_try_run_case+0x1a5/0x480
[   15.725578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.725601]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.725624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.725648]  ? __kthread_parkme+0x82/0x180
[   15.725669]  ? preempt_count_sub+0x50/0x80
[   15.725693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.725717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.725740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.725764]  kthread+0x337/0x6f0
[   15.725784]  ? trace_preempt_on+0x20/0xc0
[   15.725808]  ? __pfx_kthread+0x10/0x10
[   15.725830]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.725850]  ? calculate_sigpending+0x7b/0xa0
[   15.725875]  ? __pfx_kthread+0x10/0x10
[   15.725897]  ret_from_fork+0x116/0x1d0
[   15.725916]  ? __pfx_kthread+0x10/0x10
[   15.725937]  ret_from_fork_asm+0x1a/0x30
[   15.725967]  </TASK>
[   15.725979] 
[   15.736999] Allocated by task 282:
[   15.737168]  kasan_save_stack+0x45/0x70
[   15.737348]  kasan_save_track+0x18/0x40
[   15.737564]  kasan_save_alloc_info+0x3b/0x50
[   15.738137]  __kasan_kmalloc+0xb7/0xc0
[   15.738340]  __kmalloc_cache_noprof+0x189/0x420
[   15.738686]  kasan_atomics+0x95/0x310
[   15.738833]  kunit_try_run_case+0x1a5/0x480
[   15.739148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.739435]  kthread+0x337/0x6f0
[   15.739723]  ret_from_fork+0x116/0x1d0
[   15.739885]  ret_from_fork_asm+0x1a/0x30
[   15.740182] 
[   15.740295] The buggy address belongs to the object at ffff888103991d00
[   15.740295]  which belongs to the cache kmalloc-64 of size 64
[   15.740804] The buggy address is located 0 bytes to the right of
[   15.740804]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.741559] 
[   15.741660] The buggy address belongs to the physical page:
[   15.741840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.742358] flags: 0x200000000000000(node=0|zone=2)
[   15.742658] page_type: f5(slab)
[   15.742804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.743235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.743623] page dumped because: kasan: bad access detected
[   15.743875] 
[   15.744061] Memory state around the buggy address:
[   15.744336]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.744711]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.745027] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.745448]                                      ^
[   15.745617]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746072]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746352] ==================================================================
[   15.201572] ==================================================================
[   15.202016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.202500] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.202830] 
[   15.203091] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.203155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.203169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.203193] Call Trace:
[   15.203215]  <TASK>
[   15.203249]  dump_stack_lvl+0x73/0xb0
[   15.203282]  print_report+0xd1/0x650
[   15.203306]  ? __virt_addr_valid+0x1db/0x2d0
[   15.203331]  ? kasan_atomics_helper+0x1148/0x5450
[   15.203397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.203457]  ? kasan_atomics_helper+0x1148/0x5450
[   15.203480]  kasan_report+0x141/0x180
[   15.203505]  ? kasan_atomics_helper+0x1148/0x5450
[   15.203533]  kasan_check_range+0x10c/0x1c0
[   15.203557]  __kasan_check_write+0x18/0x20
[   15.203577]  kasan_atomics_helper+0x1148/0x5450
[   15.203600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.203624]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.203656]  ? ret_from_fork_asm+0x1a/0x30
[   15.203682]  ? kasan_atomics+0x152/0x310
[   15.203709]  kasan_atomics+0x1dc/0x310
[   15.203733]  ? __pfx_kasan_atomics+0x10/0x10
[   15.203760]  ? __pfx_read_tsc+0x10/0x10
[   15.203782]  ? ktime_get_ts64+0x86/0x230
[   15.203807]  kunit_try_run_case+0x1a5/0x480
[   15.203833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.203881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.203904]  ? __kthread_parkme+0x82/0x180
[   15.203926]  ? preempt_count_sub+0x50/0x80
[   15.203951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.203998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.204022]  kthread+0x337/0x6f0
[   15.204041]  ? trace_preempt_on+0x20/0xc0
[   15.204065]  ? __pfx_kthread+0x10/0x10
[   15.204085]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.204107]  ? calculate_sigpending+0x7b/0xa0
[   15.204131]  ? __pfx_kthread+0x10/0x10
[   15.204153]  ret_from_fork+0x116/0x1d0
[   15.204173]  ? __pfx_kthread+0x10/0x10
[   15.204194]  ret_from_fork_asm+0x1a/0x30
[   15.204233]  </TASK>
[   15.204246] 
[   15.213735] Allocated by task 282:
[   15.213944]  kasan_save_stack+0x45/0x70
[   15.214202]  kasan_save_track+0x18/0x40
[   15.214544]  kasan_save_alloc_info+0x3b/0x50
[   15.214766]  __kasan_kmalloc+0xb7/0xc0
[   15.214958]  __kmalloc_cache_noprof+0x189/0x420
[   15.215169]  kasan_atomics+0x95/0x310
[   15.215479]  kunit_try_run_case+0x1a5/0x480
[   15.215695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.215873]  kthread+0x337/0x6f0
[   15.215997]  ret_from_fork+0x116/0x1d0
[   15.216133]  ret_from_fork_asm+0x1a/0x30
[   15.216384] 
[   15.216484] The buggy address belongs to the object at ffff888103991d00
[   15.216484]  which belongs to the cache kmalloc-64 of size 64
[   15.217038] The buggy address is located 0 bytes to the right of
[   15.217038]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.217678] 
[   15.217759] The buggy address belongs to the physical page:
[   15.218053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.218310] flags: 0x200000000000000(node=0|zone=2)
[   15.218788] page_type: f5(slab)
[   15.218977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.219261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.219620] page dumped because: kasan: bad access detected
[   15.219971] 
[   15.220111] Memory state around the buggy address:
[   15.220395]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.220633]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.220860] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.221168]                                      ^
[   15.221406]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.221735]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.222266] ==================================================================
[   15.802841] ==================================================================
[   15.803279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.803657] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.803992] 
[   15.804108] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.804157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.804170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.804194] Call Trace:
[   15.804240]  <TASK>
[   15.804261]  dump_stack_lvl+0x73/0xb0
[   15.804292]  print_report+0xd1/0x650
[   15.804315]  ? __virt_addr_valid+0x1db/0x2d0
[   15.804340]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.804360]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.804383]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.804405]  kasan_report+0x141/0x180
[   15.804438]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.804464]  __asan_report_load8_noabort+0x18/0x20
[   15.804489]  kasan_atomics_helper+0x4f71/0x5450
[   15.804511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.804534]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.804558]  ? ret_from_fork_asm+0x1a/0x30
[   15.804581]  ? kasan_atomics+0x152/0x310
[   15.804607]  kasan_atomics+0x1dc/0x310
[   15.804629]  ? __pfx_kasan_atomics+0x10/0x10
[   15.804654]  ? __pfx_read_tsc+0x10/0x10
[   15.804676]  ? ktime_get_ts64+0x86/0x230
[   15.804701]  kunit_try_run_case+0x1a5/0x480
[   15.804726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.804749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.804774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.804806]  ? __kthread_parkme+0x82/0x180
[   15.804828]  ? preempt_count_sub+0x50/0x80
[   15.804853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.804876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.804899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.804922]  kthread+0x337/0x6f0
[   15.804942]  ? trace_preempt_on+0x20/0xc0
[   15.804967]  ? __pfx_kthread+0x10/0x10
[   15.804988]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.805019]  ? calculate_sigpending+0x7b/0xa0
[   15.805044]  ? __pfx_kthread+0x10/0x10
[   15.805066]  ret_from_fork+0x116/0x1d0
[   15.805085]  ? __pfx_kthread+0x10/0x10
[   15.805105]  ret_from_fork_asm+0x1a/0x30
[   15.805137]  </TASK>
[   15.805149] 
[   15.818825] Allocated by task 282:
[   15.819008]  kasan_save_stack+0x45/0x70
[   15.819179]  kasan_save_track+0x18/0x40
[   15.819387]  kasan_save_alloc_info+0x3b/0x50
[   15.819665]  __kasan_kmalloc+0xb7/0xc0
[   15.820658]  __kmalloc_cache_noprof+0x189/0x420
[   15.821033]  kasan_atomics+0x95/0x310
[   15.821195]  kunit_try_run_case+0x1a5/0x480
[   15.821691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.822121]  kthread+0x337/0x6f0
[   15.822277]  ret_from_fork+0x116/0x1d0
[   15.822688]  ret_from_fork_asm+0x1a/0x30
[   15.823081] 
[   15.823256] The buggy address belongs to the object at ffff888103991d00
[   15.823256]  which belongs to the cache kmalloc-64 of size 64
[   15.823927] The buggy address is located 0 bytes to the right of
[   15.823927]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.824407] 
[   15.824613] The buggy address belongs to the physical page:
[   15.825174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.826004] flags: 0x200000000000000(node=0|zone=2)
[   15.826549] page_type: f5(slab)
[   15.826889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.827624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.828155] page dumped because: kasan: bad access detected
[   15.828503] 
[   15.828724] Memory state around the buggy address:
[   15.829100]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.829381]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.829841] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.830053]                                      ^
[   15.830208]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.831199]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.831999] ==================================================================
[   15.483580] ==================================================================
[   15.483872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.484422] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.484702] 
[   15.484827] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.484876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.484890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.484915] Call Trace:
[   15.484937]  <TASK>
[   15.484959]  dump_stack_lvl+0x73/0xb0
[   15.484991]  print_report+0xd1/0x650
[   15.485016]  ? __virt_addr_valid+0x1db/0x2d0
[   15.485040]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.485062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.485085]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.485110]  kasan_report+0x141/0x180
[   15.485133]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.485160]  kasan_check_range+0x10c/0x1c0
[   15.485184]  __kasan_check_write+0x18/0x20
[   15.485204]  kasan_atomics_helper+0x16e7/0x5450
[   15.485239]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.485276]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.485302]  ? ret_from_fork_asm+0x1a/0x30
[   15.485325]  ? kasan_atomics+0x152/0x310
[   15.485352]  kasan_atomics+0x1dc/0x310
[   15.485375]  ? __pfx_kasan_atomics+0x10/0x10
[   15.485399]  ? __pfx_read_tsc+0x10/0x10
[   15.485422]  ? ktime_get_ts64+0x86/0x230
[   15.485447]  kunit_try_run_case+0x1a5/0x480
[   15.485472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.485495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.485519]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.485543]  ? __kthread_parkme+0x82/0x180
[   15.485564]  ? preempt_count_sub+0x50/0x80
[   15.485589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.485613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.485636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.485660]  kthread+0x337/0x6f0
[   15.485680]  ? trace_preempt_on+0x20/0xc0
[   15.485704]  ? __pfx_kthread+0x10/0x10
[   15.485725]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.485746]  ? calculate_sigpending+0x7b/0xa0
[   15.485771]  ? __pfx_kthread+0x10/0x10
[   15.485792]  ret_from_fork+0x116/0x1d0
[   15.485812]  ? __pfx_kthread+0x10/0x10
[   15.485832]  ret_from_fork_asm+0x1a/0x30
[   15.485863]  </TASK>
[   15.485875] 
[   15.493374] Allocated by task 282:
[   15.493545]  kasan_save_stack+0x45/0x70
[   15.493756]  kasan_save_track+0x18/0x40
[   15.493954]  kasan_save_alloc_info+0x3b/0x50
[   15.494130]  __kasan_kmalloc+0xb7/0xc0
[   15.494354]  __kmalloc_cache_noprof+0x189/0x420
[   15.494511]  kasan_atomics+0x95/0x310
[   15.494646]  kunit_try_run_case+0x1a5/0x480
[   15.494792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.494968]  kthread+0x337/0x6f0
[   15.495089]  ret_from_fork+0x116/0x1d0
[   15.495233]  ret_from_fork_asm+0x1a/0x30
[   15.495431] 
[   15.495543] The buggy address belongs to the object at ffff888103991d00
[   15.495543]  which belongs to the cache kmalloc-64 of size 64
[   15.496074] The buggy address is located 0 bytes to the right of
[   15.496074]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.496624] 
[   15.496705] The buggy address belongs to the physical page:
[   15.496891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.497135] flags: 0x200000000000000(node=0|zone=2)
[   15.497843] page_type: f5(slab)
[   15.498538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.499139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.499535] page dumped because: kasan: bad access detected
[   15.499789] 
[   15.499865] Memory state around the buggy address:
[   15.500040]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.500422]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.500744] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.501050]                                      ^
[   15.501210]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.501554]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.501903] ==================================================================
[   15.917855] ==================================================================
[   15.918211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.918746] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.918972] 
[   15.919064] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.919111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.919124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.919148] Call Trace:
[   15.919169]  <TASK>
[   15.919189]  dump_stack_lvl+0x73/0xb0
[   15.919232]  print_report+0xd1/0x650
[   15.919255]  ? __virt_addr_valid+0x1db/0x2d0
[   15.919280]  ? kasan_atomics_helper+0x218a/0x5450
[   15.919301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.919324]  ? kasan_atomics_helper+0x218a/0x5450
[   15.919346]  kasan_report+0x141/0x180
[   15.919368]  ? kasan_atomics_helper+0x218a/0x5450
[   15.919394]  kasan_check_range+0x10c/0x1c0
[   15.919419]  __kasan_check_write+0x18/0x20
[   15.919438]  kasan_atomics_helper+0x218a/0x5450
[   15.919461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.919484]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.919509]  ? ret_from_fork_asm+0x1a/0x30
[   15.919532]  ? kasan_atomics+0x152/0x310
[   15.919558]  kasan_atomics+0x1dc/0x310
[   15.919581]  ? __pfx_kasan_atomics+0x10/0x10
[   15.919605]  ? __pfx_read_tsc+0x10/0x10
[   15.919626]  ? ktime_get_ts64+0x86/0x230
[   15.919651]  kunit_try_run_case+0x1a5/0x480
[   15.919676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.919699]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.919723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.919745]  ? __kthread_parkme+0x82/0x180
[   15.919766]  ? preempt_count_sub+0x50/0x80
[   15.919790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.919813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.919838]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.919861]  kthread+0x337/0x6f0
[   15.919881]  ? trace_preempt_on+0x20/0xc0
[   15.919906]  ? __pfx_kthread+0x10/0x10
[   15.919926]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.919947]  ? calculate_sigpending+0x7b/0xa0
[   15.919972]  ? __pfx_kthread+0x10/0x10
[   15.919994]  ret_from_fork+0x116/0x1d0
[   15.920013]  ? __pfx_kthread+0x10/0x10
[   15.920034]  ret_from_fork_asm+0x1a/0x30
[   15.920065]  </TASK>
[   15.920092] 
[   15.928472] Allocated by task 282:
[   15.928627]  kasan_save_stack+0x45/0x70
[   15.928879]  kasan_save_track+0x18/0x40
[   15.929075]  kasan_save_alloc_info+0x3b/0x50
[   15.929292]  __kasan_kmalloc+0xb7/0xc0
[   15.929479]  __kmalloc_cache_noprof+0x189/0x420
[   15.929700]  kasan_atomics+0x95/0x310
[   15.929886]  kunit_try_run_case+0x1a5/0x480
[   15.930297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.930550]  kthread+0x337/0x6f0
[   15.930716]  ret_from_fork+0x116/0x1d0
[   15.930902]  ret_from_fork_asm+0x1a/0x30
[   15.931098] 
[   15.931196] The buggy address belongs to the object at ffff888103991d00
[   15.931196]  which belongs to the cache kmalloc-64 of size 64
[   15.931742] The buggy address is located 0 bytes to the right of
[   15.931742]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.932146] 
[   15.932231] The buggy address belongs to the physical page:
[   15.932802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.933141] flags: 0x200000000000000(node=0|zone=2)
[   15.933436] page_type: f5(slab)
[   15.933565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.933797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.934026] page dumped because: kasan: bad access detected
[   15.934198] 
[   15.934297] Memory state around the buggy address:
[   15.934733]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.935464]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.935801] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.936018]                                      ^
[   15.936174]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936818]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.937109] ==================================================================
[   15.567834] ==================================================================
[   15.568195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.568590] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.568897] 
[   15.569030] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.569090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.569104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.569129] Call Trace:
[   15.569151]  <TASK>
[   15.569180]  dump_stack_lvl+0x73/0xb0
[   15.569214]  print_report+0xd1/0x650
[   15.569253]  ? __virt_addr_valid+0x1db/0x2d0
[   15.569288]  ? kasan_atomics_helper+0x194a/0x5450
[   15.569310]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.569333]  ? kasan_atomics_helper+0x194a/0x5450
[   15.569355]  kasan_report+0x141/0x180
[   15.569378]  ? kasan_atomics_helper+0x194a/0x5450
[   15.569404]  kasan_check_range+0x10c/0x1c0
[   15.569429]  __kasan_check_write+0x18/0x20
[   15.569449]  kasan_atomics_helper+0x194a/0x5450
[   15.569472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.569495]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.569520]  ? ret_from_fork_asm+0x1a/0x30
[   15.569543]  ? kasan_atomics+0x152/0x310
[   15.569570]  kasan_atomics+0x1dc/0x310
[   15.569593]  ? __pfx_kasan_atomics+0x10/0x10
[   15.569617]  ? __pfx_read_tsc+0x10/0x10
[   15.569639]  ? ktime_get_ts64+0x86/0x230
[   15.569663]  kunit_try_run_case+0x1a5/0x480
[   15.569690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.569712]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.569747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.569770]  ? __kthread_parkme+0x82/0x180
[   15.569792]  ? preempt_count_sub+0x50/0x80
[   15.569827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.569851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.569874]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.569898]  kthread+0x337/0x6f0
[   15.569918]  ? trace_preempt_on+0x20/0xc0
[   15.569942]  ? __pfx_kthread+0x10/0x10
[   15.569962]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.569984]  ? calculate_sigpending+0x7b/0xa0
[   15.570009]  ? __pfx_kthread+0x10/0x10
[   15.570032]  ret_from_fork+0x116/0x1d0
[   15.570051]  ? __pfx_kthread+0x10/0x10
[   15.570073]  ret_from_fork_asm+0x1a/0x30
[   15.570105]  </TASK>
[   15.570117] 
[   15.578049] Allocated by task 282:
[   15.578208]  kasan_save_stack+0x45/0x70
[   15.578444]  kasan_save_track+0x18/0x40
[   15.578638]  kasan_save_alloc_info+0x3b/0x50
[   15.578847]  __kasan_kmalloc+0xb7/0xc0
[   15.579023]  __kmalloc_cache_noprof+0x189/0x420
[   15.579273]  kasan_atomics+0x95/0x310
[   15.579446]  kunit_try_run_case+0x1a5/0x480
[   15.579594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.579770]  kthread+0x337/0x6f0
[   15.579944]  ret_from_fork+0x116/0x1d0
[   15.580159]  ret_from_fork_asm+0x1a/0x30
[   15.580499] 
[   15.580599] The buggy address belongs to the object at ffff888103991d00
[   15.580599]  which belongs to the cache kmalloc-64 of size 64
[   15.581056] The buggy address is located 0 bytes to the right of
[   15.581056]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.581630] 
[   15.581749] The buggy address belongs to the physical page:
[   15.581975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.582380] flags: 0x200000000000000(node=0|zone=2)
[   15.582608] page_type: f5(slab)
[   15.582792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.583110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.583484] page dumped because: kasan: bad access detected
[   15.583733] 
[   15.583824] Memory state around the buggy address:
[   15.584044]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.584396]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.584640] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.584864]                                      ^
[   15.585022]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.585248]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.585703] ==================================================================
[   15.899381] ==================================================================
[   15.899666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.899910] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.900131] 
[   15.900269] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.900317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.900331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.900355] Call Trace:
[   15.900388]  <TASK>
[   15.900410]  dump_stack_lvl+0x73/0xb0
[   15.900454]  print_report+0xd1/0x650
[   15.900479]  ? __virt_addr_valid+0x1db/0x2d0
[   15.900502]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.900524]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.900546]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.900568]  kasan_report+0x141/0x180
[   15.900591]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.900617]  __asan_report_load8_noabort+0x18/0x20
[   15.900641]  kasan_atomics_helper+0x4fb2/0x5450
[   15.900664]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.900686]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.900711]  ? ret_from_fork_asm+0x1a/0x30
[   15.900734]  ? kasan_atomics+0x152/0x310
[   15.900761]  kasan_atomics+0x1dc/0x310
[   15.900784]  ? __pfx_kasan_atomics+0x10/0x10
[   15.900819]  ? __pfx_read_tsc+0x10/0x10
[   15.900843]  ? ktime_get_ts64+0x86/0x230
[   15.900868]  kunit_try_run_case+0x1a5/0x480
[   15.900894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.900917]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.900941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.900965]  ? __kthread_parkme+0x82/0x180
[   15.900986]  ? preempt_count_sub+0x50/0x80
[   15.901011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.901037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.901061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.901085]  kthread+0x337/0x6f0
[   15.901105]  ? trace_preempt_on+0x20/0xc0
[   15.901129]  ? __pfx_kthread+0x10/0x10
[   15.901150]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.901171]  ? calculate_sigpending+0x7b/0xa0
[   15.901196]  ? __pfx_kthread+0x10/0x10
[   15.901226]  ret_from_fork+0x116/0x1d0
[   15.901246]  ? __pfx_kthread+0x10/0x10
[   15.901277]  ret_from_fork_asm+0x1a/0x30
[   15.901308]  </TASK>
[   15.901321] 
[   15.909440] Allocated by task 282:
[   15.909642]  kasan_save_stack+0x45/0x70
[   15.909865]  kasan_save_track+0x18/0x40
[   15.910134]  kasan_save_alloc_info+0x3b/0x50
[   15.910380]  __kasan_kmalloc+0xb7/0xc0
[   15.910573]  __kmalloc_cache_noprof+0x189/0x420
[   15.910742]  kasan_atomics+0x95/0x310
[   15.910904]  kunit_try_run_case+0x1a5/0x480
[   15.911140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.911388]  kthread+0x337/0x6f0
[   15.911562]  ret_from_fork+0x116/0x1d0
[   15.911697]  ret_from_fork_asm+0x1a/0x30
[   15.911858] 
[   15.911931] The buggy address belongs to the object at ffff888103991d00
[   15.911931]  which belongs to the cache kmalloc-64 of size 64
[   15.912766] The buggy address is located 0 bytes to the right of
[   15.912766]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.913277] 
[   15.913377] The buggy address belongs to the physical page:
[   15.913608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.913849] flags: 0x200000000000000(node=0|zone=2)
[   15.914015] page_type: f5(slab)
[   15.914140] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.914379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.914608] page dumped because: kasan: bad access detected
[   15.914778] 
[   15.914848] Memory state around the buggy address:
[   15.915085]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.915680]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.916003] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.916398]                                      ^
[   15.916631]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.916951]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.917256] ==================================================================
[   14.689401] ==================================================================
[   14.690167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.690629] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.690952] 
[   14.691079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.691130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.691155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.691180] Call Trace:
[   14.691203]  <TASK>
[   14.691243]  dump_stack_lvl+0x73/0xb0
[   14.691275]  print_report+0xd1/0x650
[   14.691299]  ? __virt_addr_valid+0x1db/0x2d0
[   14.691324]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.691347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.691430]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.691484]  kasan_report+0x141/0x180
[   14.691507]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.691534]  kasan_check_range+0x10c/0x1c0
[   14.691559]  __kasan_check_write+0x18/0x20
[   14.691579]  kasan_atomics_helper+0x5fe/0x5450
[   14.691602]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.691624]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.691649]  ? ret_from_fork_asm+0x1a/0x30
[   14.691671]  ? kasan_atomics+0x152/0x310
[   14.691698]  kasan_atomics+0x1dc/0x310
[   14.691721]  ? __pfx_kasan_atomics+0x10/0x10
[   14.691746]  ? __pfx_read_tsc+0x10/0x10
[   14.691768]  ? ktime_get_ts64+0x86/0x230
[   14.691793]  kunit_try_run_case+0x1a5/0x480
[   14.691818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.691841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.691865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.691888]  ? __kthread_parkme+0x82/0x180
[   14.691909]  ? preempt_count_sub+0x50/0x80
[   14.691933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.691957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.691991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.692014]  kthread+0x337/0x6f0
[   14.692034]  ? trace_preempt_on+0x20/0xc0
[   14.692071]  ? __pfx_kthread+0x10/0x10
[   14.692092]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.692115]  ? calculate_sigpending+0x7b/0xa0
[   14.692139]  ? __pfx_kthread+0x10/0x10
[   14.692161]  ret_from_fork+0x116/0x1d0
[   14.692179]  ? __pfx_kthread+0x10/0x10
[   14.692201]  ret_from_fork_asm+0x1a/0x30
[   14.692282]  </TASK>
[   14.692296] 
[   14.701961] Allocated by task 282:
[   14.702185]  kasan_save_stack+0x45/0x70
[   14.702402]  kasan_save_track+0x18/0x40
[   14.702645]  kasan_save_alloc_info+0x3b/0x50
[   14.702803]  __kasan_kmalloc+0xb7/0xc0
[   14.702974]  __kmalloc_cache_noprof+0x189/0x420
[   14.703191]  kasan_atomics+0x95/0x310
[   14.703396]  kunit_try_run_case+0x1a5/0x480
[   14.703546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.703723]  kthread+0x337/0x6f0
[   14.704021]  ret_from_fork+0x116/0x1d0
[   14.704295]  ret_from_fork_asm+0x1a/0x30
[   14.704850] 
[   14.704960] The buggy address belongs to the object at ffff888103991d00
[   14.704960]  which belongs to the cache kmalloc-64 of size 64
[   14.706148] The buggy address is located 0 bytes to the right of
[   14.706148]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.706912] 
[   14.707018] The buggy address belongs to the physical page:
[   14.707637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.708282] flags: 0x200000000000000(node=0|zone=2)
[   14.708515] page_type: f5(slab)
[   14.708675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.708983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.709955] page dumped because: kasan: bad access detected
[   14.710483] 
[   14.710619] Memory state around the buggy address:
[   14.711010]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.711250]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.711466] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.711676]                                      ^
[   14.711840]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712058]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.713102] ==================================================================
[   15.126347] ==================================================================
[   15.126877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.127122] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.127462] 
[   15.127603] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.127653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.127667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.127692] Call Trace:
[   15.127714]  <TASK>
[   15.127736]  dump_stack_lvl+0x73/0xb0
[   15.127767]  print_report+0xd1/0x650
[   15.127791]  ? __virt_addr_valid+0x1db/0x2d0
[   15.127815]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.127837]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.127860]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.127882]  kasan_report+0x141/0x180
[   15.127904]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.127931]  __asan_report_load4_noabort+0x18/0x20
[   15.127957]  kasan_atomics_helper+0x4a36/0x5450
[   15.127981]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.128003]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.128030]  ? ret_from_fork_asm+0x1a/0x30
[   15.128053]  ? kasan_atomics+0x152/0x310
[   15.128080]  kasan_atomics+0x1dc/0x310
[   15.128103]  ? __pfx_kasan_atomics+0x10/0x10
[   15.128128]  ? __pfx_read_tsc+0x10/0x10
[   15.128150]  ? ktime_get_ts64+0x86/0x230
[   15.128176]  kunit_try_run_case+0x1a5/0x480
[   15.128202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.128235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.128259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.128284]  ? __kthread_parkme+0x82/0x180
[   15.128306]  ? preempt_count_sub+0x50/0x80
[   15.128331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.128355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.128380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.128404]  kthread+0x337/0x6f0
[   15.128425]  ? trace_preempt_on+0x20/0xc0
[   15.128449]  ? __pfx_kthread+0x10/0x10
[   15.128471]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.128494]  ? calculate_sigpending+0x7b/0xa0
[   15.128518]  ? __pfx_kthread+0x10/0x10
[   15.128540]  ret_from_fork+0x116/0x1d0
[   15.128574]  ? __pfx_kthread+0x10/0x10
[   15.128596]  ret_from_fork_asm+0x1a/0x30
[   15.128627]  </TASK>
[   15.128640] 
[   15.136074] Allocated by task 282:
[   15.136243]  kasan_save_stack+0x45/0x70
[   15.136488]  kasan_save_track+0x18/0x40
[   15.136706]  kasan_save_alloc_info+0x3b/0x50
[   15.136924]  __kasan_kmalloc+0xb7/0xc0
[   15.137134]  __kmalloc_cache_noprof+0x189/0x420
[   15.137521]  kasan_atomics+0x95/0x310
[   15.137720]  kunit_try_run_case+0x1a5/0x480
[   15.137892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.138066]  kthread+0x337/0x6f0
[   15.138191]  ret_from_fork+0x116/0x1d0
[   15.138334]  ret_from_fork_asm+0x1a/0x30
[   15.138473] 
[   15.138547] The buggy address belongs to the object at ffff888103991d00
[   15.138547]  which belongs to the cache kmalloc-64 of size 64
[   15.138918] The buggy address is located 0 bytes to the right of
[   15.138918]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.140117] 
[   15.140231] The buggy address belongs to the physical page:
[   15.140890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.141409] flags: 0x200000000000000(node=0|zone=2)
[   15.142398] page_type: f5(slab)
[   15.142986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.143499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.143744] page dumped because: kasan: bad access detected
[   15.143918] 
[   15.143993] Memory state around the buggy address:
[   15.144156]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.144800]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.145552] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.146182]                                      ^
[   15.146649]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147294]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147816] ==================================================================
[   15.521732] ==================================================================
[   15.522346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.522665] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.522994] 
[   15.523112] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.523160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.523174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.523198] Call Trace:
[   15.523233]  <TASK>
[   15.523272]  dump_stack_lvl+0x73/0xb0
[   15.523305]  print_report+0xd1/0x650
[   15.523330]  ? __virt_addr_valid+0x1db/0x2d0
[   15.523354]  ? kasan_atomics_helper+0x1818/0x5450
[   15.523376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.523398]  ? kasan_atomics_helper+0x1818/0x5450
[   15.523421]  kasan_report+0x141/0x180
[   15.523443]  ? kasan_atomics_helper+0x1818/0x5450
[   15.523480]  kasan_check_range+0x10c/0x1c0
[   15.523504]  __kasan_check_write+0x18/0x20
[   15.523524]  kasan_atomics_helper+0x1818/0x5450
[   15.523558]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.523581]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.523606]  ? ret_from_fork_asm+0x1a/0x30
[   15.523629]  ? kasan_atomics+0x152/0x310
[   15.523656]  kasan_atomics+0x1dc/0x310
[   15.523680]  ? __pfx_kasan_atomics+0x10/0x10
[   15.523705]  ? __pfx_read_tsc+0x10/0x10
[   15.523727]  ? ktime_get_ts64+0x86/0x230
[   15.523752]  kunit_try_run_case+0x1a5/0x480
[   15.523777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.523799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.523824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.523847]  ? __kthread_parkme+0x82/0x180
[   15.523868]  ? preempt_count_sub+0x50/0x80
[   15.523893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.523917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.523940]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.523964]  kthread+0x337/0x6f0
[   15.523984]  ? trace_preempt_on+0x20/0xc0
[   15.524008]  ? __pfx_kthread+0x10/0x10
[   15.524029]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.524052]  ? calculate_sigpending+0x7b/0xa0
[   15.524087]  ? __pfx_kthread+0x10/0x10
[   15.524109]  ret_from_fork+0x116/0x1d0
[   15.524128]  ? __pfx_kthread+0x10/0x10
[   15.524160]  ret_from_fork_asm+0x1a/0x30
[   15.524191]  </TASK>
[   15.524204] 
[   15.533864] Allocated by task 282:
[   15.534082]  kasan_save_stack+0x45/0x70
[   15.534563]  kasan_save_track+0x18/0x40
[   15.534761]  kasan_save_alloc_info+0x3b/0x50
[   15.534953]  __kasan_kmalloc+0xb7/0xc0
[   15.535136]  __kmalloc_cache_noprof+0x189/0x420
[   15.535770]  kasan_atomics+0x95/0x310
[   15.536048]  kunit_try_run_case+0x1a5/0x480
[   15.536468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.536906]  kthread+0x337/0x6f0
[   15.537207]  ret_from_fork+0x116/0x1d0
[   15.537642]  ret_from_fork_asm+0x1a/0x30
[   15.537972] 
[   15.538075] The buggy address belongs to the object at ffff888103991d00
[   15.538075]  which belongs to the cache kmalloc-64 of size 64
[   15.538895] The buggy address is located 0 bytes to the right of
[   15.538895]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.539681] 
[   15.539932] The buggy address belongs to the physical page:
[   15.540386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.540914] flags: 0x200000000000000(node=0|zone=2)
[   15.541323] page_type: f5(slab)
[   15.541487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.541796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.542099] page dumped because: kasan: bad access detected
[   15.542730] 
[   15.542835] Memory state around the buggy address:
[   15.543301]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.543950]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.544541] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.545084]                                      ^
[   15.545695]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.546143]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.546982] ==================================================================
[   15.247420] ==================================================================
[   15.248231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.248688] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.249151] 
[   15.249429] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.249487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.249560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.249587] Call Trace:
[   15.249609]  <TASK>
[   15.249631]  dump_stack_lvl+0x73/0xb0
[   15.249667]  print_report+0xd1/0x650
[   15.249693]  ? __virt_addr_valid+0x1db/0x2d0
[   15.249716]  ? kasan_atomics_helper+0x1217/0x5450
[   15.249739]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.249762]  ? kasan_atomics_helper+0x1217/0x5450
[   15.249787]  kasan_report+0x141/0x180
[   15.249809]  ? kasan_atomics_helper+0x1217/0x5450
[   15.249836]  kasan_check_range+0x10c/0x1c0
[   15.249860]  __kasan_check_write+0x18/0x20
[   15.249880]  kasan_atomics_helper+0x1217/0x5450
[   15.249903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.249925]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.249951]  ? ret_from_fork_asm+0x1a/0x30
[   15.249974]  ? kasan_atomics+0x152/0x310
[   15.250000]  kasan_atomics+0x1dc/0x310
[   15.250022]  ? __pfx_kasan_atomics+0x10/0x10
[   15.250047]  ? __pfx_read_tsc+0x10/0x10
[   15.250069]  ? ktime_get_ts64+0x86/0x230
[   15.250093]  kunit_try_run_case+0x1a5/0x480
[   15.250119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.250141]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.250165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.250189]  ? __kthread_parkme+0x82/0x180
[   15.250211]  ? preempt_count_sub+0x50/0x80
[   15.250251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.250276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.250300]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.250324]  kthread+0x337/0x6f0
[   15.250344]  ? trace_preempt_on+0x20/0xc0
[   15.250368]  ? __pfx_kthread+0x10/0x10
[   15.250390]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.250411]  ? calculate_sigpending+0x7b/0xa0
[   15.250436]  ? __pfx_kthread+0x10/0x10
[   15.250458]  ret_from_fork+0x116/0x1d0
[   15.250477]  ? __pfx_kthread+0x10/0x10
[   15.250498]  ret_from_fork_asm+0x1a/0x30
[   15.250528]  </TASK>
[   15.250541] 
[   15.260740] Allocated by task 282:
[   15.261056]  kasan_save_stack+0x45/0x70
[   15.261280]  kasan_save_track+0x18/0x40
[   15.261600]  kasan_save_alloc_info+0x3b/0x50
[   15.261819]  __kasan_kmalloc+0xb7/0xc0
[   15.262069]  __kmalloc_cache_noprof+0x189/0x420
[   15.262324]  kasan_atomics+0x95/0x310
[   15.262658]  kunit_try_run_case+0x1a5/0x480
[   15.262871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.263238]  kthread+0x337/0x6f0
[   15.263403]  ret_from_fork+0x116/0x1d0
[   15.263698]  ret_from_fork_asm+0x1a/0x30
[   15.263972] 
[   15.264067] The buggy address belongs to the object at ffff888103991d00
[   15.264067]  which belongs to the cache kmalloc-64 of size 64
[   15.264745] The buggy address is located 0 bytes to the right of
[   15.264745]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.265469] 
[   15.265573] The buggy address belongs to the physical page:
[   15.265789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.266200] flags: 0x200000000000000(node=0|zone=2)
[   15.266601] page_type: f5(slab)
[   15.266755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.267231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.267661] page dumped because: kasan: bad access detected
[   15.267861] 
[   15.268026] Memory state around the buggy address:
[   15.268387]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.268682]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.268982] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.269287]                                      ^
[   15.269741]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.270020]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.270448] ==================================================================
[   14.587190] ==================================================================
[   14.587745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.587999] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.588237] 
[   14.588330] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.588379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.588393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.588417] Call Trace:
[   14.588440]  <TASK>
[   14.588463]  dump_stack_lvl+0x73/0xb0
[   14.588494]  print_report+0xd1/0x650
[   14.588518]  ? __virt_addr_valid+0x1db/0x2d0
[   14.588543]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.588566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.588588]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.588610]  kasan_report+0x141/0x180
[   14.588633]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.588659]  __asan_report_load4_noabort+0x18/0x20
[   14.588685]  kasan_atomics_helper+0x4b54/0x5450
[   14.588707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.588730]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.588771]  ? ret_from_fork_asm+0x1a/0x30
[   14.588804]  ? kasan_atomics+0x152/0x310
[   14.588831]  kasan_atomics+0x1dc/0x310
[   14.588855]  ? __pfx_kasan_atomics+0x10/0x10
[   14.588879]  ? __pfx_read_tsc+0x10/0x10
[   14.588902]  ? ktime_get_ts64+0x86/0x230
[   14.588927]  kunit_try_run_case+0x1a5/0x480
[   14.588953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.588980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.589006]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.589030]  ? __kthread_parkme+0x82/0x180
[   14.589053]  ? preempt_count_sub+0x50/0x80
[   14.589078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.589102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.589128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.589152]  kthread+0x337/0x6f0
[   14.589173]  ? trace_preempt_on+0x20/0xc0
[   14.589197]  ? __pfx_kthread+0x10/0x10
[   14.589230]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.589253]  ? calculate_sigpending+0x7b/0xa0
[   14.589279]  ? __pfx_kthread+0x10/0x10
[   14.589302]  ret_from_fork+0x116/0x1d0
[   14.589323]  ? __pfx_kthread+0x10/0x10
[   14.589344]  ret_from_fork_asm+0x1a/0x30
[   14.589376]  </TASK>
[   14.589388] 
[   14.598242] Allocated by task 282:
[   14.598506]  kasan_save_stack+0x45/0x70
[   14.598679]  kasan_save_track+0x18/0x40
[   14.598877]  kasan_save_alloc_info+0x3b/0x50
[   14.599071]  __kasan_kmalloc+0xb7/0xc0
[   14.599632]  __kmalloc_cache_noprof+0x189/0x420
[   14.599855]  kasan_atomics+0x95/0x310
[   14.600012]  kunit_try_run_case+0x1a5/0x480
[   14.600161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.600457]  kthread+0x337/0x6f0
[   14.600750]  ret_from_fork+0x116/0x1d0
[   14.600936]  ret_from_fork_asm+0x1a/0x30
[   14.601097] 
[   14.601257] The buggy address belongs to the object at ffff888103991d00
[   14.601257]  which belongs to the cache kmalloc-64 of size 64
[   14.601703] The buggy address is located 0 bytes to the right of
[   14.601703]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.602073] 
[   14.602150] The buggy address belongs to the physical page:
[   14.602413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.602770] flags: 0x200000000000000(node=0|zone=2)
[   14.603009] page_type: f5(slab)
[   14.603429] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.603734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.603964] page dumped because: kasan: bad access detected
[   14.604138] 
[   14.604210] Memory state around the buggy address:
[   14.604383]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.604685]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.605215] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.605687]                                      ^
[   14.605920]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.606209]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.606456] ==================================================================
[   14.666267] ==================================================================
[   14.666918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.667444] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.667949] 
[   14.668177] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.668242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.668256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.668281] Call Trace:
[   14.668305]  <TASK>
[   14.668328]  dump_stack_lvl+0x73/0xb0
[   14.668374]  print_report+0xd1/0x650
[   14.668399]  ? __virt_addr_valid+0x1db/0x2d0
[   14.668427]  ? kasan_atomics_helper+0x565/0x5450
[   14.668450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.668475]  ? kasan_atomics_helper+0x565/0x5450
[   14.668498]  kasan_report+0x141/0x180
[   14.668520]  ? kasan_atomics_helper+0x565/0x5450
[   14.668546]  kasan_check_range+0x10c/0x1c0
[   14.668571]  __kasan_check_write+0x18/0x20
[   14.668591]  kasan_atomics_helper+0x565/0x5450
[   14.668615]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.668638]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.668666]  ? ret_from_fork_asm+0x1a/0x30
[   14.668691]  ? kasan_atomics+0x152/0x310
[   14.668718]  kasan_atomics+0x1dc/0x310
[   14.668742]  ? __pfx_kasan_atomics+0x10/0x10
[   14.668767]  ? __pfx_read_tsc+0x10/0x10
[   14.668798]  ? ktime_get_ts64+0x86/0x230
[   14.668823]  kunit_try_run_case+0x1a5/0x480
[   14.668850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.668874]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.668899]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.668922]  ? __kthread_parkme+0x82/0x180
[   14.668944]  ? preempt_count_sub+0x50/0x80
[   14.668968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.668991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.669016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.669039]  kthread+0x337/0x6f0
[   14.669060]  ? trace_preempt_on+0x20/0xc0
[   14.669084]  ? __pfx_kthread+0x10/0x10
[   14.669106]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.669127]  ? calculate_sigpending+0x7b/0xa0
[   14.669152]  ? __pfx_kthread+0x10/0x10
[   14.669173]  ret_from_fork+0x116/0x1d0
[   14.669193]  ? __pfx_kthread+0x10/0x10
[   14.669213]  ret_from_fork_asm+0x1a/0x30
[   14.669253]  </TASK>
[   14.669276] 
[   14.679854] Allocated by task 282:
[   14.680090]  kasan_save_stack+0x45/0x70
[   14.680512]  kasan_save_track+0x18/0x40
[   14.680719]  kasan_save_alloc_info+0x3b/0x50
[   14.680950]  __kasan_kmalloc+0xb7/0xc0
[   14.681170]  __kmalloc_cache_noprof+0x189/0x420
[   14.681463]  kasan_atomics+0x95/0x310
[   14.681619]  kunit_try_run_case+0x1a5/0x480
[   14.681772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.681991]  kthread+0x337/0x6f0
[   14.682170]  ret_from_fork+0x116/0x1d0
[   14.682468]  ret_from_fork_asm+0x1a/0x30
[   14.682711] 
[   14.682812] The buggy address belongs to the object at ffff888103991d00
[   14.682812]  which belongs to the cache kmalloc-64 of size 64
[   14.683804] The buggy address is located 0 bytes to the right of
[   14.683804]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.684236] 
[   14.684363] The buggy address belongs to the physical page:
[   14.684636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.685115] flags: 0x200000000000000(node=0|zone=2)
[   14.685418] page_type: f5(slab)
[   14.685551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.685859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.686192] page dumped because: kasan: bad access detected
[   14.686451] 
[   14.686523] Memory state around the buggy address:
[   14.686685]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.687420]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.687738] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.687969]                                      ^
[   14.688283]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.688610]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.688897] ==================================================================
[   15.034320] ==================================================================
[   15.034642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.035024] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.035408] 
[   15.035507] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.035556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.035570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.035593] Call Trace:
[   15.035615]  <TASK>
[   15.035637]  dump_stack_lvl+0x73/0xb0
[   15.035669]  print_report+0xd1/0x650
[   15.035694]  ? __virt_addr_valid+0x1db/0x2d0
[   15.035719]  ? kasan_atomics_helper+0xde0/0x5450
[   15.035741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.035764]  ? kasan_atomics_helper+0xde0/0x5450
[   15.035786]  kasan_report+0x141/0x180
[   15.035809]  ? kasan_atomics_helper+0xde0/0x5450
[   15.035837]  kasan_check_range+0x10c/0x1c0
[   15.035864]  __kasan_check_write+0x18/0x20
[   15.035885]  kasan_atomics_helper+0xde0/0x5450
[   15.035909]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.035933]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.035958]  ? ret_from_fork_asm+0x1a/0x30
[   15.035982]  ? kasan_atomics+0x152/0x310
[   15.036009]  kasan_atomics+0x1dc/0x310
[   15.036035]  ? __pfx_kasan_atomics+0x10/0x10
[   15.036060]  ? __pfx_read_tsc+0x10/0x10
[   15.036083]  ? ktime_get_ts64+0x86/0x230
[   15.036108]  kunit_try_run_case+0x1a5/0x480
[   15.036133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.036156]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.036181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.036204]  ? __kthread_parkme+0x82/0x180
[   15.036240]  ? preempt_count_sub+0x50/0x80
[   15.036264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.036288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.036312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.036337]  kthread+0x337/0x6f0
[   15.036357]  ? trace_preempt_on+0x20/0xc0
[   15.036382]  ? __pfx_kthread+0x10/0x10
[   15.036414]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.036458]  ? calculate_sigpending+0x7b/0xa0
[   15.036483]  ? __pfx_kthread+0x10/0x10
[   15.036505]  ret_from_fork+0x116/0x1d0
[   15.036525]  ? __pfx_kthread+0x10/0x10
[   15.036545]  ret_from_fork_asm+0x1a/0x30
[   15.036576]  </TASK>
[   15.036589] 
[   15.044595] Allocated by task 282:
[   15.044790]  kasan_save_stack+0x45/0x70
[   15.045030]  kasan_save_track+0x18/0x40
[   15.045187]  kasan_save_alloc_info+0x3b/0x50
[   15.045557]  __kasan_kmalloc+0xb7/0xc0
[   15.045696]  __kmalloc_cache_noprof+0x189/0x420
[   15.045854]  kasan_atomics+0x95/0x310
[   15.045988]  kunit_try_run_case+0x1a5/0x480
[   15.046231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.046503]  kthread+0x337/0x6f0
[   15.046672]  ret_from_fork+0x116/0x1d0
[   15.046860]  ret_from_fork_asm+0x1a/0x30
[   15.047035] 
[   15.047108] The buggy address belongs to the object at ffff888103991d00
[   15.047108]  which belongs to the cache kmalloc-64 of size 64
[   15.047642] The buggy address is located 0 bytes to the right of
[   15.047642]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.048086] 
[   15.048163] The buggy address belongs to the physical page:
[   15.048428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.048836] flags: 0x200000000000000(node=0|zone=2)
[   15.049102] page_type: f5(slab)
[   15.049301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.049612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.049840] page dumped because: kasan: bad access detected
[   15.050014] 
[   15.050088] Memory state around the buggy address:
[   15.050264]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.050595]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.050930] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.051264]                                      ^
[   15.051555]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.051857]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.052180] ==================================================================
[   15.655500] ==================================================================
[   15.655809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.656159] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.656518] 
[   15.656653] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.656705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.656719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.656743] Call Trace:
[   15.656765]  <TASK>
[   15.656801]  dump_stack_lvl+0x73/0xb0
[   15.656846]  print_report+0xd1/0x650
[   15.656870]  ? __virt_addr_valid+0x1db/0x2d0
[   15.656895]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.656931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.656964]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.656987]  kasan_report+0x141/0x180
[   15.657021]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.657048]  kasan_check_range+0x10c/0x1c0
[   15.657072]  __kasan_check_write+0x18/0x20
[   15.657092]  kasan_atomics_helper+0x1c18/0x5450
[   15.657114]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.657137]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.657162]  ? ret_from_fork_asm+0x1a/0x30
[   15.657185]  ? kasan_atomics+0x152/0x310
[   15.657211]  kasan_atomics+0x1dc/0x310
[   15.657243]  ? __pfx_kasan_atomics+0x10/0x10
[   15.657280]  ? __pfx_read_tsc+0x10/0x10
[   15.657311]  ? ktime_get_ts64+0x86/0x230
[   15.657337]  kunit_try_run_case+0x1a5/0x480
[   15.657363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.657397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.657422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.657446]  ? __kthread_parkme+0x82/0x180
[   15.657467]  ? preempt_count_sub+0x50/0x80
[   15.657491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.657515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.657538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.657561]  kthread+0x337/0x6f0
[   15.657581]  ? trace_preempt_on+0x20/0xc0
[   15.657606]  ? __pfx_kthread+0x10/0x10
[   15.657626]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.657647]  ? calculate_sigpending+0x7b/0xa0
[   15.657672]  ? __pfx_kthread+0x10/0x10
[   15.657694]  ret_from_fork+0x116/0x1d0
[   15.657713]  ? __pfx_kthread+0x10/0x10
[   15.657743]  ret_from_fork_asm+0x1a/0x30
[   15.657774]  </TASK>
[   15.657786] 
[   15.665710] Allocated by task 282:
[   15.665921]  kasan_save_stack+0x45/0x70
[   15.666115]  kasan_save_track+0x18/0x40
[   15.666338]  kasan_save_alloc_info+0x3b/0x50
[   15.666552]  __kasan_kmalloc+0xb7/0xc0
[   15.666739]  __kmalloc_cache_noprof+0x189/0x420
[   15.666960]  kasan_atomics+0x95/0x310
[   15.667097]  kunit_try_run_case+0x1a5/0x480
[   15.667319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.667595]  kthread+0x337/0x6f0
[   15.667766]  ret_from_fork+0x116/0x1d0
[   15.667946]  ret_from_fork_asm+0x1a/0x30
[   15.668088] 
[   15.668185] The buggy address belongs to the object at ffff888103991d00
[   15.668185]  which belongs to the cache kmalloc-64 of size 64
[   15.668886] The buggy address is located 0 bytes to the right of
[   15.668886]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.669359] 
[   15.669459] The buggy address belongs to the physical page:
[   15.669825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.670317] flags: 0x200000000000000(node=0|zone=2)
[   15.670575] page_type: f5(slab)
[   15.670738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.671080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.671424] page dumped because: kasan: bad access detected
[   15.671727] 
[   15.671836] Memory state around the buggy address:
[   15.672060]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.672354]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.672684] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.672987]                                      ^
[   15.673172]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.673401]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.673617] ==================================================================
[   15.106528] ==================================================================
[   15.106988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.107264] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.107637] 
[   15.107773] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.107837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.107860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.107885] Call Trace:
[   15.107908]  <TASK>
[   15.107930]  dump_stack_lvl+0x73/0xb0
[   15.107963]  print_report+0xd1/0x650
[   15.108005]  ? __virt_addr_valid+0x1db/0x2d0
[   15.108043]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.108065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.108087]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.108109]  kasan_report+0x141/0x180
[   15.108132]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.108158]  kasan_check_range+0x10c/0x1c0
[   15.108184]  __kasan_check_write+0x18/0x20
[   15.108204]  kasan_atomics_helper+0xfa9/0x5450
[   15.108240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.108262]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.108287]  ? ret_from_fork_asm+0x1a/0x30
[   15.108311]  ? kasan_atomics+0x152/0x310
[   15.108337]  kasan_atomics+0x1dc/0x310
[   15.108360]  ? __pfx_kasan_atomics+0x10/0x10
[   15.108385]  ? __pfx_read_tsc+0x10/0x10
[   15.108419]  ? ktime_get_ts64+0x86/0x230
[   15.108444]  kunit_try_run_case+0x1a5/0x480
[   15.108470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.108492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.108517]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.108541]  ? __kthread_parkme+0x82/0x180
[   15.108563]  ? preempt_count_sub+0x50/0x80
[   15.108587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.108612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.108637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.108661]  kthread+0x337/0x6f0
[   15.108680]  ? trace_preempt_on+0x20/0xc0
[   15.108704]  ? __pfx_kthread+0x10/0x10
[   15.108725]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.108747]  ? calculate_sigpending+0x7b/0xa0
[   15.108771]  ? __pfx_kthread+0x10/0x10
[   15.108802]  ret_from_fork+0x116/0x1d0
[   15.108821]  ? __pfx_kthread+0x10/0x10
[   15.108841]  ret_from_fork_asm+0x1a/0x30
[   15.108873]  </TASK>
[   15.108885] 
[   15.117791] Allocated by task 282:
[   15.118006]  kasan_save_stack+0x45/0x70
[   15.118254]  kasan_save_track+0x18/0x40
[   15.118470]  kasan_save_alloc_info+0x3b/0x50
[   15.118690]  __kasan_kmalloc+0xb7/0xc0
[   15.118886]  __kmalloc_cache_noprof+0x189/0x420
[   15.119117]  kasan_atomics+0x95/0x310
[   15.119330]  kunit_try_run_case+0x1a5/0x480
[   15.119544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.119800]  kthread+0x337/0x6f0
[   15.119953]  ret_from_fork+0x116/0x1d0
[   15.120089]  ret_from_fork_asm+0x1a/0x30
[   15.120320] 
[   15.120402] The buggy address belongs to the object at ffff888103991d00
[   15.120402]  which belongs to the cache kmalloc-64 of size 64
[   15.120825] The buggy address is located 0 bytes to the right of
[   15.120825]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.121427] 
[   15.121504] The buggy address belongs to the physical page:
[   15.121681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.121919] flags: 0x200000000000000(node=0|zone=2)
[   15.122082] page_type: f5(slab)
[   15.122288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.122623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.122952] page dumped because: kasan: bad access detected
[   15.123306] 
[   15.123400] Memory state around the buggy address:
[   15.123605]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.123816]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.124026] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.124244]                                      ^
[   15.124477]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.125040]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.125604] ==================================================================
[   14.714090] ==================================================================
[   14.714664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.715052] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.715744] 
[   14.715867] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.715926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.715941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.715967] Call Trace:
[   14.715990]  <TASK>
[   14.716013]  dump_stack_lvl+0x73/0xb0
[   14.716047]  print_report+0xd1/0x650
[   14.716072]  ? __virt_addr_valid+0x1db/0x2d0
[   14.716095]  ? kasan_atomics_helper+0x697/0x5450
[   14.716117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.716140]  ? kasan_atomics_helper+0x697/0x5450
[   14.716161]  kasan_report+0x141/0x180
[   14.716185]  ? kasan_atomics_helper+0x697/0x5450
[   14.716491]  kasan_check_range+0x10c/0x1c0
[   14.716521]  __kasan_check_write+0x18/0x20
[   14.716541]  kasan_atomics_helper+0x697/0x5450
[   14.716564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.716587]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.716657]  ? ret_from_fork_asm+0x1a/0x30
[   14.716682]  ? kasan_atomics+0x152/0x310
[   14.716710]  kasan_atomics+0x1dc/0x310
[   14.716734]  ? __pfx_kasan_atomics+0x10/0x10
[   14.716758]  ? __pfx_read_tsc+0x10/0x10
[   14.716781]  ? ktime_get_ts64+0x86/0x230
[   14.716815]  kunit_try_run_case+0x1a5/0x480
[   14.716842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.716864]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.716889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.716913]  ? __kthread_parkme+0x82/0x180
[   14.716935]  ? preempt_count_sub+0x50/0x80
[   14.716960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.716984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.717006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.717030]  kthread+0x337/0x6f0
[   14.717052]  ? trace_preempt_on+0x20/0xc0
[   14.717076]  ? __pfx_kthread+0x10/0x10
[   14.717097]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.717118]  ? calculate_sigpending+0x7b/0xa0
[   14.717143]  ? __pfx_kthread+0x10/0x10
[   14.717164]  ret_from_fork+0x116/0x1d0
[   14.717184]  ? __pfx_kthread+0x10/0x10
[   14.717206]  ret_from_fork_asm+0x1a/0x30
[   14.717246]  </TASK>
[   14.717259] 
[   14.730972] Allocated by task 282:
[   14.731198]  kasan_save_stack+0x45/0x70
[   14.731719]  kasan_save_track+0x18/0x40
[   14.732069]  kasan_save_alloc_info+0x3b/0x50
[   14.732453]  __kasan_kmalloc+0xb7/0xc0
[   14.732742]  __kmalloc_cache_noprof+0x189/0x420
[   14.732977]  kasan_atomics+0x95/0x310
[   14.733159]  kunit_try_run_case+0x1a5/0x480
[   14.733678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.733994]  kthread+0x337/0x6f0
[   14.734317]  ret_from_fork+0x116/0x1d0
[   14.734626]  ret_from_fork_asm+0x1a/0x30
[   14.734820] 
[   14.734918] The buggy address belongs to the object at ffff888103991d00
[   14.734918]  which belongs to the cache kmalloc-64 of size 64
[   14.735663] The buggy address is located 0 bytes to the right of
[   14.735663]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.736660] 
[   14.736777] The buggy address belongs to the physical page:
[   14.737024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.737700] flags: 0x200000000000000(node=0|zone=2)
[   14.738016] page_type: f5(slab)
[   14.738325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.739068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.739632] page dumped because: kasan: bad access detected
[   14.739869] 
[   14.739959] Memory state around the buggy address:
[   14.740174]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.741331]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.741654] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.741943]                                      ^
[   14.742147]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.742899]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.743492] ==================================================================
[   14.521849] ==================================================================
[   14.522179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.523048] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.523726] 
[   14.523866] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.523920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.523932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.523957] Call Trace:
[   14.523979]  <TASK>
[   14.524000]  dump_stack_lvl+0x73/0xb0
[   14.524035]  print_report+0xd1/0x650
[   14.524059]  ? __virt_addr_valid+0x1db/0x2d0
[   14.524082]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.524103]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.524123]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.524144]  kasan_report+0x141/0x180
[   14.524165]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.524190]  __asan_report_load4_noabort+0x18/0x20
[   14.524504]  kasan_atomics_helper+0x4b88/0x5450
[   14.524530]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.524551]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.524577]  ? ret_from_fork_asm+0x1a/0x30
[   14.524608]  ? kasan_atomics+0x152/0x310
[   14.524633]  kasan_atomics+0x1dc/0x310
[   14.524656]  ? __pfx_kasan_atomics+0x10/0x10
[   14.524680]  ? __pfx_read_tsc+0x10/0x10
[   14.524701]  ? ktime_get_ts64+0x86/0x230
[   14.524725]  kunit_try_run_case+0x1a5/0x480
[   14.524750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.524771]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.524802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.524826]  ? __kthread_parkme+0x82/0x180
[   14.524847]  ? preempt_count_sub+0x50/0x80
[   14.524869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.524892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.524914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.524935]  kthread+0x337/0x6f0
[   14.524954]  ? trace_preempt_on+0x20/0xc0
[   14.524977]  ? __pfx_kthread+0x10/0x10
[   14.524997]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.525017]  ? calculate_sigpending+0x7b/0xa0
[   14.525041]  ? __pfx_kthread+0x10/0x10
[   14.525061]  ret_from_fork+0x116/0x1d0
[   14.525079]  ? __pfx_kthread+0x10/0x10
[   14.525099]  ret_from_fork_asm+0x1a/0x30
[   14.525127]  </TASK>
[   14.525140] 
[   14.537764] Allocated by task 282:
[   14.537982]  kasan_save_stack+0x45/0x70
[   14.538152]  kasan_save_track+0x18/0x40
[   14.538298]  kasan_save_alloc_info+0x3b/0x50
[   14.538593]  __kasan_kmalloc+0xb7/0xc0
[   14.539323]  __kmalloc_cache_noprof+0x189/0x420
[   14.539572]  kasan_atomics+0x95/0x310
[   14.539901]  kunit_try_run_case+0x1a5/0x480
[   14.540089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.540365]  kthread+0x337/0x6f0
[   14.540540]  ret_from_fork+0x116/0x1d0
[   14.540714]  ret_from_fork_asm+0x1a/0x30
[   14.540907] 
[   14.540983] The buggy address belongs to the object at ffff888103991d00
[   14.540983]  which belongs to the cache kmalloc-64 of size 64
[   14.541478] The buggy address is located 0 bytes to the right of
[   14.541478]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.542125] 
[   14.542286] The buggy address belongs to the physical page:
[   14.542518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.542850] flags: 0x200000000000000(node=0|zone=2)
[   14.543070] page_type: f5(slab)
[   14.543285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.543587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.543877] page dumped because: kasan: bad access detected
[   14.544087] 
[   14.544184] Memory state around the buggy address:
[   14.544835]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.545132]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.545422] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.545917]                                      ^
[   14.546084]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.546580]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.546963] ==================================================================
[   14.768902] ==================================================================
[   14.769589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.770246] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.771034] 
[   14.771314] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.771388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.771425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.771499] Call Trace:
[   14.771524]  <TASK>
[   14.771547]  dump_stack_lvl+0x73/0xb0
[   14.771583]  print_report+0xd1/0x650
[   14.771608]  ? __virt_addr_valid+0x1db/0x2d0
[   14.771633]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.771655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.771678]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.771701]  kasan_report+0x141/0x180
[   14.771724]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.771750]  kasan_check_range+0x10c/0x1c0
[   14.771774]  __kasan_check_write+0x18/0x20
[   14.771795]  kasan_atomics_helper+0x7c7/0x5450
[   14.771818]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.771840]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.771866]  ? ret_from_fork_asm+0x1a/0x30
[   14.771888]  ? kasan_atomics+0x152/0x310
[   14.771915]  kasan_atomics+0x1dc/0x310
[   14.771938]  ? __pfx_kasan_atomics+0x10/0x10
[   14.771962]  ? __pfx_read_tsc+0x10/0x10
[   14.771983]  ? ktime_get_ts64+0x86/0x230
[   14.772008]  kunit_try_run_case+0x1a5/0x480
[   14.772033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.772056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.772079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.772102]  ? __kthread_parkme+0x82/0x180
[   14.772127]  ? preempt_count_sub+0x50/0x80
[   14.772150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.772175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.772197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.772234]  kthread+0x337/0x6f0
[   14.772267]  ? trace_preempt_on+0x20/0xc0
[   14.772291]  ? __pfx_kthread+0x10/0x10
[   14.772312]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.772334]  ? calculate_sigpending+0x7b/0xa0
[   14.772358]  ? __pfx_kthread+0x10/0x10
[   14.772380]  ret_from_fork+0x116/0x1d0
[   14.772399]  ? __pfx_kthread+0x10/0x10
[   14.772420]  ret_from_fork_asm+0x1a/0x30
[   14.772449]  </TASK>
[   14.772462] 
[   14.786724] Allocated by task 282:
[   14.787184]  kasan_save_stack+0x45/0x70
[   14.787633]  kasan_save_track+0x18/0x40
[   14.787793]  kasan_save_alloc_info+0x3b/0x50
[   14.787941]  __kasan_kmalloc+0xb7/0xc0
[   14.788073]  __kmalloc_cache_noprof+0x189/0x420
[   14.788513]  kasan_atomics+0x95/0x310
[   14.788875]  kunit_try_run_case+0x1a5/0x480
[   14.789335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.789604]  kthread+0x337/0x6f0
[   14.789760]  ret_from_fork+0x116/0x1d0
[   14.789933]  ret_from_fork_asm+0x1a/0x30
[   14.790118] 
[   14.790211] The buggy address belongs to the object at ffff888103991d00
[   14.790211]  which belongs to the cache kmalloc-64 of size 64
[   14.791622] The buggy address is located 0 bytes to the right of
[   14.791622]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.792170] 
[   14.792572] The buggy address belongs to the physical page:
[   14.792968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.793974] flags: 0x200000000000000(node=0|zone=2)
[   14.794437] page_type: f5(slab)
[   14.794815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.795134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.795680] page dumped because: kasan: bad access detected
[   14.795958] 
[   14.796057] Memory state around the buggy address:
[   14.796538]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.797108]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.797932] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.798452]                                      ^
[   14.798895]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.799379]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.799851] ==================================================================
[   14.800551] ==================================================================
[   14.800899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.801571] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.802133] 
[   14.802403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.802462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.802487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.802513] Call Trace:
[   14.802544]  <TASK>
[   14.802567]  dump_stack_lvl+0x73/0xb0
[   14.802605]  print_report+0xd1/0x650
[   14.802629]  ? __virt_addr_valid+0x1db/0x2d0
[   14.802654]  ? kasan_atomics_helper+0x860/0x5450
[   14.802677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.802700]  ? kasan_atomics_helper+0x860/0x5450
[   14.802722]  kasan_report+0x141/0x180
[   14.802744]  ? kasan_atomics_helper+0x860/0x5450
[   14.802770]  kasan_check_range+0x10c/0x1c0
[   14.802795]  __kasan_check_write+0x18/0x20
[   14.802815]  kasan_atomics_helper+0x860/0x5450
[   14.802840]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.802863]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.802890]  ? ret_from_fork_asm+0x1a/0x30
[   14.802913]  ? kasan_atomics+0x152/0x310
[   14.802940]  kasan_atomics+0x1dc/0x310
[   14.802963]  ? __pfx_kasan_atomics+0x10/0x10
[   14.802988]  ? __pfx_read_tsc+0x10/0x10
[   14.803010]  ? ktime_get_ts64+0x86/0x230
[   14.803036]  kunit_try_run_case+0x1a5/0x480
[   14.803061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.803083]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.803107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.803130]  ? __kthread_parkme+0x82/0x180
[   14.803151]  ? preempt_count_sub+0x50/0x80
[   14.803175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.803199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.803236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.803260]  kthread+0x337/0x6f0
[   14.803281]  ? trace_preempt_on+0x20/0xc0
[   14.803305]  ? __pfx_kthread+0x10/0x10
[   14.803327]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.803348]  ? calculate_sigpending+0x7b/0xa0
[   14.803375]  ? __pfx_kthread+0x10/0x10
[   14.803399]  ret_from_fork+0x116/0x1d0
[   14.803418]  ? __pfx_kthread+0x10/0x10
[   14.803440]  ret_from_fork_asm+0x1a/0x30
[   14.803470]  </TASK>
[   14.803482] 
[   14.814465] Allocated by task 282:
[   14.814724]  kasan_save_stack+0x45/0x70
[   14.814901]  kasan_save_track+0x18/0x40
[   14.815039]  kasan_save_alloc_info+0x3b/0x50
[   14.815375]  __kasan_kmalloc+0xb7/0xc0
[   14.815635]  __kmalloc_cache_noprof+0x189/0x420
[   14.815833]  kasan_atomics+0x95/0x310
[   14.816093]  kunit_try_run_case+0x1a5/0x480
[   14.816350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.816522]  kthread+0x337/0x6f0
[   14.816668]  ret_from_fork+0x116/0x1d0
[   14.816867]  ret_from_fork_asm+0x1a/0x30
[   14.817069] 
[   14.817168] The buggy address belongs to the object at ffff888103991d00
[   14.817168]  which belongs to the cache kmalloc-64 of size 64
[   14.818517] The buggy address is located 0 bytes to the right of
[   14.818517]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.819045] 
[   14.819409] The buggy address belongs to the physical page:
[   14.819784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.820175] flags: 0x200000000000000(node=0|zone=2)
[   14.820456] page_type: f5(slab)
[   14.821049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.821734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.822142] page dumped because: kasan: bad access detected
[   14.822561] 
[   14.822885] Memory state around the buggy address:
[   14.823118]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.823583]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.823998] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.824451]                                      ^
[   14.824798]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825131]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825689] ==================================================================
[   15.084479] ==================================================================
[   15.084867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.085339] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.085692] 
[   15.085809] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.085861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.085876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.085900] Call Trace:
[   15.085922]  <TASK>
[   15.085944]  dump_stack_lvl+0x73/0xb0
[   15.085976]  print_report+0xd1/0x650
[   15.086001]  ? __virt_addr_valid+0x1db/0x2d0
[   15.086025]  ? kasan_atomics_helper+0xf10/0x5450
[   15.086048]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.086071]  ? kasan_atomics_helper+0xf10/0x5450
[   15.086093]  kasan_report+0x141/0x180
[   15.086116]  ? kasan_atomics_helper+0xf10/0x5450
[   15.086142]  kasan_check_range+0x10c/0x1c0
[   15.086166]  __kasan_check_write+0x18/0x20
[   15.086185]  kasan_atomics_helper+0xf10/0x5450
[   15.086209]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.086248]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.086293]  ? ret_from_fork_asm+0x1a/0x30
[   15.086339]  ? kasan_atomics+0x152/0x310
[   15.086367]  kasan_atomics+0x1dc/0x310
[   15.086406]  ? __pfx_kasan_atomics+0x10/0x10
[   15.086432]  ? __pfx_read_tsc+0x10/0x10
[   15.086468]  ? ktime_get_ts64+0x86/0x230
[   15.086494]  kunit_try_run_case+0x1a5/0x480
[   15.086520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.086542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.086567]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.086590]  ? __kthread_parkme+0x82/0x180
[   15.086612]  ? preempt_count_sub+0x50/0x80
[   15.086636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.086660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.086684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.086708]  kthread+0x337/0x6f0
[   15.086728]  ? trace_preempt_on+0x20/0xc0
[   15.086771]  ? __pfx_kthread+0x10/0x10
[   15.086793]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.086814]  ? calculate_sigpending+0x7b/0xa0
[   15.086839]  ? __pfx_kthread+0x10/0x10
[   15.086861]  ret_from_fork+0x116/0x1d0
[   15.086879]  ? __pfx_kthread+0x10/0x10
[   15.086900]  ret_from_fork_asm+0x1a/0x30
[   15.086948]  </TASK>
[   15.086961] 
[   15.097729] Allocated by task 282:
[   15.097887]  kasan_save_stack+0x45/0x70
[   15.098046]  kasan_save_track+0x18/0x40
[   15.098272]  kasan_save_alloc_info+0x3b/0x50
[   15.098513]  __kasan_kmalloc+0xb7/0xc0
[   15.098727]  __kmalloc_cache_noprof+0x189/0x420
[   15.099000]  kasan_atomics+0x95/0x310
[   15.099199]  kunit_try_run_case+0x1a5/0x480
[   15.099452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.099667]  kthread+0x337/0x6f0
[   15.099790]  ret_from_fork+0x116/0x1d0
[   15.099920]  ret_from_fork_asm+0x1a/0x30
[   15.100118] 
[   15.100251] The buggy address belongs to the object at ffff888103991d00
[   15.100251]  which belongs to the cache kmalloc-64 of size 64
[   15.100850] The buggy address is located 0 bytes to the right of
[   15.100850]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.101381] 
[   15.101458] The buggy address belongs to the physical page:
[   15.101651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.102024] flags: 0x200000000000000(node=0|zone=2)
[   15.102343] page_type: f5(slab)
[   15.102534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.102849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.103159] page dumped because: kasan: bad access detected
[   15.103442] 
[   15.103543] Memory state around the buggy address:
[   15.103772]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.104059]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.104280] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.104730]                                      ^
[   15.104966]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.105380]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.105708] ==================================================================
[   15.271275] ==================================================================
[   15.272019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.272514] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.272833] 
[   15.272954] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.273005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.273019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.273043] Call Trace:
[   15.273065]  <TASK>
[   15.273087]  dump_stack_lvl+0x73/0xb0
[   15.273122]  print_report+0xd1/0x650
[   15.273147]  ? __virt_addr_valid+0x1db/0x2d0
[   15.273173]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.273195]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.273231]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.273254]  kasan_report+0x141/0x180
[   15.273277]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.273303]  __asan_report_load4_noabort+0x18/0x20
[   15.273327]  kasan_atomics_helper+0x49e8/0x5450
[   15.273350]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.273373]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.273399]  ? ret_from_fork_asm+0x1a/0x30
[   15.273421]  ? kasan_atomics+0x152/0x310
[   15.273447]  kasan_atomics+0x1dc/0x310
[   15.273471]  ? __pfx_kasan_atomics+0x10/0x10
[   15.273495]  ? __pfx_read_tsc+0x10/0x10
[   15.273517]  ? ktime_get_ts64+0x86/0x230
[   15.273542]  kunit_try_run_case+0x1a5/0x480
[   15.273568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.273603]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.273628]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.273651]  ? __kthread_parkme+0x82/0x180
[   15.273672]  ? preempt_count_sub+0x50/0x80
[   15.273697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.273721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.273744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.273768]  kthread+0x337/0x6f0
[   15.273787]  ? trace_preempt_on+0x20/0xc0
[   15.273812]  ? __pfx_kthread+0x10/0x10
[   15.273833]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.273855]  ? calculate_sigpending+0x7b/0xa0
[   15.273880]  ? __pfx_kthread+0x10/0x10
[   15.273901]  ret_from_fork+0x116/0x1d0
[   15.273920]  ? __pfx_kthread+0x10/0x10
[   15.273941]  ret_from_fork_asm+0x1a/0x30
[   15.273971]  </TASK>
[   15.273983] 
[   15.281439] Allocated by task 282:
[   15.281628]  kasan_save_stack+0x45/0x70
[   15.281831]  kasan_save_track+0x18/0x40
[   15.282006]  kasan_save_alloc_info+0x3b/0x50
[   15.282196]  __kasan_kmalloc+0xb7/0xc0
[   15.282434]  __kmalloc_cache_noprof+0x189/0x420
[   15.282592]  kasan_atomics+0x95/0x310
[   15.282727]  kunit_try_run_case+0x1a5/0x480
[   15.282879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.283131]  kthread+0x337/0x6f0
[   15.283315]  ret_from_fork+0x116/0x1d0
[   15.283571]  ret_from_fork_asm+0x1a/0x30
[   15.283718] 
[   15.283791] The buggy address belongs to the object at ffff888103991d00
[   15.283791]  which belongs to the cache kmalloc-64 of size 64
[   15.284386] The buggy address is located 0 bytes to the right of
[   15.284386]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.284896] 
[   15.284990] The buggy address belongs to the physical page:
[   15.285167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.285424] flags: 0x200000000000000(node=0|zone=2)
[   15.285680] page_type: f5(slab)
[   15.285859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.286234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.286579] page dumped because: kasan: bad access detected
[   15.286837] 
[   15.286919] Memory state around the buggy address:
[   15.287122]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.287449]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.287693] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.287997]                                      ^
[   15.288235]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.288551]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.288854] ==================================================================
[   14.744156] ==================================================================
[   14.744550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.744919] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.745232] 
[   14.745330] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.745382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.745397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.745421] Call Trace:
[   14.745444]  <TASK>
[   14.745466]  dump_stack_lvl+0x73/0xb0
[   14.745518]  print_report+0xd1/0x650
[   14.745543]  ? __virt_addr_valid+0x1db/0x2d0
[   14.745566]  ? kasan_atomics_helper+0x72f/0x5450
[   14.745588]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.745611]  ? kasan_atomics_helper+0x72f/0x5450
[   14.745633]  kasan_report+0x141/0x180
[   14.745656]  ? kasan_atomics_helper+0x72f/0x5450
[   14.745682]  kasan_check_range+0x10c/0x1c0
[   14.745706]  __kasan_check_write+0x18/0x20
[   14.745724]  kasan_atomics_helper+0x72f/0x5450
[   14.745749]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.745771]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.745796]  ? ret_from_fork_asm+0x1a/0x30
[   14.745820]  ? kasan_atomics+0x152/0x310
[   14.745845]  kasan_atomics+0x1dc/0x310
[   14.745869]  ? __pfx_kasan_atomics+0x10/0x10
[   14.745892]  ? __pfx_read_tsc+0x10/0x10
[   14.745914]  ? ktime_get_ts64+0x86/0x230
[   14.745939]  kunit_try_run_case+0x1a5/0x480
[   14.745965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.745988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.746011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.746034]  ? __kthread_parkme+0x82/0x180
[   14.746056]  ? preempt_count_sub+0x50/0x80
[   14.746080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.746104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.746127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.746150]  kthread+0x337/0x6f0
[   14.746169]  ? trace_preempt_on+0x20/0xc0
[   14.746194]  ? __pfx_kthread+0x10/0x10
[   14.746214]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.746247]  ? calculate_sigpending+0x7b/0xa0
[   14.746271]  ? __pfx_kthread+0x10/0x10
[   14.746293]  ret_from_fork+0x116/0x1d0
[   14.746311]  ? __pfx_kthread+0x10/0x10
[   14.746332]  ret_from_fork_asm+0x1a/0x30
[   14.746362]  </TASK>
[   14.746376] 
[   14.755113] Allocated by task 282:
[   14.755330]  kasan_save_stack+0x45/0x70
[   14.755541]  kasan_save_track+0x18/0x40
[   14.755738]  kasan_save_alloc_info+0x3b/0x50
[   14.755912]  __kasan_kmalloc+0xb7/0xc0
[   14.756104]  __kmalloc_cache_noprof+0x189/0x420
[   14.757495]  kasan_atomics+0x95/0x310
[   14.757865]  kunit_try_run_case+0x1a5/0x480
[   14.758032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.758213]  kthread+0x337/0x6f0
[   14.758353]  ret_from_fork+0x116/0x1d0
[   14.758490]  ret_from_fork_asm+0x1a/0x30
[   14.758631] 
[   14.758709] The buggy address belongs to the object at ffff888103991d00
[   14.758709]  which belongs to the cache kmalloc-64 of size 64
[   14.759071] The buggy address is located 0 bytes to the right of
[   14.759071]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.760705] 
[   14.761174] The buggy address belongs to the physical page:
[   14.762077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.762562] flags: 0x200000000000000(node=0|zone=2)
[   14.762742] page_type: f5(slab)
[   14.762872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.763108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.763809] page dumped because: kasan: bad access detected
[   14.764296] 
[   14.764558] Memory state around the buggy address:
[   14.764963]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.765247]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.765915] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.766627]                                      ^
[   14.766864]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.767157]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.767682] ==================================================================
[   14.856144] ==================================================================
[   14.856891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.857439] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.857678] 
[   14.857801] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.857852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.857866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.857890] Call Trace:
[   14.857913]  <TASK>
[   14.857937]  dump_stack_lvl+0x73/0xb0
[   14.857973]  print_report+0xd1/0x650
[   14.857998]  ? __virt_addr_valid+0x1db/0x2d0
[   14.858021]  ? kasan_atomics_helper+0x992/0x5450
[   14.858043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.858066]  ? kasan_atomics_helper+0x992/0x5450
[   14.858357]  kasan_report+0x141/0x180
[   14.858382]  ? kasan_atomics_helper+0x992/0x5450
[   14.858408]  kasan_check_range+0x10c/0x1c0
[   14.858432]  __kasan_check_write+0x18/0x20
[   14.858453]  kasan_atomics_helper+0x992/0x5450
[   14.858475]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.858498]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.858523]  ? ret_from_fork_asm+0x1a/0x30
[   14.858547]  ? kasan_atomics+0x152/0x310
[   14.858573]  kasan_atomics+0x1dc/0x310
[   14.858596]  ? __pfx_kasan_atomics+0x10/0x10
[   14.858624]  ? __pfx_read_tsc+0x10/0x10
[   14.858648]  ? ktime_get_ts64+0x86/0x230
[   14.858673]  kunit_try_run_case+0x1a5/0x480
[   14.858699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.858722]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.858748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.858771]  ? __kthread_parkme+0x82/0x180
[   14.858793]  ? preempt_count_sub+0x50/0x80
[   14.858817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.858841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.858864]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.858888]  kthread+0x337/0x6f0
[   14.858908]  ? trace_preempt_on+0x20/0xc0
[   14.858932]  ? __pfx_kthread+0x10/0x10
[   14.858952]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.858974]  ? calculate_sigpending+0x7b/0xa0
[   14.858999]  ? __pfx_kthread+0x10/0x10
[   14.859021]  ret_from_fork+0x116/0x1d0
[   14.859040]  ? __pfx_kthread+0x10/0x10
[   14.859061]  ret_from_fork_asm+0x1a/0x30
[   14.859092]  </TASK>
[   14.859104] 
[   14.869753] Allocated by task 282:
[   14.870003]  kasan_save_stack+0x45/0x70
[   14.870172]  kasan_save_track+0x18/0x40
[   14.870350]  kasan_save_alloc_info+0x3b/0x50
[   14.870613]  __kasan_kmalloc+0xb7/0xc0
[   14.871022]  __kmalloc_cache_noprof+0x189/0x420
[   14.871244]  kasan_atomics+0x95/0x310
[   14.871437]  kunit_try_run_case+0x1a5/0x480
[   14.871990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872189]  kthread+0x337/0x6f0
[   14.872509]  ret_from_fork+0x116/0x1d0
[   14.872686]  ret_from_fork_asm+0x1a/0x30
[   14.872871] 
[   14.872974] The buggy address belongs to the object at ffff888103991d00
[   14.872974]  which belongs to the cache kmalloc-64 of size 64
[   14.873857] The buggy address is located 0 bytes to the right of
[   14.873857]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.874545] 
[   14.874745] The buggy address belongs to the physical page:
[   14.874985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.875249] flags: 0x200000000000000(node=0|zone=2)
[   14.875493] page_type: f5(slab)
[   14.875944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.876550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.877050] page dumped because: kasan: bad access detected
[   14.877404] 
[   14.877494] Memory state around the buggy address:
[   14.877754]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.878070]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.878567] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.878860]                                      ^
[   14.879185]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.879720]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.880041] ==================================================================
[   15.053918] ==================================================================
[   15.054872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.055153] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.055412] 
[   15.055510] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.055561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.055575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.055600] Call Trace:
[   15.055623]  <TASK>
[   15.055647]  dump_stack_lvl+0x73/0xb0
[   15.055683]  print_report+0xd1/0x650
[   15.055708]  ? __virt_addr_valid+0x1db/0x2d0
[   15.055732]  ? kasan_atomics_helper+0xe78/0x5450
[   15.055754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.055777]  ? kasan_atomics_helper+0xe78/0x5450
[   15.055799]  kasan_report+0x141/0x180
[   15.055821]  ? kasan_atomics_helper+0xe78/0x5450
[   15.055847]  kasan_check_range+0x10c/0x1c0
[   15.055871]  __kasan_check_write+0x18/0x20
[   15.055892]  kasan_atomics_helper+0xe78/0x5450
[   15.055917]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.055940]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.055965]  ? ret_from_fork_asm+0x1a/0x30
[   15.055988]  ? kasan_atomics+0x152/0x310
[   15.056015]  kasan_atomics+0x1dc/0x310
[   15.056038]  ? __pfx_kasan_atomics+0x10/0x10
[   15.056062]  ? __pfx_read_tsc+0x10/0x10
[   15.056084]  ? ktime_get_ts64+0x86/0x230
[   15.056110]  kunit_try_run_case+0x1a5/0x480
[   15.056135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.056158]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.056183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.056207]  ? __kthread_parkme+0x82/0x180
[   15.056239]  ? preempt_count_sub+0x50/0x80
[   15.056264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.056287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.056310]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.056334]  kthread+0x337/0x6f0
[   15.056355]  ? trace_preempt_on+0x20/0xc0
[   15.056379]  ? __pfx_kthread+0x10/0x10
[   15.056401]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.056422]  ? calculate_sigpending+0x7b/0xa0
[   15.056447]  ? __pfx_kthread+0x10/0x10
[   15.056471]  ret_from_fork+0x116/0x1d0
[   15.056491]  ? __pfx_kthread+0x10/0x10
[   15.056512]  ret_from_fork_asm+0x1a/0x30
[   15.056543]  </TASK>
[   15.056555] 
[   15.071884] Allocated by task 282:
[   15.072058]  kasan_save_stack+0x45/0x70
[   15.072216]  kasan_save_track+0x18/0x40
[   15.072665]  kasan_save_alloc_info+0x3b/0x50
[   15.073089]  __kasan_kmalloc+0xb7/0xc0
[   15.073524]  __kmalloc_cache_noprof+0x189/0x420
[   15.073961]  kasan_atomics+0x95/0x310
[   15.074374]  kunit_try_run_case+0x1a5/0x480
[   15.074786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.075296]  kthread+0x337/0x6f0
[   15.075538]  ret_from_fork+0x116/0x1d0
[   15.075896]  ret_from_fork_asm+0x1a/0x30
[   15.076036] 
[   15.076109] The buggy address belongs to the object at ffff888103991d00
[   15.076109]  which belongs to the cache kmalloc-64 of size 64
[   15.076565] The buggy address is located 0 bytes to the right of
[   15.076565]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.077673] 
[   15.077885] The buggy address belongs to the physical page:
[   15.078434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.079183] flags: 0x200000000000000(node=0|zone=2)
[   15.079709] page_type: f5(slab)
[   15.079937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.080165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.080735] page dumped because: kasan: bad access detected
[   15.081243] 
[   15.081428] Memory state around the buggy address:
[   15.081873]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.082512]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.082823] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.083033]                                      ^
[   15.083189]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.083495]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.083774] ==================================================================
[   15.605844] ==================================================================
[   15.606198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.606526] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.606751] 
[   15.606844] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.606890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.606903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.606927] Call Trace:
[   15.606950]  <TASK>
[   15.606971]  dump_stack_lvl+0x73/0xb0
[   15.607002]  print_report+0xd1/0x650
[   15.607027]  ? __virt_addr_valid+0x1db/0x2d0
[   15.607050]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.607072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.607095]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.607116]  kasan_report+0x141/0x180
[   15.607139]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.607176]  kasan_check_range+0x10c/0x1c0
[   15.607200]  __kasan_check_write+0x18/0x20
[   15.607236]  kasan_atomics_helper+0x1a7f/0x5450
[   15.607270]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.607292]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.607317]  ? ret_from_fork_asm+0x1a/0x30
[   15.607340]  ? kasan_atomics+0x152/0x310
[   15.607367]  kasan_atomics+0x1dc/0x310
[   15.607390]  ? __pfx_kasan_atomics+0x10/0x10
[   15.607414]  ? __pfx_read_tsc+0x10/0x10
[   15.607436]  ? ktime_get_ts64+0x86/0x230
[   15.607460]  kunit_try_run_case+0x1a5/0x480
[   15.607486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.607509]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.607533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.607557]  ? __kthread_parkme+0x82/0x180
[   15.607577]  ? preempt_count_sub+0x50/0x80
[   15.607602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.607627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.607650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.607673]  kthread+0x337/0x6f0
[   15.607692]  ? trace_preempt_on+0x20/0xc0
[   15.607716]  ? __pfx_kthread+0x10/0x10
[   15.607737]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.607758]  ? calculate_sigpending+0x7b/0xa0
[   15.607783]  ? __pfx_kthread+0x10/0x10
[   15.607805]  ret_from_fork+0x116/0x1d0
[   15.607824]  ? __pfx_kthread+0x10/0x10
[   15.607845]  ret_from_fork_asm+0x1a/0x30
[   15.607886]  </TASK>
[   15.607901] 
[   15.616024] Allocated by task 282:
[   15.616426]  kasan_save_stack+0x45/0x70
[   15.616693]  kasan_save_track+0x18/0x40
[   15.616903]  kasan_save_alloc_info+0x3b/0x50
[   15.617116]  __kasan_kmalloc+0xb7/0xc0
[   15.617275]  __kmalloc_cache_noprof+0x189/0x420
[   15.617505]  kasan_atomics+0x95/0x310
[   15.617703]  kunit_try_run_case+0x1a5/0x480
[   15.617899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.618126]  kthread+0x337/0x6f0
[   15.618369]  ret_from_fork+0x116/0x1d0
[   15.618569]  ret_from_fork_asm+0x1a/0x30
[   15.618795] 
[   15.618897] The buggy address belongs to the object at ffff888103991d00
[   15.618897]  which belongs to the cache kmalloc-64 of size 64
[   15.619512] The buggy address is located 0 bytes to the right of
[   15.619512]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.619882] 
[   15.620031] The buggy address belongs to the physical page:
[   15.620366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.620741] flags: 0x200000000000000(node=0|zone=2)
[   15.620989] page_type: f5(slab)
[   15.621114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.621363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.621597] page dumped because: kasan: bad access detected
[   15.621823] 
[   15.621933] Memory state around the buggy address:
[   15.622161]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.622791]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.623113] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.624393]                                      ^
[   15.624673]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.624912]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.625129] ==================================================================
[   15.961526] ==================================================================
[   15.961988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.963051] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.963342] 
[   15.963442] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.963493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.963507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.963532] Call Trace:
[   15.963554]  <TASK>
[   15.963577]  dump_stack_lvl+0x73/0xb0
[   15.963612]  print_report+0xd1/0x650
[   15.963637]  ? __virt_addr_valid+0x1db/0x2d0
[   15.963661]  ? kasan_atomics_helper+0x224c/0x5450
[   15.963683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.963705]  ? kasan_atomics_helper+0x224c/0x5450
[   15.963728]  kasan_report+0x141/0x180
[   15.963752]  ? kasan_atomics_helper+0x224c/0x5450
[   15.963778]  kasan_check_range+0x10c/0x1c0
[   15.963803]  __kasan_check_write+0x18/0x20
[   15.963823]  kasan_atomics_helper+0x224c/0x5450
[   15.963846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.963869]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.963894]  ? ret_from_fork_asm+0x1a/0x30
[   15.963916]  ? kasan_atomics+0x152/0x310
[   15.963943]  kasan_atomics+0x1dc/0x310
[   15.963966]  ? __pfx_kasan_atomics+0x10/0x10
[   15.963989]  ? __pfx_read_tsc+0x10/0x10
[   15.964014]  ? ktime_get_ts64+0x86/0x230
[   15.964073]  kunit_try_run_case+0x1a5/0x480
[   15.964105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.964128]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.964152]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.964176]  ? __kthread_parkme+0x82/0x180
[   15.964196]  ? preempt_count_sub+0x50/0x80
[   15.964252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.964277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.964299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.964322]  kthread+0x337/0x6f0
[   15.964343]  ? trace_preempt_on+0x20/0xc0
[   15.964367]  ? __pfx_kthread+0x10/0x10
[   15.964387]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.964409]  ? calculate_sigpending+0x7b/0xa0
[   15.964434]  ? __pfx_kthread+0x10/0x10
[   15.964456]  ret_from_fork+0x116/0x1d0
[   15.964475]  ? __pfx_kthread+0x10/0x10
[   15.964496]  ret_from_fork_asm+0x1a/0x30
[   15.964527]  </TASK>
[   15.964540] 
[   15.972891] Allocated by task 282:
[   15.973118]  kasan_save_stack+0x45/0x70
[   15.973358]  kasan_save_track+0x18/0x40
[   15.973535]  kasan_save_alloc_info+0x3b/0x50
[   15.973682]  __kasan_kmalloc+0xb7/0xc0
[   15.973811]  __kmalloc_cache_noprof+0x189/0x420
[   15.973964]  kasan_atomics+0x95/0x310
[   15.974148]  kunit_try_run_case+0x1a5/0x480
[   15.974360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.974615]  kthread+0x337/0x6f0
[   15.974783]  ret_from_fork+0x116/0x1d0
[   15.974943]  ret_from_fork_asm+0x1a/0x30
[   15.975080] 
[   15.975151] The buggy address belongs to the object at ffff888103991d00
[   15.975151]  which belongs to the cache kmalloc-64 of size 64
[   15.975907] The buggy address is located 0 bytes to the right of
[   15.975907]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.976437] 
[   15.976528] The buggy address belongs to the physical page:
[   15.976762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.977071] flags: 0x200000000000000(node=0|zone=2)
[   15.977249] page_type: f5(slab)
[   15.977371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.977713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.978058] page dumped because: kasan: bad access detected
[   15.978238] 
[   15.978346] Memory state around the buggy address:
[   15.978576]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.978865]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.979150] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.979427]                                      ^
[   15.979580]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.979790]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.980092] ==================================================================
[   14.457496] ==================================================================
[   14.458787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.459571] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.460624] 
[   14.461031] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.461309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.461368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.461394] Call Trace:
[   14.461414]  <TASK>
[   14.461439]  dump_stack_lvl+0x73/0xb0
[   14.461482]  print_report+0xd1/0x650
[   14.461506]  ? __virt_addr_valid+0x1db/0x2d0
[   14.461528]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.461549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.461571]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.461591]  kasan_report+0x141/0x180
[   14.461612]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.461637]  __asan_report_load4_noabort+0x18/0x20
[   14.461660]  kasan_atomics_helper+0x4bbc/0x5450
[   14.461681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.461702]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.461726]  ? ret_from_fork_asm+0x1a/0x30
[   14.461747]  ? kasan_atomics+0x152/0x310
[   14.461771]  kasan_atomics+0x1dc/0x310
[   14.461793]  ? __pfx_kasan_atomics+0x10/0x10
[   14.461816]  ? __pfx_read_tsc+0x10/0x10
[   14.461836]  ? ktime_get_ts64+0x86/0x230
[   14.461859]  kunit_try_run_case+0x1a5/0x480
[   14.461885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.461906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.461930]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.461952]  ? __kthread_parkme+0x82/0x180
[   14.461972]  ? preempt_count_sub+0x50/0x80
[   14.461994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.462017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.462038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.462061]  kthread+0x337/0x6f0
[   14.462081]  ? trace_preempt_on+0x20/0xc0
[   14.462104]  ? __pfx_kthread+0x10/0x10
[   14.462123]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.462143]  ? calculate_sigpending+0x7b/0xa0
[   14.462166]  ? __pfx_kthread+0x10/0x10
[   14.462187]  ret_from_fork+0x116/0x1d0
[   14.462234]  ? __pfx_kthread+0x10/0x10
[   14.462254]  ret_from_fork_asm+0x1a/0x30
[   14.462284]  </TASK>
[   14.462296] 
[   14.479346] Allocated by task 282:
[   14.479559]  kasan_save_stack+0x45/0x70
[   14.479768]  kasan_save_track+0x18/0x40
[   14.479941]  kasan_save_alloc_info+0x3b/0x50
[   14.480133]  __kasan_kmalloc+0xb7/0xc0
[   14.480671]  __kmalloc_cache_noprof+0x189/0x420
[   14.481044]  kasan_atomics+0x95/0x310
[   14.481522]  kunit_try_run_case+0x1a5/0x480
[   14.481791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.482209]  kthread+0x337/0x6f0
[   14.482533]  ret_from_fork+0x116/0x1d0
[   14.482748]  ret_from_fork_asm+0x1a/0x30
[   14.482950] 
[   14.483086] The buggy address belongs to the object at ffff888103991d00
[   14.483086]  which belongs to the cache kmalloc-64 of size 64
[   14.484077] The buggy address is located 0 bytes to the right of
[   14.484077]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.484958] 
[   14.485237] The buggy address belongs to the physical page:
[   14.485701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.486046] flags: 0x200000000000000(node=0|zone=2)
[   14.486569] page_type: f5(slab)
[   14.486801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.487373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.487877] page dumped because: kasan: bad access detected
[   14.488085] 
[   14.488178] Memory state around the buggy address:
[   14.488721]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.489294]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.489595] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.489887]                                      ^
[   14.490096]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.490757]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.491256] ==================================================================
[   15.175725] ==================================================================
[   15.176903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.177911] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.178905] 
[   15.179229] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.179366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.179381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.179407] Call Trace:
[   15.179430]  <TASK>
[   15.179453]  dump_stack_lvl+0x73/0xb0
[   15.179496]  print_report+0xd1/0x650
[   15.179523]  ? __virt_addr_valid+0x1db/0x2d0
[   15.179552]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.179575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.179714]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.179742]  kasan_report+0x141/0x180
[   15.179767]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.179794]  __asan_report_load4_noabort+0x18/0x20
[   15.179820]  kasan_atomics_helper+0x4a1c/0x5450
[   15.179842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.179865]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.179891]  ? ret_from_fork_asm+0x1a/0x30
[   15.179914]  ? kasan_atomics+0x152/0x310
[   15.179940]  kasan_atomics+0x1dc/0x310
[   15.179965]  ? __pfx_kasan_atomics+0x10/0x10
[   15.179992]  ? __pfx_read_tsc+0x10/0x10
[   15.180017]  ? ktime_get_ts64+0x86/0x230
[   15.180042]  kunit_try_run_case+0x1a5/0x480
[   15.180068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.180091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.180116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.180139]  ? __kthread_parkme+0x82/0x180
[   15.180161]  ? preempt_count_sub+0x50/0x80
[   15.180186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.180209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.180270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.180295]  kthread+0x337/0x6f0
[   15.180314]  ? trace_preempt_on+0x20/0xc0
[   15.180338]  ? __pfx_kthread+0x10/0x10
[   15.180359]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.180381]  ? calculate_sigpending+0x7b/0xa0
[   15.180405]  ? __pfx_kthread+0x10/0x10
[   15.180427]  ret_from_fork+0x116/0x1d0
[   15.180447]  ? __pfx_kthread+0x10/0x10
[   15.180469]  ret_from_fork_asm+0x1a/0x30
[   15.180500]  </TASK>
[   15.180512] 
[   15.191303] Allocated by task 282:
[   15.191531]  kasan_save_stack+0x45/0x70
[   15.191883]  kasan_save_track+0x18/0x40
[   15.192080]  kasan_save_alloc_info+0x3b/0x50
[   15.192485]  __kasan_kmalloc+0xb7/0xc0
[   15.192663]  __kmalloc_cache_noprof+0x189/0x420
[   15.193003]  kasan_atomics+0x95/0x310
[   15.193190]  kunit_try_run_case+0x1a5/0x480
[   15.193600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.193786]  kthread+0x337/0x6f0
[   15.193913]  ret_from_fork+0x116/0x1d0
[   15.194108]  ret_from_fork_asm+0x1a/0x30
[   15.194463] 
[   15.194673] The buggy address belongs to the object at ffff888103991d00
[   15.194673]  which belongs to the cache kmalloc-64 of size 64
[   15.195228] The buggy address is located 0 bytes to the right of
[   15.195228]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.195755] 
[   15.195980] The buggy address belongs to the physical page:
[   15.196370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.196813] flags: 0x200000000000000(node=0|zone=2)
[   15.197127] page_type: f5(slab)
[   15.197351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.197745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.198067] page dumped because: kasan: bad access detected
[   15.198294] 
[   15.198401] Memory state around the buggy address:
[   15.198588]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.199059]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.199519] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.199875]                                      ^
[   15.200062]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200415]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200741] ==================================================================
[   15.674148] ==================================================================
[   15.674512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.675164] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.675679] 
[   15.675782] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.675841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.675856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.675888] Call Trace:
[   15.675910]  <TASK>
[   15.675933]  dump_stack_lvl+0x73/0xb0
[   15.675966]  print_report+0xd1/0x650
[   15.675992]  ? __virt_addr_valid+0x1db/0x2d0
[   15.676017]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.676042]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.676067]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.676090]  kasan_report+0x141/0x180
[   15.676113]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.676141]  __asan_report_load8_noabort+0x18/0x20
[   15.676166]  kasan_atomics_helper+0x4f30/0x5450
[   15.676190]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.676213]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.676250]  ? ret_from_fork_asm+0x1a/0x30
[   15.676286]  ? kasan_atomics+0x152/0x310
[   15.676314]  kasan_atomics+0x1dc/0x310
[   15.676339]  ? __pfx_kasan_atomics+0x10/0x10
[   15.676365]  ? __pfx_read_tsc+0x10/0x10
[   15.676388]  ? ktime_get_ts64+0x86/0x230
[   15.676414]  kunit_try_run_case+0x1a5/0x480
[   15.676441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.676467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.676495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.676521]  ? __kthread_parkme+0x82/0x180
[   15.676544]  ? preempt_count_sub+0x50/0x80
[   15.676582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.676609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.676633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.676677]  kthread+0x337/0x6f0
[   15.676699]  ? trace_preempt_on+0x20/0xc0
[   15.676723]  ? __pfx_kthread+0x10/0x10
[   15.676755]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.676777]  ? calculate_sigpending+0x7b/0xa0
[   15.676817]  ? __pfx_kthread+0x10/0x10
[   15.676839]  ret_from_fork+0x116/0x1d0
[   15.676857]  ? __pfx_kthread+0x10/0x10
[   15.676878]  ret_from_fork_asm+0x1a/0x30
[   15.676909]  </TASK>
[   15.676923] 
[   15.684758] Allocated by task 282:
[   15.684983]  kasan_save_stack+0x45/0x70
[   15.685246]  kasan_save_track+0x18/0x40
[   15.685472]  kasan_save_alloc_info+0x3b/0x50
[   15.685829]  __kasan_kmalloc+0xb7/0xc0
[   15.686025]  __kmalloc_cache_noprof+0x189/0x420
[   15.686286]  kasan_atomics+0x95/0x310
[   15.686488]  kunit_try_run_case+0x1a5/0x480
[   15.686651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.687001]  kthread+0x337/0x6f0
[   15.687199]  ret_from_fork+0x116/0x1d0
[   15.687406]  ret_from_fork_asm+0x1a/0x30
[   15.687694] 
[   15.687783] The buggy address belongs to the object at ffff888103991d00
[   15.687783]  which belongs to the cache kmalloc-64 of size 64
[   15.688294] The buggy address is located 0 bytes to the right of
[   15.688294]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.688814] 
[   15.688936] The buggy address belongs to the physical page:
[   15.689131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.689535] flags: 0x200000000000000(node=0|zone=2)
[   15.689712] page_type: f5(slab)
[   15.689837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.690069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.690313] page dumped because: kasan: bad access detected
[   15.690486] 
[   15.690556] Memory state around the buggy address:
[   15.692594]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.693002]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.693431] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.693653]                                      ^
[   15.693814]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694096]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694354] ==================================================================
[   15.784920] ==================================================================
[   15.785552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.785867] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.786179] 
[   15.786324] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.786372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.786385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.786409] Call Trace:
[   15.786430]  <TASK>
[   15.786451]  dump_stack_lvl+0x73/0xb0
[   15.786482]  print_report+0xd1/0x650
[   15.786505]  ? __virt_addr_valid+0x1db/0x2d0
[   15.786528]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.786550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.786573]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.786594]  kasan_report+0x141/0x180
[   15.786617]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.786644]  kasan_check_range+0x10c/0x1c0
[   15.786671]  __kasan_check_write+0x18/0x20
[   15.786691]  kasan_atomics_helper+0x1f43/0x5450
[   15.786715]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.786737]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.786763]  ? ret_from_fork_asm+0x1a/0x30
[   15.786787]  ? kasan_atomics+0x152/0x310
[   15.786813]  kasan_atomics+0x1dc/0x310
[   15.786836]  ? __pfx_kasan_atomics+0x10/0x10
[   15.786861]  ? __pfx_read_tsc+0x10/0x10
[   15.786883]  ? ktime_get_ts64+0x86/0x230
[   15.786909]  kunit_try_run_case+0x1a5/0x480
[   15.786934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.786956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.786981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.787004]  ? __kthread_parkme+0x82/0x180
[   15.787024]  ? preempt_count_sub+0x50/0x80
[   15.787049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.787072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.787096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.787119]  kthread+0x337/0x6f0
[   15.787138]  ? trace_preempt_on+0x20/0xc0
[   15.787162]  ? __pfx_kthread+0x10/0x10
[   15.787183]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.787204]  ? calculate_sigpending+0x7b/0xa0
[   15.787240]  ? __pfx_kthread+0x10/0x10
[   15.787276]  ret_from_fork+0x116/0x1d0
[   15.787295]  ? __pfx_kthread+0x10/0x10
[   15.787316]  ret_from_fork_asm+0x1a/0x30
[   15.787346]  </TASK>
[   15.787358] 
[   15.794533] Allocated by task 282:
[   15.794746]  kasan_save_stack+0x45/0x70
[   15.794956]  kasan_save_track+0x18/0x40
[   15.795149]  kasan_save_alloc_info+0x3b/0x50
[   15.795392]  __kasan_kmalloc+0xb7/0xc0
[   15.795585]  __kmalloc_cache_noprof+0x189/0x420
[   15.795812]  kasan_atomics+0x95/0x310
[   15.796002]  kunit_try_run_case+0x1a5/0x480
[   15.796214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.796509]  kthread+0x337/0x6f0
[   15.796667]  ret_from_fork+0x116/0x1d0
[   15.796857]  ret_from_fork_asm+0x1a/0x30
[   15.797020] 
[   15.797093] The buggy address belongs to the object at ffff888103991d00
[   15.797093]  which belongs to the cache kmalloc-64 of size 64
[   15.797701] The buggy address is located 0 bytes to the right of
[   15.797701]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.798425] 
[   15.798529] The buggy address belongs to the physical page:
[   15.798770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.799087] flags: 0x200000000000000(node=0|zone=2)
[   15.799266] page_type: f5(slab)
[   15.799441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.799788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.800096] page dumped because: kasan: bad access detected
[   15.800280] 
[   15.800351] Memory state around the buggy address:
[   15.800509]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.800726]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.801075] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.801419]                                      ^
[   15.801719]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801933]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.802146] ==================================================================
[   14.826402] ==================================================================
[   14.826836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.827253] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.828388] 
[   14.828694] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.828757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.828773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.828810] Call Trace:
[   14.828833]  <TASK>
[   14.828856]  dump_stack_lvl+0x73/0xb0
[   14.828899]  print_report+0xd1/0x650
[   14.828925]  ? __virt_addr_valid+0x1db/0x2d0
[   14.828950]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.828973]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.828996]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.829018]  kasan_report+0x141/0x180
[   14.829041]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.829067]  kasan_check_range+0x10c/0x1c0
[   14.829092]  __kasan_check_write+0x18/0x20
[   14.829114]  kasan_atomics_helper+0x8f9/0x5450
[   14.829137]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.829160]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.829185]  ? ret_from_fork_asm+0x1a/0x30
[   14.829237]  ? kasan_atomics+0x152/0x310
[   14.829264]  kasan_atomics+0x1dc/0x310
[   14.829287]  ? __pfx_kasan_atomics+0x10/0x10
[   14.829313]  ? __pfx_read_tsc+0x10/0x10
[   14.829335]  ? ktime_get_ts64+0x86/0x230
[   14.829360]  kunit_try_run_case+0x1a5/0x480
[   14.829386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.829433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.829456]  ? __kthread_parkme+0x82/0x180
[   14.829477]  ? preempt_count_sub+0x50/0x80
[   14.829502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.829571]  kthread+0x337/0x6f0
[   14.829591]  ? trace_preempt_on+0x20/0xc0
[   14.829615]  ? __pfx_kthread+0x10/0x10
[   14.829636]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.829657]  ? calculate_sigpending+0x7b/0xa0
[   14.829682]  ? __pfx_kthread+0x10/0x10
[   14.829703]  ret_from_fork+0x116/0x1d0
[   14.829722]  ? __pfx_kthread+0x10/0x10
[   14.829742]  ret_from_fork_asm+0x1a/0x30
[   14.829773]  </TASK>
[   14.829784] 
[   14.844408] Allocated by task 282:
[   14.844691]  kasan_save_stack+0x45/0x70
[   14.844870]  kasan_save_track+0x18/0x40
[   14.845008]  kasan_save_alloc_info+0x3b/0x50
[   14.845159]  __kasan_kmalloc+0xb7/0xc0
[   14.845315]  __kmalloc_cache_noprof+0x189/0x420
[   14.845587]  kasan_atomics+0x95/0x310
[   14.845807]  kunit_try_run_case+0x1a5/0x480
[   14.846000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.846365]  kthread+0x337/0x6f0
[   14.846593]  ret_from_fork+0x116/0x1d0
[   14.846824]  ret_from_fork_asm+0x1a/0x30
[   14.846965] 
[   14.847069] The buggy address belongs to the object at ffff888103991d00
[   14.847069]  which belongs to the cache kmalloc-64 of size 64
[   14.847819] The buggy address is located 0 bytes to the right of
[   14.847819]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.848439] 
[   14.848523] The buggy address belongs to the physical page:
[   14.849009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.849760] flags: 0x200000000000000(node=0|zone=2)
[   14.850001] page_type: f5(slab)
[   14.850175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.850924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.851480] page dumped because: kasan: bad access detected
[   14.851897] 
[   14.851979] Memory state around the buggy address:
[   14.852433]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.852862]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.853755] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.854065]                                      ^
[   14.854407]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.854742]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.855046] ==================================================================
[   15.861338] ==================================================================
[   15.861757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.862032] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.862502] 
[   15.862670] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.862733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.862746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.862782] Call Trace:
[   15.862804]  <TASK>
[   15.862827]  dump_stack_lvl+0x73/0xb0
[   15.862858]  print_report+0xd1/0x650
[   15.862882]  ? __virt_addr_valid+0x1db/0x2d0
[   15.862915]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.862937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.862960]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.862993]  kasan_report+0x141/0x180
[   15.863015]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.863041]  __asan_report_load8_noabort+0x18/0x20
[   15.863066]  kasan_atomics_helper+0x4f98/0x5450
[   15.863098]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.863120]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.863145]  ? ret_from_fork_asm+0x1a/0x30
[   15.863178]  ? kasan_atomics+0x152/0x310
[   15.863205]  kasan_atomics+0x1dc/0x310
[   15.863238]  ? __pfx_kasan_atomics+0x10/0x10
[   15.863262]  ? __pfx_read_tsc+0x10/0x10
[   15.863292]  ? ktime_get_ts64+0x86/0x230
[   15.863318]  kunit_try_run_case+0x1a5/0x480
[   15.863353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.863377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.863400]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.863424]  ? __kthread_parkme+0x82/0x180
[   15.863445]  ? preempt_count_sub+0x50/0x80
[   15.863469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.863493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.863516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.863540]  kthread+0x337/0x6f0
[   15.863560]  ? trace_preempt_on+0x20/0xc0
[   15.863583]  ? __pfx_kthread+0x10/0x10
[   15.863604]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.863625]  ? calculate_sigpending+0x7b/0xa0
[   15.863659]  ? __pfx_kthread+0x10/0x10
[   15.863681]  ret_from_fork+0x116/0x1d0
[   15.863700]  ? __pfx_kthread+0x10/0x10
[   15.863731]  ret_from_fork_asm+0x1a/0x30
[   15.863764]  </TASK>
[   15.863777] 
[   15.871563] Allocated by task 282:
[   15.871722]  kasan_save_stack+0x45/0x70
[   15.871920]  kasan_save_track+0x18/0x40
[   15.872112]  kasan_save_alloc_info+0x3b/0x50
[   15.872328]  __kasan_kmalloc+0xb7/0xc0
[   15.872499]  __kmalloc_cache_noprof+0x189/0x420
[   15.872664]  kasan_atomics+0x95/0x310
[   15.872808]  kunit_try_run_case+0x1a5/0x480
[   15.873188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.873725]  kthread+0x337/0x6f0
[   15.873870]  ret_from_fork+0x116/0x1d0
[   15.874046]  ret_from_fork_asm+0x1a/0x30
[   15.874189] 
[   15.874272] The buggy address belongs to the object at ffff888103991d00
[   15.874272]  which belongs to the cache kmalloc-64 of size 64
[   15.874821] The buggy address is located 0 bytes to the right of
[   15.874821]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.875529] 
[   15.875720] The buggy address belongs to the physical page:
[   15.875920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.876163] flags: 0x200000000000000(node=0|zone=2)
[   15.876344] page_type: f5(slab)
[   15.876550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.876906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.877280] page dumped because: kasan: bad access detected
[   15.877582] 
[   15.877735] Memory state around the buggy address:
[   15.877987]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.878214]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.878440] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.878749]                                      ^
[   15.878970]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.879334]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.879560] ==================================================================
[   14.995721] ==================================================================
[   14.996913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.997408] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.997730] 
[   14.997844] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.997893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.997906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.997930] Call Trace:
[   14.997952]  <TASK>
[   14.997973]  dump_stack_lvl+0x73/0xb0
[   14.998006]  print_report+0xd1/0x650
[   14.998030]  ? __virt_addr_valid+0x1db/0x2d0
[   14.998054]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.998077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.998099]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.998121]  kasan_report+0x141/0x180
[   14.998143]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.998169]  __asan_report_load4_noabort+0x18/0x20
[   14.998194]  kasan_atomics_helper+0x4a84/0x5450
[   14.998216]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.998253]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.998292]  ? ret_from_fork_asm+0x1a/0x30
[   14.998316]  ? kasan_atomics+0x152/0x310
[   14.998342]  kasan_atomics+0x1dc/0x310
[   14.998365]  ? __pfx_kasan_atomics+0x10/0x10
[   14.998389]  ? __pfx_read_tsc+0x10/0x10
[   14.998411]  ? ktime_get_ts64+0x86/0x230
[   14.998437]  kunit_try_run_case+0x1a5/0x480
[   14.998462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.998485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.998509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.998532]  ? __kthread_parkme+0x82/0x180
[   14.998553]  ? preempt_count_sub+0x50/0x80
[   14.998579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.998603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.998625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.998649]  kthread+0x337/0x6f0
[   14.998670]  ? trace_preempt_on+0x20/0xc0
[   14.998694]  ? __pfx_kthread+0x10/0x10
[   14.998715]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.998736]  ? calculate_sigpending+0x7b/0xa0
[   14.998761]  ? __pfx_kthread+0x10/0x10
[   14.998782]  ret_from_fork+0x116/0x1d0
[   14.998801]  ? __pfx_kthread+0x10/0x10
[   14.998823]  ret_from_fork_asm+0x1a/0x30
[   14.998854]  </TASK>
[   14.998867] 
[   15.006256] Allocated by task 282:
[   15.006466]  kasan_save_stack+0x45/0x70
[   15.006677]  kasan_save_track+0x18/0x40
[   15.006866]  kasan_save_alloc_info+0x3b/0x50
[   15.007041]  __kasan_kmalloc+0xb7/0xc0
[   15.007225]  __kmalloc_cache_noprof+0x189/0x420
[   15.007382]  kasan_atomics+0x95/0x310
[   15.007516]  kunit_try_run_case+0x1a5/0x480
[   15.007664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.007838]  kthread+0x337/0x6f0
[   15.007962]  ret_from_fork+0x116/0x1d0
[   15.008096]  ret_from_fork_asm+0x1a/0x30
[   15.008354] 
[   15.008466] The buggy address belongs to the object at ffff888103991d00
[   15.008466]  which belongs to the cache kmalloc-64 of size 64
[   15.009004] The buggy address is located 0 bytes to the right of
[   15.009004]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.009757] 
[   15.009833] The buggy address belongs to the physical page:
[   15.010007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.010259] flags: 0x200000000000000(node=0|zone=2)
[   15.010424] page_type: f5(slab)
[   15.010547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.010775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.011558] page dumped because: kasan: bad access detected
[   15.011813] 
[   15.011908] Memory state around the buggy address:
[   15.012138]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.012627]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.012958] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.013284]                                      ^
[   15.013567]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.013827]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.014129] ==================================================================
[   15.222987] ==================================================================
[   15.223412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.224351] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.224997] 
[   15.225109] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.225162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.225175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.225200] Call Trace:
[   15.225234]  <TASK>
[   15.225256]  dump_stack_lvl+0x73/0xb0
[   15.225293]  print_report+0xd1/0x650
[   15.225318]  ? __virt_addr_valid+0x1db/0x2d0
[   15.225342]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.225365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.225388]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.225410]  kasan_report+0x141/0x180
[   15.225432]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.225459]  __asan_report_load4_noabort+0x18/0x20
[   15.225485]  kasan_atomics_helper+0x4a02/0x5450
[   15.225509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.225531]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.225557]  ? ret_from_fork_asm+0x1a/0x30
[   15.225580]  ? kasan_atomics+0x152/0x310
[   15.225607]  kasan_atomics+0x1dc/0x310
[   15.225630]  ? __pfx_kasan_atomics+0x10/0x10
[   15.225655]  ? __pfx_read_tsc+0x10/0x10
[   15.225676]  ? ktime_get_ts64+0x86/0x230
[   15.225702]  kunit_try_run_case+0x1a5/0x480
[   15.225727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.225750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.225775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.225798]  ? __kthread_parkme+0x82/0x180
[   15.225820]  ? preempt_count_sub+0x50/0x80
[   15.225844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.225868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.225891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.225915]  kthread+0x337/0x6f0
[   15.225935]  ? trace_preempt_on+0x20/0xc0
[   15.225960]  ? __pfx_kthread+0x10/0x10
[   15.225981]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.226003]  ? calculate_sigpending+0x7b/0xa0
[   15.226027]  ? __pfx_kthread+0x10/0x10
[   15.226049]  ret_from_fork+0x116/0x1d0
[   15.226068]  ? __pfx_kthread+0x10/0x10
[   15.226089]  ret_from_fork_asm+0x1a/0x30
[   15.226119]  </TASK>
[   15.226132] 
[   15.236541] Allocated by task 282:
[   15.236764]  kasan_save_stack+0x45/0x70
[   15.236984]  kasan_save_track+0x18/0x40
[   15.237162]  kasan_save_alloc_info+0x3b/0x50
[   15.237818]  __kasan_kmalloc+0xb7/0xc0
[   15.238080]  __kmalloc_cache_noprof+0x189/0x420
[   15.238524]  kasan_atomics+0x95/0x310
[   15.238783]  kunit_try_run_case+0x1a5/0x480
[   15.239093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.239558]  kthread+0x337/0x6f0
[   15.239862]  ret_from_fork+0x116/0x1d0
[   15.240046]  ret_from_fork_asm+0x1a/0x30
[   15.240240] 
[   15.240335] The buggy address belongs to the object at ffff888103991d00
[   15.240335]  which belongs to the cache kmalloc-64 of size 64
[   15.240776] The buggy address is located 0 bytes to the right of
[   15.240776]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.241272] 
[   15.241376] The buggy address belongs to the physical page:
[   15.241664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.242394] flags: 0x200000000000000(node=0|zone=2)
[   15.242616] page_type: f5(slab)
[   15.242800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.243102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.243801] page dumped because: kasan: bad access detected
[   15.244011] 
[   15.244107] Memory state around the buggy address:
[   15.244626]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.244903]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.245340] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.245726]                                      ^
[   15.245945]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246411]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246718] ==================================================================
[   15.695080] ==================================================================
[   15.697607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.699473] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.700020] 
[   15.700157] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.700212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.700423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.700860] Call Trace:
[   15.700885]  <TASK>
[   15.700911]  dump_stack_lvl+0x73/0xb0
[   15.700956]  print_report+0xd1/0x650
[   15.700981]  ? __virt_addr_valid+0x1db/0x2d0
[   15.701005]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.701027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.701050]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.701073]  kasan_report+0x141/0x180
[   15.701096]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.701122]  kasan_check_range+0x10c/0x1c0
[   15.701146]  __kasan_check_write+0x18/0x20
[   15.701167]  kasan_atomics_helper+0x1ce1/0x5450
[   15.701189]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.701212]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.701250]  ? ret_from_fork_asm+0x1a/0x30
[   15.701274]  ? kasan_atomics+0x152/0x310
[   15.701320]  kasan_atomics+0x1dc/0x310
[   15.701344]  ? __pfx_kasan_atomics+0x10/0x10
[   15.701368]  ? __pfx_read_tsc+0x10/0x10
[   15.701391]  ? ktime_get_ts64+0x86/0x230
[   15.701415]  kunit_try_run_case+0x1a5/0x480
[   15.701778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.701805]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.701829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.701853]  ? __kthread_parkme+0x82/0x180
[   15.701875]  ? preempt_count_sub+0x50/0x80
[   15.701900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.701924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.701947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.701971]  kthread+0x337/0x6f0
[   15.701991]  ? trace_preempt_on+0x20/0xc0
[   15.702016]  ? __pfx_kthread+0x10/0x10
[   15.702037]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.702059]  ? calculate_sigpending+0x7b/0xa0
[   15.702084]  ? __pfx_kthread+0x10/0x10
[   15.702106]  ret_from_fork+0x116/0x1d0
[   15.702125]  ? __pfx_kthread+0x10/0x10
[   15.702146]  ret_from_fork_asm+0x1a/0x30
[   15.702177]  </TASK>
[   15.702190] 
[   15.712725] Allocated by task 282:
[   15.713010]  kasan_save_stack+0x45/0x70
[   15.713312]  kasan_save_track+0x18/0x40
[   15.713581]  kasan_save_alloc_info+0x3b/0x50
[   15.713751]  __kasan_kmalloc+0xb7/0xc0
[   15.713947]  __kmalloc_cache_noprof+0x189/0x420
[   15.714363]  kasan_atomics+0x95/0x310
[   15.714628]  kunit_try_run_case+0x1a5/0x480
[   15.714787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.715122]  kthread+0x337/0x6f0
[   15.715299]  ret_from_fork+0x116/0x1d0
[   15.715470]  ret_from_fork_asm+0x1a/0x30
[   15.715659] 
[   15.715754] The buggy address belongs to the object at ffff888103991d00
[   15.715754]  which belongs to the cache kmalloc-64 of size 64
[   15.716243] The buggy address is located 0 bytes to the right of
[   15.716243]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.717124] 
[   15.717325] The buggy address belongs to the physical page:
[   15.717643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.717959] flags: 0x200000000000000(node=0|zone=2)
[   15.718343] page_type: f5(slab)
[   15.718560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.718942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.719326] page dumped because: kasan: bad access detected
[   15.719588] 
[   15.719805] Memory state around the buggy address:
[   15.719980]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.720508]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.720829] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.721125]                                      ^
[   15.721569]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.721886]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.722233] ==================================================================
[   14.566497] ==================================================================
[   14.566783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.567108] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.567770] 
[   14.567902] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.567952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.567966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.567990] Call Trace:
[   14.568012]  <TASK>
[   14.568034]  dump_stack_lvl+0x73/0xb0
[   14.568069]  print_report+0xd1/0x650
[   14.568094]  ? __virt_addr_valid+0x1db/0x2d0
[   14.568119]  ? kasan_atomics_helper+0x3df/0x5450
[   14.568141]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.568163]  ? kasan_atomics_helper+0x3df/0x5450
[   14.568185]  kasan_report+0x141/0x180
[   14.568207]  ? kasan_atomics_helper+0x3df/0x5450
[   14.568246]  kasan_check_range+0x10c/0x1c0
[   14.568271]  __kasan_check_read+0x15/0x20
[   14.568291]  kasan_atomics_helper+0x3df/0x5450
[   14.568314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.568336]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.568361]  ? ret_from_fork_asm+0x1a/0x30
[   14.568385]  ? kasan_atomics+0x152/0x310
[   14.568411]  kasan_atomics+0x1dc/0x310
[   14.568433]  ? __pfx_kasan_atomics+0x10/0x10
[   14.568545]  ? __pfx_read_tsc+0x10/0x10
[   14.568569]  ? ktime_get_ts64+0x86/0x230
[   14.568595]  kunit_try_run_case+0x1a5/0x480
[   14.568623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.568647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.568672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.568696]  ? __kthread_parkme+0x82/0x180
[   14.568718]  ? preempt_count_sub+0x50/0x80
[   14.568742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.568766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.568801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.568825]  kthread+0x337/0x6f0
[   14.568845]  ? trace_preempt_on+0x20/0xc0
[   14.568870]  ? __pfx_kthread+0x10/0x10
[   14.568891]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.568913]  ? calculate_sigpending+0x7b/0xa0
[   14.568937]  ? __pfx_kthread+0x10/0x10
[   14.568959]  ret_from_fork+0x116/0x1d0
[   14.568978]  ? __pfx_kthread+0x10/0x10
[   14.568999]  ret_from_fork_asm+0x1a/0x30
[   14.569029]  </TASK>
[   14.569042] 
[   14.577473] Allocated by task 282:
[   14.577844]  kasan_save_stack+0x45/0x70
[   14.578075]  kasan_save_track+0x18/0x40
[   14.578350]  kasan_save_alloc_info+0x3b/0x50
[   14.578569]  __kasan_kmalloc+0xb7/0xc0
[   14.578764]  __kmalloc_cache_noprof+0x189/0x420
[   14.578991]  kasan_atomics+0x95/0x310
[   14.579186]  kunit_try_run_case+0x1a5/0x480
[   14.579509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.579730]  kthread+0x337/0x6f0
[   14.579864]  ret_from_fork+0x116/0x1d0
[   14.579999]  ret_from_fork_asm+0x1a/0x30
[   14.580140] 
[   14.580213] The buggy address belongs to the object at ffff888103991d00
[   14.580213]  which belongs to the cache kmalloc-64 of size 64
[   14.581275] The buggy address is located 0 bytes to the right of
[   14.581275]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.581847] 
[   14.581925] The buggy address belongs to the physical page:
[   14.582105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.582469] flags: 0x200000000000000(node=0|zone=2)
[   14.582744] page_type: f5(slab)
[   14.582871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.583104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.583418] page dumped because: kasan: bad access detected
[   14.583756] 
[   14.583855] Memory state around the buggy address:
[   14.584095]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.584797]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.585057] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.585290]                                      ^
[   14.585604]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.586028]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.586375] ==================================================================
[   14.907043] ==================================================================
[   14.908080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.909944] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.910971] 
[   14.911172] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.911341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.911357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.911382] Call Trace:
[   14.911405]  <TASK>
[   14.911429]  dump_stack_lvl+0x73/0xb0
[   14.911473]  print_report+0xd1/0x650
[   14.911498]  ? __virt_addr_valid+0x1db/0x2d0
[   14.911522]  ? kasan_atomics_helper+0xac7/0x5450
[   14.911546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.911568]  ? kasan_atomics_helper+0xac7/0x5450
[   14.911591]  kasan_report+0x141/0x180
[   14.911613]  ? kasan_atomics_helper+0xac7/0x5450
[   14.911897]  kasan_check_range+0x10c/0x1c0
[   14.911936]  __kasan_check_write+0x18/0x20
[   14.911959]  kasan_atomics_helper+0xac7/0x5450
[   14.911984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.912007]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.912032]  ? ret_from_fork_asm+0x1a/0x30
[   14.912054]  ? kasan_atomics+0x152/0x310
[   14.912082]  kasan_atomics+0x1dc/0x310
[   14.912104]  ? __pfx_kasan_atomics+0x10/0x10
[   14.912129]  ? __pfx_read_tsc+0x10/0x10
[   14.912151]  ? ktime_get_ts64+0x86/0x230
[   14.912175]  kunit_try_run_case+0x1a5/0x480
[   14.912690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912722]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.912766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.912798]  ? __kthread_parkme+0x82/0x180
[   14.912862]  ? preempt_count_sub+0x50/0x80
[   14.912888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.912947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.912971]  kthread+0x337/0x6f0
[   14.912991]  ? trace_preempt_on+0x20/0xc0
[   14.913016]  ? __pfx_kthread+0x10/0x10
[   14.913037]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.913059]  ? calculate_sigpending+0x7b/0xa0
[   14.913083]  ? __pfx_kthread+0x10/0x10
[   14.913105]  ret_from_fork+0x116/0x1d0
[   14.913125]  ? __pfx_kthread+0x10/0x10
[   14.913145]  ret_from_fork_asm+0x1a/0x30
[   14.913177]  </TASK>
[   14.913316] 
[   14.929860] Allocated by task 282:
[   14.930077]  kasan_save_stack+0x45/0x70
[   14.930553]  kasan_save_track+0x18/0x40
[   14.930798]  kasan_save_alloc_info+0x3b/0x50
[   14.931250]  __kasan_kmalloc+0xb7/0xc0
[   14.931674]  __kmalloc_cache_noprof+0x189/0x420
[   14.932090]  kasan_atomics+0x95/0x310
[   14.932335]  kunit_try_run_case+0x1a5/0x480
[   14.932535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.933029]  kthread+0x337/0x6f0
[   14.933345]  ret_from_fork+0x116/0x1d0
[   14.933656]  ret_from_fork_asm+0x1a/0x30
[   14.934102] 
[   14.934315] The buggy address belongs to the object at ffff888103991d00
[   14.934315]  which belongs to the cache kmalloc-64 of size 64
[   14.935136] The buggy address is located 0 bytes to the right of
[   14.935136]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.936661] 
[   14.936943] The buggy address belongs to the physical page:
[   14.937436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.937813] flags: 0x200000000000000(node=0|zone=2)
[   14.938575] page_type: f5(slab)
[   14.938888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.939404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.939978] page dumped because: kasan: bad access detected
[   14.940161] 
[   14.940333] Memory state around the buggy address:
[   14.941011]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.941795]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.942514] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.942759]                                      ^
[   14.942919]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.943137]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.943368] ==================================================================
[   15.015117] ==================================================================
[   15.015935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.016182] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.016423] 
[   15.016520] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.016569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.016584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.016608] Call Trace:
[   15.016630]  <TASK>
[   15.016651]  dump_stack_lvl+0x73/0xb0
[   15.016681]  print_report+0xd1/0x650
[   15.016705]  ? __virt_addr_valid+0x1db/0x2d0
[   15.016731]  ? kasan_atomics_helper+0xd47/0x5450
[   15.016753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.016776]  ? kasan_atomics_helper+0xd47/0x5450
[   15.016806]  kasan_report+0x141/0x180
[   15.016828]  ? kasan_atomics_helper+0xd47/0x5450
[   15.016854]  kasan_check_range+0x10c/0x1c0
[   15.016879]  __kasan_check_write+0x18/0x20
[   15.016897]  kasan_atomics_helper+0xd47/0x5450
[   15.016921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.016943]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.016969]  ? ret_from_fork_asm+0x1a/0x30
[   15.016990]  ? kasan_atomics+0x152/0x310
[   15.017034]  kasan_atomics+0x1dc/0x310
[   15.017082]  ? __pfx_kasan_atomics+0x10/0x10
[   15.017106]  ? __pfx_read_tsc+0x10/0x10
[   15.017127]  ? ktime_get_ts64+0x86/0x230
[   15.017153]  kunit_try_run_case+0x1a5/0x480
[   15.017178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.017200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.017236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.017259]  ? __kthread_parkme+0x82/0x180
[   15.017281]  ? preempt_count_sub+0x50/0x80
[   15.017304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.017328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.017351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.017375]  kthread+0x337/0x6f0
[   15.017394]  ? trace_preempt_on+0x20/0xc0
[   15.017418]  ? __pfx_kthread+0x10/0x10
[   15.017439]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.017479]  ? calculate_sigpending+0x7b/0xa0
[   15.017504]  ? __pfx_kthread+0x10/0x10
[   15.017525]  ret_from_fork+0x116/0x1d0
[   15.017545]  ? __pfx_kthread+0x10/0x10
[   15.017565]  ret_from_fork_asm+0x1a/0x30
[   15.017596]  </TASK>
[   15.017609] 
[   15.025535] Allocated by task 282:
[   15.025757]  kasan_save_stack+0x45/0x70
[   15.026081]  kasan_save_track+0x18/0x40
[   15.026311]  kasan_save_alloc_info+0x3b/0x50
[   15.026544]  __kasan_kmalloc+0xb7/0xc0
[   15.026741]  __kmalloc_cache_noprof+0x189/0x420
[   15.026929]  kasan_atomics+0x95/0x310
[   15.027060]  kunit_try_run_case+0x1a5/0x480
[   15.027313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.027562]  kthread+0x337/0x6f0
[   15.027732]  ret_from_fork+0x116/0x1d0
[   15.027914]  ret_from_fork_asm+0x1a/0x30
[   15.028050] 
[   15.028121] The buggy address belongs to the object at ffff888103991d00
[   15.028121]  which belongs to the cache kmalloc-64 of size 64
[   15.028866] The buggy address is located 0 bytes to the right of
[   15.028866]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.029401] 
[   15.029481] The buggy address belongs to the physical page:
[   15.029789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.030157] flags: 0x200000000000000(node=0|zone=2)
[   15.030410] page_type: f5(slab)
[   15.030534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.030758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.030977] page dumped because: kasan: bad access detected
[   15.031144] 
[   15.031213] Memory state around the buggy address:
[   15.031454]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.031788]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.032120] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.032466]                                      ^
[   15.032622]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032986]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.033330] ==================================================================
[   15.414107] ==================================================================
[   15.414431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.414776] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.415073] 
[   15.415169] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.415216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.415240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.415278] Call Trace:
[   15.415300]  <TASK>
[   15.415321]  dump_stack_lvl+0x73/0xb0
[   15.415351]  print_report+0xd1/0x650
[   15.415375]  ? __virt_addr_valid+0x1db/0x2d0
[   15.415399]  ? kasan_atomics_helper+0x151d/0x5450
[   15.415420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.415442]  ? kasan_atomics_helper+0x151d/0x5450
[   15.415463]  kasan_report+0x141/0x180
[   15.415485]  ? kasan_atomics_helper+0x151d/0x5450
[   15.415512]  kasan_check_range+0x10c/0x1c0
[   15.415535]  __kasan_check_write+0x18/0x20
[   15.415555]  kasan_atomics_helper+0x151d/0x5450
[   15.415577]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.415600]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.415629]  ? ret_from_fork_asm+0x1a/0x30
[   15.415651]  ? kasan_atomics+0x152/0x310
[   15.415678]  kasan_atomics+0x1dc/0x310
[   15.415700]  ? __pfx_kasan_atomics+0x10/0x10
[   15.415725]  ? __pfx_read_tsc+0x10/0x10
[   15.415746]  ? ktime_get_ts64+0x86/0x230
[   15.415771]  kunit_try_run_case+0x1a5/0x480
[   15.415797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.415819]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.415843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.415866]  ? __kthread_parkme+0x82/0x180
[   15.415886]  ? preempt_count_sub+0x50/0x80
[   15.415911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.415934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.415957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.415979]  kthread+0x337/0x6f0
[   15.416000]  ? trace_preempt_on+0x20/0xc0
[   15.416023]  ? __pfx_kthread+0x10/0x10
[   15.416044]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.416065]  ? calculate_sigpending+0x7b/0xa0
[   15.416089]  ? __pfx_kthread+0x10/0x10
[   15.416110]  ret_from_fork+0x116/0x1d0
[   15.416129]  ? __pfx_kthread+0x10/0x10
[   15.416150]  ret_from_fork_asm+0x1a/0x30
[   15.416179]  </TASK>
[   15.416191] 
[   15.423542] Allocated by task 282:
[   15.423753]  kasan_save_stack+0x45/0x70
[   15.423975]  kasan_save_track+0x18/0x40
[   15.424171]  kasan_save_alloc_info+0x3b/0x50
[   15.424551]  __kasan_kmalloc+0xb7/0xc0
[   15.424746]  __kmalloc_cache_noprof+0x189/0x420
[   15.424978]  kasan_atomics+0x95/0x310
[   15.425171]  kunit_try_run_case+0x1a5/0x480
[   15.425412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.425614]  kthread+0x337/0x6f0
[   15.425783]  ret_from_fork+0x116/0x1d0
[   15.425939]  ret_from_fork_asm+0x1a/0x30
[   15.426081] 
[   15.426153] The buggy address belongs to the object at ffff888103991d00
[   15.426153]  which belongs to the cache kmalloc-64 of size 64
[   15.426963] The buggy address is located 0 bytes to the right of
[   15.426963]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.427470] 
[   15.427579] The buggy address belongs to the physical page:
[   15.427770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.428126] flags: 0x200000000000000(node=0|zone=2)
[   15.428370] page_type: f5(slab)
[   15.428501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.428740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.428989] page dumped because: kasan: bad access detected
[   15.429163] 
[   15.429244] Memory state around the buggy address:
[   15.429470]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.430110]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.435822] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.436853]                                      ^
[   15.437409]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.437646]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.437866] ==================================================================
[   15.586489] ==================================================================
[   15.587276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.587579] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.587911] 
[   15.588035] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.588096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.588109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.588134] Call Trace:
[   15.588156]  <TASK>
[   15.588178]  dump_stack_lvl+0x73/0xb0
[   15.588208]  print_report+0xd1/0x650
[   15.588242]  ? __virt_addr_valid+0x1db/0x2d0
[   15.588266]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.588287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.588310]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.588332]  kasan_report+0x141/0x180
[   15.588354]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.588380]  kasan_check_range+0x10c/0x1c0
[   15.588404]  __kasan_check_write+0x18/0x20
[   15.588424]  kasan_atomics_helper+0x19e3/0x5450
[   15.588446]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.588468]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.588493]  ? ret_from_fork_asm+0x1a/0x30
[   15.588516]  ? kasan_atomics+0x152/0x310
[   15.588542]  kasan_atomics+0x1dc/0x310
[   15.588565]  ? __pfx_kasan_atomics+0x10/0x10
[   15.588601]  ? __pfx_read_tsc+0x10/0x10
[   15.588624]  ? ktime_get_ts64+0x86/0x230
[   15.588650]  kunit_try_run_case+0x1a5/0x480
[   15.588700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.588730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.588765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.588796]  ? __kthread_parkme+0x82/0x180
[   15.588818]  ? preempt_count_sub+0x50/0x80
[   15.588843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.588867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.588890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.588914]  kthread+0x337/0x6f0
[   15.588934]  ? trace_preempt_on+0x20/0xc0
[   15.588960]  ? __pfx_kthread+0x10/0x10
[   15.588981]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.589002]  ? calculate_sigpending+0x7b/0xa0
[   15.589027]  ? __pfx_kthread+0x10/0x10
[   15.589049]  ret_from_fork+0x116/0x1d0
[   15.589092]  ? __pfx_kthread+0x10/0x10
[   15.589113]  ret_from_fork_asm+0x1a/0x30
[   15.589144]  </TASK>
[   15.589157] 
[   15.597243] Allocated by task 282:
[   15.597468]  kasan_save_stack+0x45/0x70
[   15.597635]  kasan_save_track+0x18/0x40
[   15.597801]  kasan_save_alloc_info+0x3b/0x50
[   15.598027]  __kasan_kmalloc+0xb7/0xc0
[   15.598174]  __kmalloc_cache_noprof+0x189/0x420
[   15.598558]  kasan_atomics+0x95/0x310
[   15.598728]  kunit_try_run_case+0x1a5/0x480
[   15.598911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.599139]  kthread+0x337/0x6f0
[   15.599372]  ret_from_fork+0x116/0x1d0
[   15.599520]  ret_from_fork_asm+0x1a/0x30
[   15.599661] 
[   15.599736] The buggy address belongs to the object at ffff888103991d00
[   15.599736]  which belongs to the cache kmalloc-64 of size 64
[   15.600090] The buggy address is located 0 bytes to the right of
[   15.600090]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.600467] 
[   15.600544] The buggy address belongs to the physical page:
[   15.600808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.601556] flags: 0x200000000000000(node=0|zone=2)
[   15.601806] page_type: f5(slab)
[   15.601977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.602330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.602722] page dumped because: kasan: bad access detected
[   15.603169] 
[   15.603252] Memory state around the buggy address:
[   15.603489]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.603728]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.603947] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.604161]                                      ^
[   15.604533]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.604865]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.605185] ==================================================================
[   14.628590] ==================================================================
[   14.628930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.629729] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.630424] 
[   14.630615] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.630670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.630684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.630709] Call Trace:
[   14.630731]  <TASK>
[   14.630753]  dump_stack_lvl+0x73/0xb0
[   14.630791]  print_report+0xd1/0x650
[   14.630816]  ? __virt_addr_valid+0x1db/0x2d0
[   14.630840]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.630865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.630888]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.630912]  kasan_report+0x141/0x180
[   14.630934]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.630961]  __asan_report_store4_noabort+0x1b/0x30
[   14.630982]  kasan_atomics_helper+0x4b3a/0x5450
[   14.631005]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.631027]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.631052]  ? ret_from_fork_asm+0x1a/0x30
[   14.631075]  ? kasan_atomics+0x152/0x310
[   14.631101]  kasan_atomics+0x1dc/0x310
[   14.631124]  ? __pfx_kasan_atomics+0x10/0x10
[   14.631148]  ? __pfx_read_tsc+0x10/0x10
[   14.631171]  ? ktime_get_ts64+0x86/0x230
[   14.631195]  kunit_try_run_case+0x1a5/0x480
[   14.631349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.631390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.631415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.631439]  ? __kthread_parkme+0x82/0x180
[   14.631509]  ? preempt_count_sub+0x50/0x80
[   14.631535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.631559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.631583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.631606]  kthread+0x337/0x6f0
[   14.631628]  ? trace_preempt_on+0x20/0xc0
[   14.631651]  ? __pfx_kthread+0x10/0x10
[   14.631673]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.631694]  ? calculate_sigpending+0x7b/0xa0
[   14.631719]  ? __pfx_kthread+0x10/0x10
[   14.631741]  ret_from_fork+0x116/0x1d0
[   14.631760]  ? __pfx_kthread+0x10/0x10
[   14.631781]  ret_from_fork_asm+0x1a/0x30
[   14.631813]  </TASK>
[   14.631826] 
[   14.647519] Allocated by task 282:
[   14.649056]  kasan_save_stack+0x45/0x70
[   14.649781]  kasan_save_track+0x18/0x40
[   14.650693]  kasan_save_alloc_info+0x3b/0x50
[   14.651174]  __kasan_kmalloc+0xb7/0xc0
[   14.651844]  __kmalloc_cache_noprof+0x189/0x420
[   14.652019]  kasan_atomics+0x95/0x310
[   14.652159]  kunit_try_run_case+0x1a5/0x480
[   14.653388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.654047]  kthread+0x337/0x6f0
[   14.654568]  ret_from_fork+0x116/0x1d0
[   14.655138]  ret_from_fork_asm+0x1a/0x30
[   14.655670] 
[   14.655981] The buggy address belongs to the object at ffff888103991d00
[   14.655981]  which belongs to the cache kmalloc-64 of size 64
[   14.656767] The buggy address is located 0 bytes to the right of
[   14.656767]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.657164] 
[   14.657274] The buggy address belongs to the physical page:
[   14.657946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.658739] flags: 0x200000000000000(node=0|zone=2)
[   14.658927] page_type: f5(slab)
[   14.659084] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.660024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.660671] page dumped because: kasan: bad access detected
[   14.660860] 
[   14.660935] Memory state around the buggy address:
[   14.661099]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.661715]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.662836] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.663604]                                      ^
[   14.664055]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.664780]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.665515] ==================================================================
[   14.944406] ==================================================================
[   14.945049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.945723] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.946500] 
[   14.946762] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.946819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.946833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.946858] Call Trace:
[   14.946879]  <TASK>
[   14.946902]  dump_stack_lvl+0x73/0xb0
[   14.946938]  print_report+0xd1/0x650
[   14.946963]  ? __virt_addr_valid+0x1db/0x2d0
[   14.946986]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.947008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.947032]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.947053]  kasan_report+0x141/0x180
[   14.947076]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.947103]  kasan_check_range+0x10c/0x1c0
[   14.947127]  __kasan_check_write+0x18/0x20
[   14.947147]  kasan_atomics_helper+0xb6a/0x5450
[   14.947169]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.947192]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.947230]  ? ret_from_fork_asm+0x1a/0x30
[   14.947298]  ? kasan_atomics+0x152/0x310
[   14.947327]  kasan_atomics+0x1dc/0x310
[   14.947352]  ? __pfx_kasan_atomics+0x10/0x10
[   14.947376]  ? __pfx_read_tsc+0x10/0x10
[   14.947397]  ? ktime_get_ts64+0x86/0x230
[   14.947422]  kunit_try_run_case+0x1a5/0x480
[   14.947448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.947470]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.947495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.947518]  ? __kthread_parkme+0x82/0x180
[   14.947540]  ? preempt_count_sub+0x50/0x80
[   14.947564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.947587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.947611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.947634]  kthread+0x337/0x6f0
[   14.947654]  ? trace_preempt_on+0x20/0xc0
[   14.947679]  ? __pfx_kthread+0x10/0x10
[   14.947700]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.947722]  ? calculate_sigpending+0x7b/0xa0
[   14.947747]  ? __pfx_kthread+0x10/0x10
[   14.947771]  ret_from_fork+0x116/0x1d0
[   14.947792]  ? __pfx_kthread+0x10/0x10
[   14.947815]  ret_from_fork_asm+0x1a/0x30
[   14.947847]  </TASK>
[   14.947860] 
[   14.962820] Allocated by task 282:
[   14.962996]  kasan_save_stack+0x45/0x70
[   14.963162]  kasan_save_track+0x18/0x40
[   14.963675]  kasan_save_alloc_info+0x3b/0x50
[   14.963875]  __kasan_kmalloc+0xb7/0xc0
[   14.964050]  __kmalloc_cache_noprof+0x189/0x420
[   14.964603]  kasan_atomics+0x95/0x310
[   14.964885]  kunit_try_run_case+0x1a5/0x480
[   14.965245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.965668]  kthread+0x337/0x6f0
[   14.965865]  ret_from_fork+0x116/0x1d0
[   14.966208]  ret_from_fork_asm+0x1a/0x30
[   14.966714] 
[   14.966888] The buggy address belongs to the object at ffff888103991d00
[   14.966888]  which belongs to the cache kmalloc-64 of size 64
[   14.967915] The buggy address is located 0 bytes to the right of
[   14.967915]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.968700] 
[   14.968947] The buggy address belongs to the physical page:
[   14.969397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.969743] flags: 0x200000000000000(node=0|zone=2)
[   14.969975] page_type: f5(slab)
[   14.970142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.971869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.972480] page dumped because: kasan: bad access detected
[   14.972718] 
[   14.972817] Memory state around the buggy address:
[   14.973032]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.973791]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.974344] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.975000]                                      ^
[   14.975574]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.975987]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.976550] ==================================================================
[   14.547519] ==================================================================
[   14.547807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.548163] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282
[   14.548543] 
[   14.548670] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.548723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.548736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.548761] Call Trace:
[   14.548783]  <TASK>
[   14.548812]  dump_stack_lvl+0x73/0xb0
[   14.548845]  print_report+0xd1/0x650
[   14.548870]  ? __virt_addr_valid+0x1db/0x2d0
[   14.548894]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.548915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.548938]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.548960]  kasan_report+0x141/0x180
[   14.548982]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.549009]  __asan_report_store4_noabort+0x1b/0x30
[   14.549029]  kasan_atomics_helper+0x4b6e/0x5450
[   14.549052]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.549074]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.549099]  ? ret_from_fork_asm+0x1a/0x30
[   14.549122]  ? kasan_atomics+0x152/0x310
[   14.549148]  kasan_atomics+0x1dc/0x310
[   14.549171]  ? __pfx_kasan_atomics+0x10/0x10
[   14.549196]  ? __pfx_read_tsc+0x10/0x10
[   14.549231]  ? ktime_get_ts64+0x86/0x230
[   14.549256]  kunit_try_run_case+0x1a5/0x480
[   14.549283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.549306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.549330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.549353]  ? __kthread_parkme+0x82/0x180
[   14.549375]  ? preempt_count_sub+0x50/0x80
[   14.549399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.549423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.549446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.549469]  kthread+0x337/0x6f0
[   14.549489]  ? trace_preempt_on+0x20/0xc0
[   14.549535]  ? __pfx_kthread+0x10/0x10
[   14.549557]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.549579]  ? calculate_sigpending+0x7b/0xa0
[   14.549604]  ? __pfx_kthread+0x10/0x10
[   14.549627]  ret_from_fork+0x116/0x1d0
[   14.549646]  ? __pfx_kthread+0x10/0x10
[   14.549667]  ret_from_fork_asm+0x1a/0x30
[   14.549699]  </TASK>
[   14.549711] 
[   14.557499] Allocated by task 282:
[   14.557664]  kasan_save_stack+0x45/0x70
[   14.557876]  kasan_save_track+0x18/0x40
[   14.558070]  kasan_save_alloc_info+0x3b/0x50
[   14.558289]  __kasan_kmalloc+0xb7/0xc0
[   14.558548]  __kmalloc_cache_noprof+0x189/0x420
[   14.558784]  kasan_atomics+0x95/0x310
[   14.558974]  kunit_try_run_case+0x1a5/0x480
[   14.559170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559471]  kthread+0x337/0x6f0
[   14.559629]  ret_from_fork+0x116/0x1d0
[   14.559809]  ret_from_fork_asm+0x1a/0x30
[   14.559976] 
[   14.560074] The buggy address belongs to the object at ffff888103991d00
[   14.560074]  which belongs to the cache kmalloc-64 of size 64
[   14.561199] The buggy address is located 0 bytes to the right of
[   14.561199]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   14.561809] 
[   14.561887] The buggy address belongs to the physical page:
[   14.562064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   14.562377] flags: 0x200000000000000(node=0|zone=2)
[   14.562614] page_type: f5(slab)
[   14.562782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.563263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.563536] page dumped because: kasan: bad access detected
[   14.563712] 
[   14.563784] Memory state around the buggy address:
[   14.563984]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.564386]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.564716] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.565043]                                      ^
[   14.565300]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.565620]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.565867] ==================================================================
[   15.357213] ==================================================================
[   15.357907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.358727] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282
[   15.359002] 
[   15.359184] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.359254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.359267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.359306] Call Trace:
[   15.359328]  <TASK>
[   15.359351]  dump_stack_lvl+0x73/0xb0
[   15.359384]  print_report+0xd1/0x650
[   15.359415]  ? __virt_addr_valid+0x1db/0x2d0
[   15.359439]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.359462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.359484]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.359507]  kasan_report+0x141/0x180
[   15.359529]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.359556]  __asan_report_load8_noabort+0x18/0x20
[   15.359581]  kasan_atomics_helper+0x4eae/0x5450
[   15.359604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.359626]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.359652]  ? ret_from_fork_asm+0x1a/0x30
[   15.359674]  ? kasan_atomics+0x152/0x310
[   15.359700]  kasan_atomics+0x1dc/0x310
[   15.359723]  ? __pfx_kasan_atomics+0x10/0x10
[   15.359747]  ? __pfx_read_tsc+0x10/0x10
[   15.359769]  ? ktime_get_ts64+0x86/0x230
[   15.359797]  kunit_try_run_case+0x1a5/0x480
[   15.359822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.359845]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.359870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.359893]  ? __kthread_parkme+0x82/0x180
[   15.359914]  ? preempt_count_sub+0x50/0x80
[   15.359939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.359963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.359986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.360010]  kthread+0x337/0x6f0
[   15.360029]  ? trace_preempt_on+0x20/0xc0
[   15.360053]  ? __pfx_kthread+0x10/0x10
[   15.360074]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.360096]  ? calculate_sigpending+0x7b/0xa0
[   15.360121]  ? __pfx_kthread+0x10/0x10
[   15.360143]  ret_from_fork+0x116/0x1d0
[   15.360161]  ? __pfx_kthread+0x10/0x10
[   15.360183]  ret_from_fork_asm+0x1a/0x30
[   15.360215]  </TASK>
[   15.360240] 
[   15.369698] Allocated by task 282:
[   15.369875]  kasan_save_stack+0x45/0x70
[   15.370031]  kasan_save_track+0x18/0x40
[   15.370240]  kasan_save_alloc_info+0x3b/0x50
[   15.370541]  __kasan_kmalloc+0xb7/0xc0
[   15.370706]  __kmalloc_cache_noprof+0x189/0x420
[   15.370909]  kasan_atomics+0x95/0x310
[   15.371087]  kunit_try_run_case+0x1a5/0x480
[   15.371331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.371545]  kthread+0x337/0x6f0
[   15.371713]  ret_from_fork+0x116/0x1d0
[   15.371847]  ret_from_fork_asm+0x1a/0x30
[   15.371989] 
[   15.372074] The buggy address belongs to the object at ffff888103991d00
[   15.372074]  which belongs to the cache kmalloc-64 of size 64
[   15.372739] The buggy address is located 0 bytes to the right of
[   15.372739]  allocated 48-byte region [ffff888103991d00, ffff888103991d30)
[   15.373172] 
[   15.373257] The buggy address belongs to the physical page:
[   15.373449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991
[   15.373905] flags: 0x200000000000000(node=0|zone=2)
[   15.374150] page_type: f5(slab)
[   15.374341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.374664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.374961] page dumped because: kasan: bad access detected
[   15.375188] 
[   15.375319] Memory state around the buggy address:
[   15.375484]  ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.375767]  ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.376094] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.376421]                                      ^
[   15.376625]  ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.376925]  ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.377198] ==================================================================