Hay
Date
July 2, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.179495] ==================================================================
[   21.179565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.179801] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.179883] 
[   21.180017] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.180107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.180219] Hardware name: linux,dummy-virt (DT)
[   21.180507] Call trace:
[   21.180589]  show_stack+0x20/0x38 (C)
[   21.180808]  dump_stack_lvl+0x8c/0xd0
[   21.181118]  print_report+0x118/0x608
[   21.181200]  kasan_report+0xdc/0x128
[   21.181455]  __asan_report_load8_noabort+0x20/0x30
[   21.181635]  kasan_atomics_helper+0x3db0/0x4858
[   21.181841]  kasan_atomics+0x198/0x2e0
[   21.181940]  kunit_try_run_case+0x170/0x3f0
[   21.182288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.182418]  kthread+0x328/0x630
[   21.182515]  ret_from_fork+0x10/0x20
[   21.182966] 
[   21.183031] Allocated by task 265:
[   21.183150]  kasan_save_stack+0x3c/0x68
[   21.183432]  kasan_save_track+0x20/0x40
[   21.183600]  kasan_save_alloc_info+0x40/0x58
[   21.183902]  __kasan_kmalloc+0xd4/0xd8
[   21.184129]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.184215]  kasan_atomics+0xb8/0x2e0
[   21.184388]  kunit_try_run_case+0x170/0x3f0
[   21.184476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.184777]  kthread+0x328/0x630
[   21.184981]  ret_from_fork+0x10/0x20
[   21.185263] 
[   21.185436] The buggy address belongs to the object at fff00000c58ac280
[   21.185436]  which belongs to the cache kmalloc-64 of size 64
[   21.185672] The buggy address is located 0 bytes to the right of
[   21.185672]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.185878] 
[   21.185947] The buggy address belongs to the physical page:
[   21.186017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.186227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.186452] page_type: f5(slab)
[   21.186535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.186883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.187071] page dumped because: kasan: bad access detected
[   21.187123] 
[   21.187145] Memory state around the buggy address:
[   21.187370]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.187506]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.188181] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.188424]                                      ^
[   21.188494]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.188813]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.188864] ==================================================================
[   21.037799] ==================================================================
[   21.037851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.037957] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.038011] 
[   21.038045] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.038620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.038674] Hardware name: linux,dummy-virt (DT)
[   21.038708] Call trace:
[   21.038914]  show_stack+0x20/0x38 (C)
[   21.038980]  dump_stack_lvl+0x8c/0xd0
[   21.039031]  print_report+0x118/0x608
[   21.039077]  kasan_report+0xdc/0x128
[   21.039126]  kasan_check_range+0x100/0x1a8
[   21.039358]  __kasan_check_write+0x20/0x30
[   21.039486]  kasan_atomics_helper+0xf88/0x4858
[   21.039543]  kasan_atomics+0x198/0x2e0
[   21.039612]  kunit_try_run_case+0x170/0x3f0
[   21.039663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.039723]  kthread+0x328/0x630
[   21.039766]  ret_from_fork+0x10/0x20
[   21.039819] 
[   21.039841] Allocated by task 265:
[   21.039871]  kasan_save_stack+0x3c/0x68
[   21.039925]  kasan_save_track+0x20/0x40
[   21.039973]  kasan_save_alloc_info+0x40/0x58
[   21.040016]  __kasan_kmalloc+0xd4/0xd8
[   21.040060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.040103]  kasan_atomics+0xb8/0x2e0
[   21.040139]  kunit_try_run_case+0x170/0x3f0
[   21.040177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.040231]  kthread+0x328/0x630
[   21.040267]  ret_from_fork+0x10/0x20
[   21.040305] 
[   21.040337] The buggy address belongs to the object at fff00000c58ac280
[   21.040337]  which belongs to the cache kmalloc-64 of size 64
[   21.040398] The buggy address is located 0 bytes to the right of
[   21.040398]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.040462] 
[   21.040484] The buggy address belongs to the physical page:
[   21.040517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.040569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.040628] page_type: f5(slab)
[   21.040670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.040750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.041065] page dumped because: kasan: bad access detected
[   21.041322] 
[   21.041758] Memory state around the buggy address:
[   21.042169]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.042243]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.042312] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.042525]                                      ^
[   21.042714]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.043086]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.043173] ==================================================================
[   20.875551] ==================================================================
[   20.875773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.876027] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.876264] 
[   20.876349] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.876445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.876520] Hardware name: linux,dummy-virt (DT)
[   20.876591] Call trace:
[   20.876643]  show_stack+0x20/0x38 (C)
[   20.877162]  dump_stack_lvl+0x8c/0xd0
[   20.877372]  print_report+0x118/0x608
[   20.877479]  kasan_report+0xdc/0x128
[   20.877717]  kasan_check_range+0x100/0x1a8
[   20.877908]  __kasan_check_write+0x20/0x30
[   20.878023]  kasan_atomics_helper+0xa04/0x4858
[   20.878094]  kasan_atomics+0x198/0x2e0
[   20.878293]  kunit_try_run_case+0x170/0x3f0
[   20.878490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.878701]  kthread+0x328/0x630
[   20.878803]  ret_from_fork+0x10/0x20
[   20.878925] 
[   20.879025] Allocated by task 265:
[   20.879057]  kasan_save_stack+0x3c/0x68
[   20.879411]  kasan_save_track+0x20/0x40
[   20.879528]  kasan_save_alloc_info+0x40/0x58
[   20.879659]  __kasan_kmalloc+0xd4/0xd8
[   20.879734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.879858]  kasan_atomics+0xb8/0x2e0
[   20.879938]  kunit_try_run_case+0x170/0x3f0
[   20.879997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.880228]  kthread+0x328/0x630
[   20.880324]  ret_from_fork+0x10/0x20
[   20.880544] 
[   20.880676] The buggy address belongs to the object at fff00000c58ac280
[   20.880676]  which belongs to the cache kmalloc-64 of size 64
[   20.880740] The buggy address is located 0 bytes to the right of
[   20.880740]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.880805] 
[   20.880833] The buggy address belongs to the physical page:
[   20.880867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.881120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.881402] page_type: f5(slab)
[   20.881496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.881695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.881763] page dumped because: kasan: bad access detected
[   20.881804] 
[   20.881839] Memory state around the buggy address:
[   20.881874]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.881919]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.881966] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.882022]                                      ^
[   20.882058]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.882102]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.882142] ==================================================================
[   20.991671] ==================================================================
[   20.991720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.991801] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.992039] 
[   20.992083] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.992528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.992624] Hardware name: linux,dummy-virt (DT)
[   20.992661] Call trace:
[   20.992686]  show_stack+0x20/0x38 (C)
[   20.992794]  dump_stack_lvl+0x8c/0xd0
[   20.992844]  print_report+0x118/0x608
[   20.993276]  kasan_report+0xdc/0x128
[   20.993567]  __asan_report_load8_noabort+0x20/0x30
[   20.994000]  kasan_atomics_helper+0x3f58/0x4858
[   20.994266]  kasan_atomics+0x198/0x2e0
[   20.994369]  kunit_try_run_case+0x170/0x3f0
[   20.994541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.994624]  kthread+0x328/0x630
[   20.994797]  ret_from_fork+0x10/0x20
[   20.995074] 
[   20.995122] Allocated by task 265:
[   20.995328]  kasan_save_stack+0x3c/0x68
[   20.995558]  kasan_save_track+0x20/0x40
[   20.995671]  kasan_save_alloc_info+0x40/0x58
[   20.995730]  __kasan_kmalloc+0xd4/0xd8
[   20.995948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.996061]  kasan_atomics+0xb8/0x2e0
[   20.996654]  kunit_try_run_case+0x170/0x3f0
[   20.996773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.996834]  kthread+0x328/0x630
[   20.997059]  ret_from_fork+0x10/0x20
[   20.997317] 
[   20.997377] The buggy address belongs to the object at fff00000c58ac280
[   20.997377]  which belongs to the cache kmalloc-64 of size 64
[   20.997590] The buggy address is located 0 bytes to the right of
[   20.997590]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.997829] 
[   20.997886] The buggy address belongs to the physical page:
[   20.997938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.997997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.998205] page_type: f5(slab)
[   20.998383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.998454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.998499] page dumped because: kasan: bad access detected
[   20.998532] 
[   20.998565] Memory state around the buggy address:
[   20.998839]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.999014]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.999081] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.999421]                                      ^
[   20.999569]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.999632]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.000108] ==================================================================
[   21.222471] ==================================================================
[   21.222604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.222760] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.222824] 
[   21.222863] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.223165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.223209] Hardware name: linux,dummy-virt (DT)
[   21.223244] Call trace:
[   21.223318]  show_stack+0x20/0x38 (C)
[   21.223374]  dump_stack_lvl+0x8c/0xd0
[   21.223429]  print_report+0x118/0x608
[   21.223522]  kasan_report+0xdc/0x128
[   21.223584]  kasan_check_range+0x100/0x1a8
[   21.223635]  __kasan_check_write+0x20/0x30
[   21.223700]  kasan_atomics_helper+0x175c/0x4858
[   21.223752]  kasan_atomics+0x198/0x2e0
[   21.223799]  kunit_try_run_case+0x170/0x3f0
[   21.224186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.224398]  kthread+0x328/0x630
[   21.224483]  ret_from_fork+0x10/0x20
[   21.224534] 
[   21.224629] Allocated by task 265:
[   21.224662]  kasan_save_stack+0x3c/0x68
[   21.224713]  kasan_save_track+0x20/0x40
[   21.224760]  kasan_save_alloc_info+0x40/0x58
[   21.224939]  __kasan_kmalloc+0xd4/0xd8
[   21.225196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.225291]  kasan_atomics+0xb8/0x2e0
[   21.225675]  kunit_try_run_case+0x170/0x3f0
[   21.225824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.225925]  kthread+0x328/0x630
[   21.226006]  ret_from_fork+0x10/0x20
[   21.226136] 
[   21.226160] The buggy address belongs to the object at fff00000c58ac280
[   21.226160]  which belongs to the cache kmalloc-64 of size 64
[   21.226571] The buggy address is located 0 bytes to the right of
[   21.226571]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.227044] 
[   21.227169] The buggy address belongs to the physical page:
[   21.227477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.227646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.228196] page_type: f5(slab)
[   21.228539] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.228648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.228703] page dumped because: kasan: bad access detected
[   21.228761] 
[   21.228987] Memory state around the buggy address:
[   21.229226]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.229598]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.229753] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.229994]                                      ^
[   21.230167]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.230290]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.230331] ==================================================================
[   21.062403] ==================================================================
[   21.062723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   21.063020] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.063145] 
[   21.063180] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.063360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.063419] Hardware name: linux,dummy-virt (DT)
[   21.063453] Call trace:
[   21.063479]  show_stack+0x20/0x38 (C)
[   21.063548]  dump_stack_lvl+0x8c/0xd0
[   21.063610]  print_report+0x118/0x608
[   21.063885]  kasan_report+0xdc/0x128
[   21.064210]  kasan_check_range+0x100/0x1a8
[   21.064499]  __kasan_check_write+0x20/0x30
[   21.064619]  kasan_atomics_helper+0x10c0/0x4858
[   21.064969]  kasan_atomics+0x198/0x2e0
[   21.065184]  kunit_try_run_case+0x170/0x3f0
[   21.065324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.065608]  kthread+0x328/0x630
[   21.065843]  ret_from_fork+0x10/0x20
[   21.066155] 
[   21.066250] Allocated by task 265:
[   21.066422]  kasan_save_stack+0x3c/0x68
[   21.066533]  kasan_save_track+0x20/0x40
[   21.066687]  kasan_save_alloc_info+0x40/0x58
[   21.066922]  __kasan_kmalloc+0xd4/0xd8
[   21.067090]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.067412]  kasan_atomics+0xb8/0x2e0
[   21.067683]  kunit_try_run_case+0x170/0x3f0
[   21.067894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.067943]  kthread+0x328/0x630
[   21.067979]  ret_from_fork+0x10/0x20
[   21.068157] 
[   21.068227] The buggy address belongs to the object at fff00000c58ac280
[   21.068227]  which belongs to the cache kmalloc-64 of size 64
[   21.068383] The buggy address is located 0 bytes to the right of
[   21.068383]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.068454] 
[   21.068488] The buggy address belongs to the physical page:
[   21.068537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.068612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.068667] page_type: f5(slab)
[   21.068930] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.069222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.069313] page dumped because: kasan: bad access detected
[   21.069350] 
[   21.069370] Memory state around the buggy address:
[   21.069405]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.069451]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.069760] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.070178]                                      ^
[   21.070350]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.070477]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.070518] ==================================================================
[   21.145432] ==================================================================
[   21.145486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.145535] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.145597] 
[   21.145629] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.146103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.146373] Hardware name: linux,dummy-virt (DT)
[   21.146417] Call trace:
[   21.146443]  show_stack+0x20/0x38 (C)
[   21.146496]  dump_stack_lvl+0x8c/0xd0
[   21.146626]  print_report+0x118/0x608
[   21.146678]  kasan_report+0xdc/0x128
[   21.146731]  kasan_check_range+0x100/0x1a8
[   21.147121]  __kasan_check_write+0x20/0x30
[   21.147470]  kasan_atomics_helper+0x147c/0x4858
[   21.147627]  kasan_atomics+0x198/0x2e0
[   21.147682]  kunit_try_run_case+0x170/0x3f0
[   21.147759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.147867]  kthread+0x328/0x630
[   21.147915]  ret_from_fork+0x10/0x20
[   21.147979] 
[   21.148010] Allocated by task 265:
[   21.148293]  kasan_save_stack+0x3c/0x68
[   21.148359]  kasan_save_track+0x20/0x40
[   21.148484]  kasan_save_alloc_info+0x40/0x58
[   21.148538]  __kasan_kmalloc+0xd4/0xd8
[   21.148716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.148929]  kasan_atomics+0xb8/0x2e0
[   21.149045]  kunit_try_run_case+0x170/0x3f0
[   21.149098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.149151]  kthread+0x328/0x630
[   21.149340]  ret_from_fork+0x10/0x20
[   21.149572] 
[   21.150006] The buggy address belongs to the object at fff00000c58ac280
[   21.150006]  which belongs to the cache kmalloc-64 of size 64
[   21.150160] The buggy address is located 0 bytes to the right of
[   21.150160]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.150514] 
[   21.150731] The buggy address belongs to the physical page:
[   21.151013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.151356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.151773] page_type: f5(slab)
[   21.151848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.152058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.152220] page dumped because: kasan: bad access detected
[   21.152560] 
[   21.152690] Memory state around the buggy address:
[   21.152749]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.152818]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.153027] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.153271]                                      ^
[   21.153316]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.153362]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.153400] ==================================================================
[   21.018222] ==================================================================
[   21.018490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.018757] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.018833] 
[   21.019382] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.019603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.019646] Hardware name: linux,dummy-virt (DT)
[   21.019704] Call trace:
[   21.019832]  show_stack+0x20/0x38 (C)
[   21.019890]  dump_stack_lvl+0x8c/0xd0
[   21.019937]  print_report+0x118/0x608
[   21.020015]  kasan_report+0xdc/0x128
[   21.020080]  kasan_check_range+0x100/0x1a8
[   21.020539]  __kasan_check_write+0x20/0x30
[   21.020634]  kasan_atomics_helper+0xeb8/0x4858
[   21.020724]  kasan_atomics+0x198/0x2e0
[   21.020794]  kunit_try_run_case+0x170/0x3f0
[   21.020890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.021049]  kthread+0x328/0x630
[   21.021119]  ret_from_fork+0x10/0x20
[   21.021414] 
[   21.021513] Allocated by task 265:
[   21.021967]  kasan_save_stack+0x3c/0x68
[   21.022059]  kasan_save_track+0x20/0x40
[   21.022194]  kasan_save_alloc_info+0x40/0x58
[   21.022259]  __kasan_kmalloc+0xd4/0xd8
[   21.022559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.022682]  kasan_atomics+0xb8/0x2e0
[   21.022723]  kunit_try_run_case+0x170/0x3f0
[   21.022927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.022977]  kthread+0x328/0x630
[   21.023013]  ret_from_fork+0x10/0x20
[   21.023052] 
[   21.023075] The buggy address belongs to the object at fff00000c58ac280
[   21.023075]  which belongs to the cache kmalloc-64 of size 64
[   21.023146] The buggy address is located 0 bytes to the right of
[   21.023146]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.023217] 
[   21.023241] The buggy address belongs to the physical page:
[   21.023303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.023366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.023416] page_type: f5(slab)
[   21.023456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.023513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.023556] page dumped because: kasan: bad access detected
[   21.023633] 
[   21.023688] Memory state around the buggy address:
[   21.023766]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.023848]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.024447] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.024797]                                      ^
[   21.025078]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.025298]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.025640] ==================================================================
[   21.127055] ==================================================================
[   21.127230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.127290] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.127364] 
[   21.127396] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.127488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.127520] Hardware name: linux,dummy-virt (DT)
[   21.127554] Call trace:
[   21.127591]  show_stack+0x20/0x38 (C)
[   21.127643]  dump_stack_lvl+0x8c/0xd0
[   21.127695]  print_report+0x118/0x608
[   21.127741]  kasan_report+0xdc/0x128
[   21.127790]  __asan_report_load8_noabort+0x20/0x30
[   21.127847]  kasan_atomics_helper+0x3f04/0x4858
[   21.127898]  kasan_atomics+0x198/0x2e0
[   21.127946]  kunit_try_run_case+0x170/0x3f0
[   21.127993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.128057]  kthread+0x328/0x630
[   21.128107]  ret_from_fork+0x10/0x20
[   21.128163] 
[   21.128184] Allocated by task 265:
[   21.128223]  kasan_save_stack+0x3c/0x68
[   21.128265]  kasan_save_track+0x20/0x40
[   21.128305]  kasan_save_alloc_info+0x40/0x58
[   21.128345]  __kasan_kmalloc+0xd4/0xd8
[   21.128383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.128433]  kasan_atomics+0xb8/0x2e0
[   21.128470]  kunit_try_run_case+0x170/0x3f0
[   21.128518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.128563]  kthread+0x328/0x630
[   21.128605]  ret_from_fork+0x10/0x20
[   21.128666] 
[   21.128688] The buggy address belongs to the object at fff00000c58ac280
[   21.128688]  which belongs to the cache kmalloc-64 of size 64
[   21.129004] The buggy address is located 0 bytes to the right of
[   21.129004]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.129446] 
[   21.129604] The buggy address belongs to the physical page:
[   21.130279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.130371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.130445] page_type: f5(slab)
[   21.130864] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.131077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.131442] page dumped because: kasan: bad access detected
[   21.131518] 
[   21.132028] Memory state around the buggy address:
[   21.132500]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.132555]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.132746] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.132861]                                      ^
[   21.133068]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.133288]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.133487] ==================================================================
[   20.976078] ==================================================================
[   20.976152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.976213] Read of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.976355] 
[   20.976390] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.976474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.976509] Hardware name: linux,dummy-virt (DT)
[   20.976679] Call trace:
[   20.976715]  show_stack+0x20/0x38 (C)
[   20.976769]  dump_stack_lvl+0x8c/0xd0
[   20.976819]  print_report+0x118/0x608
[   20.976866]  kasan_report+0xdc/0x128
[   20.976914]  __asan_report_load4_noabort+0x20/0x30
[   20.977107]  kasan_atomics_helper+0x3e04/0x4858
[   20.977176]  kasan_atomics+0x198/0x2e0
[   20.977223]  kunit_try_run_case+0x170/0x3f0
[   20.977273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.977327]  kthread+0x328/0x630
[   20.977370]  ret_from_fork+0x10/0x20
[   20.977421] 
[   20.977451] Allocated by task 265:
[   20.977481]  kasan_save_stack+0x3c/0x68
[   20.977522]  kasan_save_track+0x20/0x40
[   20.977562]  kasan_save_alloc_info+0x40/0x58
[   20.978276]  __kasan_kmalloc+0xd4/0xd8
[   20.978380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.978469]  kasan_atomics+0xb8/0x2e0
[   20.978690]  kunit_try_run_case+0x170/0x3f0
[   20.978822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.978979]  kthread+0x328/0x630
[   20.979228]  ret_from_fork+0x10/0x20
[   20.979429] 
[   20.979457] The buggy address belongs to the object at fff00000c58ac280
[   20.979457]  which belongs to the cache kmalloc-64 of size 64
[   20.979720] The buggy address is located 0 bytes to the right of
[   20.979720]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.980016] 
[   20.980146] The buggy address belongs to the physical page:
[   20.980246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.980321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.980572] page_type: f5(slab)
[   20.980809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.981025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.981128] page dumped because: kasan: bad access detected
[   20.981346] 
[   20.981415] Memory state around the buggy address:
[   20.981629]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.981735]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.981809] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.981952]                                      ^
[   20.982008]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.982086]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.982232] ==================================================================
[   20.966545] ==================================================================
[   20.966743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.966807] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.967159] 
[   20.967212] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.967310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.967714] Hardware name: linux,dummy-virt (DT)
[   20.967767] Call trace:
[   20.967876]  show_stack+0x20/0x38 (C)
[   20.968013]  dump_stack_lvl+0x8c/0xd0
[   20.968081]  print_report+0x118/0x608
[   20.968129]  kasan_report+0xdc/0x128
[   20.968364]  kasan_check_range+0x100/0x1a8
[   20.968591]  __kasan_check_write+0x20/0x30
[   20.968877]  kasan_atomics_helper+0xd3c/0x4858
[   20.969099]  kasan_atomics+0x198/0x2e0
[   20.969180]  kunit_try_run_case+0x170/0x3f0
[   20.969322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.969380]  kthread+0x328/0x630
[   20.969426]  ret_from_fork+0x10/0x20
[   20.969481] 
[   20.969501] Allocated by task 265:
[   20.969695]  kasan_save_stack+0x3c/0x68
[   20.969843]  kasan_save_track+0x20/0x40
[   20.970010]  kasan_save_alloc_info+0x40/0x58
[   20.970234]  __kasan_kmalloc+0xd4/0xd8
[   20.970404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.970699]  kasan_atomics+0xb8/0x2e0
[   20.971091]  kunit_try_run_case+0x170/0x3f0
[   20.971310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.971444]  kthread+0x328/0x630
[   20.971714]  ret_from_fork+0x10/0x20
[   20.971802] 
[   20.972005] The buggy address belongs to the object at fff00000c58ac280
[   20.972005]  which belongs to the cache kmalloc-64 of size 64
[   20.972125] The buggy address is located 0 bytes to the right of
[   20.972125]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.972441] 
[   20.972735] The buggy address belongs to the physical page:
[   20.972782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.973021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.973247] page_type: f5(slab)
[   20.973303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.973423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.973515] page dumped because: kasan: bad access detected
[   20.973653] 
[   20.973675] Memory state around the buggy address:
[   20.973709]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.973754]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.973990] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.974074]                                      ^
[   20.974348]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.974609]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.975136] ==================================================================
[   21.154540] ==================================================================
[   21.154695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.154750] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.154803] 
[   21.154837] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.155228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.155272] Hardware name: linux,dummy-virt (DT)
[   21.155451] Call trace:
[   21.155488]  show_stack+0x20/0x38 (C)
[   21.155542]  dump_stack_lvl+0x8c/0xd0
[   21.155784]  print_report+0x118/0x608
[   21.155900]  kasan_report+0xdc/0x128
[   21.155984]  kasan_check_range+0x100/0x1a8
[   21.156034]  __kasan_check_write+0x20/0x30
[   21.156088]  kasan_atomics_helper+0x14e4/0x4858
[   21.156339]  kasan_atomics+0x198/0x2e0
[   21.156592]  kunit_try_run_case+0x170/0x3f0
[   21.156645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.156923]  kthread+0x328/0x630
[   21.156989]  ret_from_fork+0x10/0x20
[   21.157374] 
[   21.157694] Allocated by task 265:
[   21.157846]  kasan_save_stack+0x3c/0x68
[   21.157944]  kasan_save_track+0x20/0x40
[   21.158071]  kasan_save_alloc_info+0x40/0x58
[   21.158119]  __kasan_kmalloc+0xd4/0xd8
[   21.158167]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.158215]  kasan_atomics+0xb8/0x2e0
[   21.158282]  kunit_try_run_case+0x170/0x3f0
[   21.158325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.158372]  kthread+0x328/0x630
[   21.158407]  ret_from_fork+0x10/0x20
[   21.158445] 
[   21.158478] The buggy address belongs to the object at fff00000c58ac280
[   21.158478]  which belongs to the cache kmalloc-64 of size 64
[   21.158540] The buggy address is located 0 bytes to the right of
[   21.158540]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.158618] 
[   21.158657] The buggy address belongs to the physical page:
[   21.158723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.158799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.158852] page_type: f5(slab)
[   21.158894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.158953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.158996] page dumped because: kasan: bad access detected
[   21.159036] 
[   21.159065] Memory state around the buggy address:
[   21.159098]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.159145]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.159190] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.159235]                                      ^
[   21.159271]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159326]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159365] ==================================================================
[   21.230952] ==================================================================
[   21.231281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.231450] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.231512] 
[   21.231545] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.231803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.231837] Hardware name: linux,dummy-virt (DT)
[   21.232012] Call trace:
[   21.232059]  show_stack+0x20/0x38 (C)
[   21.232113]  dump_stack_lvl+0x8c/0xd0
[   21.232223]  print_report+0x118/0x608
[   21.232290]  kasan_report+0xdc/0x128
[   21.232346]  __asan_report_load8_noabort+0x20/0x30
[   21.232525]  kasan_atomics_helper+0x3e20/0x4858
[   21.232605]  kasan_atomics+0x198/0x2e0
[   21.232826]  kunit_try_run_case+0x170/0x3f0
[   21.233202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.233296]  kthread+0x328/0x630
[   21.233427]  ret_from_fork+0x10/0x20
[   21.233661] 
[   21.233695] Allocated by task 265:
[   21.233726]  kasan_save_stack+0x3c/0x68
[   21.233772]  kasan_save_track+0x20/0x40
[   21.233919]  kasan_save_alloc_info+0x40/0x58
[   21.234103]  __kasan_kmalloc+0xd4/0xd8
[   21.234200]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.234596]  kasan_atomics+0xb8/0x2e0
[   21.234735]  kunit_try_run_case+0x170/0x3f0
[   21.234877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.234955]  kthread+0x328/0x630
[   21.235000]  ret_from_fork+0x10/0x20
[   21.235046] 
[   21.235210] The buggy address belongs to the object at fff00000c58ac280
[   21.235210]  which belongs to the cache kmalloc-64 of size 64
[   21.235609] The buggy address is located 0 bytes to the right of
[   21.235609]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.235769] 
[   21.235837] The buggy address belongs to the physical page:
[   21.235879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.236056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.236453] page_type: f5(slab)
[   21.236663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.236742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.236793] page dumped because: kasan: bad access detected
[   21.236828] 
[   21.236847] Memory state around the buggy address:
[   21.237080]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.237302]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.237484] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.237530]                                      ^
[   21.237566]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.237624]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.237792] ==================================================================
[   21.080055] ==================================================================
[   21.080126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   21.080177] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.080521] 
[   21.080596] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.080777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.081301] Hardware name: linux,dummy-virt (DT)
[   21.081421] Call trace:
[   21.081511]  show_stack+0x20/0x38 (C)
[   21.082104]  dump_stack_lvl+0x8c/0xd0
[   21.082169]  print_report+0x118/0x608
[   21.082414]  kasan_report+0xdc/0x128
[   21.082678]  kasan_check_range+0x100/0x1a8
[   21.082906]  __kasan_check_write+0x20/0x30
[   21.083146]  kasan_atomics_helper+0x1190/0x4858
[   21.083241]  kasan_atomics+0x198/0x2e0
[   21.083494]  kunit_try_run_case+0x170/0x3f0
[   21.083707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.084067]  kthread+0x328/0x630
[   21.084156]  ret_from_fork+0x10/0x20
[   21.084301] 
[   21.084325] Allocated by task 265:
[   21.084355]  kasan_save_stack+0x3c/0x68
[   21.084705]  kasan_save_track+0x20/0x40
[   21.085230]  kasan_save_alloc_info+0x40/0x58
[   21.085515]  __kasan_kmalloc+0xd4/0xd8
[   21.085596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.085639]  kasan_atomics+0xb8/0x2e0
[   21.085684]  kunit_try_run_case+0x170/0x3f0
[   21.085723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.085992]  kthread+0x328/0x630
[   21.086275]  ret_from_fork+0x10/0x20
[   21.086453] 
[   21.086634] The buggy address belongs to the object at fff00000c58ac280
[   21.086634]  which belongs to the cache kmalloc-64 of size 64
[   21.087061] The buggy address is located 0 bytes to the right of
[   21.087061]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.087139] 
[   21.087342] The buggy address belongs to the physical page:
[   21.087386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.087754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.088007] page_type: f5(slab)
[   21.088053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.088340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.088518] page dumped because: kasan: bad access detected
[   21.088598] 
[   21.088754] Memory state around the buggy address:
[   21.088803]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.088858]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.088904] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.089323]                                      ^
[   21.089584]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.089675]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.089717] ==================================================================
[   21.238383] ==================================================================
[   21.238435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.238487] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.238539] 
[   21.238611] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.238696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.238725] Hardware name: linux,dummy-virt (DT)
[   21.238761] Call trace:
[   21.238794]  show_stack+0x20/0x38 (C)
[   21.238855]  dump_stack_lvl+0x8c/0xd0
[   21.238902]  print_report+0x118/0x608
[   21.238951]  kasan_report+0xdc/0x128
[   21.238997]  kasan_check_range+0x100/0x1a8
[   21.239056]  __kasan_check_write+0x20/0x30
[   21.239103]  kasan_atomics_helper+0x17ec/0x4858
[   21.239158]  kasan_atomics+0x198/0x2e0
[   21.239204]  kunit_try_run_case+0x170/0x3f0
[   21.239252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.239304]  kthread+0x328/0x630
[   21.239347]  ret_from_fork+0x10/0x20
[   21.239404] 
[   21.239425] Allocated by task 265:
[   21.239452]  kasan_save_stack+0x3c/0x68
[   21.239494]  kasan_save_track+0x20/0x40
[   21.239532]  kasan_save_alloc_info+0x40/0x58
[   21.239656]  __kasan_kmalloc+0xd4/0xd8
[   21.239915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.240882]  kasan_atomics+0xb8/0x2e0
[   21.240975]  kunit_try_run_case+0x170/0x3f0
[   21.241063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.241149]  kthread+0x328/0x630
[   21.241201]  ret_from_fork+0x10/0x20
[   21.241278] 
[   21.241466] The buggy address belongs to the object at fff00000c58ac280
[   21.241466]  which belongs to the cache kmalloc-64 of size 64
[   21.241550] The buggy address is located 0 bytes to the right of
[   21.241550]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.242244] 
[   21.242288] The buggy address belongs to the physical page:
[   21.242497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.242821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.243220] page_type: f5(slab)
[   21.243345] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.243405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.243650] page dumped because: kasan: bad access detected
[   21.244084] 
[   21.244318] Memory state around the buggy address:
[   21.244455]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.244878]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.245030] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.245077]                                      ^
[   21.245140]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.245193]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.245558] ==================================================================
[   21.135237] ==================================================================
[   21.135292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.135342] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.135790] 
[   21.136110] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.136226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.136254] Hardware name: linux,dummy-virt (DT)
[   21.136289] Call trace:
[   21.136681]  show_stack+0x20/0x38 (C)
[   21.136846]  dump_stack_lvl+0x8c/0xd0
[   21.137045]  print_report+0x118/0x608
[   21.137098]  kasan_report+0xdc/0x128
[   21.137439]  kasan_check_range+0x100/0x1a8
[   21.137690]  __kasan_check_write+0x20/0x30
[   21.137881]  kasan_atomics_helper+0x1414/0x4858
[   21.138026]  kasan_atomics+0x198/0x2e0
[   21.138132]  kunit_try_run_case+0x170/0x3f0
[   21.138279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.138522]  kthread+0x328/0x630
[   21.138657]  ret_from_fork+0x10/0x20
[   21.139031] 
[   21.139169] Allocated by task 265:
[   21.139270]  kasan_save_stack+0x3c/0x68
[   21.139368]  kasan_save_track+0x20/0x40
[   21.139554]  kasan_save_alloc_info+0x40/0x58
[   21.139609]  __kasan_kmalloc+0xd4/0xd8
[   21.139794]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.140014]  kasan_atomics+0xb8/0x2e0
[   21.140215]  kunit_try_run_case+0x170/0x3f0
[   21.140327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.140595]  kthread+0x328/0x630
[   21.140741]  ret_from_fork+0x10/0x20
[   21.140820] 
[   21.140858] The buggy address belongs to the object at fff00000c58ac280
[   21.140858]  which belongs to the cache kmalloc-64 of size 64
[   21.140926] The buggy address is located 0 bytes to the right of
[   21.140926]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.141174] 
[   21.141557] The buggy address belongs to the physical page:
[   21.141693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.141824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.141902] page_type: f5(slab)
[   21.141943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.142124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.142332] page dumped because: kasan: bad access detected
[   21.142557] 
[   21.142716] Memory state around the buggy address:
[   21.142756]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.143120]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.143360] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.143563]                                      ^
[   21.143816]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.143983]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.144181] ==================================================================
[   20.903464] ==================================================================
[   20.903528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   20.903709] Read of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.903940] 
[   20.903983] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.904316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.905417]  kasan_report+0xdc/0x128
[   20.907344]  kasan_save_stack+0x3c/0x68
[   20.909944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.914506]  kunit_try_run_case+0x170/0x3f0
[   20.916813]  kthread+0x328/0x630
[   20.917696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.923837] Call trace:
[   20.926172]  kasan_save_track+0x20/0x40
[   20.928445] 
[   20.929767] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.931442] Hardware name: linux,dummy-virt (DT)
[   20.933645]  kthread+0x328/0x630
[   20.935256]  kasan_atomics+0xb8/0x2e0
[   20.936589] The buggy address is located 0 bytes to the right of
[   20.936589]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.938978]                                      ^
[   20.943130]  kasan_atomics+0x198/0x2e0
[   20.943931]  kthread+0x328/0x630
[   20.944100] The buggy address is located 0 bytes to the right of
[   20.944100]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.945331]                                      ^
[   20.947547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   20.951313]  kasan_atomics+0xb8/0x2e0
[   20.951933]  kthread+0x328/0x630
[   20.952028]  ret_from_fork+0x10/0x20
[   20.952178] 
[   20.952203] The buggy address belongs to the object at fff00000c58ac280
[   20.952203]  which belongs to the cache kmalloc-64 of size 64
[   20.952295] The buggy address is located 0 bytes to the right of
[   20.952295]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.952726] 
[   20.952772] The buggy address belongs to the physical page:
[   20.953117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.953173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.953356] page_type: f5(slab)
[   20.953462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.953873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.954093] page dumped because: kasan: bad access detected
[   20.954622] 
[   20.954918] Memory state around the buggy address:
[   20.955019]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.955102]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.955185] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.955338]                                      ^
[   20.955595]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.955816]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.956062] ==================================================================
[   21.108122] ==================================================================
[   21.108182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.108274] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.108542] 
[   21.108594] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.108827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.109183] Hardware name: linux,dummy-virt (DT)
[   21.109304] Call trace:
[   21.109438]  show_stack+0x20/0x38 (C)
[   21.109614]  dump_stack_lvl+0x8c/0xd0
[   21.109718]  print_report+0x118/0x608
[   21.109887]  kasan_report+0xdc/0x128
[   21.109935]  kasan_check_range+0x100/0x1a8
[   21.109992]  __kasan_check_write+0x20/0x30
[   21.110038]  kasan_atomics_helper+0x12d8/0x4858
[   21.110467]  kasan_atomics+0x198/0x2e0
[   21.110705]  kunit_try_run_case+0x170/0x3f0
[   21.110963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.111138]  kthread+0x328/0x630
[   21.111263]  ret_from_fork+0x10/0x20
[   21.111315] 
[   21.111723] Allocated by task 265:
[   21.111785]  kasan_save_stack+0x3c/0x68
[   21.112188]  kasan_save_track+0x20/0x40
[   21.112336]  kasan_save_alloc_info+0x40/0x58
[   21.112414]  __kasan_kmalloc+0xd4/0xd8
[   21.112516]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.112561]  kasan_atomics+0xb8/0x2e0
[   21.112785]  kunit_try_run_case+0x170/0x3f0
[   21.113205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.113538]  kthread+0x328/0x630
[   21.113736]  ret_from_fork+0x10/0x20
[   21.113811] 
[   21.113865] The buggy address belongs to the object at fff00000c58ac280
[   21.113865]  which belongs to the cache kmalloc-64 of size 64
[   21.114134] The buggy address is located 0 bytes to the right of
[   21.114134]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.114533] 
[   21.114599] The buggy address belongs to the physical page:
[   21.114869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.114963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.115214] page_type: f5(slab)
[   21.115263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.115316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.115587] page dumped because: kasan: bad access detected
[   21.115678] 
[   21.115712] Memory state around the buggy address:
[   21.115774]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.115822]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.115868] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.115909]                                      ^
[   21.115946]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.115989]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.116029] ==================================================================
[   20.983262] ==================================================================
[   20.983479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.983610] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.983705] 
[   20.983740] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.983954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.984046] Hardware name: linux,dummy-virt (DT)
[   20.984081] Call trace:
[   20.984214]  show_stack+0x20/0x38 (C)
[   20.984375]  dump_stack_lvl+0x8c/0xd0
[   20.984468]  print_report+0x118/0x608
[   20.984689]  kasan_report+0xdc/0x128
[   20.984758]  kasan_check_range+0x100/0x1a8
[   20.985040]  __kasan_check_read+0x20/0x30
[   20.985187]  kasan_atomics_helper+0xdd4/0x4858
[   20.985316]  kasan_atomics+0x198/0x2e0
[   20.985442]  kunit_try_run_case+0x170/0x3f0
[   20.985517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.985586]  kthread+0x328/0x630
[   20.985632]  ret_from_fork+0x10/0x20
[   20.985681] 
[   20.985701] Allocated by task 265:
[   20.985733]  kasan_save_stack+0x3c/0x68
[   20.985774]  kasan_save_track+0x20/0x40
[   20.985813]  kasan_save_alloc_info+0x40/0x58
[   20.985855]  __kasan_kmalloc+0xd4/0xd8
[   20.985893]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.987025]  kasan_atomics+0xb8/0x2e0
[   20.987130]  kunit_try_run_case+0x170/0x3f0
[   20.987191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.987260]  kthread+0x328/0x630
[   20.987296]  ret_from_fork+0x10/0x20
[   20.987669] 
[   20.987709] The buggy address belongs to the object at fff00000c58ac280
[   20.987709]  which belongs to the cache kmalloc-64 of size 64
[   20.988215] The buggy address is located 0 bytes to the right of
[   20.988215]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.988302] 
[   20.988325] The buggy address belongs to the physical page:
[   20.988359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.988549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.988872] page_type: f5(slab)
[   20.988918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.989196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.989362] page dumped because: kasan: bad access detected
[   20.989583] 
[   20.989683] Memory state around the buggy address:
[   20.989759]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.989813]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.990021] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.990350]                                      ^
[   20.990668]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.990780]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.990867] ==================================================================
[   21.027374] ==================================================================
[   21.027558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.027629] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.027688] 
[   21.027721] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.027810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.028288] Hardware name: linux,dummy-virt (DT)
[   21.028341] Call trace:
[   21.028492]  show_stack+0x20/0x38 (C)
[   21.028572]  dump_stack_lvl+0x8c/0xd0
[   21.028972]  print_report+0x118/0x608
[   21.029077]  kasan_report+0xdc/0x128
[   21.029257]  kasan_check_range+0x100/0x1a8
[   21.029492]  __kasan_check_write+0x20/0x30
[   21.029623]  kasan_atomics_helper+0xf20/0x4858
[   21.029771]  kasan_atomics+0x198/0x2e0
[   21.029946]  kunit_try_run_case+0x170/0x3f0
[   21.030188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.030375]  kthread+0x328/0x630
[   21.030453]  ret_from_fork+0x10/0x20
[   21.030770] 
[   21.030907] Allocated by task 265:
[   21.030985]  kasan_save_stack+0x3c/0x68
[   21.031066]  kasan_save_track+0x20/0x40
[   21.031207]  kasan_save_alloc_info+0x40/0x58
[   21.031251]  __kasan_kmalloc+0xd4/0xd8
[   21.031464]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.031602]  kasan_atomics+0xb8/0x2e0
[   21.031883]  kunit_try_run_case+0x170/0x3f0
[   21.032878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.032979]  kthread+0x328/0x630
[   21.033041]  ret_from_fork+0x10/0x20
[   21.033115] 
[   21.033157] The buggy address belongs to the object at fff00000c58ac280
[   21.033157]  which belongs to the cache kmalloc-64 of size 64
[   21.033253] The buggy address is located 0 bytes to the right of
[   21.033253]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.033626] 
[   21.033735] The buggy address belongs to the physical page:
[   21.033846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.034316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.034730] page_type: f5(slab)
[   21.034785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.035087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.035139] page dumped because: kasan: bad access detected
[   21.035450] 
[   21.035518] Memory state around the buggy address:
[   21.035784]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.036071]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.036343] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.036533]                                      ^
[   21.036685]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.036824]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.036993] ==================================================================
[   21.096631] ==================================================================
[   21.097213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.097300] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.097351] 
[   21.097654] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.097895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.098151] Hardware name: linux,dummy-virt (DT)
[   21.098280] Call trace:
[   21.098435]  show_stack+0x20/0x38 (C)
[   21.098705]  dump_stack_lvl+0x8c/0xd0
[   21.099002]  print_report+0x118/0x608
[   21.099184]  kasan_report+0xdc/0x128
[   21.099378]  kasan_check_range+0x100/0x1a8
[   21.099476]  __kasan_check_write+0x20/0x30
[   21.099560]  kasan_atomics_helper+0x126c/0x4858
[   21.099912]  kasan_atomics+0x198/0x2e0
[   21.100110]  kunit_try_run_case+0x170/0x3f0
[   21.100194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.100365]  kthread+0x328/0x630
[   21.100483]  ret_from_fork+0x10/0x20
[   21.100771] 
[   21.100929] Allocated by task 265:
[   21.101176]  kasan_save_stack+0x3c/0x68
[   21.101417]  kasan_save_track+0x20/0x40
[   21.101601]  kasan_save_alloc_info+0x40/0x58
[   21.101691]  __kasan_kmalloc+0xd4/0xd8
[   21.101907]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.102100]  kasan_atomics+0xb8/0x2e0
[   21.102403]  kunit_try_run_case+0x170/0x3f0
[   21.102590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.102743]  kthread+0x328/0x630
[   21.102824]  ret_from_fork+0x10/0x20
[   21.103017] 
[   21.103089] The buggy address belongs to the object at fff00000c58ac280
[   21.103089]  which belongs to the cache kmalloc-64 of size 64
[   21.103162] The buggy address is located 0 bytes to the right of
[   21.103162]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.103431] 
[   21.103549] The buggy address belongs to the physical page:
[   21.103637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.103995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.104176] page_type: f5(slab)
[   21.104619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.104841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.105020] page dumped because: kasan: bad access detected
[   21.105365] 
[   21.105653] Memory state around the buggy address:
[   21.105760]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.105918]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.105973] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.106315]                                      ^
[   21.106566]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.106901]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.107136] ==================================================================
[   21.197560] ==================================================================
[   21.197924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.197994] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.198079] 
[   21.198114] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.198312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.198354] Hardware name: linux,dummy-virt (DT)
[   21.198389] Call trace:
[   21.198500]  show_stack+0x20/0x38 (C)
[   21.198563]  dump_stack_lvl+0x8c/0xd0
[   21.198758]  print_report+0x118/0x608
[   21.198821]  kasan_report+0xdc/0x128
[   21.198872]  __asan_report_load8_noabort+0x20/0x30
[   21.198922]  kasan_atomics_helper+0x3df4/0x4858
[   21.199374]  kasan_atomics+0x198/0x2e0
[   21.199446]  kunit_try_run_case+0x170/0x3f0
[   21.199499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.199773]  kthread+0x328/0x630
[   21.199836]  ret_from_fork+0x10/0x20
[   21.200116] 
[   21.200151] Allocated by task 265:
[   21.200335]  kasan_save_stack+0x3c/0x68
[   21.200414]  kasan_save_track+0x20/0x40
[   21.200554]  kasan_save_alloc_info+0x40/0x58
[   21.200614]  __kasan_kmalloc+0xd4/0xd8
[   21.200652]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.200844]  kasan_atomics+0xb8/0x2e0
[   21.201262]  kunit_try_run_case+0x170/0x3f0
[   21.201449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201604]  kthread+0x328/0x630
[   21.201699]  ret_from_fork+0x10/0x20
[   21.201796] 
[   21.201931] The buggy address belongs to the object at fff00000c58ac280
[   21.201931]  which belongs to the cache kmalloc-64 of size 64
[   21.202135] The buggy address is located 0 bytes to the right of
[   21.202135]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.202617] 
[   21.202838] The buggy address belongs to the physical page:
[   21.203067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.203263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.203344] page_type: f5(slab)
[   21.203781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.204046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.204153] page dumped because: kasan: bad access detected
[   21.204446] 
[   21.204525] Memory state around the buggy address:
[   21.204564]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.205147]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.205291] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.205731]                                      ^
[   21.205789]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.205846]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.206073] ==================================================================
[   21.008178] ==================================================================
[   21.008238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.008290] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.008361] 
[   21.008395] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.008477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.008691] Hardware name: linux,dummy-virt (DT)
[   21.008745] Call trace:
[   21.008771]  show_stack+0x20/0x38 (C)
[   21.009068]  dump_stack_lvl+0x8c/0xd0
[   21.009138]  print_report+0x118/0x608
[   21.009373]  kasan_report+0xdc/0x128
[   21.009466]  __asan_report_store8_noabort+0x20/0x30
[   21.009650]  kasan_atomics_helper+0x3e5c/0x4858
[   21.009731]  kasan_atomics+0x198/0x2e0
[   21.009780]  kunit_try_run_case+0x170/0x3f0
[   21.009829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.010493]  kthread+0x328/0x630
[   21.010658]  ret_from_fork+0x10/0x20
[   21.010775] 
[   21.010953] Allocated by task 265:
[   21.011036]  kasan_save_stack+0x3c/0x68
[   21.011224]  kasan_save_track+0x20/0x40
[   21.011507]  kasan_save_alloc_info+0x40/0x58
[   21.011809]  __kasan_kmalloc+0xd4/0xd8
[   21.012029]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.012477]  kasan_atomics+0xb8/0x2e0
[   21.012527]  kunit_try_run_case+0x170/0x3f0
[   21.012991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.013095]  kthread+0x328/0x630
[   21.013159]  ret_from_fork+0x10/0x20
[   21.013198] 
[   21.013219] The buggy address belongs to the object at fff00000c58ac280
[   21.013219]  which belongs to the cache kmalloc-64 of size 64
[   21.013864] The buggy address is located 0 bytes to the right of
[   21.013864]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.014085] 
[   21.014229] The buggy address belongs to the physical page:
[   21.014453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.014791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.015073] page_type: f5(slab)
[   21.015504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.015615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.015815] page dumped because: kasan: bad access detected
[   21.015857] 
[   21.015877] Memory state around the buggy address:
[   21.015925]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.016321]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.016491] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.016867]                                      ^
[   21.016914]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.016960]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.017002] ==================================================================
[   21.117919] ==================================================================
[   21.118327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.118401] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.118616] 
[   21.118834] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.118931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.118959] Hardware name: linux,dummy-virt (DT)
[   21.118992] Call trace:
[   21.119134]  show_stack+0x20/0x38 (C)
[   21.119238]  dump_stack_lvl+0x8c/0xd0
[   21.119474]  print_report+0x118/0x608
[   21.119536]  kasan_report+0xdc/0x128
[   21.119597]  kasan_check_range+0x100/0x1a8
[   21.119648]  __kasan_check_write+0x20/0x30
[   21.119693]  kasan_atomics_helper+0x1384/0x4858
[   21.120148]  kasan_atomics+0x198/0x2e0
[   21.120255]  kunit_try_run_case+0x170/0x3f0
[   21.120308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.120363]  kthread+0x328/0x630
[   21.120587]  ret_from_fork+0x10/0x20
[   21.120789] 
[   21.120823] Allocated by task 265:
[   21.120914]  kasan_save_stack+0x3c/0x68
[   21.121282]  kasan_save_track+0x20/0x40
[   21.121359]  kasan_save_alloc_info+0x40/0x58
[   21.121476]  __kasan_kmalloc+0xd4/0xd8
[   21.121535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.121672]  kasan_atomics+0xb8/0x2e0
[   21.121712]  kunit_try_run_case+0x170/0x3f0
[   21.121752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.121798]  kthread+0x328/0x630
[   21.122275]  ret_from_fork+0x10/0x20
[   21.122440] 
[   21.122561] The buggy address belongs to the object at fff00000c58ac280
[   21.122561]  which belongs to the cache kmalloc-64 of size 64
[   21.122649] The buggy address is located 0 bytes to the right of
[   21.122649]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.122891] 
[   21.123003] The buggy address belongs to the physical page:
[   21.123158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.123428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.123623] page_type: f5(slab)
[   21.123812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.123993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.124602] page dumped because: kasan: bad access detected
[   21.125118] 
[   21.125147] Memory state around the buggy address:
[   21.125186]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.125233]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.125432] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.125565]                                      ^
[   21.125993]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.126137]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.126250] ==================================================================
[   20.847487] ==================================================================
[   20.847535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.848009] Read of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.848362] 
[   20.848411] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.848496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.848526] Hardware name: linux,dummy-virt (DT)
[   20.848559] Call trace:
[   20.848595]  show_stack+0x20/0x38 (C)
[   20.848961]  dump_stack_lvl+0x8c/0xd0
[   20.849101]  print_report+0x118/0x608
[   20.849301]  kasan_report+0xdc/0x128
[   20.849374]  __asan_report_load4_noabort+0x20/0x30
[   20.849450]  kasan_atomics_helper+0x42d8/0x4858
[   20.849531]  kasan_atomics+0x198/0x2e0
[   20.849714]  kunit_try_run_case+0x170/0x3f0
[   20.850076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.850312]  kthread+0x328/0x630
[   20.850615]  ret_from_fork+0x10/0x20
[   20.850895] 
[   20.850924] Allocated by task 265:
[   20.850990]  kasan_save_stack+0x3c/0x68
[   20.851223]  kasan_save_track+0x20/0x40
[   20.851496]  kasan_save_alloc_info+0x40/0x58
[   20.851664]  __kasan_kmalloc+0xd4/0xd8
[   20.851760]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.851808]  kasan_atomics+0xb8/0x2e0
[   20.852104]  kunit_try_run_case+0x170/0x3f0
[   20.852287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.852409]  kthread+0x328/0x630
[   20.852487]  ret_from_fork+0x10/0x20
[   20.852606] 
[   20.852674] The buggy address belongs to the object at fff00000c58ac280
[   20.852674]  which belongs to the cache kmalloc-64 of size 64
[   20.852935] The buggy address is located 0 bytes to the right of
[   20.852935]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.853937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.856169] ==================================================================
[   20.883644] ==================================================================
[   20.883697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.883747] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.884151] 
[   20.884204] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.884291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.884725] Hardware name: linux,dummy-virt (DT)
[   20.884761] Call trace:
[   20.884786]  show_stack+0x20/0x38 (C)
[   20.884914]  dump_stack_lvl+0x8c/0xd0
[   20.885011]  print_report+0x118/0x608
[   20.885094]  kasan_report+0xdc/0x128
[   20.885218]  kasan_check_range+0x100/0x1a8
[   20.885272]  __kasan_check_write+0x20/0x30
[   20.885319]  kasan_atomics_helper+0xa6c/0x4858
[   20.885594]  kasan_atomics+0x198/0x2e0
[   20.885811]  kunit_try_run_case+0x170/0x3f0
[   20.885918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.886078]  kthread+0x328/0x630
[   20.886186]  ret_from_fork+0x10/0x20
[   20.886259] 
[   20.886282] Allocated by task 265:
[   20.886642]  kasan_save_stack+0x3c/0x68
[   20.886767]  kasan_save_track+0x20/0x40
[   20.886858]  kasan_save_alloc_info+0x40/0x58
[   20.887056]  __kasan_kmalloc+0xd4/0xd8
[   20.887146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.887504]  kasan_atomics+0xb8/0x2e0
[   20.888194]  kunit_try_run_case+0x170/0x3f0
[   20.888279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.888379]  kthread+0x328/0x630
[   20.888650]  ret_from_fork+0x10/0x20
[   20.888828] 
[   20.888883] The buggy address belongs to the object at fff00000c58ac280
[   20.888883]  which belongs to the cache kmalloc-64 of size 64
[   20.889503] The buggy address is located 0 bytes to the right of
[   20.889503]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.889754] 
[   20.889834] The buggy address belongs to the physical page:
[   20.889967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.890177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.890420] page_type: f5(slab)
[   20.890485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.890721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.890970] page dumped because: kasan: bad access detected
[   20.891055] 
[   20.891123] Memory state around the buggy address:
[   20.891241]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.891287]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.891342] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.891382]                                      ^
[   20.891417]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.891471]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.891520] ==================================================================
[   21.001404] ==================================================================
[   21.001543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.001626] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.001731] 
[   21.001767] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.001850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.002219] Hardware name: linux,dummy-virt (DT)
[   21.002275] Call trace:
[   21.002456]  show_stack+0x20/0x38 (C)
[   21.002520]  dump_stack_lvl+0x8c/0xd0
[   21.002749]  print_report+0x118/0x608
[   21.002890]  kasan_report+0xdc/0x128
[   21.003001]  kasan_check_range+0x100/0x1a8
[   21.003053]  __kasan_check_write+0x20/0x30
[   21.003410]  kasan_atomics_helper+0xe44/0x4858
[   21.003660]  kasan_atomics+0x198/0x2e0
[   21.003758]  kunit_try_run_case+0x170/0x3f0
[   21.003948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.004067]  kthread+0x328/0x630
[   21.004143]  ret_from_fork+0x10/0x20
[   21.004192] 
[   21.004382] Allocated by task 265:
[   21.004535]  kasan_save_stack+0x3c/0x68
[   21.004602]  kasan_save_track+0x20/0x40
[   21.004881]  kasan_save_alloc_info+0x40/0x58
[   21.005092]  __kasan_kmalloc+0xd4/0xd8
[   21.005168]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.005465]  kasan_atomics+0xb8/0x2e0
[   21.005694]  kunit_try_run_case+0x170/0x3f0
[   21.005752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.005998]  kthread+0x328/0x630
[   21.006044]  ret_from_fork+0x10/0x20
[   21.006275] 
[   21.006304] The buggy address belongs to the object at fff00000c58ac280
[   21.006304]  which belongs to the cache kmalloc-64 of size 64
[   21.006387] The buggy address is located 0 bytes to the right of
[   21.006387]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.006453] 
[   21.006474] The buggy address belongs to the physical page:
[   21.006517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.006572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.006643] page_type: f5(slab)
[   21.006696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.006764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.006807] page dumped because: kasan: bad access detected
[   21.006847] 
[   21.006869] Memory state around the buggy address:
[   21.006902]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.006957]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.007004] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.007043]                                      ^
[   21.007080]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.007132]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.007187] ==================================================================
[   21.054013] ==================================================================
[   21.054073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.054193] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.054251] 
[   21.054284] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.054536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.055006] Hardware name: linux,dummy-virt (DT)
[   21.055059] Call trace:
[   21.055234]  show_stack+0x20/0x38 (C)
[   21.055318]  dump_stack_lvl+0x8c/0xd0
[   21.055368]  print_report+0x118/0x608
[   21.055571]  kasan_report+0xdc/0x128
[   21.055633]  kasan_check_range+0x100/0x1a8
[   21.055912]  __kasan_check_write+0x20/0x30
[   21.055982]  kasan_atomics_helper+0x1058/0x4858
[   21.056246]  kasan_atomics+0x198/0x2e0
[   21.056336]  kunit_try_run_case+0x170/0x3f0
[   21.056435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.056551]  kthread+0x328/0x630
[   21.056612]  ret_from_fork+0x10/0x20
[   21.056661] 
[   21.056682] Allocated by task 265:
[   21.056730]  kasan_save_stack+0x3c/0x68
[   21.056929]  kasan_save_track+0x20/0x40
[   21.057268]  kasan_save_alloc_info+0x40/0x58
[   21.057504]  __kasan_kmalloc+0xd4/0xd8
[   21.057699]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.057805]  kasan_atomics+0xb8/0x2e0
[   21.057862]  kunit_try_run_case+0x170/0x3f0
[   21.057902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.057946]  kthread+0x328/0x630
[   21.057981]  ret_from_fork+0x10/0x20
[   21.058527] 
[   21.058758] The buggy address belongs to the object at fff00000c58ac280
[   21.058758]  which belongs to the cache kmalloc-64 of size 64
[   21.058991] The buggy address is located 0 bytes to the right of
[   21.058991]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.059267] 
[   21.059307] The buggy address belongs to the physical page:
[   21.059714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.059949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.060276] page_type: f5(slab)
[   21.060509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.060681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.060773] page dumped because: kasan: bad access detected
[   21.060809] 
[   21.060829] Memory state around the buggy address:
[   21.060867]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.061091]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.061333] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.061381]                                      ^
[   21.061433]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.061482]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.061521] ==================================================================
[   20.957926] ==================================================================
[   20.958121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.958180] Read of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.958487] 
[   20.958595] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.958944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.958992] Hardware name: linux,dummy-virt (DT)
[   20.959253] Call trace:
[   20.959295]  show_stack+0x20/0x38 (C)
[   20.959350]  dump_stack_lvl+0x8c/0xd0
[   20.959401]  print_report+0x118/0x608
[   20.959450]  kasan_report+0xdc/0x128
[   20.959799]  __asan_report_load4_noabort+0x20/0x30
[   20.960100]  kasan_atomics_helper+0x3dd8/0x4858
[   20.960233]  kasan_atomics+0x198/0x2e0
[   20.960287]  kunit_try_run_case+0x170/0x3f0
[   20.960345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.960643]  kthread+0x328/0x630
[   20.960804]  ret_from_fork+0x10/0x20
[   20.961026] 
[   20.961053] Allocated by task 265:
[   20.961084]  kasan_save_stack+0x3c/0x68
[   20.961132]  kasan_save_track+0x20/0x40
[   20.961180]  kasan_save_alloc_info+0x40/0x58
[   20.961398]  __kasan_kmalloc+0xd4/0xd8
[   20.961493]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.961590]  kasan_atomics+0xb8/0x2e0
[   20.961633]  kunit_try_run_case+0x170/0x3f0
[   20.961673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.961732]  kthread+0x328/0x630
[   20.961776]  ret_from_fork+0x10/0x20
[   20.961814] 
[   20.961851] The buggy address belongs to the object at fff00000c58ac280
[   20.961851]  which belongs to the cache kmalloc-64 of size 64
[   20.961922] The buggy address is located 0 bytes to the right of
[   20.961922]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.961991] 
[   20.962012] The buggy address belongs to the physical page:
[   20.962055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.962119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.962169] page_type: f5(slab)
[   20.962218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.962271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.962324] page dumped because: kasan: bad access detected
[   20.962367] 
[   20.962387] Memory state around the buggy address:
[   20.962420]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.962469]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.962515] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.962555]                                      ^
[   20.962611]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963040]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963101] ==================================================================
[   21.090878] ==================================================================
[   21.090931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   21.091106] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.091274] 
[   21.091312] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.091796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.091841] Hardware name: linux,dummy-virt (DT)
[   21.091877] Call trace:
[   21.091994]  show_stack+0x20/0x38 (C)
[   21.092056]  dump_stack_lvl+0x8c/0xd0
[   21.092299]  print_report+0x118/0x608
[   21.092410]  kasan_report+0xdc/0x128
[   21.092497]  kasan_check_range+0x100/0x1a8
[   21.092551]  __kasan_check_write+0x20/0x30
[   21.093002]  kasan_atomics_helper+0x11f8/0x4858
[   21.093193]  kasan_atomics+0x198/0x2e0
[   21.093301]  kunit_try_run_case+0x170/0x3f0
[   21.093588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.093836]  kthread+0x328/0x630
[   21.093947]  ret_from_fork+0x10/0x20
[   21.094101] 
[   21.094126] Allocated by task 265:
[   21.094158]  kasan_save_stack+0x3c/0x68
[   21.094281]  kasan_save_track+0x20/0x40
[   21.094346]  kasan_save_alloc_info+0x40/0x58
[   21.094390]  __kasan_kmalloc+0xd4/0xd8
[   21.094432]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.094473]  kasan_atomics+0xb8/0x2e0
[   21.094511]  kunit_try_run_case+0x170/0x3f0
[   21.094550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.094608]  kthread+0x328/0x630
[   21.094642]  ret_from_fork+0x10/0x20
[   21.094680] 
[   21.094711] The buggy address belongs to the object at fff00000c58ac280
[   21.094711]  which belongs to the cache kmalloc-64 of size 64
[   21.094771] The buggy address is located 0 bytes to the right of
[   21.094771]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.094851] 
[   21.094872] The buggy address belongs to the physical page:
[   21.094929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.094982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.095041] page_type: f5(slab)
[   21.095081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.095148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.095191] page dumped because: kasan: bad access detected
[   21.095235] 
[   21.095268] Memory state around the buggy address:
[   21.095302]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.095348]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.095392] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.095434]                                      ^
[   21.095479]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.095529]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.095569] ==================================================================
[   21.160634] ==================================================================
[   21.160725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.161039] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.161348] 
[   21.161482] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.162149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.162293] Hardware name: linux,dummy-virt (DT)
[   21.162450] Call trace:
[   21.162709]  show_stack+0x20/0x38 (C)
[   21.162807]  dump_stack_lvl+0x8c/0xd0
[   21.163044]  print_report+0x118/0x608
[   21.163308]  kasan_report+0xdc/0x128
[   21.163856]  kasan_check_range+0x100/0x1a8
[   21.164083]  __kasan_check_write+0x20/0x30
[   21.164275]  kasan_atomics_helper+0x154c/0x4858
[   21.164528]  kasan_atomics+0x198/0x2e0
[   21.164657]  kunit_try_run_case+0x170/0x3f0
[   21.164757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.164847]  kthread+0x328/0x630
[   21.164949]  ret_from_fork+0x10/0x20
[   21.165000] 
[   21.165021] Allocated by task 265:
[   21.165342]  kasan_save_stack+0x3c/0x68
[   21.165772]  kasan_save_track+0x20/0x40
[   21.165873]  kasan_save_alloc_info+0x40/0x58
[   21.166005]  __kasan_kmalloc+0xd4/0xd8
[   21.166094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.166325]  kasan_atomics+0xb8/0x2e0
[   21.166446]  kunit_try_run_case+0x170/0x3f0
[   21.166717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.166770]  kthread+0x328/0x630
[   21.166806]  ret_from_fork+0x10/0x20
[   21.167108] 
[   21.167561] The buggy address belongs to the object at fff00000c58ac280
[   21.167561]  which belongs to the cache kmalloc-64 of size 64
[   21.167740] The buggy address is located 0 bytes to the right of
[   21.167740]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.168293] 
[   21.168364] The buggy address belongs to the physical page:
[   21.168511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.168784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.168986] page_type: f5(slab)
[   21.169050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.169289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.169368] page dumped because: kasan: bad access detected
[   21.169660] 
[   21.169968] Memory state around the buggy address:
[   21.170151]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.170203]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.170394] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.170441]                                      ^
[   21.170488]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.170732]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.171053] ==================================================================
[   21.210592] ==================================================================
[   21.210672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.210724] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.210884] 
[   21.211459] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.211568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.211611] Hardware name: linux,dummy-virt (DT)
[   21.212211] Call trace:
[   21.212276]  show_stack+0x20/0x38 (C)
[   21.212559]  dump_stack_lvl+0x8c/0xd0
[   21.212643]  print_report+0x118/0x608
[   21.213025]  kasan_report+0xdc/0x128
[   21.213242]  __asan_report_load8_noabort+0x20/0x30
[   21.213744]  kasan_atomics_helper+0x3e10/0x4858
[   21.213854]  kasan_atomics+0x198/0x2e0
[   21.213942]  kunit_try_run_case+0x170/0x3f0
[   21.214089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.214149]  kthread+0x328/0x630
[   21.214315]  ret_from_fork+0x10/0x20
[   21.214568] 
[   21.214623] Allocated by task 265:
[   21.214882]  kasan_save_stack+0x3c/0x68
[   21.215122]  kasan_save_track+0x20/0x40
[   21.215203]  kasan_save_alloc_info+0x40/0x58
[   21.215289]  __kasan_kmalloc+0xd4/0xd8
[   21.215425]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.215488]  kasan_atomics+0xb8/0x2e0
[   21.215747]  kunit_try_run_case+0x170/0x3f0
[   21.216130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.216308]  kthread+0x328/0x630
[   21.216425]  ret_from_fork+0x10/0x20
[   21.216539] 
[   21.216628] The buggy address belongs to the object at fff00000c58ac280
[   21.216628]  which belongs to the cache kmalloc-64 of size 64
[   21.216829] The buggy address is located 0 bytes to the right of
[   21.216829]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.217078] 
[   21.217154] The buggy address belongs to the physical page:
[   21.217260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.217355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.217677] page_type: f5(slab)
[   21.217731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.218129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.218334] page dumped because: kasan: bad access detected
[   21.218484] 
[   21.218644] Memory state around the buggy address:
[   21.218812]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.218870]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.219277] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.219454]                                      ^
[   21.219557]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.219621]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.219822] ==================================================================
[   21.190193] ==================================================================
[   21.190426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.190598] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.190652] 
[   21.190687] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.190894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.190953] Hardware name: linux,dummy-virt (DT)
[   21.190988] Call trace:
[   21.191028]  show_stack+0x20/0x38 (C)
[   21.191161]  dump_stack_lvl+0x8c/0xd0
[   21.191210]  print_report+0x118/0x608
[   21.191259]  kasan_report+0xdc/0x128
[   21.191476]  kasan_check_range+0x100/0x1a8
[   21.191606]  __kasan_check_write+0x20/0x30
[   21.191762]  kasan_atomics_helper+0x1644/0x4858
[   21.191816]  kasan_atomics+0x198/0x2e0
[   21.191863]  kunit_try_run_case+0x170/0x3f0
[   21.191911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.191965]  kthread+0x328/0x630
[   21.192010]  ret_from_fork+0x10/0x20
[   21.192058] 
[   21.192078] Allocated by task 265:
[   21.192123]  kasan_save_stack+0x3c/0x68
[   21.192166]  kasan_save_track+0x20/0x40
[   21.192214]  kasan_save_alloc_info+0x40/0x58
[   21.192263]  __kasan_kmalloc+0xd4/0xd8
[   21.192302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.192344]  kasan_atomics+0xb8/0x2e0
[   21.192380]  kunit_try_run_case+0x170/0x3f0
[   21.192428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.192483]  kthread+0x328/0x630
[   21.192517]  ret_from_fork+0x10/0x20
[   21.192555] 
[   21.192955] The buggy address belongs to the object at fff00000c58ac280
[   21.192955]  which belongs to the cache kmalloc-64 of size 64
[   21.193272] The buggy address is located 0 bytes to the right of
[   21.193272]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.193568] 
[   21.193605] The buggy address belongs to the physical page:
[   21.194031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.194363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.194500] page_type: f5(slab)
[   21.194549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.195433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.195543] page dumped because: kasan: bad access detected
[   21.195790] 
[   21.195828] Memory state around the buggy address:
[   21.195950]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.196022]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.196373] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.196515]                                      ^
[   21.196558]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.196779]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.196960] ==================================================================
[   20.894366] ==================================================================
[   20.894837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.895058] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.895323] 
[   20.895374] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.895466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.895496] Hardware name: linux,dummy-virt (DT)
[   20.895688] Call trace:
[   20.895752]  show_stack+0x20/0x38 (C)
[   20.895941]  dump_stack_lvl+0x8c/0xd0
[   20.896004]  print_report+0x118/0x608
[   20.896052]  kasan_report+0xdc/0x128
[   20.896100]  kasan_check_range+0x100/0x1a8
[   20.896160]  __kasan_check_write+0x20/0x30
[   20.896208]  kasan_atomics_helper+0xad4/0x4858
[   20.896258]  kasan_atomics+0x198/0x2e0
[   20.896305]  kunit_try_run_case+0x170/0x3f0
[   20.896358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.896423]  kthread+0x328/0x630
[   20.896468]  ret_from_fork+0x10/0x20
[   20.896518] 
[   20.896541] Allocated by task 265:
[   20.896571]  kasan_save_stack+0x3c/0x68
[   20.896627]  kasan_save_track+0x20/0x40
[   20.896665]  kasan_save_alloc_info+0x40/0x58
[   20.896708]  __kasan_kmalloc+0xd4/0xd8
[   20.896745]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.897005]  kasan_atomics+0xb8/0x2e0
[   20.897325]  kunit_try_run_case+0x170/0x3f0
[   20.897522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.897699]  kthread+0x328/0x630
[   20.897771]  ret_from_fork+0x10/0x20
[   20.898168] 
[   20.898357] The buggy address belongs to the object at fff00000c58ac280
[   20.898357]  which belongs to the cache kmalloc-64 of size 64
[   20.898470] The buggy address is located 0 bytes to the right of
[   20.898470]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.898920] 
[   20.898949] The buggy address belongs to the physical page:
[   20.899177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.899392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.899617] page_type: f5(slab)
[   20.900041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.900233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.900441] page dumped because: kasan: bad access detected
[   20.900510] 
[   20.900530] Memory state around the buggy address:
[   20.900756]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.900966]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.901029] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.901069]                                      ^
[   20.901105]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.901316]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.901422] ==================================================================
[   20.866608] ==================================================================
[   20.866665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.866938] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   20.867467] 
[   20.867736] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.868006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.868041] Hardware name: linux,dummy-virt (DT)
[   20.868326] Call trace:
[   20.868543]  show_stack+0x20/0x38 (C)
[   20.868632]  dump_stack_lvl+0x8c/0xd0
[   20.868688]  print_report+0x118/0x608
[   20.869149]  kasan_report+0xdc/0x128
[   20.869226]  kasan_check_range+0x100/0x1a8
[   20.869307]  __kasan_check_write+0x20/0x30
[   20.869418]  kasan_atomics_helper+0x99c/0x4858
[   20.869471]  kasan_atomics+0x198/0x2e0
[   20.869697]  kunit_try_run_case+0x170/0x3f0
[   20.869918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.870163]  kthread+0x328/0x630
[   20.870339]  ret_from_fork+0x10/0x20
[   20.870508] 
[   20.870533] Allocated by task 265:
[   20.870608]  kasan_save_stack+0x3c/0x68
[   20.870767]  kasan_save_track+0x20/0x40
[   20.870969]  kasan_save_alloc_info+0x40/0x58
[   20.871073]  __kasan_kmalloc+0xd4/0xd8
[   20.871135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.871178]  kasan_atomics+0xb8/0x2e0
[   20.871215]  kunit_try_run_case+0x170/0x3f0
[   20.871276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.871323]  kthread+0x328/0x630
[   20.871364]  ret_from_fork+0x10/0x20
[   20.871412] 
[   20.871448] The buggy address belongs to the object at fff00000c58ac280
[   20.871448]  which belongs to the cache kmalloc-64 of size 64
[   20.871511] The buggy address is located 0 bytes to the right of
[   20.871511]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   20.871587] 
[   20.871642] The buggy address belongs to the physical page:
[   20.871676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   20.872310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.872406] page_type: f5(slab)
[   20.872496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.873086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.873178] page dumped because: kasan: bad access detected
[   20.873230] 
[   20.873253] Memory state around the buggy address:
[   20.873288]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.873685]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.873738] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.873902]                                      ^
[   20.873989]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.874376]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.874445] ==================================================================
[   21.071648] ==================================================================
[   21.071800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   21.071854] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.071906] 
[   21.071936] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.072416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.072619] Hardware name: linux,dummy-virt (DT)
[   21.072738] Call trace:
[   21.072836]  show_stack+0x20/0x38 (C)
[   21.072928]  dump_stack_lvl+0x8c/0xd0
[   21.073072]  print_report+0x118/0x608
[   21.073189]  kasan_report+0xdc/0x128
[   21.073237]  kasan_check_range+0x100/0x1a8
[   21.073292]  __kasan_check_write+0x20/0x30
[   21.073565]  kasan_atomics_helper+0x1128/0x4858
[   21.073784]  kasan_atomics+0x198/0x2e0
[   21.073990]  kunit_try_run_case+0x170/0x3f0
[   21.074226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.074330]  kthread+0x328/0x630
[   21.074621]  ret_from_fork+0x10/0x20
[   21.075114] 
[   21.075440] Allocated by task 265:
[   21.075553]  kasan_save_stack+0x3c/0x68
[   21.075659]  kasan_save_track+0x20/0x40
[   21.075813]  kasan_save_alloc_info+0x40/0x58
[   21.076005]  __kasan_kmalloc+0xd4/0xd8
[   21.076221]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.076454]  kasan_atomics+0xb8/0x2e0
[   21.076546]  kunit_try_run_case+0x170/0x3f0
[   21.076850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.076901]  kthread+0x328/0x630
[   21.076952]  ret_from_fork+0x10/0x20
[   21.077109] 
[   21.077174] The buggy address belongs to the object at fff00000c58ac280
[   21.077174]  which belongs to the cache kmalloc-64 of size 64
[   21.077378] The buggy address is located 0 bytes to the right of
[   21.077378]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.077508] 
[   21.077879] The buggy address belongs to the physical page:
[   21.077929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.077984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.078446] page_type: f5(slab)
[   21.078667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.078783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.078955] page dumped because: kasan: bad access detected
[   21.079212] 
[   21.079300] Memory state around the buggy address:
[   21.079342]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.079543]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.079601] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.079642]                                      ^
[   21.079686]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.079741]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.079792] ==================================================================
[   21.171873] ==================================================================
[   21.171926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.172149] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.172343] 
[   21.172601] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.173009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.173104] Hardware name: linux,dummy-virt (DT)
[   21.173174] Call trace:
[   21.173238]  show_stack+0x20/0x38 (C)
[   21.173388]  dump_stack_lvl+0x8c/0xd0
[   21.173478]  print_report+0x118/0x608
[   21.173691]  kasan_report+0xdc/0x128
[   21.173749]  kasan_check_range+0x100/0x1a8
[   21.173866]  __kasan_check_write+0x20/0x30
[   21.174106]  kasan_atomics_helper+0x15b4/0x4858
[   21.174471]  kasan_atomics+0x198/0x2e0
[   21.174636]  kunit_try_run_case+0x170/0x3f0
[   21.174732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.174826]  kthread+0x328/0x630
[   21.174965]  ret_from_fork+0x10/0x20
[   21.175016] 
[   21.175221] Allocated by task 265:
[   21.175397]  kasan_save_stack+0x3c/0x68
[   21.175654]  kasan_save_track+0x20/0x40
[   21.175879]  kasan_save_alloc_info+0x40/0x58
[   21.175976]  __kasan_kmalloc+0xd4/0xd8
[   21.176217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.176357]  kasan_atomics+0xb8/0x2e0
[   21.176684]  kunit_try_run_case+0x170/0x3f0
[   21.176778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.177031]  kthread+0x328/0x630
[   21.177142]  ret_from_fork+0x10/0x20
[   21.177240] 
[   21.177425] The buggy address belongs to the object at fff00000c58ac280
[   21.177425]  which belongs to the cache kmalloc-64 of size 64
[   21.177591] The buggy address is located 0 bytes to the right of
[   21.177591]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.177730] 
[   21.177820] The buggy address belongs to the physical page:
[   21.177855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.177909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.177980] page_type: f5(slab)
[   21.178020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.178079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.178122] page dumped because: kasan: bad access detected
[   21.178162] 
[   21.178191] Memory state around the buggy address:
[   21.178226]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.178274]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.178321] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.178371]                                      ^
[   21.178429]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.178494]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.178539] ==================================================================
[   21.206507] ==================================================================
[   21.206559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.206636] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.206689] 
[   21.206720] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.206803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.206848] Hardware name: linux,dummy-virt (DT)
[   21.206880] Call trace:
[   21.206909]  show_stack+0x20/0x38 (C)
[   21.206959]  dump_stack_lvl+0x8c/0xd0
[   21.207007]  print_report+0x118/0x608
[   21.207064]  kasan_report+0xdc/0x128
[   21.207112]  kasan_check_range+0x100/0x1a8
[   21.207160]  __kasan_check_write+0x20/0x30
[   21.207207]  kasan_atomics_helper+0x16d0/0x4858
[   21.207257]  kasan_atomics+0x198/0x2e0
[   21.207303]  kunit_try_run_case+0x170/0x3f0
[   21.207361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.207416]  kthread+0x328/0x630
[   21.207466]  ret_from_fork+0x10/0x20
[   21.207515] 
[   21.207534] Allocated by task 265:
[   21.207589]  kasan_save_stack+0x3c/0x68
[   21.207636]  kasan_save_track+0x20/0x40
[   21.207684]  kasan_save_alloc_info+0x40/0x58
[   21.207728]  __kasan_kmalloc+0xd4/0xd8
[   21.207766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.207812]  kasan_atomics+0xb8/0x2e0
[   21.207860]  kunit_try_run_case+0x170/0x3f0
[   21.207899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.207945]  kthread+0x328/0x630
[   21.207978]  ret_from_fork+0x10/0x20
[   21.208015] 
[   21.208045] The buggy address belongs to the object at fff00000c58ac280
[   21.208045]  which belongs to the cache kmalloc-64 of size 64
[   21.208113] The buggy address is located 0 bytes to the right of
[   21.208113]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.208181] 
[   21.208209] The buggy address belongs to the physical page:
[   21.208242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.208295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.208344] page_type: f5(slab)
[   21.208383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.208434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.208477] page dumped because: kasan: bad access detected
[   21.208511] 
[   21.208531] Memory state around the buggy address:
[   21.208563]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.208617]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.209130] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.209185]                                      ^
[   21.209223]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209400]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209969] ==================================================================
[   21.043938] ==================================================================
[   21.043993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.044204] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265
[   21.044297] 
[   21.044334] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.044589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.044791] Hardware name: linux,dummy-virt (DT)
[   21.045124] Call trace:
[   21.045193]  show_stack+0x20/0x38 (C)
[   21.045411]  dump_stack_lvl+0x8c/0xd0
[   21.045603]  print_report+0x118/0x608
[   21.045833]  kasan_report+0xdc/0x128
[   21.045960]  kasan_check_range+0x100/0x1a8
[   21.046074]  __kasan_check_write+0x20/0x30
[   21.046269]  kasan_atomics_helper+0xff0/0x4858
[   21.046539]  kasan_atomics+0x198/0x2e0
[   21.046663]  kunit_try_run_case+0x170/0x3f0
[   21.046755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.046834]  kthread+0x328/0x630
[   21.046878]  ret_from_fork+0x10/0x20
[   21.047107] 
[   21.047517] Allocated by task 265:
[   21.047609]  kasan_save_stack+0x3c/0x68
[   21.047763]  kasan_save_track+0x20/0x40
[   21.047860]  kasan_save_alloc_info+0x40/0x58
[   21.048001]  __kasan_kmalloc+0xd4/0xd8
[   21.048052]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.048095]  kasan_atomics+0xb8/0x2e0
[   21.048318]  kunit_try_run_case+0x170/0x3f0
[   21.048732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.048950]  kthread+0x328/0x630
[   21.048994]  ret_from_fork+0x10/0x20
[   21.049034] 
[   21.049058] The buggy address belongs to the object at fff00000c58ac280
[   21.049058]  which belongs to the cache kmalloc-64 of size 64
[   21.049334] The buggy address is located 0 bytes to the right of
[   21.049334]  allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0)
[   21.049530] 
[   21.049597] The buggy address belongs to the physical page:
[   21.049650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac
[   21.049965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.050030] page_type: f5(slab)
[   21.050269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.050341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.050583] page dumped because: kasan: bad access detected
[   21.050624] 
[   21.051167] Memory state around the buggy address:
[   21.051433]  fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.051496]  fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.051825] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.052136]                                      ^
[   21.052296]  fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.052688]  fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.053052] ==================================================================

[   14.787154] ==================================================================
[   14.787512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.788143] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.788408] 
[   14.788521] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.788576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.788590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.788611] Call Trace:
[   14.788638]  <TASK>
[   14.788654]  dump_stack_lvl+0x73/0xb0
[   14.788691]  print_report+0xd1/0x650
[   14.788716]  ? __virt_addr_valid+0x1db/0x2d0
[   14.788759]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.788782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.788804]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.788826]  kasan_report+0x141/0x180
[   14.788849]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.788874]  kasan_check_range+0x10c/0x1c0
[   14.788898]  __kasan_check_write+0x18/0x20
[   14.788918]  kasan_atomics_helper+0x16e7/0x5450
[   14.788941]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.788963]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.788989]  ? kasan_atomics+0x152/0x310
[   14.789016]  kasan_atomics+0x1dc/0x310
[   14.789039]  ? __pfx_kasan_atomics+0x10/0x10
[   14.789073]  ? __pfx_read_tsc+0x10/0x10
[   14.789094]  ? ktime_get_ts64+0x86/0x230
[   14.789130]  kunit_try_run_case+0x1a5/0x480
[   14.789155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.789179]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.789203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.789236]  ? __kthread_parkme+0x82/0x180
[   14.789257]  ? preempt_count_sub+0x50/0x80
[   14.789282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.789316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.789340]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.789373]  kthread+0x337/0x6f0
[   14.789402]  ? trace_preempt_on+0x20/0xc0
[   14.789426]  ? __pfx_kthread+0x10/0x10
[   14.789448]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.789480]  ? calculate_sigpending+0x7b/0xa0
[   14.789504]  ? __pfx_kthread+0x10/0x10
[   14.789526]  ret_from_fork+0x116/0x1d0
[   14.789546]  ? __pfx_kthread+0x10/0x10
[   14.789575]  ret_from_fork_asm+0x1a/0x30
[   14.789606]  </TASK>
[   14.789618] 
[   14.797444] Allocated by task 284:
[   14.797652]  kasan_save_stack+0x45/0x70
[   14.798001]  kasan_save_track+0x18/0x40
[   14.798195]  kasan_save_alloc_info+0x3b/0x50
[   14.798440]  __kasan_kmalloc+0xb7/0xc0
[   14.798632]  __kmalloc_cache_noprof+0x189/0x420
[   14.798893]  kasan_atomics+0x95/0x310
[   14.799070]  kunit_try_run_case+0x1a5/0x480
[   14.799278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.799542]  kthread+0x337/0x6f0
[   14.799705]  ret_from_fork+0x116/0x1d0
[   14.799873]  ret_from_fork_asm+0x1a/0x30
[   14.800095] 
[   14.800181] The buggy address belongs to the object at ffff888103128480
[   14.800181]  which belongs to the cache kmalloc-64 of size 64
[   14.800679] The buggy address is located 0 bytes to the right of
[   14.800679]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.801246] 
[   14.801355] The buggy address belongs to the physical page:
[   14.801579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.801953] flags: 0x200000000000000(node=0|zone=2)
[   14.802200] page_type: f5(slab)
[   14.802334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.802718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.803004] page dumped because: kasan: bad access detected
[   14.803285] 
[   14.803391] Memory state around the buggy address:
[   14.803606]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.803844]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.804072] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.804317]                                      ^
[   14.804548]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.805236]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.805544] ==================================================================
[   15.110580] ==================================================================
[   15.111023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.111387] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.111662] 
[   15.111753] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.111798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.111812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.111834] Call Trace:
[   15.111854]  <TASK>
[   15.111874]  dump_stack_lvl+0x73/0xb0
[   15.111902]  print_report+0xd1/0x650
[   15.111926]  ? __virt_addr_valid+0x1db/0x2d0
[   15.111950]  ? kasan_atomics_helper+0x2006/0x5450
[   15.111972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.111995]  ? kasan_atomics_helper+0x2006/0x5450
[   15.112017]  kasan_report+0x141/0x180
[   15.112041]  ? kasan_atomics_helper+0x2006/0x5450
[   15.112067]  kasan_check_range+0x10c/0x1c0
[   15.112091]  __kasan_check_write+0x18/0x20
[   15.112111]  kasan_atomics_helper+0x2006/0x5450
[   15.112135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.112157]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.112183]  ? kasan_atomics+0x152/0x310
[   15.112211]  kasan_atomics+0x1dc/0x310
[   15.112246]  ? __pfx_kasan_atomics+0x10/0x10
[   15.112271]  ? __pfx_read_tsc+0x10/0x10
[   15.112293]  ? ktime_get_ts64+0x86/0x230
[   15.112317]  kunit_try_run_case+0x1a5/0x480
[   15.112354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.112377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.112402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.112425]  ? __kthread_parkme+0x82/0x180
[   15.112448]  ? preempt_count_sub+0x50/0x80
[   15.112473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.112497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.112521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.112546]  kthread+0x337/0x6f0
[   15.112566]  ? trace_preempt_on+0x20/0xc0
[   15.112591]  ? __pfx_kthread+0x10/0x10
[   15.112613]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.112636]  ? calculate_sigpending+0x7b/0xa0
[   15.112661]  ? __pfx_kthread+0x10/0x10
[   15.112683]  ret_from_fork+0x116/0x1d0
[   15.112702]  ? __pfx_kthread+0x10/0x10
[   15.112724]  ret_from_fork_asm+0x1a/0x30
[   15.112756]  </TASK>
[   15.112768] 
[   15.120391] Allocated by task 284:
[   15.120525]  kasan_save_stack+0x45/0x70
[   15.120724]  kasan_save_track+0x18/0x40
[   15.120950]  kasan_save_alloc_info+0x3b/0x50
[   15.121160]  __kasan_kmalloc+0xb7/0xc0
[   15.121356]  __kmalloc_cache_noprof+0x189/0x420
[   15.121585]  kasan_atomics+0x95/0x310
[   15.121812]  kunit_try_run_case+0x1a5/0x480
[   15.122023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.122233]  kthread+0x337/0x6f0
[   15.122390]  ret_from_fork+0x116/0x1d0
[   15.122527]  ret_from_fork_asm+0x1a/0x30
[   15.122667] 
[   15.122738] The buggy address belongs to the object at ffff888103128480
[   15.122738]  which belongs to the cache kmalloc-64 of size 64
[   15.123371] The buggy address is located 0 bytes to the right of
[   15.123371]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.123872] 
[   15.123946] The buggy address belongs to the physical page:
[   15.124120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.124368] flags: 0x200000000000000(node=0|zone=2)
[   15.124674] page_type: f5(slab)
[   15.124953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.125289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.125621] page dumped because: kasan: bad access detected
[   15.125936] 
[   15.126031] Memory state around the buggy address:
[   15.126227]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.126511]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.126774] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.127079]                                      ^
[   15.127262]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.127493]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.127725] ==================================================================
[   13.928350] ==================================================================
[   13.928803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.929115] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   13.929421] 
[   13.929507] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.929548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.929560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.929631] Call Trace:
[   13.929647]  <TASK>
[   13.929675]  dump_stack_lvl+0x73/0xb0
[   13.929701]  print_report+0xd1/0x650
[   13.929722]  ? __virt_addr_valid+0x1db/0x2d0
[   13.929744]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.929764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.929785]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.929806]  kasan_report+0x141/0x180
[   13.929827]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.929851]  __asan_report_load4_noabort+0x18/0x20
[   13.929876]  kasan_atomics_helper+0x4b88/0x5450
[   13.929897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.929917]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.929944]  ? kasan_atomics+0x152/0x310
[   13.929969]  kasan_atomics+0x1dc/0x310
[   13.930001]  ? __pfx_kasan_atomics+0x10/0x10
[   13.930025]  ? __pfx_read_tsc+0x10/0x10
[   13.930043]  ? ktime_get_ts64+0x86/0x230
[   13.930078]  kunit_try_run_case+0x1a5/0x480
[   13.930101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.930123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.930154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.930177]  ? __kthread_parkme+0x82/0x180
[   13.930197]  ? preempt_count_sub+0x50/0x80
[   13.930220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.930253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.930275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.930298]  kthread+0x337/0x6f0
[   13.930318]  ? trace_preempt_on+0x20/0xc0
[   13.930341]  ? __pfx_kthread+0x10/0x10
[   13.930370]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.930390]  ? calculate_sigpending+0x7b/0xa0
[   13.930421]  ? __pfx_kthread+0x10/0x10
[   13.930441]  ret_from_fork+0x116/0x1d0
[   13.930459]  ? __pfx_kthread+0x10/0x10
[   13.930484]  ret_from_fork_asm+0x1a/0x30
[   13.930514]  </TASK>
[   13.930526] 
[   13.938655] Allocated by task 284:
[   13.938844]  kasan_save_stack+0x45/0x70
[   13.939296]  kasan_save_track+0x18/0x40
[   13.939541]  kasan_save_alloc_info+0x3b/0x50
[   13.939994]  __kasan_kmalloc+0xb7/0xc0
[   13.940166]  __kmalloc_cache_noprof+0x189/0x420
[   13.940459]  kasan_atomics+0x95/0x310
[   13.940650]  kunit_try_run_case+0x1a5/0x480
[   13.941012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.941272]  kthread+0x337/0x6f0
[   13.941426]  ret_from_fork+0x116/0x1d0
[   13.941561]  ret_from_fork_asm+0x1a/0x30
[   13.941859] 
[   13.941972] The buggy address belongs to the object at ffff888103128480
[   13.941972]  which belongs to the cache kmalloc-64 of size 64
[   13.942424] The buggy address is located 0 bytes to the right of
[   13.942424]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   13.942904] 
[   13.943032] The buggy address belongs to the physical page:
[   13.943316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   13.943939] flags: 0x200000000000000(node=0|zone=2)
[   13.944106] page_type: f5(slab)
[   13.944228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.944901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.945228] page dumped because: kasan: bad access detected
[   13.945485] 
[   13.945558] Memory state around the buggy address:
[   13.945933]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.946202]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.946447] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.947065]                                      ^
[   13.947320]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.947713]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.948022] ==================================================================
[   14.118252] ==================================================================
[   14.118892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.119238] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.119645] 
[   14.119781] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.119825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.119838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.119860] Call Trace:
[   14.119876]  <TASK>
[   14.119893]  dump_stack_lvl+0x73/0xb0
[   14.119922]  print_report+0xd1/0x650
[   14.119946]  ? __virt_addr_valid+0x1db/0x2d0
[   14.119970]  ? kasan_atomics_helper+0x72f/0x5450
[   14.119992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.120016]  ? kasan_atomics_helper+0x72f/0x5450
[   14.120038]  kasan_report+0x141/0x180
[   14.120061]  ? kasan_atomics_helper+0x72f/0x5450
[   14.120088]  kasan_check_range+0x10c/0x1c0
[   14.120112]  __kasan_check_write+0x18/0x20
[   14.120132]  kasan_atomics_helper+0x72f/0x5450
[   14.120169]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.120192]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.120231]  ? kasan_atomics+0x152/0x310
[   14.120259]  kasan_atomics+0x1dc/0x310
[   14.120283]  ? __pfx_kasan_atomics+0x10/0x10
[   14.120307]  ? __pfx_read_tsc+0x10/0x10
[   14.120328]  ? ktime_get_ts64+0x86/0x230
[   14.120362]  kunit_try_run_case+0x1a5/0x480
[   14.120386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.120408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.120433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.120458]  ? __kthread_parkme+0x82/0x180
[   14.120480]  ? preempt_count_sub+0x50/0x80
[   14.120507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.120532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.120556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.120624]  kthread+0x337/0x6f0
[   14.120647]  ? trace_preempt_on+0x20/0xc0
[   14.120672]  ? __pfx_kthread+0x10/0x10
[   14.120694]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.120717]  ? calculate_sigpending+0x7b/0xa0
[   14.120750]  ? __pfx_kthread+0x10/0x10
[   14.120772]  ret_from_fork+0x116/0x1d0
[   14.120792]  ? __pfx_kthread+0x10/0x10
[   14.120813]  ret_from_fork_asm+0x1a/0x30
[   14.120844]  </TASK>
[   14.120856] 
[   14.129431] Allocated by task 284:
[   14.129895]  kasan_save_stack+0x45/0x70
[   14.130083]  kasan_save_track+0x18/0x40
[   14.130227]  kasan_save_alloc_info+0x3b/0x50
[   14.130444]  __kasan_kmalloc+0xb7/0xc0
[   14.130720]  __kmalloc_cache_noprof+0x189/0x420
[   14.130902]  kasan_atomics+0x95/0x310
[   14.131038]  kunit_try_run_case+0x1a5/0x480
[   14.131242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.131561]  kthread+0x337/0x6f0
[   14.131848]  ret_from_fork+0x116/0x1d0
[   14.132037]  ret_from_fork_asm+0x1a/0x30
[   14.132265] 
[   14.132342] The buggy address belongs to the object at ffff888103128480
[   14.132342]  which belongs to the cache kmalloc-64 of size 64
[   14.132786] The buggy address is located 0 bytes to the right of
[   14.132786]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.133556] 
[   14.133717] The buggy address belongs to the physical page:
[   14.133998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.134243] flags: 0x200000000000000(node=0|zone=2)
[   14.134417] page_type: f5(slab)
[   14.134542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.135135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.135506] page dumped because: kasan: bad access detected
[   14.135969] 
[   14.136104] Memory state around the buggy address:
[   14.136331]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.136569]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.137193] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.137472]                                      ^
[   14.137671]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.138030]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.138669] ==================================================================
[   14.374648] ==================================================================
[   14.375384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.375673] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.376077] 
[   14.376221] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.376263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.376276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.376297] Call Trace:
[   14.376310]  <TASK>
[   14.376327]  dump_stack_lvl+0x73/0xb0
[   14.376375]  print_report+0xd1/0x650
[   14.376399]  ? __virt_addr_valid+0x1db/0x2d0
[   14.376424]  ? kasan_atomics_helper+0xe78/0x5450
[   14.376457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.376480]  ? kasan_atomics_helper+0xe78/0x5450
[   14.376501]  kasan_report+0x141/0x180
[   14.376533]  ? kasan_atomics_helper+0xe78/0x5450
[   14.376560]  kasan_check_range+0x10c/0x1c0
[   14.376585]  __kasan_check_write+0x18/0x20
[   14.376615]  kasan_atomics_helper+0xe78/0x5450
[   14.376638]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.376661]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.376696]  ? kasan_atomics+0x152/0x310
[   14.376724]  kasan_atomics+0x1dc/0x310
[   14.376747]  ? __pfx_kasan_atomics+0x10/0x10
[   14.376781]  ? __pfx_read_tsc+0x10/0x10
[   14.376803]  ? ktime_get_ts64+0x86/0x230
[   14.376828]  kunit_try_run_case+0x1a5/0x480
[   14.376852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.376884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.376908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.376932]  ? __kthread_parkme+0x82/0x180
[   14.376965]  ? preempt_count_sub+0x50/0x80
[   14.376989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.377014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.377037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.377070]  kthread+0x337/0x6f0
[   14.377090]  ? trace_preempt_on+0x20/0xc0
[   14.377115]  ? __pfx_kthread+0x10/0x10
[   14.377146]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.377168]  ? calculate_sigpending+0x7b/0xa0
[   14.377193]  ? __pfx_kthread+0x10/0x10
[   14.377224]  ret_from_fork+0x116/0x1d0
[   14.377244]  ? __pfx_kthread+0x10/0x10
[   14.377265]  ret_from_fork_asm+0x1a/0x30
[   14.377307]  </TASK>
[   14.377319] 
[   14.384999] Allocated by task 284:
[   14.385159]  kasan_save_stack+0x45/0x70
[   14.385397]  kasan_save_track+0x18/0x40
[   14.385565]  kasan_save_alloc_info+0x3b/0x50
[   14.385802]  __kasan_kmalloc+0xb7/0xc0
[   14.385951]  __kmalloc_cache_noprof+0x189/0x420
[   14.386187]  kasan_atomics+0x95/0x310
[   14.386401]  kunit_try_run_case+0x1a5/0x480
[   14.386597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.386867]  kthread+0x337/0x6f0
[   14.387032]  ret_from_fork+0x116/0x1d0
[   14.387225]  ret_from_fork_asm+0x1a/0x30
[   14.387393] 
[   14.387468] The buggy address belongs to the object at ffff888103128480
[   14.387468]  which belongs to the cache kmalloc-64 of size 64
[   14.387822] The buggy address is located 0 bytes to the right of
[   14.387822]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.388243] 
[   14.388360] The buggy address belongs to the physical page:
[   14.388615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.389282] flags: 0x200000000000000(node=0|zone=2)
[   14.389530] page_type: f5(slab)
[   14.389698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.390085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.390434] page dumped because: kasan: bad access detected
[   14.390619] 
[   14.390689] Memory state around the buggy address:
[   14.390845]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.391061]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.391276] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.391510]                                      ^
[   14.391897]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.392246]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.392594] ==================================================================
[   14.492118] ==================================================================
[   14.492412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.492854] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.493167] 
[   14.493302] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.493370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.493384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.493405] Call Trace:
[   14.493424]  <TASK>
[   14.493453]  dump_stack_lvl+0x73/0xb0
[   14.493482]  print_report+0xd1/0x650
[   14.493507]  ? __virt_addr_valid+0x1db/0x2d0
[   14.493543]  ? kasan_atomics_helper+0x1148/0x5450
[   14.493565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.493833]  ? kasan_atomics_helper+0x1148/0x5450
[   14.493868]  kasan_report+0x141/0x180
[   14.493892]  ? kasan_atomics_helper+0x1148/0x5450
[   14.493919]  kasan_check_range+0x10c/0x1c0
[   14.493955]  __kasan_check_write+0x18/0x20
[   14.493974]  kasan_atomics_helper+0x1148/0x5450
[   14.493998]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.494021]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.494056]  ? kasan_atomics+0x152/0x310
[   14.494084]  kasan_atomics+0x1dc/0x310
[   14.494117]  ? __pfx_kasan_atomics+0x10/0x10
[   14.494142]  ? __pfx_read_tsc+0x10/0x10
[   14.494163]  ? ktime_get_ts64+0x86/0x230
[   14.494189]  kunit_try_run_case+0x1a5/0x480
[   14.494214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.494246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.494271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.494304]  ? __kthread_parkme+0x82/0x180
[   14.494326]  ? preempt_count_sub+0x50/0x80
[   14.494359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.494383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.494416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.494441]  kthread+0x337/0x6f0
[   14.494461]  ? trace_preempt_on+0x20/0xc0
[   14.494498]  ? __pfx_kthread+0x10/0x10
[   14.494520]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.494542]  ? calculate_sigpending+0x7b/0xa0
[   14.494576]  ? __pfx_kthread+0x10/0x10
[   14.494599]  ret_from_fork+0x116/0x1d0
[   14.494618]  ? __pfx_kthread+0x10/0x10
[   14.494640]  ret_from_fork_asm+0x1a/0x30
[   14.494673]  </TASK>
[   14.494684] 
[   14.506215] Allocated by task 284:
[   14.506437]  kasan_save_stack+0x45/0x70
[   14.506635]  kasan_save_track+0x18/0x40
[   14.507132]  kasan_save_alloc_info+0x3b/0x50
[   14.507385]  __kasan_kmalloc+0xb7/0xc0
[   14.507567]  __kmalloc_cache_noprof+0x189/0x420
[   14.507966]  kasan_atomics+0x95/0x310
[   14.508282]  kunit_try_run_case+0x1a5/0x480
[   14.508683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.509079]  kthread+0x337/0x6f0
[   14.509250]  ret_from_fork+0x116/0x1d0
[   14.509440]  ret_from_fork_asm+0x1a/0x30
[   14.509629] 
[   14.509722] The buggy address belongs to the object at ffff888103128480
[   14.509722]  which belongs to the cache kmalloc-64 of size 64
[   14.510206] The buggy address is located 0 bytes to the right of
[   14.510206]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.511450] 
[   14.511702] The buggy address belongs to the physical page:
[   14.512357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.512829] flags: 0x200000000000000(node=0|zone=2)
[   14.513061] page_type: f5(slab)
[   14.513224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.513543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.514232] page dumped because: kasan: bad access detected
[   14.514539] 
[   14.514774] Memory state around the buggy address:
[   14.515137]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.515450]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.515964] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.516438]                                      ^
[   14.516613]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.516848]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.517065] ==================================================================
[   14.011321] ==================================================================
[   14.011763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.012067] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.012400] 
[   14.012511] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.012554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.012611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.012633] Call Trace:
[   14.012646]  <TASK>
[   14.012664]  dump_stack_lvl+0x73/0xb0
[   14.012692]  print_report+0xd1/0x650
[   14.012717]  ? __virt_addr_valid+0x1db/0x2d0
[   14.012741]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.012763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.012787]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.012808]  kasan_report+0x141/0x180
[   14.012831]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.012857]  kasan_check_range+0x10c/0x1c0
[   14.012882]  __kasan_check_write+0x18/0x20
[   14.012902]  kasan_atomics_helper+0x4a0/0x5450
[   14.012925]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.012947]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.012973]  ? kasan_atomics+0x152/0x310
[   14.013000]  kasan_atomics+0x1dc/0x310
[   14.013024]  ? __pfx_kasan_atomics+0x10/0x10
[   14.013048]  ? __pfx_read_tsc+0x10/0x10
[   14.013069]  ? ktime_get_ts64+0x86/0x230
[   14.013094]  kunit_try_run_case+0x1a5/0x480
[   14.013118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.013141]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.013165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.013187]  ? __kthread_parkme+0x82/0x180
[   14.013209]  ? preempt_count_sub+0x50/0x80
[   14.013233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.013257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.013281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.013303]  kthread+0x337/0x6f0
[   14.013324]  ? trace_preempt_on+0x20/0xc0
[   14.013348]  ? __pfx_kthread+0x10/0x10
[   14.013382]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.013403]  ? calculate_sigpending+0x7b/0xa0
[   14.013426]  ? __pfx_kthread+0x10/0x10
[   14.013448]  ret_from_fork+0x116/0x1d0
[   14.013467]  ? __pfx_kthread+0x10/0x10
[   14.013488]  ret_from_fork_asm+0x1a/0x30
[   14.013519]  </TASK>
[   14.013531] 
[   14.022133] Allocated by task 284:
[   14.022370]  kasan_save_stack+0x45/0x70
[   14.022732]  kasan_save_track+0x18/0x40
[   14.022963]  kasan_save_alloc_info+0x3b/0x50
[   14.023271]  __kasan_kmalloc+0xb7/0xc0
[   14.023485]  __kmalloc_cache_noprof+0x189/0x420
[   14.023859]  kasan_atomics+0x95/0x310
[   14.024072]  kunit_try_run_case+0x1a5/0x480
[   14.024276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.024539]  kthread+0x337/0x6f0
[   14.024797]  ret_from_fork+0x116/0x1d0
[   14.024980]  ret_from_fork_asm+0x1a/0x30
[   14.025181] 
[   14.025281] The buggy address belongs to the object at ffff888103128480
[   14.025281]  which belongs to the cache kmalloc-64 of size 64
[   14.025861] The buggy address is located 0 bytes to the right of
[   14.025861]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.026229] 
[   14.026303] The buggy address belongs to the physical page:
[   14.026595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.026952] flags: 0x200000000000000(node=0|zone=2)
[   14.027187] page_type: f5(slab)
[   14.027309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.027572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.028182] page dumped because: kasan: bad access detected
[   14.028486] 
[   14.028804] Memory state around the buggy address:
[   14.029029]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.029251]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.029630] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.030174]                                      ^
[   14.030421]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.030768]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.031157] ==================================================================
[   14.595828] ==================================================================
[   14.596186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.596550] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.597015] 
[   14.597128] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.597172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.597186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.597208] Call Trace:
[   14.597225]  <TASK>
[   14.597243]  dump_stack_lvl+0x73/0xb0
[   14.597270]  print_report+0xd1/0x650
[   14.597294]  ? __virt_addr_valid+0x1db/0x2d0
[   14.597318]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.597339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.597376]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.597398]  kasan_report+0x141/0x180
[   14.597420]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.597446]  __asan_report_load4_noabort+0x18/0x20
[   14.597471]  kasan_atomics_helper+0x49ce/0x5450
[   14.597494]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.597516]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.597542]  ? kasan_atomics+0x152/0x310
[   14.597568]  kasan_atomics+0x1dc/0x310
[   14.597593]  ? __pfx_kasan_atomics+0x10/0x10
[   14.597617]  ? __pfx_read_tsc+0x10/0x10
[   14.597639]  ? ktime_get_ts64+0x86/0x230
[   14.597663]  kunit_try_run_case+0x1a5/0x480
[   14.597687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.597710]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.597733]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.597769]  ? __kthread_parkme+0x82/0x180
[   14.597791]  ? preempt_count_sub+0x50/0x80
[   14.597815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.597839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.597862]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.597885]  kthread+0x337/0x6f0
[   14.597905]  ? trace_preempt_on+0x20/0xc0
[   14.597929]  ? __pfx_kthread+0x10/0x10
[   14.597950]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.597971]  ? calculate_sigpending+0x7b/0xa0
[   14.597995]  ? __pfx_kthread+0x10/0x10
[   14.598018]  ret_from_fork+0x116/0x1d0
[   14.598036]  ? __pfx_kthread+0x10/0x10
[   14.598057]  ret_from_fork_asm+0x1a/0x30
[   14.598088]  </TASK>
[   14.598100] 
[   14.605541] Allocated by task 284:
[   14.605739]  kasan_save_stack+0x45/0x70
[   14.605956]  kasan_save_track+0x18/0x40
[   14.606151]  kasan_save_alloc_info+0x3b/0x50
[   14.606380]  __kasan_kmalloc+0xb7/0xc0
[   14.606579]  __kmalloc_cache_noprof+0x189/0x420
[   14.606809]  kasan_atomics+0x95/0x310
[   14.607013]  kunit_try_run_case+0x1a5/0x480
[   14.607190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.607420]  kthread+0x337/0x6f0
[   14.607578]  ret_from_fork+0x116/0x1d0
[   14.607716]  ret_from_fork_asm+0x1a/0x30
[   14.607858] 
[   14.607931] The buggy address belongs to the object at ffff888103128480
[   14.607931]  which belongs to the cache kmalloc-64 of size 64
[   14.608587] The buggy address is located 0 bytes to the right of
[   14.608587]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.609034] 
[   14.609149] The buggy address belongs to the physical page:
[   14.609422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.610246] flags: 0x200000000000000(node=0|zone=2)
[   14.610507] page_type: f5(slab)
[   14.610664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.611866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.612777] page dumped because: kasan: bad access detected
[   14.613261] 
[   14.613695] Memory state around the buggy address:
[   14.614301]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.615113]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.615870] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.616463]                                      ^
[   14.616628]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.616854]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.617074] ==================================================================
[   14.691342] ==================================================================
[   14.691849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.692305] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.692545] 
[   14.692633] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.692677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.692690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.692713] Call Trace:
[   14.692731]  <TASK>
[   14.692758]  dump_stack_lvl+0x73/0xb0
[   14.692786]  print_report+0xd1/0x650
[   14.692811]  ? __virt_addr_valid+0x1db/0x2d0
[   14.692834]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.692879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.692902]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.692924]  kasan_report+0x141/0x180
[   14.692947]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.692973]  __asan_report_store8_noabort+0x1b/0x30
[   14.692995]  kasan_atomics_helper+0x50d4/0x5450
[   14.693018]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.693040]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.693067]  ? kasan_atomics+0x152/0x310
[   14.693094]  kasan_atomics+0x1dc/0x310
[   14.693117]  ? __pfx_kasan_atomics+0x10/0x10
[   14.693141]  ? __pfx_read_tsc+0x10/0x10
[   14.693163]  ? ktime_get_ts64+0x86/0x230
[   14.693188]  kunit_try_run_case+0x1a5/0x480
[   14.693212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.693235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.693259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.693282]  ? __kthread_parkme+0x82/0x180
[   14.693303]  ? preempt_count_sub+0x50/0x80
[   14.693326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.693361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.693384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.693408]  kthread+0x337/0x6f0
[   14.693428]  ? trace_preempt_on+0x20/0xc0
[   14.693452]  ? __pfx_kthread+0x10/0x10
[   14.693473]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.693495]  ? calculate_sigpending+0x7b/0xa0
[   14.693519]  ? __pfx_kthread+0x10/0x10
[   14.693541]  ret_from_fork+0x116/0x1d0
[   14.693562]  ? __pfx_kthread+0x10/0x10
[   14.693583]  ret_from_fork_asm+0x1a/0x30
[   14.693614]  </TASK>
[   14.693627] 
[   14.704629] Allocated by task 284:
[   14.704839]  kasan_save_stack+0x45/0x70
[   14.704989]  kasan_save_track+0x18/0x40
[   14.705186]  kasan_save_alloc_info+0x3b/0x50
[   14.705428]  __kasan_kmalloc+0xb7/0xc0
[   14.705632]  __kmalloc_cache_noprof+0x189/0x420
[   14.705823]  kasan_atomics+0x95/0x310
[   14.706038]  kunit_try_run_case+0x1a5/0x480
[   14.706269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.706541]  kthread+0x337/0x6f0
[   14.706700]  ret_from_fork+0x116/0x1d0
[   14.706859]  ret_from_fork_asm+0x1a/0x30
[   14.707099] 
[   14.707223] The buggy address belongs to the object at ffff888103128480
[   14.707223]  which belongs to the cache kmalloc-64 of size 64
[   14.707773] The buggy address is located 0 bytes to the right of
[   14.707773]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.708363] 
[   14.708463] The buggy address belongs to the physical page:
[   14.708725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.709009] flags: 0x200000000000000(node=0|zone=2)
[   14.709175] page_type: f5(slab)
[   14.709296] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.710020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.710388] page dumped because: kasan: bad access detected
[   14.710640] 
[   14.710749] Memory state around the buggy address:
[   14.710955]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.711201]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.711517] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.711738]                                      ^
[   14.712006]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712324]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712620] ==================================================================
[   14.763779] ==================================================================
[   14.764113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.764442] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.765145] 
[   14.765424] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.765474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.765487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.765511] Call Trace:
[   14.765527]  <TASK>
[   14.765551]  dump_stack_lvl+0x73/0xb0
[   14.765581]  print_report+0xd1/0x650
[   14.765605]  ? __virt_addr_valid+0x1db/0x2d0
[   14.765629]  ? kasan_atomics_helper+0x164f/0x5450
[   14.765650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.765673]  ? kasan_atomics_helper+0x164f/0x5450
[   14.765695]  kasan_report+0x141/0x180
[   14.765718]  ? kasan_atomics_helper+0x164f/0x5450
[   14.765776]  kasan_check_range+0x10c/0x1c0
[   14.765802]  __kasan_check_write+0x18/0x20
[   14.765822]  kasan_atomics_helper+0x164f/0x5450
[   14.765846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.765868]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.765894]  ? kasan_atomics+0x152/0x310
[   14.765921]  kasan_atomics+0x1dc/0x310
[   14.765945]  ? __pfx_kasan_atomics+0x10/0x10
[   14.765969]  ? __pfx_read_tsc+0x10/0x10
[   14.765991]  ? ktime_get_ts64+0x86/0x230
[   14.766016]  kunit_try_run_case+0x1a5/0x480
[   14.766042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.766064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.766088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.766111]  ? __kthread_parkme+0x82/0x180
[   14.766133]  ? preempt_count_sub+0x50/0x80
[   14.766157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.766181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.766205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.766228]  kthread+0x337/0x6f0
[   14.766249]  ? trace_preempt_on+0x20/0xc0
[   14.766272]  ? __pfx_kthread+0x10/0x10
[   14.766295]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.766317]  ? calculate_sigpending+0x7b/0xa0
[   14.766341]  ? __pfx_kthread+0x10/0x10
[   14.766374]  ret_from_fork+0x116/0x1d0
[   14.766394]  ? __pfx_kthread+0x10/0x10
[   14.766415]  ret_from_fork_asm+0x1a/0x30
[   14.766445]  </TASK>
[   14.766458] 
[   14.778505] Allocated by task 284:
[   14.778722]  kasan_save_stack+0x45/0x70
[   14.778933]  kasan_save_track+0x18/0x40
[   14.779138]  kasan_save_alloc_info+0x3b/0x50
[   14.779368]  __kasan_kmalloc+0xb7/0xc0
[   14.779531]  __kmalloc_cache_noprof+0x189/0x420
[   14.779836]  kasan_atomics+0x95/0x310
[   14.780018]  kunit_try_run_case+0x1a5/0x480
[   14.780225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.780474]  kthread+0x337/0x6f0
[   14.780618]  ret_from_fork+0x116/0x1d0
[   14.780828]  ret_from_fork_asm+0x1a/0x30
[   14.781094] 
[   14.781169] The buggy address belongs to the object at ffff888103128480
[   14.781169]  which belongs to the cache kmalloc-64 of size 64
[   14.781714] The buggy address is located 0 bytes to the right of
[   14.781714]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.782228] 
[   14.782330] The buggy address belongs to the physical page:
[   14.782596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.783030] flags: 0x200000000000000(node=0|zone=2)
[   14.783227] page_type: f5(slab)
[   14.783362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.783717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.784062] page dumped because: kasan: bad access detected
[   14.784299] 
[   14.784378] Memory state around the buggy address:
[   14.784571]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.784956]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.785304] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.785619]                                      ^
[   14.786036]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.786340]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.786623] ==================================================================
[   14.888875] ==================================================================
[   14.889230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.889635] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.890002] 
[   14.890118] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.890161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.890174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.890196] Call Trace:
[   14.890212]  <TASK>
[   14.890228]  dump_stack_lvl+0x73/0xb0
[   14.890256]  print_report+0xd1/0x650
[   14.890278]  ? __virt_addr_valid+0x1db/0x2d0
[   14.890301]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.890323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.890357]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.890378]  kasan_report+0x141/0x180
[   14.890401]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.890428]  kasan_check_range+0x10c/0x1c0
[   14.890452]  __kasan_check_write+0x18/0x20
[   14.890471]  kasan_atomics_helper+0x19e3/0x5450
[   14.890494]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.890528]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.890554]  ? kasan_atomics+0x152/0x310
[   14.890582]  kasan_atomics+0x1dc/0x310
[   14.890616]  ? __pfx_kasan_atomics+0x10/0x10
[   14.890641]  ? __pfx_read_tsc+0x10/0x10
[   14.890664]  ? ktime_get_ts64+0x86/0x230
[   14.890689]  kunit_try_run_case+0x1a5/0x480
[   14.890713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.890736]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.890760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.890792]  ? __kthread_parkme+0x82/0x180
[   14.890814]  ? preempt_count_sub+0x50/0x80
[   14.890838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.890873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.890896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.890920]  kthread+0x337/0x6f0
[   14.890939]  ? trace_preempt_on+0x20/0xc0
[   14.890963]  ? __pfx_kthread+0x10/0x10
[   14.890984]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.891005]  ? calculate_sigpending+0x7b/0xa0
[   14.891030]  ? __pfx_kthread+0x10/0x10
[   14.891052]  ret_from_fork+0x116/0x1d0
[   14.891070]  ? __pfx_kthread+0x10/0x10
[   14.891092]  ret_from_fork_asm+0x1a/0x30
[   14.891132]  </TASK>
[   14.891143] 
[   14.904906] Allocated by task 284:
[   14.905257]  kasan_save_stack+0x45/0x70
[   14.905583]  kasan_save_track+0x18/0x40
[   14.905722]  kasan_save_alloc_info+0x3b/0x50
[   14.905871]  __kasan_kmalloc+0xb7/0xc0
[   14.906005]  __kmalloc_cache_noprof+0x189/0x420
[   14.906166]  kasan_atomics+0x95/0x310
[   14.906305]  kunit_try_run_case+0x1a5/0x480
[   14.906470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.906679]  kthread+0x337/0x6f0
[   14.906867]  ret_from_fork+0x116/0x1d0
[   14.907060]  ret_from_fork_asm+0x1a/0x30
[   14.907256] 
[   14.907363] The buggy address belongs to the object at ffff888103128480
[   14.907363]  which belongs to the cache kmalloc-64 of size 64
[   14.907792] The buggy address is located 0 bytes to the right of
[   14.907792]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.908366] 
[   14.908444] The buggy address belongs to the physical page:
[   14.908631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.909189] flags: 0x200000000000000(node=0|zone=2)
[   14.909402] page_type: f5(slab)
[   14.909531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.909894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.910235] page dumped because: kasan: bad access detected
[   14.910498] 
[   14.910594] Memory state around the buggy address:
[   14.910829]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.911187]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.911517] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.911805]                                      ^
[   14.912048]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912273]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912604] ==================================================================
[   14.205808] ==================================================================
[   14.206168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.206507] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.206927] 
[   14.207045] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.207089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.207102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.207124] Call Trace:
[   14.207140]  <TASK>
[   14.207156]  dump_stack_lvl+0x73/0xb0
[   14.207185]  print_report+0xd1/0x650
[   14.207209]  ? __virt_addr_valid+0x1db/0x2d0
[   14.207234]  ? kasan_atomics_helper+0x992/0x5450
[   14.207256]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.207279]  ? kasan_atomics_helper+0x992/0x5450
[   14.207301]  kasan_report+0x141/0x180
[   14.207333]  ? kasan_atomics_helper+0x992/0x5450
[   14.207376]  kasan_check_range+0x10c/0x1c0
[   14.207400]  __kasan_check_write+0x18/0x20
[   14.207419]  kasan_atomics_helper+0x992/0x5450
[   14.207442]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.207465]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.207490]  ? kasan_atomics+0x152/0x310
[   14.207526]  kasan_atomics+0x1dc/0x310
[   14.207549]  ? __pfx_kasan_atomics+0x10/0x10
[   14.207584]  ? __pfx_read_tsc+0x10/0x10
[   14.207615]  ? ktime_get_ts64+0x86/0x230
[   14.207640]  kunit_try_run_case+0x1a5/0x480
[   14.207669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.207692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.207758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.207794]  ? __kthread_parkme+0x82/0x180
[   14.207816]  ? preempt_count_sub+0x50/0x80
[   14.207841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.207866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.207889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.207913]  kthread+0x337/0x6f0
[   14.207934]  ? trace_preempt_on+0x20/0xc0
[   14.207959]  ? __pfx_kthread+0x10/0x10
[   14.207981]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.208003]  ? calculate_sigpending+0x7b/0xa0
[   14.208027]  ? __pfx_kthread+0x10/0x10
[   14.208050]  ret_from_fork+0x116/0x1d0
[   14.208070]  ? __pfx_kthread+0x10/0x10
[   14.208101]  ret_from_fork_asm+0x1a/0x30
[   14.208133]  </TASK>
[   14.208145] 
[   14.217231] Allocated by task 284:
[   14.217465]  kasan_save_stack+0x45/0x70
[   14.217777]  kasan_save_track+0x18/0x40
[   14.218022]  kasan_save_alloc_info+0x3b/0x50
[   14.218254]  __kasan_kmalloc+0xb7/0xc0
[   14.218414]  __kmalloc_cache_noprof+0x189/0x420
[   14.218574]  kasan_atomics+0x95/0x310
[   14.218709]  kunit_try_run_case+0x1a5/0x480
[   14.219140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.219456]  kthread+0x337/0x6f0
[   14.219631]  ret_from_fork+0x116/0x1d0
[   14.219828]  ret_from_fork_asm+0x1a/0x30
[   14.220125] 
[   14.220265] The buggy address belongs to the object at ffff888103128480
[   14.220265]  which belongs to the cache kmalloc-64 of size 64
[   14.220631] The buggy address is located 0 bytes to the right of
[   14.220631]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.221253] 
[   14.221584] The buggy address belongs to the physical page:
[   14.222035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.222285] flags: 0x200000000000000(node=0|zone=2)
[   14.222626] page_type: f5(slab)
[   14.222864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.223256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.223689] page dumped because: kasan: bad access detected
[   14.223977] 
[   14.224091] Memory state around the buggy address:
[   14.224369]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.224844]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.225187] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.225441]                                      ^
[   14.225938]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.226400]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.226620] ==================================================================
[   14.271481] ==================================================================
[   14.271895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.272229] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.272493] 
[   14.272640] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.272684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.272696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.272760] Call Trace:
[   14.272778]  <TASK>
[   14.272808]  dump_stack_lvl+0x73/0xb0
[   14.272836]  print_report+0xd1/0x650
[   14.272860]  ? __virt_addr_valid+0x1db/0x2d0
[   14.272883]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.272905]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.272928]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.272949]  kasan_report+0x141/0x180
[   14.272972]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.272998]  kasan_check_range+0x10c/0x1c0
[   14.273023]  __kasan_check_write+0x18/0x20
[   14.273053]  kasan_atomics_helper+0xb6a/0x5450
[   14.273076]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.273098]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.273139]  ? kasan_atomics+0x152/0x310
[   14.273165]  kasan_atomics+0x1dc/0x310
[   14.273199]  ? __pfx_kasan_atomics+0x10/0x10
[   14.273224]  ? __pfx_read_tsc+0x10/0x10
[   14.273245]  ? ktime_get_ts64+0x86/0x230
[   14.273270]  kunit_try_run_case+0x1a5/0x480
[   14.273295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.273318]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.273341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.273373]  ? __kthread_parkme+0x82/0x180
[   14.273395]  ? preempt_count_sub+0x50/0x80
[   14.273419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.273452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.273475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.273499]  kthread+0x337/0x6f0
[   14.273529]  ? trace_preempt_on+0x20/0xc0
[   14.273554]  ? __pfx_kthread+0x10/0x10
[   14.273609]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.273633]  ? calculate_sigpending+0x7b/0xa0
[   14.273666]  ? __pfx_kthread+0x10/0x10
[   14.273690]  ret_from_fork+0x116/0x1d0
[   14.273709]  ? __pfx_kthread+0x10/0x10
[   14.273741]  ret_from_fork_asm+0x1a/0x30
[   14.273773]  </TASK>
[   14.273785] 
[   14.282228] Allocated by task 284:
[   14.282423]  kasan_save_stack+0x45/0x70
[   14.282709]  kasan_save_track+0x18/0x40
[   14.283023]  kasan_save_alloc_info+0x3b/0x50
[   14.283227]  __kasan_kmalloc+0xb7/0xc0
[   14.283437]  __kmalloc_cache_noprof+0x189/0x420
[   14.283652]  kasan_atomics+0x95/0x310
[   14.283967]  kunit_try_run_case+0x1a5/0x480
[   14.284169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.284430]  kthread+0x337/0x6f0
[   14.284616]  ret_from_fork+0x116/0x1d0
[   14.284844]  ret_from_fork_asm+0x1a/0x30
[   14.285018] 
[   14.285092] The buggy address belongs to the object at ffff888103128480
[   14.285092]  which belongs to the cache kmalloc-64 of size 64
[   14.285453] The buggy address is located 0 bytes to the right of
[   14.285453]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.286112] 
[   14.286211] The buggy address belongs to the physical page:
[   14.286823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.287174] flags: 0x200000000000000(node=0|zone=2)
[   14.287436] page_type: f5(slab)
[   14.287574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.288007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.288236] page dumped because: kasan: bad access detected
[   14.288658] 
[   14.288780] Memory state around the buggy address:
[   14.289078]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.289299]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.289528] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.289746]                                      ^
[   14.290038]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.290439]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.290792] ==================================================================
[   14.314467] ==================================================================
[   14.314867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.315201] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.315528] 
[   14.315706] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.315793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.315810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.315832] Call Trace:
[   14.315851]  <TASK>
[   14.315869]  dump_stack_lvl+0x73/0xb0
[   14.315898]  print_report+0xd1/0x650
[   14.315922]  ? __virt_addr_valid+0x1db/0x2d0
[   14.315946]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.315980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.316004]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.316027]  kasan_report+0x141/0x180
[   14.316061]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.316088]  __asan_report_load4_noabort+0x18/0x20
[   14.316114]  kasan_atomics_helper+0x4a84/0x5450
[   14.316137]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.316160]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.316186]  ? kasan_atomics+0x152/0x310
[   14.316212]  kasan_atomics+0x1dc/0x310
[   14.316236]  ? __pfx_kasan_atomics+0x10/0x10
[   14.316270]  ? __pfx_read_tsc+0x10/0x10
[   14.316291]  ? ktime_get_ts64+0x86/0x230
[   14.316315]  kunit_try_run_case+0x1a5/0x480
[   14.316361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.316385]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.316408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.316440]  ? __kthread_parkme+0x82/0x180
[   14.316462]  ? preempt_count_sub+0x50/0x80
[   14.316486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.316522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.316545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.316569]  kthread+0x337/0x6f0
[   14.316629]  ? trace_preempt_on+0x20/0xc0
[   14.316657]  ? __pfx_kthread+0x10/0x10
[   14.316678]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.316700]  ? calculate_sigpending+0x7b/0xa0
[   14.316725]  ? __pfx_kthread+0x10/0x10
[   14.316747]  ret_from_fork+0x116/0x1d0
[   14.316766]  ? __pfx_kthread+0x10/0x10
[   14.316787]  ret_from_fork_asm+0x1a/0x30
[   14.316818]  </TASK>
[   14.316830] 
[   14.325643] Allocated by task 284:
[   14.325873]  kasan_save_stack+0x45/0x70
[   14.326092]  kasan_save_track+0x18/0x40
[   14.326288]  kasan_save_alloc_info+0x3b/0x50
[   14.326483]  __kasan_kmalloc+0xb7/0xc0
[   14.326775]  __kmalloc_cache_noprof+0x189/0x420
[   14.326984]  kasan_atomics+0x95/0x310
[   14.327186]  kunit_try_run_case+0x1a5/0x480
[   14.327412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.327728]  kthread+0x337/0x6f0
[   14.327926]  ret_from_fork+0x116/0x1d0
[   14.328126]  ret_from_fork_asm+0x1a/0x30
[   14.328310] 
[   14.328427] The buggy address belongs to the object at ffff888103128480
[   14.328427]  which belongs to the cache kmalloc-64 of size 64
[   14.329115] The buggy address is located 0 bytes to the right of
[   14.329115]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.329702] 
[   14.329940] The buggy address belongs to the physical page:
[   14.330203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.330575] flags: 0x200000000000000(node=0|zone=2)
[   14.330743] page_type: f5(slab)
[   14.330866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.331170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.331442] page dumped because: kasan: bad access detected
[   14.331725] 
[   14.331812] Memory state around the buggy address:
[   14.331970]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.332336]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.332840] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.333176]                                      ^
[   14.333397]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.333872]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.334236] ==================================================================
[   14.334750] ==================================================================
[   14.335280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.335629] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.336049] 
[   14.336160] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.336206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.336229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.336252] Call Trace:
[   14.336268]  <TASK>
[   14.336297]  dump_stack_lvl+0x73/0xb0
[   14.336329]  print_report+0xd1/0x650
[   14.336365]  ? __virt_addr_valid+0x1db/0x2d0
[   14.336398]  ? kasan_atomics_helper+0xd47/0x5450
[   14.336420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.336443]  ? kasan_atomics_helper+0xd47/0x5450
[   14.336476]  kasan_report+0x141/0x180
[   14.336499]  ? kasan_atomics_helper+0xd47/0x5450
[   14.336526]  kasan_check_range+0x10c/0x1c0
[   14.336550]  __kasan_check_write+0x18/0x20
[   14.336590]  kasan_atomics_helper+0xd47/0x5450
[   14.336614]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.336636]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.336719]  ? kasan_atomics+0x152/0x310
[   14.336747]  kasan_atomics+0x1dc/0x310
[   14.336771]  ? __pfx_kasan_atomics+0x10/0x10
[   14.336795]  ? __pfx_read_tsc+0x10/0x10
[   14.336828]  ? ktime_get_ts64+0x86/0x230
[   14.336852]  kunit_try_run_case+0x1a5/0x480
[   14.336878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.336913]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.336938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.336962]  ? __kthread_parkme+0x82/0x180
[   14.336984]  ? preempt_count_sub+0x50/0x80
[   14.337009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.337033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.337057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.337091]  kthread+0x337/0x6f0
[   14.337111]  ? trace_preempt_on+0x20/0xc0
[   14.337135]  ? __pfx_kthread+0x10/0x10
[   14.337168]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.337190]  ? calculate_sigpending+0x7b/0xa0
[   14.337214]  ? __pfx_kthread+0x10/0x10
[   14.337236]  ret_from_fork+0x116/0x1d0
[   14.337256]  ? __pfx_kthread+0x10/0x10
[   14.337278]  ret_from_fork_asm+0x1a/0x30
[   14.337308]  </TASK>
[   14.337320] 
[   14.345616] Allocated by task 284:
[   14.345811]  kasan_save_stack+0x45/0x70
[   14.346022]  kasan_save_track+0x18/0x40
[   14.346650]  kasan_save_alloc_info+0x3b/0x50
[   14.346976]  __kasan_kmalloc+0xb7/0xc0
[   14.347132]  __kmalloc_cache_noprof+0x189/0x420
[   14.347520]  kasan_atomics+0x95/0x310
[   14.347830]  kunit_try_run_case+0x1a5/0x480
[   14.348054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.348322]  kthread+0x337/0x6f0
[   14.348504]  ret_from_fork+0x116/0x1d0
[   14.348647]  ret_from_fork_asm+0x1a/0x30
[   14.348786] 
[   14.348859] The buggy address belongs to the object at ffff888103128480
[   14.348859]  which belongs to the cache kmalloc-64 of size 64
[   14.349774] The buggy address is located 0 bytes to the right of
[   14.349774]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.350146] 
[   14.350221] The buggy address belongs to the physical page:
[   14.350496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.351111] flags: 0x200000000000000(node=0|zone=2)
[   14.351388] page_type: f5(slab)
[   14.351623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.352044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.352292] page dumped because: kasan: bad access detected
[   14.352592] 
[   14.352689] Memory state around the buggy address:
[   14.353013]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.353247]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.353564] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.353927]                                      ^
[   14.354184]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.354460]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.355042] ==================================================================
[   14.448967] ==================================================================
[   14.449631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.450400] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.450735] 
[   14.450861] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.450906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.450919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.450940] Call Trace:
[   14.450956]  <TASK>
[   14.450974]  dump_stack_lvl+0x73/0xb0
[   14.451003]  print_report+0xd1/0x650
[   14.451028]  ? __virt_addr_valid+0x1db/0x2d0
[   14.451053]  ? kasan_atomics_helper+0x1079/0x5450
[   14.451075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.451098]  ? kasan_atomics_helper+0x1079/0x5450
[   14.451120]  kasan_report+0x141/0x180
[   14.451142]  ? kasan_atomics_helper+0x1079/0x5450
[   14.451169]  kasan_check_range+0x10c/0x1c0
[   14.451194]  __kasan_check_write+0x18/0x20
[   14.451214]  kasan_atomics_helper+0x1079/0x5450
[   14.451237]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.451260]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.451287]  ? kasan_atomics+0x152/0x310
[   14.451315]  kasan_atomics+0x1dc/0x310
[   14.451337]  ? __pfx_kasan_atomics+0x10/0x10
[   14.451373]  ? __pfx_read_tsc+0x10/0x10
[   14.451394]  ? ktime_get_ts64+0x86/0x230
[   14.451419]  kunit_try_run_case+0x1a5/0x480
[   14.451444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.451491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.451514]  ? __kthread_parkme+0x82/0x180
[   14.451537]  ? preempt_count_sub+0x50/0x80
[   14.451561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.451620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.451645]  kthread+0x337/0x6f0
[   14.451670]  ? trace_preempt_on+0x20/0xc0
[   14.451708]  ? __pfx_kthread+0x10/0x10
[   14.451729]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.451762]  ? calculate_sigpending+0x7b/0xa0
[   14.451809]  ? __pfx_kthread+0x10/0x10
[   14.451831]  ret_from_fork+0x116/0x1d0
[   14.451850]  ? __pfx_kthread+0x10/0x10
[   14.451872]  ret_from_fork_asm+0x1a/0x30
[   14.451914]  </TASK>
[   14.451926] 
[   14.459620] Allocated by task 284:
[   14.459872]  kasan_save_stack+0x45/0x70
[   14.460069]  kasan_save_track+0x18/0x40
[   14.460266]  kasan_save_alloc_info+0x3b/0x50
[   14.460437]  __kasan_kmalloc+0xb7/0xc0
[   14.460571]  __kmalloc_cache_noprof+0x189/0x420
[   14.460727]  kasan_atomics+0x95/0x310
[   14.460928]  kunit_try_run_case+0x1a5/0x480
[   14.461161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.461462]  kthread+0x337/0x6f0
[   14.461589]  ret_from_fork+0x116/0x1d0
[   14.461723]  ret_from_fork_asm+0x1a/0x30
[   14.463029] 
[   14.463139] The buggy address belongs to the object at ffff888103128480
[   14.463139]  which belongs to the cache kmalloc-64 of size 64
[   14.463691] The buggy address is located 0 bytes to the right of
[   14.463691]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.464231] 
[   14.464308] The buggy address belongs to the physical page:
[   14.464496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.465304] flags: 0x200000000000000(node=0|zone=2)
[   14.465721] page_type: f5(slab)
[   14.466288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.467233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.467937] page dumped because: kasan: bad access detected
[   14.468441] 
[   14.468604] Memory state around the buggy address:
[   14.468922]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.469142]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.469374] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.469590]                                      ^
[   14.469754]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.469970]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.470185] ==================================================================
[   14.913298] ==================================================================
[   14.913612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.914046] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.914364] 
[   14.914454] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.914498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.914511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.914532] Call Trace:
[   14.914549]  <TASK>
[   14.914566]  dump_stack_lvl+0x73/0xb0
[   14.914607]  print_report+0xd1/0x650
[   14.914631]  ? __virt_addr_valid+0x1db/0x2d0
[   14.914653]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.914675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.914697]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.914719]  kasan_report+0x141/0x180
[   14.914742]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.914768]  kasan_check_range+0x10c/0x1c0
[   14.914792]  __kasan_check_write+0x18/0x20
[   14.914812]  kasan_atomics_helper+0x1a7f/0x5450
[   14.914844]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.914878]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.914904]  ? kasan_atomics+0x152/0x310
[   14.914930]  kasan_atomics+0x1dc/0x310
[   14.914965]  ? __pfx_kasan_atomics+0x10/0x10
[   14.914989]  ? __pfx_read_tsc+0x10/0x10
[   14.915012]  ? ktime_get_ts64+0x86/0x230
[   14.915037]  kunit_try_run_case+0x1a5/0x480
[   14.915061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.915084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.915108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.915142]  ? __kthread_parkme+0x82/0x180
[   14.915163]  ? preempt_count_sub+0x50/0x80
[   14.915187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.915211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.915234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.915258]  kthread+0x337/0x6f0
[   14.915277]  ? trace_preempt_on+0x20/0xc0
[   14.915301]  ? __pfx_kthread+0x10/0x10
[   14.915323]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.915363]  ? calculate_sigpending+0x7b/0xa0
[   14.915386]  ? __pfx_kthread+0x10/0x10
[   14.915409]  ret_from_fork+0x116/0x1d0
[   14.915438]  ? __pfx_kthread+0x10/0x10
[   14.915460]  ret_from_fork_asm+0x1a/0x30
[   14.915491]  </TASK>
[   14.915502] 
[   14.923401] Allocated by task 284:
[   14.923568]  kasan_save_stack+0x45/0x70
[   14.923717]  kasan_save_track+0x18/0x40
[   14.923853]  kasan_save_alloc_info+0x3b/0x50
[   14.924041]  __kasan_kmalloc+0xb7/0xc0
[   14.924239]  __kmalloc_cache_noprof+0x189/0x420
[   14.924490]  kasan_atomics+0x95/0x310
[   14.924680]  kunit_try_run_case+0x1a5/0x480
[   14.925048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.925279]  kthread+0x337/0x6f0
[   14.925412]  ret_from_fork+0x116/0x1d0
[   14.925558]  ret_from_fork_asm+0x1a/0x30
[   14.925764] 
[   14.925860] The buggy address belongs to the object at ffff888103128480
[   14.925860]  which belongs to the cache kmalloc-64 of size 64
[   14.926278] The buggy address is located 0 bytes to the right of
[   14.926278]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.926670] 
[   14.926767] The buggy address belongs to the physical page:
[   14.927185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.927548] flags: 0x200000000000000(node=0|zone=2)
[   14.927782] page_type: f5(slab)
[   14.927936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.928171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.928411] page dumped because: kasan: bad access detected
[   14.928866] 
[   14.928961] Memory state around the buggy address:
[   14.929198]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.929568]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.930066] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.930421]                                      ^
[   14.930594]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.930979]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.931352] ==================================================================
[   14.641030] ==================================================================
[   14.641556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.642319] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.642730] 
[   14.642844] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.642889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.642902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.642923] Call Trace:
[   14.642978]  <TASK>
[   14.642997]  dump_stack_lvl+0x73/0xb0
[   14.643025]  print_report+0xd1/0x650
[   14.643050]  ? __virt_addr_valid+0x1db/0x2d0
[   14.643074]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.643097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.643146]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.643168]  kasan_report+0x141/0x180
[   14.643190]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.643217]  __asan_report_load8_noabort+0x18/0x20
[   14.643243]  kasan_atomics_helper+0x4eae/0x5450
[   14.643266]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.643288]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.643314]  ? kasan_atomics+0x152/0x310
[   14.643341]  kasan_atomics+0x1dc/0x310
[   14.643375]  ? __pfx_kasan_atomics+0x10/0x10
[   14.643400]  ? __pfx_read_tsc+0x10/0x10
[   14.643421]  ? ktime_get_ts64+0x86/0x230
[   14.643446]  kunit_try_run_case+0x1a5/0x480
[   14.643470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.643492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.643516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.643540]  ? __kthread_parkme+0x82/0x180
[   14.643562]  ? preempt_count_sub+0x50/0x80
[   14.643587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.643611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.643634]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.643664]  kthread+0x337/0x6f0
[   14.643685]  ? trace_preempt_on+0x20/0xc0
[   14.643709]  ? __pfx_kthread+0x10/0x10
[   14.643730]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.643771]  ? calculate_sigpending+0x7b/0xa0
[   14.643796]  ? __pfx_kthread+0x10/0x10
[   14.643818]  ret_from_fork+0x116/0x1d0
[   14.643837]  ? __pfx_kthread+0x10/0x10
[   14.643858]  ret_from_fork_asm+0x1a/0x30
[   14.643890]  </TASK>
[   14.643902] 
[   14.653491] Allocated by task 284:
[   14.653659]  kasan_save_stack+0x45/0x70
[   14.654184]  kasan_save_track+0x18/0x40
[   14.654607]  kasan_save_alloc_info+0x3b/0x50
[   14.655100]  __kasan_kmalloc+0xb7/0xc0
[   14.655341]  __kmalloc_cache_noprof+0x189/0x420
[   14.655679]  kasan_atomics+0x95/0x310
[   14.656170]  kunit_try_run_case+0x1a5/0x480
[   14.656450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.656869]  kthread+0x337/0x6f0
[   14.657177]  ret_from_fork+0x116/0x1d0
[   14.657373]  ret_from_fork_asm+0x1a/0x30
[   14.657559] 
[   14.657653] The buggy address belongs to the object at ffff888103128480
[   14.657653]  which belongs to the cache kmalloc-64 of size 64
[   14.658634] The buggy address is located 0 bytes to the right of
[   14.658634]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.659523] 
[   14.659632] The buggy address belongs to the physical page:
[   14.660072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.660549] flags: 0x200000000000000(node=0|zone=2)
[   14.660965] page_type: f5(slab)
[   14.661191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.661717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.662232] page dumped because: kasan: bad access detected
[   14.662489] 
[   14.662581] Memory state around the buggy address:
[   14.663054]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.663603]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.664336] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.664793]                                      ^
[   14.665143]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.665588]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.666234] ==================================================================
[   14.052332] ==================================================================
[   14.052787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.053345] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.053811] 
[   14.053905] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.053954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.053967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.053990] Call Trace:
[   14.054007]  <TASK>
[   14.054025]  dump_stack_lvl+0x73/0xb0
[   14.054054]  print_report+0xd1/0x650
[   14.054090]  ? __virt_addr_valid+0x1db/0x2d0
[   14.054114]  ? kasan_atomics_helper+0x565/0x5450
[   14.054137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.054172]  ? kasan_atomics_helper+0x565/0x5450
[   14.054194]  kasan_report+0x141/0x180
[   14.054217]  ? kasan_atomics_helper+0x565/0x5450
[   14.054244]  kasan_check_range+0x10c/0x1c0
[   14.054277]  __kasan_check_write+0x18/0x20
[   14.054298]  kasan_atomics_helper+0x565/0x5450
[   14.054327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.054350]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.054386]  ? kasan_atomics+0x152/0x310
[   14.054414]  kasan_atomics+0x1dc/0x310
[   14.054437]  ? __pfx_kasan_atomics+0x10/0x10
[   14.054462]  ? __pfx_read_tsc+0x10/0x10
[   14.054484]  ? ktime_get_ts64+0x86/0x230
[   14.054509]  kunit_try_run_case+0x1a5/0x480
[   14.054533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.054556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.054620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.054660]  ? __kthread_parkme+0x82/0x180
[   14.054681]  ? preempt_count_sub+0x50/0x80
[   14.054718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.054743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.054766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.054790]  kthread+0x337/0x6f0
[   14.054810]  ? trace_preempt_on+0x20/0xc0
[   14.054844]  ? __pfx_kthread+0x10/0x10
[   14.054865]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.054887]  ? calculate_sigpending+0x7b/0xa0
[   14.054922]  ? __pfx_kthread+0x10/0x10
[   14.054944]  ret_from_fork+0x116/0x1d0
[   14.054963]  ? __pfx_kthread+0x10/0x10
[   14.054993]  ret_from_fork_asm+0x1a/0x30
[   14.055024]  </TASK>
[   14.055036] 
[   14.068161] Allocated by task 284:
[   14.068513]  kasan_save_stack+0x45/0x70
[   14.068917]  kasan_save_track+0x18/0x40
[   14.069261]  kasan_save_alloc_info+0x3b/0x50
[   14.069618]  __kasan_kmalloc+0xb7/0xc0
[   14.069982]  __kmalloc_cache_noprof+0x189/0x420
[   14.070145]  kasan_atomics+0x95/0x310
[   14.070282]  kunit_try_run_case+0x1a5/0x480
[   14.070437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.070641]  kthread+0x337/0x6f0
[   14.070765]  ret_from_fork+0x116/0x1d0
[   14.070980]  ret_from_fork_asm+0x1a/0x30
[   14.071382] 
[   14.071484] The buggy address belongs to the object at ffff888103128480
[   14.071484]  which belongs to the cache kmalloc-64 of size 64
[   14.072056] The buggy address is located 0 bytes to the right of
[   14.072056]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.072588] 
[   14.072682] The buggy address belongs to the physical page:
[   14.073103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.073448] flags: 0x200000000000000(node=0|zone=2)
[   14.073673] page_type: f5(slab)
[   14.073845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.074173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.074509] page dumped because: kasan: bad access detected
[   14.074807] 
[   14.074925] Memory state around the buggy address:
[   14.075140]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.075455]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.075931] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.076206]                                      ^
[   14.076422]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.076806]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.077221] ==================================================================
[   14.355714] ==================================================================
[   14.356219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.356555] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.357111] 
[   14.357252] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.357298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.357311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.357333] Call Trace:
[   14.357345]  <TASK>
[   14.357382]  dump_stack_lvl+0x73/0xb0
[   14.357412]  print_report+0xd1/0x650
[   14.357436]  ? __virt_addr_valid+0x1db/0x2d0
[   14.357472]  ? kasan_atomics_helper+0xde0/0x5450
[   14.357494]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.357516]  ? kasan_atomics_helper+0xde0/0x5450
[   14.357538]  kasan_report+0x141/0x180
[   14.357569]  ? kasan_atomics_helper+0xde0/0x5450
[   14.357596]  kasan_check_range+0x10c/0x1c0
[   14.357630]  __kasan_check_write+0x18/0x20
[   14.357651]  kasan_atomics_helper+0xde0/0x5450
[   14.357674]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.357697]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.357724]  ? kasan_atomics+0x152/0x310
[   14.357764]  kasan_atomics+0x1dc/0x310
[   14.357796]  ? __pfx_kasan_atomics+0x10/0x10
[   14.357821]  ? __pfx_read_tsc+0x10/0x10
[   14.357855]  ? ktime_get_ts64+0x86/0x230
[   14.357881]  kunit_try_run_case+0x1a5/0x480
[   14.357906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.357929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.357954]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.357978]  ? __kthread_parkme+0x82/0x180
[   14.358000]  ? preempt_count_sub+0x50/0x80
[   14.358025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.358050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.358073]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.358098]  kthread+0x337/0x6f0
[   14.358118]  ? trace_preempt_on+0x20/0xc0
[   14.358144]  ? __pfx_kthread+0x10/0x10
[   14.358165]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.358187]  ? calculate_sigpending+0x7b/0xa0
[   14.358212]  ? __pfx_kthread+0x10/0x10
[   14.358235]  ret_from_fork+0x116/0x1d0
[   14.358255]  ? __pfx_kthread+0x10/0x10
[   14.358277]  ret_from_fork_asm+0x1a/0x30
[   14.358309]  </TASK>
[   14.358322] 
[   14.366380] Allocated by task 284:
[   14.366596]  kasan_save_stack+0x45/0x70
[   14.366824]  kasan_save_track+0x18/0x40
[   14.367013]  kasan_save_alloc_info+0x3b/0x50
[   14.367293]  __kasan_kmalloc+0xb7/0xc0
[   14.367494]  __kmalloc_cache_noprof+0x189/0x420
[   14.367703]  kasan_atomics+0x95/0x310
[   14.367904]  kunit_try_run_case+0x1a5/0x480
[   14.368112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.368361]  kthread+0x337/0x6f0
[   14.368486]  ret_from_fork+0x116/0x1d0
[   14.368696]  ret_from_fork_asm+0x1a/0x30
[   14.368891] 
[   14.369012] The buggy address belongs to the object at ffff888103128480
[   14.369012]  which belongs to the cache kmalloc-64 of size 64
[   14.369499] The buggy address is located 0 bytes to the right of
[   14.369499]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.370110] 
[   14.370202] The buggy address belongs to the physical page:
[   14.370436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.370804] flags: 0x200000000000000(node=0|zone=2)
[   14.371028] page_type: f5(slab)
[   14.371180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.371419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.371644] page dumped because: kasan: bad access detected
[   14.371842] 
[   14.371969] Memory state around the buggy address:
[   14.372198]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.372534]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.372986] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.373249]                                      ^
[   14.373411]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.373626]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.373900] ==================================================================
[   15.069454] ==================================================================
[   15.069806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.070248] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.070637] 
[   15.070988] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.071040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.071054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.071075] Call Trace:
[   15.071095]  <TASK>
[   15.071114]  dump_stack_lvl+0x73/0xb0
[   15.071145]  print_report+0xd1/0x650
[   15.071170]  ? __virt_addr_valid+0x1db/0x2d0
[   15.071194]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.071216]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.071239]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.071261]  kasan_report+0x141/0x180
[   15.071284]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.071311]  kasan_check_range+0x10c/0x1c0
[   15.071336]  __kasan_check_write+0x18/0x20
[   15.071368]  kasan_atomics_helper+0x1f43/0x5450
[   15.071392]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.071415]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.071441]  ? kasan_atomics+0x152/0x310
[   15.071469]  kasan_atomics+0x1dc/0x310
[   15.071492]  ? __pfx_kasan_atomics+0x10/0x10
[   15.071517]  ? __pfx_read_tsc+0x10/0x10
[   15.071539]  ? ktime_get_ts64+0x86/0x230
[   15.071564]  kunit_try_run_case+0x1a5/0x480
[   15.071589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.071612]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.071638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.071667]  ? __kthread_parkme+0x82/0x180
[   15.071689]  ? preempt_count_sub+0x50/0x80
[   15.071713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.071747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.071771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.071794]  kthread+0x337/0x6f0
[   15.071816]  ? trace_preempt_on+0x20/0xc0
[   15.071841]  ? __pfx_kthread+0x10/0x10
[   15.071863]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.071884]  ? calculate_sigpending+0x7b/0xa0
[   15.071908]  ? __pfx_kthread+0x10/0x10
[   15.071931]  ret_from_fork+0x116/0x1d0
[   15.071949]  ? __pfx_kthread+0x10/0x10
[   15.071969]  ret_from_fork_asm+0x1a/0x30
[   15.072002]  </TASK>
[   15.072015] 
[   15.081857] Allocated by task 284:
[   15.082173]  kasan_save_stack+0x45/0x70
[   15.082412]  kasan_save_track+0x18/0x40
[   15.082592]  kasan_save_alloc_info+0x3b/0x50
[   15.082966]  __kasan_kmalloc+0xb7/0xc0
[   15.083155]  __kmalloc_cache_noprof+0x189/0x420
[   15.083437]  kasan_atomics+0x95/0x310
[   15.083584]  kunit_try_run_case+0x1a5/0x480
[   15.083987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.084301]  kthread+0x337/0x6f0
[   15.084454]  ret_from_fork+0x116/0x1d0
[   15.084638]  ret_from_fork_asm+0x1a/0x30
[   15.085005] 
[   15.085113] The buggy address belongs to the object at ffff888103128480
[   15.085113]  which belongs to the cache kmalloc-64 of size 64
[   15.085644] The buggy address is located 0 bytes to the right of
[   15.085644]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.086384] 
[   15.086484] The buggy address belongs to the physical page:
[   15.086718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.087046] flags: 0x200000000000000(node=0|zone=2)
[   15.087262] page_type: f5(slab)
[   15.087425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.087745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.088491] page dumped because: kasan: bad access detected
[   15.088744] 
[   15.088998] Memory state around the buggy address:
[   15.089225]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.089638]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.090064] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.090463]                                      ^
[   15.090643]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.091161]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.091553] ==================================================================
[   15.255682] ==================================================================
[   15.256042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.256469] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.256692] 
[   15.256776] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.256817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.256829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.256850] Call Trace:
[   15.256865]  <TASK>
[   15.256881]  dump_stack_lvl+0x73/0xb0
[   15.256909]  print_report+0xd1/0x650
[   15.256932]  ? __virt_addr_valid+0x1db/0x2d0
[   15.256957]  ? kasan_atomics_helper+0x5115/0x5450
[   15.256978]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.257000]  ? kasan_atomics_helper+0x5115/0x5450
[   15.257023]  kasan_report+0x141/0x180
[   15.257046]  ? kasan_atomics_helper+0x5115/0x5450
[   15.257073]  __asan_report_load8_noabort+0x18/0x20
[   15.257098]  kasan_atomics_helper+0x5115/0x5450
[   15.257121]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.257143]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.257168]  ? kasan_atomics+0x152/0x310
[   15.257195]  kasan_atomics+0x1dc/0x310
[   15.257218]  ? __pfx_kasan_atomics+0x10/0x10
[   15.257243]  ? __pfx_read_tsc+0x10/0x10
[   15.257264]  ? ktime_get_ts64+0x86/0x230
[   15.257289]  kunit_try_run_case+0x1a5/0x480
[   15.257313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.257373]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.257396]  ? __kthread_parkme+0x82/0x180
[   15.257417]  ? preempt_count_sub+0x50/0x80
[   15.257441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.257489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.257512]  kthread+0x337/0x6f0
[   15.257532]  ? trace_preempt_on+0x20/0xc0
[   15.257556]  ? __pfx_kthread+0x10/0x10
[   15.257578]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.257599]  ? calculate_sigpending+0x7b/0xa0
[   15.257623]  ? __pfx_kthread+0x10/0x10
[   15.257645]  ret_from_fork+0x116/0x1d0
[   15.257664]  ? __pfx_kthread+0x10/0x10
[   15.257685]  ret_from_fork_asm+0x1a/0x30
[   15.257716]  </TASK>
[   15.257728] 
[   15.265679] Allocated by task 284:
[   15.265867]  kasan_save_stack+0x45/0x70
[   15.266071]  kasan_save_track+0x18/0x40
[   15.266409]  kasan_save_alloc_info+0x3b/0x50
[   15.266559]  __kasan_kmalloc+0xb7/0xc0
[   15.266693]  __kmalloc_cache_noprof+0x189/0x420
[   15.266847]  kasan_atomics+0x95/0x310
[   15.267189]  kunit_try_run_case+0x1a5/0x480
[   15.267414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.267677]  kthread+0x337/0x6f0
[   15.267847]  ret_from_fork+0x116/0x1d0
[   15.268113]  ret_from_fork_asm+0x1a/0x30
[   15.268296] 
[   15.268457] The buggy address belongs to the object at ffff888103128480
[   15.268457]  which belongs to the cache kmalloc-64 of size 64
[   15.268815] The buggy address is located 0 bytes to the right of
[   15.268815]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.269538] 
[   15.269637] The buggy address belongs to the physical page:
[   15.269922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.270160] flags: 0x200000000000000(node=0|zone=2)
[   15.270324] page_type: f5(slab)
[   15.270454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.270798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.271134] page dumped because: kasan: bad access detected
[   15.271400] 
[   15.271496] Memory state around the buggy address:
[   15.271729]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.272028]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.272242] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.272794]                                      ^
[   15.273008]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.273255]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.273478] ==================================================================
[   14.291486] ==================================================================
[   14.291924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.292309] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.292680] 
[   14.292993] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.293041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.293055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.293077] Call Trace:
[   14.293092]  <TASK>
[   14.293109]  dump_stack_lvl+0x73/0xb0
[   14.293138]  print_report+0xd1/0x650
[   14.293162]  ? __virt_addr_valid+0x1db/0x2d0
[   14.293186]  ? kasan_atomics_helper+0xc70/0x5450
[   14.293207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.293230]  ? kasan_atomics_helper+0xc70/0x5450
[   14.293254]  kasan_report+0x141/0x180
[   14.293278]  ? kasan_atomics_helper+0xc70/0x5450
[   14.293303]  kasan_check_range+0x10c/0x1c0
[   14.293327]  __kasan_check_write+0x18/0x20
[   14.293347]  kasan_atomics_helper+0xc70/0x5450
[   14.293380]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.293403]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.293430]  ? kasan_atomics+0x152/0x310
[   14.293456]  kasan_atomics+0x1dc/0x310
[   14.293479]  ? __pfx_kasan_atomics+0x10/0x10
[   14.293504]  ? __pfx_read_tsc+0x10/0x10
[   14.293526]  ? ktime_get_ts64+0x86/0x230
[   14.293550]  kunit_try_run_case+0x1a5/0x480
[   14.293575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.293703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.293730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.293753]  ? __kthread_parkme+0x82/0x180
[   14.293787]  ? preempt_count_sub+0x50/0x80
[   14.293813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.293837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.293861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.293885]  kthread+0x337/0x6f0
[   14.293908]  ? trace_preempt_on+0x20/0xc0
[   14.293936]  ? __pfx_kthread+0x10/0x10
[   14.293958]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.293980]  ? calculate_sigpending+0x7b/0xa0
[   14.294005]  ? __pfx_kthread+0x10/0x10
[   14.294027]  ret_from_fork+0x116/0x1d0
[   14.294047]  ? __pfx_kthread+0x10/0x10
[   14.294068]  ret_from_fork_asm+0x1a/0x30
[   14.294099]  </TASK>
[   14.294111] 
[   14.302669] Allocated by task 284:
[   14.302892]  kasan_save_stack+0x45/0x70
[   14.303098]  kasan_save_track+0x18/0x40
[   14.303280]  kasan_save_alloc_info+0x3b/0x50
[   14.303501]  __kasan_kmalloc+0xb7/0xc0
[   14.303984]  __kmalloc_cache_noprof+0x189/0x420
[   14.304201]  kasan_atomics+0x95/0x310
[   14.304368]  kunit_try_run_case+0x1a5/0x480
[   14.304672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.305010]  kthread+0x337/0x6f0
[   14.305198]  ret_from_fork+0x116/0x1d0
[   14.305405]  ret_from_fork_asm+0x1a/0x30
[   14.305844] 
[   14.306037] The buggy address belongs to the object at ffff888103128480
[   14.306037]  which belongs to the cache kmalloc-64 of size 64
[   14.307079] The buggy address is located 0 bytes to the right of
[   14.307079]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.308087] 
[   14.308321] The buggy address belongs to the physical page:
[   14.308738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.309089] flags: 0x200000000000000(node=0|zone=2)
[   14.309312] page_type: f5(slab)
[   14.309482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.310129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.310460] page dumped because: kasan: bad access detected
[   14.311166] 
[   14.311283] Memory state around the buggy address:
[   14.311502]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.311867]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.312164] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.312458]                                      ^
[   14.313045]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.313564]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.314017] ==================================================================
[   14.430906] ==================================================================
[   14.431363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.431810] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.432166] 
[   14.432304] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.432371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.432384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.432407] Call Trace:
[   14.432426]  <TASK>
[   14.432446]  dump_stack_lvl+0x73/0xb0
[   14.432474]  print_report+0xd1/0x650
[   14.432498]  ? __virt_addr_valid+0x1db/0x2d0
[   14.432523]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.432544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.432567]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.432589]  kasan_report+0x141/0x180
[   14.432611]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.432638]  __asan_report_load4_noabort+0x18/0x20
[   14.432663]  kasan_atomics_helper+0x4a36/0x5450
[   14.432696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.432720]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.432768]  ? kasan_atomics+0x152/0x310
[   14.432795]  kasan_atomics+0x1dc/0x310
[   14.432819]  ? __pfx_kasan_atomics+0x10/0x10
[   14.432844]  ? __pfx_read_tsc+0x10/0x10
[   14.432865]  ? ktime_get_ts64+0x86/0x230
[   14.432890]  kunit_try_run_case+0x1a5/0x480
[   14.432915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.432938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.432963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.432986]  ? __kthread_parkme+0x82/0x180
[   14.433009]  ? preempt_count_sub+0x50/0x80
[   14.433034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.433058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.433081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.433105]  kthread+0x337/0x6f0
[   14.433134]  ? trace_preempt_on+0x20/0xc0
[   14.433160]  ? __pfx_kthread+0x10/0x10
[   14.433181]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.433213]  ? calculate_sigpending+0x7b/0xa0
[   14.433238]  ? __pfx_kthread+0x10/0x10
[   14.433260]  ret_from_fork+0x116/0x1d0
[   14.433279]  ? __pfx_kthread+0x10/0x10
[   14.433308]  ret_from_fork_asm+0x1a/0x30
[   14.433339]  </TASK>
[   14.433366] 
[   14.440711] Allocated by task 284:
[   14.440925]  kasan_save_stack+0x45/0x70
[   14.441164]  kasan_save_track+0x18/0x40
[   14.441398]  kasan_save_alloc_info+0x3b/0x50
[   14.441657]  __kasan_kmalloc+0xb7/0xc0
[   14.441921]  __kmalloc_cache_noprof+0x189/0x420
[   14.442145]  kasan_atomics+0x95/0x310
[   14.442334]  kunit_try_run_case+0x1a5/0x480
[   14.442553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.442850]  kthread+0x337/0x6f0
[   14.442984]  ret_from_fork+0x116/0x1d0
[   14.443119]  ret_from_fork_asm+0x1a/0x30
[   14.443259] 
[   14.443338] The buggy address belongs to the object at ffff888103128480
[   14.443338]  which belongs to the cache kmalloc-64 of size 64
[   14.444121] The buggy address is located 0 bytes to the right of
[   14.444121]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.444642] 
[   14.444774] The buggy address belongs to the physical page:
[   14.444983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.445334] flags: 0x200000000000000(node=0|zone=2)
[   14.445572] page_type: f5(slab)
[   14.445747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.446063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.446364] page dumped because: kasan: bad access detected
[   14.446538] 
[   14.446608] Memory state around the buggy address:
[   14.446851]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.447223]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.447551] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.447909]                                      ^
[   14.448067]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.448283]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.448507] ==================================================================
[   14.869260] ==================================================================
[   14.870004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.870667] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.871176] 
[   14.871267] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.871312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.871335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.871366] Call Trace:
[   14.871382]  <TASK>
[   14.871400]  dump_stack_lvl+0x73/0xb0
[   14.871440]  print_report+0xd1/0x650
[   14.871463]  ? __virt_addr_valid+0x1db/0x2d0
[   14.871486]  ? kasan_atomics_helper+0x194a/0x5450
[   14.871508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.871530]  ? kasan_atomics_helper+0x194a/0x5450
[   14.871552]  kasan_report+0x141/0x180
[   14.871575]  ? kasan_atomics_helper+0x194a/0x5450
[   14.871602]  kasan_check_range+0x10c/0x1c0
[   14.871626]  __kasan_check_write+0x18/0x20
[   14.871645]  kasan_atomics_helper+0x194a/0x5450
[   14.871674]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.871705]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.871731]  ? kasan_atomics+0x152/0x310
[   14.871759]  kasan_atomics+0x1dc/0x310
[   14.871792]  ? __pfx_kasan_atomics+0x10/0x10
[   14.871817]  ? __pfx_read_tsc+0x10/0x10
[   14.871839]  ? ktime_get_ts64+0x86/0x230
[   14.871863]  kunit_try_run_case+0x1a5/0x480
[   14.871888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.871910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.871934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.871966]  ? __kthread_parkme+0x82/0x180
[   14.871987]  ? preempt_count_sub+0x50/0x80
[   14.872011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.872036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.872081]  kthread+0x337/0x6f0
[   14.872102]  ? trace_preempt_on+0x20/0xc0
[   14.872126]  ? __pfx_kthread+0x10/0x10
[   14.872147]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.872169]  ? calculate_sigpending+0x7b/0xa0
[   14.872193]  ? __pfx_kthread+0x10/0x10
[   14.872215]  ret_from_fork+0x116/0x1d0
[   14.872233]  ? __pfx_kthread+0x10/0x10
[   14.872254]  ret_from_fork_asm+0x1a/0x30
[   14.872285]  </TASK>
[   14.872297] 
[   14.880449] Allocated by task 284:
[   14.880657]  kasan_save_stack+0x45/0x70
[   14.880917]  kasan_save_track+0x18/0x40
[   14.881089]  kasan_save_alloc_info+0x3b/0x50
[   14.881340]  __kasan_kmalloc+0xb7/0xc0
[   14.881522]  __kmalloc_cache_noprof+0x189/0x420
[   14.881749]  kasan_atomics+0x95/0x310
[   14.881941]  kunit_try_run_case+0x1a5/0x480
[   14.882138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.882386]  kthread+0x337/0x6f0
[   14.882511]  ret_from_fork+0x116/0x1d0
[   14.882716]  ret_from_fork_asm+0x1a/0x30
[   14.882938] 
[   14.883033] The buggy address belongs to the object at ffff888103128480
[   14.883033]  which belongs to the cache kmalloc-64 of size 64
[   14.883711] The buggy address is located 0 bytes to the right of
[   14.883711]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.884243] 
[   14.884319] The buggy address belongs to the physical page:
[   14.884606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.884950] flags: 0x200000000000000(node=0|zone=2)
[   14.885181] page_type: f5(slab)
[   14.885372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.885659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.886038] page dumped because: kasan: bad access detected
[   14.886247] 
[   14.886321] Memory state around the buggy address:
[   14.886498]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.886724]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.887043] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.887367]                                      ^
[   14.887618]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.887976]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888196] ==================================================================
[   14.250285] ==================================================================
[   14.250720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.251052] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.251312] 
[   14.251416] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.251462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.251475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.251496] Call Trace:
[   14.251514]  <TASK>
[   14.251530]  dump_stack_lvl+0x73/0xb0
[   14.251560]  print_report+0xd1/0x650
[   14.251583]  ? __virt_addr_valid+0x1db/0x2d0
[   14.251607]  ? kasan_atomics_helper+0xac7/0x5450
[   14.251628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.251651]  ? kasan_atomics_helper+0xac7/0x5450
[   14.251678]  kasan_report+0x141/0x180
[   14.251700]  ? kasan_atomics_helper+0xac7/0x5450
[   14.251727]  kasan_check_range+0x10c/0x1c0
[   14.251751]  __kasan_check_write+0x18/0x20
[   14.251772]  kasan_atomics_helper+0xac7/0x5450
[   14.251795]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.251817]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.251843]  ? kasan_atomics+0x152/0x310
[   14.251872]  kasan_atomics+0x1dc/0x310
[   14.251894]  ? __pfx_kasan_atomics+0x10/0x10
[   14.251921]  ? __pfx_read_tsc+0x10/0x10
[   14.251942]  ? ktime_get_ts64+0x86/0x230
[   14.251967]  kunit_try_run_case+0x1a5/0x480
[   14.251992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.252015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.252039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.252062]  ? __kthread_parkme+0x82/0x180
[   14.252083]  ? preempt_count_sub+0x50/0x80
[   14.252108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.252132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.252156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.252180]  kthread+0x337/0x6f0
[   14.252200]  ? trace_preempt_on+0x20/0xc0
[   14.252225]  ? __pfx_kthread+0x10/0x10
[   14.252246]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.252268]  ? calculate_sigpending+0x7b/0xa0
[   14.252292]  ? __pfx_kthread+0x10/0x10
[   14.252315]  ret_from_fork+0x116/0x1d0
[   14.252333]  ? __pfx_kthread+0x10/0x10
[   14.252426]  ret_from_fork_asm+0x1a/0x30
[   14.252462]  </TASK>
[   14.252473] 
[   14.262080] Allocated by task 284:
[   14.262252]  kasan_save_stack+0x45/0x70
[   14.262479]  kasan_save_track+0x18/0x40
[   14.262877]  kasan_save_alloc_info+0x3b/0x50
[   14.263110]  __kasan_kmalloc+0xb7/0xc0
[   14.263306]  __kmalloc_cache_noprof+0x189/0x420
[   14.263522]  kasan_atomics+0x95/0x310
[   14.263836]  kunit_try_run_case+0x1a5/0x480
[   14.264055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.264285]  kthread+0x337/0x6f0
[   14.264467]  ret_from_fork+0x116/0x1d0
[   14.264678]  ret_from_fork_asm+0x1a/0x30
[   14.264954] 
[   14.265074] The buggy address belongs to the object at ffff888103128480
[   14.265074]  which belongs to the cache kmalloc-64 of size 64
[   14.265547] The buggy address is located 0 bytes to the right of
[   14.265547]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.266089] 
[   14.266167] The buggy address belongs to the physical page:
[   14.266392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.266807] flags: 0x200000000000000(node=0|zone=2)
[   14.267110] page_type: f5(slab)
[   14.267284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.267525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.267947] page dumped because: kasan: bad access detected
[   14.268222] 
[   14.268562] Memory state around the buggy address:
[   14.268785]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.269182]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.269471] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.270005]                                      ^
[   14.270174]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.270407]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.270957] ==================================================================
[   14.227343] ==================================================================
[   14.227759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.228212] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.228565] 
[   14.228695] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.228826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.228854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.228875] Call Trace:
[   14.228891]  <TASK>
[   14.228908]  dump_stack_lvl+0x73/0xb0
[   14.228948]  print_report+0xd1/0x650
[   14.228972]  ? __virt_addr_valid+0x1db/0x2d0
[   14.229012]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.229033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.229069]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.229091]  kasan_report+0x141/0x180
[   14.229127]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.229180]  kasan_check_range+0x10c/0x1c0
[   14.229214]  __kasan_check_write+0x18/0x20
[   14.229234]  kasan_atomics_helper+0xa2b/0x5450
[   14.229256]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.229291]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.229317]  ? kasan_atomics+0x152/0x310
[   14.229362]  kasan_atomics+0x1dc/0x310
[   14.229385]  ? __pfx_kasan_atomics+0x10/0x10
[   14.229410]  ? __pfx_read_tsc+0x10/0x10
[   14.229431]  ? ktime_get_ts64+0x86/0x230
[   14.229456]  kunit_try_run_case+0x1a5/0x480
[   14.229481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.229505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.229529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.229553]  ? __kthread_parkme+0x82/0x180
[   14.229584]  ? preempt_count_sub+0x50/0x80
[   14.229608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.229688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.229716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.229754]  kthread+0x337/0x6f0
[   14.229775]  ? trace_preempt_on+0x20/0xc0
[   14.229800]  ? __pfx_kthread+0x10/0x10
[   14.229851]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.229887]  ? calculate_sigpending+0x7b/0xa0
[   14.229938]  ? __pfx_kthread+0x10/0x10
[   14.229962]  ret_from_fork+0x116/0x1d0
[   14.230003]  ? __pfx_kthread+0x10/0x10
[   14.230037]  ret_from_fork_asm+0x1a/0x30
[   14.230081]  </TASK>
[   14.230094] 
[   14.239969] Allocated by task 284:
[   14.240209]  kasan_save_stack+0x45/0x70
[   14.240443]  kasan_save_track+0x18/0x40
[   14.240682]  kasan_save_alloc_info+0x3b/0x50
[   14.240929]  __kasan_kmalloc+0xb7/0xc0
[   14.241147]  __kmalloc_cache_noprof+0x189/0x420
[   14.241365]  kasan_atomics+0x95/0x310
[   14.241590]  kunit_try_run_case+0x1a5/0x480
[   14.241890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.242168]  kthread+0x337/0x6f0
[   14.242389]  ret_from_fork+0x116/0x1d0
[   14.242589]  ret_from_fork_asm+0x1a/0x30
[   14.242839] 
[   14.243165] The buggy address belongs to the object at ffff888103128480
[   14.243165]  which belongs to the cache kmalloc-64 of size 64
[   14.243925] The buggy address is located 0 bytes to the right of
[   14.243925]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.244522] 
[   14.244640] The buggy address belongs to the physical page:
[   14.244934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.245306] flags: 0x200000000000000(node=0|zone=2)
[   14.245636] page_type: f5(slab)
[   14.245762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.246382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.246871] page dumped because: kasan: bad access detected
[   14.247163] 
[   14.247239] Memory state around the buggy address:
[   14.247410]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.247648]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.248016] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.248426]                                      ^
[   14.248916]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.249322]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.249544] ==================================================================
[   13.990794] ==================================================================
[   13.991218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.991523] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   13.992213] 
[   13.992338] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.992520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.992547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.992568] Call Trace:
[   13.992623]  <TASK>
[   13.992639]  dump_stack_lvl+0x73/0xb0
[   13.992669]  print_report+0xd1/0x650
[   13.992693]  ? __virt_addr_valid+0x1db/0x2d0
[   13.992717]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.992739]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.992761]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.992784]  kasan_report+0x141/0x180
[   13.992806]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.992833]  __asan_report_load4_noabort+0x18/0x20
[   13.992869]  kasan_atomics_helper+0x4b54/0x5450
[   13.992892]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.992914]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.992951]  ? kasan_atomics+0x152/0x310
[   13.992978]  kasan_atomics+0x1dc/0x310
[   13.993001]  ? __pfx_kasan_atomics+0x10/0x10
[   13.993024]  ? __pfx_read_tsc+0x10/0x10
[   13.993046]  ? ktime_get_ts64+0x86/0x230
[   13.993070]  kunit_try_run_case+0x1a5/0x480
[   13.993095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.993117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.993141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.993163]  ? __kthread_parkme+0x82/0x180
[   13.993185]  ? preempt_count_sub+0x50/0x80
[   13.993208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.993232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.993265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.993289]  kthread+0x337/0x6f0
[   13.993309]  ? trace_preempt_on+0x20/0xc0
[   13.993344]  ? __pfx_kthread+0x10/0x10
[   13.993373]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.993394]  ? calculate_sigpending+0x7b/0xa0
[   13.993419]  ? __pfx_kthread+0x10/0x10
[   13.993450]  ret_from_fork+0x116/0x1d0
[   13.993469]  ? __pfx_kthread+0x10/0x10
[   13.993489]  ret_from_fork_asm+0x1a/0x30
[   13.993530]  </TASK>
[   13.993542] 
[   14.001560] Allocated by task 284:
[   14.002064]  kasan_save_stack+0x45/0x70
[   14.002295]  kasan_save_track+0x18/0x40
[   14.002665]  kasan_save_alloc_info+0x3b/0x50
[   14.003074]  __kasan_kmalloc+0xb7/0xc0
[   14.003213]  __kmalloc_cache_noprof+0x189/0x420
[   14.003448]  kasan_atomics+0x95/0x310
[   14.003688]  kunit_try_run_case+0x1a5/0x480
[   14.003987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.004257]  kthread+0x337/0x6f0
[   14.004454]  ret_from_fork+0x116/0x1d0
[   14.004681]  ret_from_fork_asm+0x1a/0x30
[   14.004883] 
[   14.004983] The buggy address belongs to the object at ffff888103128480
[   14.004983]  which belongs to the cache kmalloc-64 of size 64
[   14.005485] The buggy address is located 0 bytes to the right of
[   14.005485]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.005951] 
[   14.006025] The buggy address belongs to the physical page:
[   14.006198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.006705] flags: 0x200000000000000(node=0|zone=2)
[   14.007031] page_type: f5(slab)
[   14.007202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.007563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.008085] page dumped because: kasan: bad access detected
[   14.008277] 
[   14.008350] Memory state around the buggy address:
[   14.008549]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.008958]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.009311] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.009639]                                      ^
[   14.009912]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.010200]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.010531] ==================================================================
[   14.393179] ==================================================================
[   14.393678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.394113] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.394465] 
[   14.394551] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.394592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.394605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.394625] Call Trace:
[   14.394640]  <TASK>
[   14.394655]  dump_stack_lvl+0x73/0xb0
[   14.394684]  print_report+0xd1/0x650
[   14.394707]  ? __virt_addr_valid+0x1db/0x2d0
[   14.394730]  ? kasan_atomics_helper+0xf10/0x5450
[   14.394751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.394774]  ? kasan_atomics_helper+0xf10/0x5450
[   14.394796]  kasan_report+0x141/0x180
[   14.394820]  ? kasan_atomics_helper+0xf10/0x5450
[   14.394847]  kasan_check_range+0x10c/0x1c0
[   14.394871]  __kasan_check_write+0x18/0x20
[   14.394892]  kasan_atomics_helper+0xf10/0x5450
[   14.394915]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.394938]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.394964]  ? kasan_atomics+0x152/0x310
[   14.394991]  kasan_atomics+0x1dc/0x310
[   14.395015]  ? __pfx_kasan_atomics+0x10/0x10
[   14.395041]  ? __pfx_read_tsc+0x10/0x10
[   14.395062]  ? ktime_get_ts64+0x86/0x230
[   14.395086]  kunit_try_run_case+0x1a5/0x480
[   14.395111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.395158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.395182]  ? __kthread_parkme+0x82/0x180
[   14.395204]  ? preempt_count_sub+0x50/0x80
[   14.395228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.395289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.395314]  kthread+0x337/0x6f0
[   14.395334]  ? trace_preempt_on+0x20/0xc0
[   14.395374]  ? __pfx_kthread+0x10/0x10
[   14.395395]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.395417]  ? calculate_sigpending+0x7b/0xa0
[   14.395441]  ? __pfx_kthread+0x10/0x10
[   14.395464]  ret_from_fork+0x116/0x1d0
[   14.395483]  ? __pfx_kthread+0x10/0x10
[   14.395504]  ret_from_fork_asm+0x1a/0x30
[   14.395535]  </TASK>
[   14.395547] 
[   14.403774] Allocated by task 284:
[   14.403983]  kasan_save_stack+0x45/0x70
[   14.404157]  kasan_save_track+0x18/0x40
[   14.404363]  kasan_save_alloc_info+0x3b/0x50
[   14.404570]  __kasan_kmalloc+0xb7/0xc0
[   14.404753]  __kmalloc_cache_noprof+0x189/0x420
[   14.404933]  kasan_atomics+0x95/0x310
[   14.405144]  kunit_try_run_case+0x1a5/0x480
[   14.405310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.405494]  kthread+0x337/0x6f0
[   14.405619]  ret_from_fork+0x116/0x1d0
[   14.405822]  ret_from_fork_asm+0x1a/0x30
[   14.406042] 
[   14.406139] The buggy address belongs to the object at ffff888103128480
[   14.406139]  which belongs to the cache kmalloc-64 of size 64
[   14.406616] The buggy address is located 0 bytes to the right of
[   14.406616]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.407558] 
[   14.407635] The buggy address belongs to the physical page:
[   14.407953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.408196] flags: 0x200000000000000(node=0|zone=2)
[   14.408420] page_type: f5(slab)
[   14.408591] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.409220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.409520] page dumped because: kasan: bad access detected
[   14.409810] 
[   14.409893] Memory state around the buggy address:
[   14.410101]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.410441]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.410736] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.411049]                                      ^
[   14.411261]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.411578]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.411892] ==================================================================
[   15.092292] ==================================================================
[   15.093023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.093451] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.093804] 
[   15.093921] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.093967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.093981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.094004] Call Trace:
[   15.094022]  <TASK>
[   15.094043]  dump_stack_lvl+0x73/0xb0
[   15.094073]  print_report+0xd1/0x650
[   15.094098]  ? __virt_addr_valid+0x1db/0x2d0
[   15.094123]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.094146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.094168]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.094191]  kasan_report+0x141/0x180
[   15.094213]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.094240]  __asan_report_load8_noabort+0x18/0x20
[   15.094265]  kasan_atomics_helper+0x4f71/0x5450
[   15.094289]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.094312]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.094338]  ? kasan_atomics+0x152/0x310
[   15.094378]  kasan_atomics+0x1dc/0x310
[   15.094401]  ? __pfx_kasan_atomics+0x10/0x10
[   15.094426]  ? __pfx_read_tsc+0x10/0x10
[   15.094448]  ? ktime_get_ts64+0x86/0x230
[   15.094473]  kunit_try_run_case+0x1a5/0x480
[   15.094498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.094521]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.094546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.094570]  ? __kthread_parkme+0x82/0x180
[   15.094592]  ? preempt_count_sub+0x50/0x80
[   15.094618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.094643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.094666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.094690]  kthread+0x337/0x6f0
[   15.094711]  ? trace_preempt_on+0x20/0xc0
[   15.094747]  ? __pfx_kthread+0x10/0x10
[   15.094769]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.094791]  ? calculate_sigpending+0x7b/0xa0
[   15.094815]  ? __pfx_kthread+0x10/0x10
[   15.094838]  ret_from_fork+0x116/0x1d0
[   15.094858]  ? __pfx_kthread+0x10/0x10
[   15.094879]  ret_from_fork_asm+0x1a/0x30
[   15.094911]  </TASK>
[   15.094923] 
[   15.102202] Allocated by task 284:
[   15.102400]  kasan_save_stack+0x45/0x70
[   15.102685]  kasan_save_track+0x18/0x40
[   15.102967]  kasan_save_alloc_info+0x3b/0x50
[   15.103180]  __kasan_kmalloc+0xb7/0xc0
[   15.103361]  __kmalloc_cache_noprof+0x189/0x420
[   15.103560]  kasan_atomics+0x95/0x310
[   15.103703]  kunit_try_run_case+0x1a5/0x480
[   15.103914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.104293]  kthread+0x337/0x6f0
[   15.104440]  ret_from_fork+0x116/0x1d0
[   15.104619]  ret_from_fork_asm+0x1a/0x30
[   15.104839] 
[   15.104932] The buggy address belongs to the object at ffff888103128480
[   15.104932]  which belongs to the cache kmalloc-64 of size 64
[   15.105289] The buggy address is located 0 bytes to the right of
[   15.105289]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.105703] 
[   15.105806] The buggy address belongs to the physical page:
[   15.106061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.106424] flags: 0x200000000000000(node=0|zone=2)
[   15.106611] page_type: f5(slab)
[   15.106735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.106965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.107404] page dumped because: kasan: bad access detected
[   15.107661] 
[   15.107767] Memory state around the buggy address:
[   15.107997]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.108316]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.108641] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.108976]                                      ^
[   15.109170]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.109435]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.109682] ==================================================================
[   14.542458] ==================================================================
[   14.542789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.543046] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.543388] 
[   14.543503] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.543548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.543562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.543585] Call Trace:
[   14.543603]  <TASK>
[   14.543623]  dump_stack_lvl+0x73/0xb0
[   14.543652]  print_report+0xd1/0x650
[   14.543681]  ? __virt_addr_valid+0x1db/0x2d0
[   14.543706]  ? kasan_atomics_helper+0x1217/0x5450
[   14.543728]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.543759]  ? kasan_atomics_helper+0x1217/0x5450
[   14.543782]  kasan_report+0x141/0x180
[   14.543804]  ? kasan_atomics_helper+0x1217/0x5450
[   14.543830]  kasan_check_range+0x10c/0x1c0
[   14.543855]  __kasan_check_write+0x18/0x20
[   14.543876]  kasan_atomics_helper+0x1217/0x5450
[   14.543898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.543921]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.543949]  ? kasan_atomics+0x152/0x310
[   14.543976]  kasan_atomics+0x1dc/0x310
[   14.543999]  ? __pfx_kasan_atomics+0x10/0x10
[   14.544023]  ? __pfx_read_tsc+0x10/0x10
[   14.544045]  ? ktime_get_ts64+0x86/0x230
[   14.544069]  kunit_try_run_case+0x1a5/0x480
[   14.544095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.544117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.544141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.544165]  ? __kthread_parkme+0x82/0x180
[   14.544188]  ? preempt_count_sub+0x50/0x80
[   14.544212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.544237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.544260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.544283]  kthread+0x337/0x6f0
[   14.544303]  ? trace_preempt_on+0x20/0xc0
[   14.544327]  ? __pfx_kthread+0x10/0x10
[   14.544360]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.544382]  ? calculate_sigpending+0x7b/0xa0
[   14.544406]  ? __pfx_kthread+0x10/0x10
[   14.544428]  ret_from_fork+0x116/0x1d0
[   14.544447]  ? __pfx_kthread+0x10/0x10
[   14.544468]  ret_from_fork_asm+0x1a/0x30
[   14.544499]  </TASK>
[   14.544512] 
[   14.551823] Allocated by task 284:
[   14.551959]  kasan_save_stack+0x45/0x70
[   14.552127]  kasan_save_track+0x18/0x40
[   14.552329]  kasan_save_alloc_info+0x3b/0x50
[   14.552555]  __kasan_kmalloc+0xb7/0xc0
[   14.552758]  __kmalloc_cache_noprof+0x189/0x420
[   14.552956]  kasan_atomics+0x95/0x310
[   14.553143]  kunit_try_run_case+0x1a5/0x480
[   14.553317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.553545]  kthread+0x337/0x6f0
[   14.553715]  ret_from_fork+0x116/0x1d0
[   14.553892]  ret_from_fork_asm+0x1a/0x30
[   14.554034] 
[   14.554130] The buggy address belongs to the object at ffff888103128480
[   14.554130]  which belongs to the cache kmalloc-64 of size 64
[   14.554639] The buggy address is located 0 bytes to the right of
[   14.554639]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.555230] 
[   14.555305] The buggy address belongs to the physical page:
[   14.555493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.555738] flags: 0x200000000000000(node=0|zone=2)
[   14.555969] page_type: f5(slab)
[   14.556136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.556619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.556952] page dumped because: kasan: bad access detected
[   14.557176] 
[   14.557246] Memory state around the buggy address:
[   14.557411]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.557628]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.557954] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.558272]                                      ^
[   14.558511]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.558829]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.559246] ==================================================================
[   14.825369] ==================================================================
[   14.825868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.826195] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.826526] 
[   14.826639] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.826694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.826706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.826749] Call Trace:
[   14.826766]  <TASK>
[   14.826781]  dump_stack_lvl+0x73/0xb0
[   14.826808]  print_report+0xd1/0x650
[   14.826832]  ? __virt_addr_valid+0x1db/0x2d0
[   14.826864]  ? kasan_atomics_helper+0x1818/0x5450
[   14.826886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.826909]  ? kasan_atomics_helper+0x1818/0x5450
[   14.826942]  kasan_report+0x141/0x180
[   14.826964]  ? kasan_atomics_helper+0x1818/0x5450
[   14.826990]  kasan_check_range+0x10c/0x1c0
[   14.827014]  __kasan_check_write+0x18/0x20
[   14.827033]  kasan_atomics_helper+0x1818/0x5450
[   14.827065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.827088]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.827113]  ? kasan_atomics+0x152/0x310
[   14.827150]  kasan_atomics+0x1dc/0x310
[   14.827174]  ? __pfx_kasan_atomics+0x10/0x10
[   14.827197]  ? __pfx_read_tsc+0x10/0x10
[   14.827218]  ? ktime_get_ts64+0x86/0x230
[   14.827243]  kunit_try_run_case+0x1a5/0x480
[   14.827267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.827290]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.827314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.827337]  ? __kthread_parkme+0x82/0x180
[   14.827377]  ? preempt_count_sub+0x50/0x80
[   14.827400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.827424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.827458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.827481]  kthread+0x337/0x6f0
[   14.827502]  ? trace_preempt_on+0x20/0xc0
[   14.827526]  ? __pfx_kthread+0x10/0x10
[   14.827548]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.827570]  ? calculate_sigpending+0x7b/0xa0
[   14.827594]  ? __pfx_kthread+0x10/0x10
[   14.827615]  ret_from_fork+0x116/0x1d0
[   14.827634]  ? __pfx_kthread+0x10/0x10
[   14.827660]  ret_from_fork_asm+0x1a/0x30
[   14.827691]  </TASK>
[   14.827703] 
[   14.835495] Allocated by task 284:
[   14.835677]  kasan_save_stack+0x45/0x70
[   14.835946]  kasan_save_track+0x18/0x40
[   14.836107]  kasan_save_alloc_info+0x3b/0x50
[   14.836359]  __kasan_kmalloc+0xb7/0xc0
[   14.836574]  __kmalloc_cache_noprof+0x189/0x420
[   14.836754]  kasan_atomics+0x95/0x310
[   14.836967]  kunit_try_run_case+0x1a5/0x480
[   14.837127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.837301]  kthread+0x337/0x6f0
[   14.837437]  ret_from_fork+0x116/0x1d0
[   14.837574]  ret_from_fork_asm+0x1a/0x30
[   14.837716] 
[   14.837822] The buggy address belongs to the object at ffff888103128480
[   14.837822]  which belongs to the cache kmalloc-64 of size 64
[   14.838367] The buggy address is located 0 bytes to the right of
[   14.838367]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.839145] 
[   14.839255] The buggy address belongs to the physical page:
[   14.839454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.839704] flags: 0x200000000000000(node=0|zone=2)
[   14.839869] page_type: f5(slab)
[   14.840030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.840405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.840781] page dumped because: kasan: bad access detected
[   14.841285] 
[   14.841398] Memory state around the buggy address:
[   14.841639]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.842119]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.842338] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.842623]                                      ^
[   14.842854]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.843159]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.843382] ==================================================================
[   14.713210] ==================================================================
[   14.713595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.713946] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.714171] 
[   14.714257] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.714464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.714479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.714501] Call Trace:
[   14.714517]  <TASK>
[   14.714548]  dump_stack_lvl+0x73/0xb0
[   14.714590]  print_report+0xd1/0x650
[   14.714629]  ? __virt_addr_valid+0x1db/0x2d0
[   14.714677]  ? kasan_atomics_helper+0x151d/0x5450
[   14.714699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.714722]  ? kasan_atomics_helper+0x151d/0x5450
[   14.714753]  kasan_report+0x141/0x180
[   14.714777]  ? kasan_atomics_helper+0x151d/0x5450
[   14.714803]  kasan_check_range+0x10c/0x1c0
[   14.714828]  __kasan_check_write+0x18/0x20
[   14.714848]  kasan_atomics_helper+0x151d/0x5450
[   14.714871]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.714894]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.714919]  ? kasan_atomics+0x152/0x310
[   14.714946]  kasan_atomics+0x1dc/0x310
[   14.714969]  ? __pfx_kasan_atomics+0x10/0x10
[   14.714994]  ? __pfx_read_tsc+0x10/0x10
[   14.715015]  ? ktime_get_ts64+0x86/0x230
[   14.715040]  kunit_try_run_case+0x1a5/0x480
[   14.715065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.715088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.715112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.715136]  ? __kthread_parkme+0x82/0x180
[   14.715157]  ? preempt_count_sub+0x50/0x80
[   14.715182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.715207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.715230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.715254]  kthread+0x337/0x6f0
[   14.715274]  ? trace_preempt_on+0x20/0xc0
[   14.715318]  ? __pfx_kthread+0x10/0x10
[   14.715339]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.715372]  ? calculate_sigpending+0x7b/0xa0
[   14.715396]  ? __pfx_kthread+0x10/0x10
[   14.715419]  ret_from_fork+0x116/0x1d0
[   14.715437]  ? __pfx_kthread+0x10/0x10
[   14.715458]  ret_from_fork_asm+0x1a/0x30
[   14.715506]  </TASK>
[   14.715518] 
[   14.723902] Allocated by task 284:
[   14.724100]  kasan_save_stack+0x45/0x70
[   14.724273]  kasan_save_track+0x18/0x40
[   14.724502]  kasan_save_alloc_info+0x3b/0x50
[   14.724722]  __kasan_kmalloc+0xb7/0xc0
[   14.724929]  __kmalloc_cache_noprof+0x189/0x420
[   14.725177]  kasan_atomics+0x95/0x310
[   14.725373]  kunit_try_run_case+0x1a5/0x480
[   14.725578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.725825]  kthread+0x337/0x6f0
[   14.726033]  ret_from_fork+0x116/0x1d0
[   14.726164]  ret_from_fork_asm+0x1a/0x30
[   14.726540] 
[   14.726651] The buggy address belongs to the object at ffff888103128480
[   14.726651]  which belongs to the cache kmalloc-64 of size 64
[   14.727266] The buggy address is located 0 bytes to the right of
[   14.727266]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.728398] 
[   14.728579] The buggy address belongs to the physical page:
[   14.728769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.729014] flags: 0x200000000000000(node=0|zone=2)
[   14.729175] page_type: f5(slab)
[   14.729292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.730463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.730935] page dumped because: kasan: bad access detected
[   14.731118] 
[   14.731190] Memory state around the buggy address:
[   14.731367]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.731979]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.732626] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.733254]                                      ^
[   14.733701]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.734240]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.734694] ==================================================================
[   14.412481] ==================================================================
[   14.412963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.413202] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.413473] 
[   14.413586] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.413629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.413643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.413665] Call Trace:
[   14.413693]  <TASK>
[   14.413713]  dump_stack_lvl+0x73/0xb0
[   14.413741]  print_report+0xd1/0x650
[   14.413777]  ? __virt_addr_valid+0x1db/0x2d0
[   14.413803]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.413825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.413848]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.413870]  kasan_report+0x141/0x180
[   14.413892]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.413919]  kasan_check_range+0x10c/0x1c0
[   14.413943]  __kasan_check_write+0x18/0x20
[   14.413963]  kasan_atomics_helper+0xfa9/0x5450
[   14.413986]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.414009]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.414035]  ? kasan_atomics+0x152/0x310
[   14.414063]  kasan_atomics+0x1dc/0x310
[   14.414085]  ? __pfx_kasan_atomics+0x10/0x10
[   14.414110]  ? __pfx_read_tsc+0x10/0x10
[   14.414131]  ? ktime_get_ts64+0x86/0x230
[   14.414157]  kunit_try_run_case+0x1a5/0x480
[   14.414182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.414205]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.414229]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.414253]  ? __kthread_parkme+0x82/0x180
[   14.414275]  ? preempt_count_sub+0x50/0x80
[   14.414300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.414338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.414371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.414395]  kthread+0x337/0x6f0
[   14.414415]  ? trace_preempt_on+0x20/0xc0
[   14.414450]  ? __pfx_kthread+0x10/0x10
[   14.414471]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.414493]  ? calculate_sigpending+0x7b/0xa0
[   14.414529]  ? __pfx_kthread+0x10/0x10
[   14.414551]  ret_from_fork+0x116/0x1d0
[   14.414571]  ? __pfx_kthread+0x10/0x10
[   14.414592]  ret_from_fork_asm+0x1a/0x30
[   14.414632]  </TASK>
[   14.414645] 
[   14.422663] Allocated by task 284:
[   14.422897]  kasan_save_stack+0x45/0x70
[   14.423107]  kasan_save_track+0x18/0x40
[   14.423301]  kasan_save_alloc_info+0x3b/0x50
[   14.423505]  __kasan_kmalloc+0xb7/0xc0
[   14.423640]  __kmalloc_cache_noprof+0x189/0x420
[   14.423917]  kasan_atomics+0x95/0x310
[   14.424231]  kunit_try_run_case+0x1a5/0x480
[   14.424452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.424687]  kthread+0x337/0x6f0
[   14.424844]  ret_from_fork+0x116/0x1d0
[   14.425023]  ret_from_fork_asm+0x1a/0x30
[   14.425167] 
[   14.425240] The buggy address belongs to the object at ffff888103128480
[   14.425240]  which belongs to the cache kmalloc-64 of size 64
[   14.425601] The buggy address is located 0 bytes to the right of
[   14.425601]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.425964] 
[   14.426039] The buggy address belongs to the physical page:
[   14.426249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.426845] flags: 0x200000000000000(node=0|zone=2)
[   14.427100] page_type: f5(slab)
[   14.427271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.427620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.427960] page dumped because: kasan: bad access detected
[   14.428215] 
[   14.428391] Memory state around the buggy address:
[   14.428558]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.428844]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.429163] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.429485]                                      ^
[   14.429690]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.430104]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.430440] ==================================================================
[   13.948508] ==================================================================
[   13.948952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.949218] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   13.949626] 
[   13.949749] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.949793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.949817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.949838] Call Trace:
[   13.949854]  <TASK>
[   13.949870]  dump_stack_lvl+0x73/0xb0
[   13.949898]  print_report+0xd1/0x650
[   13.949930]  ? __virt_addr_valid+0x1db/0x2d0
[   13.949954]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.949986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.950009]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.950031]  kasan_report+0x141/0x180
[   13.950054]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.950090]  __asan_report_store4_noabort+0x1b/0x30
[   13.950111]  kasan_atomics_helper+0x4b6e/0x5450
[   13.950133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.950167]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.950192]  ? kasan_atomics+0x152/0x310
[   13.950220]  kasan_atomics+0x1dc/0x310
[   13.950243]  ? __pfx_kasan_atomics+0x10/0x10
[   13.950267]  ? __pfx_read_tsc+0x10/0x10
[   13.950289]  ? ktime_get_ts64+0x86/0x230
[   13.950321]  kunit_try_run_case+0x1a5/0x480
[   13.950345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.950383]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.950407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.950431]  ? __kthread_parkme+0x82/0x180
[   13.950452]  ? preempt_count_sub+0x50/0x80
[   13.950477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.950500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.950524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.950547]  kthread+0x337/0x6f0
[   13.950607]  ? trace_preempt_on+0x20/0xc0
[   13.950634]  ? __pfx_kthread+0x10/0x10
[   13.950655]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.950677]  ? calculate_sigpending+0x7b/0xa0
[   13.950701]  ? __pfx_kthread+0x10/0x10
[   13.950723]  ret_from_fork+0x116/0x1d0
[   13.950742]  ? __pfx_kthread+0x10/0x10
[   13.950764]  ret_from_fork_asm+0x1a/0x30
[   13.950795]  </TASK>
[   13.950817] 
[   13.959041] Allocated by task 284:
[   13.959271]  kasan_save_stack+0x45/0x70
[   13.959511]  kasan_save_track+0x18/0x40
[   13.959878]  kasan_save_alloc_info+0x3b/0x50
[   13.960107]  __kasan_kmalloc+0xb7/0xc0
[   13.960247]  __kmalloc_cache_noprof+0x189/0x420
[   13.960475]  kasan_atomics+0x95/0x310
[   13.960685]  kunit_try_run_case+0x1a5/0x480
[   13.961106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.961422]  kthread+0x337/0x6f0
[   13.961703]  ret_from_fork+0x116/0x1d0
[   13.961896]  ret_from_fork_asm+0x1a/0x30
[   13.962086] 
[   13.962159] The buggy address belongs to the object at ffff888103128480
[   13.962159]  which belongs to the cache kmalloc-64 of size 64
[   13.962663] The buggy address is located 0 bytes to the right of
[   13.962663]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   13.963158] 
[   13.963236] The buggy address belongs to the physical page:
[   13.963423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   13.964128] flags: 0x200000000000000(node=0|zone=2)
[   13.964508] page_type: f5(slab)
[   13.965027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.965432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.966375] page dumped because: kasan: bad access detected
[   13.966753] 
[   13.966935] Memory state around the buggy address:
[   13.967305]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.967683]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.968055] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.968434]                                      ^
[   13.968904]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.969218]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.969814] ==================================================================
[   14.517563] ==================================================================
[   14.517863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.518305] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.518914] 
[   14.519220] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.519269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.519283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.519306] Call Trace:
[   14.519328]  <TASK>
[   14.519360]  dump_stack_lvl+0x73/0xb0
[   14.519390]  print_report+0xd1/0x650
[   14.519415]  ? __virt_addr_valid+0x1db/0x2d0
[   14.519439]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.519461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.519495]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.519517]  kasan_report+0x141/0x180
[   14.519540]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.519566]  __asan_report_load4_noabort+0x18/0x20
[   14.519591]  kasan_atomics_helper+0x4a02/0x5450
[   14.519614]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.519637]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.519668]  ? kasan_atomics+0x152/0x310
[   14.519695]  kasan_atomics+0x1dc/0x310
[   14.519718]  ? __pfx_kasan_atomics+0x10/0x10
[   14.519749]  ? __pfx_read_tsc+0x10/0x10
[   14.519796]  ? ktime_get_ts64+0x86/0x230
[   14.519821]  kunit_try_run_case+0x1a5/0x480
[   14.519849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.519872]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.519897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.519919]  ? __kthread_parkme+0x82/0x180
[   14.519942]  ? preempt_count_sub+0x50/0x80
[   14.519967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.519993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.520016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.520040]  kthread+0x337/0x6f0
[   14.520060]  ? trace_preempt_on+0x20/0xc0
[   14.520085]  ? __pfx_kthread+0x10/0x10
[   14.520107]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.520128]  ? calculate_sigpending+0x7b/0xa0
[   14.520153]  ? __pfx_kthread+0x10/0x10
[   14.520175]  ret_from_fork+0x116/0x1d0
[   14.520193]  ? __pfx_kthread+0x10/0x10
[   14.520214]  ret_from_fork_asm+0x1a/0x30
[   14.520247]  </TASK>
[   14.520261] 
[   14.534098] Allocated by task 284:
[   14.534329]  kasan_save_stack+0x45/0x70
[   14.534491]  kasan_save_track+0x18/0x40
[   14.534624]  kasan_save_alloc_info+0x3b/0x50
[   14.534786]  __kasan_kmalloc+0xb7/0xc0
[   14.534929]  __kmalloc_cache_noprof+0x189/0x420
[   14.535151]  kasan_atomics+0x95/0x310
[   14.535357]  kunit_try_run_case+0x1a5/0x480
[   14.535553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.535747]  kthread+0x337/0x6f0
[   14.535885]  ret_from_fork+0x116/0x1d0
[   14.536097]  ret_from_fork_asm+0x1a/0x30
[   14.536391] 
[   14.536501] The buggy address belongs to the object at ffff888103128480
[   14.536501]  which belongs to the cache kmalloc-64 of size 64
[   14.537049] The buggy address is located 0 bytes to the right of
[   14.537049]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.537527] 
[   14.537603] The buggy address belongs to the physical page:
[   14.537888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.538245] flags: 0x200000000000000(node=0|zone=2)
[   14.538466] page_type: f5(slab)
[   14.538588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.538973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.539328] page dumped because: kasan: bad access detected
[   14.539586] 
[   14.539669] Memory state around the buggy address:
[   14.539905]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540146]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540413] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.540746]                                      ^
[   14.541036]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.541276]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.541620] ==================================================================
[   14.950062] ==================================================================
[   14.950531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.950907] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.951239] 
[   14.951363] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.951408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.951422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.951443] Call Trace:
[   14.951458]  <TASK>
[   14.951472]  dump_stack_lvl+0x73/0xb0
[   14.951498]  print_report+0xd1/0x650
[   14.951522]  ? __virt_addr_valid+0x1db/0x2d0
[   14.951544]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.951566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.951589]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.951611]  kasan_report+0x141/0x180
[   14.951635]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.951664]  kasan_check_range+0x10c/0x1c0
[   14.951699]  __kasan_check_write+0x18/0x20
[   14.951719]  kasan_atomics_helper+0x1c18/0x5450
[   14.951741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.951785]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.951811]  ? kasan_atomics+0x152/0x310
[   14.951838]  kasan_atomics+0x1dc/0x310
[   14.951861]  ? __pfx_kasan_atomics+0x10/0x10
[   14.951886]  ? __pfx_read_tsc+0x10/0x10
[   14.951908]  ? ktime_get_ts64+0x86/0x230
[   14.951932]  kunit_try_run_case+0x1a5/0x480
[   14.951955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.951978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.952001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.952024]  ? __kthread_parkme+0x82/0x180
[   14.952046]  ? preempt_count_sub+0x50/0x80
[   14.952070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.952093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.952117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.952140]  kthread+0x337/0x6f0
[   14.952160]  ? trace_preempt_on+0x20/0xc0
[   14.952184]  ? __pfx_kthread+0x10/0x10
[   14.952205]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.952226]  ? calculate_sigpending+0x7b/0xa0
[   14.952251]  ? __pfx_kthread+0x10/0x10
[   14.952273]  ret_from_fork+0x116/0x1d0
[   14.952293]  ? __pfx_kthread+0x10/0x10
[   14.952313]  ret_from_fork_asm+0x1a/0x30
[   14.952353]  </TASK>
[   14.952365] 
[   14.959893] Allocated by task 284:
[   14.960230]  kasan_save_stack+0x45/0x70
[   14.960459]  kasan_save_track+0x18/0x40
[   14.960654]  kasan_save_alloc_info+0x3b/0x50
[   14.961032]  __kasan_kmalloc+0xb7/0xc0
[   14.961221]  __kmalloc_cache_noprof+0x189/0x420
[   14.961454]  kasan_atomics+0x95/0x310
[   14.961645]  kunit_try_run_case+0x1a5/0x480
[   14.962008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.962205]  kthread+0x337/0x6f0
[   14.962329]  ret_from_fork+0x116/0x1d0
[   14.962479]  ret_from_fork_asm+0x1a/0x30
[   14.962620] 
[   14.962692] The buggy address belongs to the object at ffff888103128480
[   14.962692]  which belongs to the cache kmalloc-64 of size 64
[   14.963893] The buggy address is located 0 bytes to the right of
[   14.963893]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.964465] 
[   14.964580] The buggy address belongs to the physical page:
[   14.964768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.965149] flags: 0x200000000000000(node=0|zone=2)
[   14.965401] page_type: f5(slab)
[   14.965589] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.965946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.966264] page dumped because: kasan: bad access detected
[   14.966522] 
[   14.966614] Memory state around the buggy address:
[   14.966865]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.967167]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.967503] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.967824]                                      ^
[   14.968083]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.968415]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.968727] ==================================================================
[   15.028969] ==================================================================
[   15.029317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.029655] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.030061] 
[   15.030170] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.030217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.030242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.030264] Call Trace:
[   15.030285]  <TASK>
[   15.030304]  dump_stack_lvl+0x73/0xb0
[   15.030340]  print_report+0xd1/0x650
[   15.030383]  ? __virt_addr_valid+0x1db/0x2d0
[   15.030407]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.030429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.030453]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.030475]  kasan_report+0x141/0x180
[   15.030508]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.030535]  kasan_check_range+0x10c/0x1c0
[   15.030559]  __kasan_check_write+0x18/0x20
[   15.030592]  kasan_atomics_helper+0x1e12/0x5450
[   15.030616]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.030639]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.030676]  ? kasan_atomics+0x152/0x310
[   15.030704]  kasan_atomics+0x1dc/0x310
[   15.030727]  ? __pfx_kasan_atomics+0x10/0x10
[   15.030764]  ? __pfx_read_tsc+0x10/0x10
[   15.030786]  ? ktime_get_ts64+0x86/0x230
[   15.030811]  kunit_try_run_case+0x1a5/0x480
[   15.030837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.030859]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.030895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.030919]  ? __kthread_parkme+0x82/0x180
[   15.030941]  ? preempt_count_sub+0x50/0x80
[   15.030978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.031002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.031025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.031059]  kthread+0x337/0x6f0
[   15.031079]  ? trace_preempt_on+0x20/0xc0
[   15.031103]  ? __pfx_kthread+0x10/0x10
[   15.031136]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.031158]  ? calculate_sigpending+0x7b/0xa0
[   15.031183]  ? __pfx_kthread+0x10/0x10
[   15.031216]  ret_from_fork+0x116/0x1d0
[   15.031234]  ? __pfx_kthread+0x10/0x10
[   15.031256]  ret_from_fork_asm+0x1a/0x30
[   15.031298]  </TASK>
[   15.031312] 
[   15.039315] Allocated by task 284:
[   15.039467]  kasan_save_stack+0x45/0x70
[   15.039704]  kasan_save_track+0x18/0x40
[   15.039897]  kasan_save_alloc_info+0x3b/0x50
[   15.040105]  __kasan_kmalloc+0xb7/0xc0
[   15.040402]  __kmalloc_cache_noprof+0x189/0x420
[   15.040625]  kasan_atomics+0x95/0x310
[   15.040830]  kunit_try_run_case+0x1a5/0x480
[   15.041036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.041290]  kthread+0x337/0x6f0
[   15.041457]  ret_from_fork+0x116/0x1d0
[   15.041637]  ret_from_fork_asm+0x1a/0x30
[   15.041924] 
[   15.042024] The buggy address belongs to the object at ffff888103128480
[   15.042024]  which belongs to the cache kmalloc-64 of size 64
[   15.042404] The buggy address is located 0 bytes to the right of
[   15.042404]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.042815] 
[   15.042953] The buggy address belongs to the physical page:
[   15.043229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.043598] flags: 0x200000000000000(node=0|zone=2)
[   15.043933] page_type: f5(slab)
[   15.044060] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.044293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.044559] page dumped because: kasan: bad access detected
[   15.044900] 
[   15.044996] Memory state around the buggy address:
[   15.045245]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.045601]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.045952] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.046169]                                      ^
[   15.046330]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.046675]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.046993] ==================================================================
[   15.047585] ==================================================================
[   15.048131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.048487] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.048830] 
[   15.048952] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.049011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.049024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.049047] Call Trace:
[   15.049066]  <TASK>
[   15.049096]  dump_stack_lvl+0x73/0xb0
[   15.049125]  print_report+0xd1/0x650
[   15.049152]  ? __virt_addr_valid+0x1db/0x2d0
[   15.049177]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.049199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.049222]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.049243]  kasan_report+0x141/0x180
[   15.049266]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.049294]  kasan_check_range+0x10c/0x1c0
[   15.049318]  __kasan_check_write+0x18/0x20
[   15.049338]  kasan_atomics_helper+0x1eaa/0x5450
[   15.049381]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.049403]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.049431]  ? kasan_atomics+0x152/0x310
[   15.049469]  kasan_atomics+0x1dc/0x310
[   15.049493]  ? __pfx_kasan_atomics+0x10/0x10
[   15.049517]  ? __pfx_read_tsc+0x10/0x10
[   15.049540]  ? ktime_get_ts64+0x86/0x230
[   15.049566]  kunit_try_run_case+0x1a5/0x480
[   15.049591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049614]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.049639]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.049662]  ? __kthread_parkme+0x82/0x180
[   15.049684]  ? preempt_count_sub+0x50/0x80
[   15.049709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.049769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.049792]  kthread+0x337/0x6f0
[   15.049812]  ? trace_preempt_on+0x20/0xc0
[   15.049837]  ? __pfx_kthread+0x10/0x10
[   15.049867]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.049889]  ? calculate_sigpending+0x7b/0xa0
[   15.049914]  ? __pfx_kthread+0x10/0x10
[   15.049942]  ret_from_fork+0x116/0x1d0
[   15.049960]  ? __pfx_kthread+0x10/0x10
[   15.049982]  ret_from_fork_asm+0x1a/0x30
[   15.050013]  </TASK>
[   15.050025] 
[   15.058080] Allocated by task 284:
[   15.058272]  kasan_save_stack+0x45/0x70
[   15.058503]  kasan_save_track+0x18/0x40
[   15.058688]  kasan_save_alloc_info+0x3b/0x50
[   15.058907]  __kasan_kmalloc+0xb7/0xc0
[   15.059105]  __kmalloc_cache_noprof+0x189/0x420
[   15.059329]  kasan_atomics+0x95/0x310
[   15.059494]  kunit_try_run_case+0x1a5/0x480
[   15.059644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.059946]  kthread+0x337/0x6f0
[   15.060152]  ret_from_fork+0x116/0x1d0
[   15.060354]  ret_from_fork_asm+0x1a/0x30
[   15.060532] 
[   15.060603] The buggy address belongs to the object at ffff888103128480
[   15.060603]  which belongs to the cache kmalloc-64 of size 64
[   15.060956] The buggy address is located 0 bytes to the right of
[   15.060956]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.061433] 
[   15.061531] The buggy address belongs to the physical page:
[   15.061784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.062305] flags: 0x200000000000000(node=0|zone=2)
[   15.063318] page_type: f5(slab)
[   15.063814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.064223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.064581] page dumped because: kasan: bad access detected
[   15.065432] 
[   15.065530] Memory state around the buggy address:
[   15.065695]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.066182]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.066575] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.067136]                                      ^
[   15.067458]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.067869]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.068243] ==================================================================
[   14.077874] ==================================================================
[   14.078285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.078656] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.078996] 
[   14.079112] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.079167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.079181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.079214] Call Trace:
[   14.079232]  <TASK>
[   14.079249]  dump_stack_lvl+0x73/0xb0
[   14.079278]  print_report+0xd1/0x650
[   14.079302]  ? __virt_addr_valid+0x1db/0x2d0
[   14.079326]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.079348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.079382]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.079404]  kasan_report+0x141/0x180
[   14.079427]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.079462]  kasan_check_range+0x10c/0x1c0
[   14.079487]  __kasan_check_write+0x18/0x20
[   14.079508]  kasan_atomics_helper+0x5fe/0x5450
[   14.079542]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.079565]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.079592]  ? kasan_atomics+0x152/0x310
[   14.079619]  kasan_atomics+0x1dc/0x310
[   14.079643]  ? __pfx_kasan_atomics+0x10/0x10
[   14.079672]  ? __pfx_read_tsc+0x10/0x10
[   14.079694]  ? ktime_get_ts64+0x86/0x230
[   14.079718]  kunit_try_run_case+0x1a5/0x480
[   14.079744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.079766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.079789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.079872]  ? __kthread_parkme+0x82/0x180
[   14.079896]  ? preempt_count_sub+0x50/0x80
[   14.079920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.079955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.079979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.080002]  kthread+0x337/0x6f0
[   14.080034]  ? trace_preempt_on+0x20/0xc0
[   14.080059]  ? __pfx_kthread+0x10/0x10
[   14.080080]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.080101]  ? calculate_sigpending+0x7b/0xa0
[   14.080126]  ? __pfx_kthread+0x10/0x10
[   14.080148]  ret_from_fork+0x116/0x1d0
[   14.080167]  ? __pfx_kthread+0x10/0x10
[   14.080188]  ret_from_fork_asm+0x1a/0x30
[   14.080219]  </TASK>
[   14.080231] 
[   14.088930] Allocated by task 284:
[   14.089069]  kasan_save_stack+0x45/0x70
[   14.089231]  kasan_save_track+0x18/0x40
[   14.089435]  kasan_save_alloc_info+0x3b/0x50
[   14.089653]  __kasan_kmalloc+0xb7/0xc0
[   14.090095]  __kmalloc_cache_noprof+0x189/0x420
[   14.090314]  kasan_atomics+0x95/0x310
[   14.090505]  kunit_try_run_case+0x1a5/0x480
[   14.090765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.091065]  kthread+0x337/0x6f0
[   14.091193]  ret_from_fork+0x116/0x1d0
[   14.091325]  ret_from_fork_asm+0x1a/0x30
[   14.091471] 
[   14.091579] The buggy address belongs to the object at ffff888103128480
[   14.091579]  which belongs to the cache kmalloc-64 of size 64
[   14.092130] The buggy address is located 0 bytes to the right of
[   14.092130]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.092547] 
[   14.092622] The buggy address belongs to the physical page:
[   14.093077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.093468] flags: 0x200000000000000(node=0|zone=2)
[   14.093734] page_type: f5(slab)
[   14.093998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.094321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.094723] page dumped because: kasan: bad access detected
[   14.094947] 
[   14.095095] Memory state around the buggy address:
[   14.095304]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.095626]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.096199] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.096519]                                      ^
[   14.096672]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.096879]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.097213] ==================================================================
[   15.238073] ==================================================================
[   15.238631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.238993] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.239303] 
[   15.239414] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.239458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.239471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.239493] Call Trace:
[   15.239509]  <TASK>
[   15.239526]  dump_stack_lvl+0x73/0xb0
[   15.239556]  print_report+0xd1/0x650
[   15.239579]  ? __virt_addr_valid+0x1db/0x2d0
[   15.239603]  ? kasan_atomics_helper+0x224c/0x5450
[   15.239625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.239647]  ? kasan_atomics_helper+0x224c/0x5450
[   15.239675]  kasan_report+0x141/0x180
[   15.239699]  ? kasan_atomics_helper+0x224c/0x5450
[   15.239728]  kasan_check_range+0x10c/0x1c0
[   15.239752]  __kasan_check_write+0x18/0x20
[   15.239773]  kasan_atomics_helper+0x224c/0x5450
[   15.239796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.239819]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.239844]  ? kasan_atomics+0x152/0x310
[   15.239871]  kasan_atomics+0x1dc/0x310
[   15.239895]  ? __pfx_kasan_atomics+0x10/0x10
[   15.239921]  ? __pfx_read_tsc+0x10/0x10
[   15.239942]  ? ktime_get_ts64+0x86/0x230
[   15.239967]  kunit_try_run_case+0x1a5/0x480
[   15.239992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.240015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.240040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.240063]  ? __kthread_parkme+0x82/0x180
[   15.240085]  ? preempt_count_sub+0x50/0x80
[   15.240110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.240135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.240160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.240184]  kthread+0x337/0x6f0
[   15.240205]  ? trace_preempt_on+0x20/0xc0
[   15.240229]  ? __pfx_kthread+0x10/0x10
[   15.240251]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.240272]  ? calculate_sigpending+0x7b/0xa0
[   15.240296]  ? __pfx_kthread+0x10/0x10
[   15.240319]  ret_from_fork+0x116/0x1d0
[   15.240337]  ? __pfx_kthread+0x10/0x10
[   15.240368]  ret_from_fork_asm+0x1a/0x30
[   15.240400]  </TASK>
[   15.240412] 
[   15.247660] Allocated by task 284:
[   15.247851]  kasan_save_stack+0x45/0x70
[   15.248053]  kasan_save_track+0x18/0x40
[   15.248223]  kasan_save_alloc_info+0x3b/0x50
[   15.248409]  __kasan_kmalloc+0xb7/0xc0
[   15.248551]  __kmalloc_cache_noprof+0x189/0x420
[   15.248799]  kasan_atomics+0x95/0x310
[   15.248989]  kunit_try_run_case+0x1a5/0x480
[   15.249136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.249333]  kthread+0x337/0x6f0
[   15.249519]  ret_from_fork+0x116/0x1d0
[   15.249708]  ret_from_fork_asm+0x1a/0x30
[   15.249921] 
[   15.250006] The buggy address belongs to the object at ffff888103128480
[   15.250006]  which belongs to the cache kmalloc-64 of size 64
[   15.250368] The buggy address is located 0 bytes to the right of
[   15.250368]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.251030] 
[   15.251222] The buggy address belongs to the physical page:
[   15.251461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.251706] flags: 0x200000000000000(node=0|zone=2)
[   15.251869] page_type: f5(slab)
[   15.251988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.252326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.252676] page dumped because: kasan: bad access detected
[   15.252924] 
[   15.253019] Memory state around the buggy address:
[   15.253249]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.253576]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.253926] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.254158]                                      ^
[   15.254320]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.254649]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.255068] ==================================================================
[   14.843905] ==================================================================
[   14.844431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.845075] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.845450] 
[   14.845583] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.845626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.845638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.845660] Call Trace:
[   14.845676]  <TASK>
[   14.845692]  dump_stack_lvl+0x73/0xb0
[   14.845719]  print_report+0xd1/0x650
[   14.845742]  ? __virt_addr_valid+0x1db/0x2d0
[   14.845766]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.845787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.845810]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.845832]  kasan_report+0x141/0x180
[   14.845854]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.845881]  kasan_check_range+0x10c/0x1c0
[   14.845905]  __kasan_check_write+0x18/0x20
[   14.845924]  kasan_atomics_helper+0x18b1/0x5450
[   14.845948]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.845970]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.845996]  ? kasan_atomics+0x152/0x310
[   14.846023]  kasan_atomics+0x1dc/0x310
[   14.846048]  ? __pfx_kasan_atomics+0x10/0x10
[   14.846086]  ? __pfx_read_tsc+0x10/0x10
[   14.846107]  ? ktime_get_ts64+0x86/0x230
[   14.846132]  kunit_try_run_case+0x1a5/0x480
[   14.846169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.846192]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.846217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.846240]  ? __kthread_parkme+0x82/0x180
[   14.846262]  ? preempt_count_sub+0x50/0x80
[   14.846288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.846312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.846337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.846368]  kthread+0x337/0x6f0
[   14.846388]  ? trace_preempt_on+0x20/0xc0
[   14.846413]  ? __pfx_kthread+0x10/0x10
[   14.846434]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.846455]  ? calculate_sigpending+0x7b/0xa0
[   14.846489]  ? __pfx_kthread+0x10/0x10
[   14.846511]  ret_from_fork+0x116/0x1d0
[   14.846530]  ? __pfx_kthread+0x10/0x10
[   14.846562]  ret_from_fork_asm+0x1a/0x30
[   14.846594]  </TASK>
[   14.846605] 
[   14.855777] Allocated by task 284:
[   14.855953]  kasan_save_stack+0x45/0x70
[   14.856131]  kasan_save_track+0x18/0x40
[   14.856549]  kasan_save_alloc_info+0x3b/0x50
[   14.857095]  __kasan_kmalloc+0xb7/0xc0
[   14.857495]  __kmalloc_cache_noprof+0x189/0x420
[   14.857838]  kasan_atomics+0x95/0x310
[   14.858119]  kunit_try_run_case+0x1a5/0x480
[   14.858534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.858713]  kthread+0x337/0x6f0
[   14.858858]  ret_from_fork+0x116/0x1d0
[   14.859212]  ret_from_fork_asm+0x1a/0x30
[   14.859589] 
[   14.859751] The buggy address belongs to the object at ffff888103128480
[   14.859751]  which belongs to the cache kmalloc-64 of size 64
[   14.860572] The buggy address is located 0 bytes to the right of
[   14.860572]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.861420] 
[   14.861495] The buggy address belongs to the physical page:
[   14.861669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.862296] flags: 0x200000000000000(node=0|zone=2)
[   14.862763] page_type: f5(slab)
[   14.863080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.863749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.864413] page dumped because: kasan: bad access detected
[   14.864939] 
[   14.865096] Memory state around the buggy address:
[   14.865428]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.865648]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.866152] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.866793]                                      ^
[   14.867230]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.867873]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.868560] ==================================================================
[   15.192035] ==================================================================
[   15.192376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.193123] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.193514] 
[   15.193634] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.193804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.193820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.193843] Call Trace:
[   15.193865]  <TASK>
[   15.193885]  dump_stack_lvl+0x73/0xb0
[   15.193915]  print_report+0xd1/0x650
[   15.193940]  ? __virt_addr_valid+0x1db/0x2d0
[   15.193965]  ? kasan_atomics_helper+0x218a/0x5450
[   15.193987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.194010]  ? kasan_atomics_helper+0x218a/0x5450
[   15.194032]  kasan_report+0x141/0x180
[   15.194055]  ? kasan_atomics_helper+0x218a/0x5450
[   15.194083]  kasan_check_range+0x10c/0x1c0
[   15.194107]  __kasan_check_write+0x18/0x20
[   15.194128]  kasan_atomics_helper+0x218a/0x5450
[   15.194152]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.194175]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.194201]  ? kasan_atomics+0x152/0x310
[   15.194229]  kasan_atomics+0x1dc/0x310
[   15.194252]  ? __pfx_kasan_atomics+0x10/0x10
[   15.194277]  ? __pfx_read_tsc+0x10/0x10
[   15.194299]  ? ktime_get_ts64+0x86/0x230
[   15.194324]  kunit_try_run_case+0x1a5/0x480
[   15.194362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.194385]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.194410]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.194434]  ? __kthread_parkme+0x82/0x180
[   15.194456]  ? preempt_count_sub+0x50/0x80
[   15.194481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.194506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.194529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.194553]  kthread+0x337/0x6f0
[   15.194574]  ? trace_preempt_on+0x20/0xc0
[   15.194598]  ? __pfx_kthread+0x10/0x10
[   15.194620]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.194642]  ? calculate_sigpending+0x7b/0xa0
[   15.194666]  ? __pfx_kthread+0x10/0x10
[   15.194688]  ret_from_fork+0x116/0x1d0
[   15.194707]  ? __pfx_kthread+0x10/0x10
[   15.194728]  ret_from_fork_asm+0x1a/0x30
[   15.194761]  </TASK>
[   15.194774] 
[   15.204566] Allocated by task 284:
[   15.204713]  kasan_save_stack+0x45/0x70
[   15.205226]  kasan_save_track+0x18/0x40
[   15.205405]  kasan_save_alloc_info+0x3b/0x50
[   15.205765]  __kasan_kmalloc+0xb7/0xc0
[   15.205959]  __kmalloc_cache_noprof+0x189/0x420
[   15.206282]  kasan_atomics+0x95/0x310
[   15.206560]  kunit_try_run_case+0x1a5/0x480
[   15.206905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.207145]  kthread+0x337/0x6f0
[   15.207306]  ret_from_fork+0x116/0x1d0
[   15.207506]  ret_from_fork_asm+0x1a/0x30
[   15.207702] 
[   15.208054] The buggy address belongs to the object at ffff888103128480
[   15.208054]  which belongs to the cache kmalloc-64 of size 64
[   15.208584] The buggy address is located 0 bytes to the right of
[   15.208584]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.209389] 
[   15.209500] The buggy address belongs to the physical page:
[   15.209849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.210227] flags: 0x200000000000000(node=0|zone=2)
[   15.210534] page_type: f5(slab)
[   15.210706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.211152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.211540] page dumped because: kasan: bad access detected
[   15.211921] 
[   15.212091] Memory state around the buggy address:
[   15.212289]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.212602]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.213146] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.213529]                                      ^
[   15.213716]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214142]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214527] ==================================================================
[   13.907609] ==================================================================
[   13.907993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.908337] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   13.908646] 
[   13.908996] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.909065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.909076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.909096] Call Trace:
[   13.909108]  <TASK>
[   13.909123]  dump_stack_lvl+0x73/0xb0
[   13.909164]  print_report+0xd1/0x650
[   13.909187]  ? __virt_addr_valid+0x1db/0x2d0
[   13.909208]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.909229]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.909249]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.909269]  kasan_report+0x141/0x180
[   13.909291]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.909323]  __asan_report_store4_noabort+0x1b/0x30
[   13.909343]  kasan_atomics_helper+0x4ba2/0x5450
[   13.909379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.909402]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.909426]  ? kasan_atomics+0x152/0x310
[   13.909452]  kasan_atomics+0x1dc/0x310
[   13.909474]  ? __pfx_kasan_atomics+0x10/0x10
[   13.909497]  ? __pfx_read_tsc+0x10/0x10
[   13.909518]  ? ktime_get_ts64+0x86/0x230
[   13.909541]  kunit_try_run_case+0x1a5/0x480
[   13.909564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.909640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.909668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.909690]  ? __kthread_parkme+0x82/0x180
[   13.909722]  ? preempt_count_sub+0x50/0x80
[   13.909745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.909768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.909791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.909814]  kthread+0x337/0x6f0
[   13.909832]  ? trace_preempt_on+0x20/0xc0
[   13.909856]  ? __pfx_kthread+0x10/0x10
[   13.909876]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.909896]  ? calculate_sigpending+0x7b/0xa0
[   13.909919]  ? __pfx_kthread+0x10/0x10
[   13.909939]  ret_from_fork+0x116/0x1d0
[   13.909957]  ? __pfx_kthread+0x10/0x10
[   13.909976]  ret_from_fork_asm+0x1a/0x30
[   13.910006]  </TASK>
[   13.910017] 
[   13.918899] Allocated by task 284:
[   13.919039]  kasan_save_stack+0x45/0x70
[   13.919239]  kasan_save_track+0x18/0x40
[   13.919634]  kasan_save_alloc_info+0x3b/0x50
[   13.919871]  __kasan_kmalloc+0xb7/0xc0
[   13.920005]  __kmalloc_cache_noprof+0x189/0x420
[   13.920158]  kasan_atomics+0x95/0x310
[   13.920343]  kunit_try_run_case+0x1a5/0x480
[   13.920566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.920873]  kthread+0x337/0x6f0
[   13.921200]  ret_from_fork+0x116/0x1d0
[   13.921507]  ret_from_fork_asm+0x1a/0x30
[   13.921855] 
[   13.921933] The buggy address belongs to the object at ffff888103128480
[   13.921933]  which belongs to the cache kmalloc-64 of size 64
[   13.922360] The buggy address is located 0 bytes to the right of
[   13.922360]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   13.922873] 
[   13.922984] The buggy address belongs to the physical page:
[   13.923534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   13.923961] flags: 0x200000000000000(node=0|zone=2)
[   13.924181] page_type: f5(slab)
[   13.924303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.924550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.924993] page dumped because: kasan: bad access detected
[   13.925280] 
[   13.925394] Memory state around the buggy address:
[   13.925719]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.926019]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.926339] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.926759]                                      ^
[   13.926969]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.927283]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.927566] ==================================================================
[   15.146017] ==================================================================
[   15.146980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.147336] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.147836] 
[   15.147954] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.147998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.148011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.148034] Call Trace:
[   15.148054]  <TASK>
[   15.148073]  dump_stack_lvl+0x73/0xb0
[   15.148101]  print_report+0xd1/0x650
[   15.148127]  ? __virt_addr_valid+0x1db/0x2d0
[   15.148150]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.148172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.148194]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.148216]  kasan_report+0x141/0x180
[   15.148239]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.148266]  kasan_check_range+0x10c/0x1c0
[   15.148290]  __kasan_check_write+0x18/0x20
[   15.148310]  kasan_atomics_helper+0x20c8/0x5450
[   15.148333]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.148367]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.148393]  ? kasan_atomics+0x152/0x310
[   15.148420]  kasan_atomics+0x1dc/0x310
[   15.148444]  ? __pfx_kasan_atomics+0x10/0x10
[   15.148470]  ? __pfx_read_tsc+0x10/0x10
[   15.148492]  ? ktime_get_ts64+0x86/0x230
[   15.148517]  kunit_try_run_case+0x1a5/0x480
[   15.148541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.148564]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.148590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.148614]  ? __kthread_parkme+0x82/0x180
[   15.148636]  ? preempt_count_sub+0x50/0x80
[   15.148661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.148686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.148710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.148734]  kthread+0x337/0x6f0
[   15.148753]  ? trace_preempt_on+0x20/0xc0
[   15.148779]  ? __pfx_kthread+0x10/0x10
[   15.148800]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.148822]  ? calculate_sigpending+0x7b/0xa0
[   15.148847]  ? __pfx_kthread+0x10/0x10
[   15.148880]  ret_from_fork+0x116/0x1d0
[   15.148899]  ? __pfx_kthread+0x10/0x10
[   15.148921]  ret_from_fork_asm+0x1a/0x30
[   15.148952]  </TASK>
[   15.148964] 
[   15.158467] Allocated by task 284:
[   15.158755]  kasan_save_stack+0x45/0x70
[   15.158941]  kasan_save_track+0x18/0x40
[   15.159126]  kasan_save_alloc_info+0x3b/0x50
[   15.159324]  __kasan_kmalloc+0xb7/0xc0
[   15.159510]  __kmalloc_cache_noprof+0x189/0x420
[   15.159719]  kasan_atomics+0x95/0x310
[   15.160267]  kunit_try_run_case+0x1a5/0x480
[   15.160444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.160832]  kthread+0x337/0x6f0
[   15.161081]  ret_from_fork+0x116/0x1d0
[   15.161305]  ret_from_fork_asm+0x1a/0x30
[   15.161523] 
[   15.161747] The buggy address belongs to the object at ffff888103128480
[   15.161747]  which belongs to the cache kmalloc-64 of size 64
[   15.162323] The buggy address is located 0 bytes to the right of
[   15.162323]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.162855] 
[   15.163028] The buggy address belongs to the physical page:
[   15.163328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.163708] flags: 0x200000000000000(node=0|zone=2)
[   15.164156] page_type: f5(slab)
[   15.164304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.164713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.165025] page dumped because: kasan: bad access detected
[   15.165364] 
[   15.165465] Memory state around the buggy address:
[   15.165834]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.166274]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.166561] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.166978]                                      ^
[   15.167181]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167604]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167991] ==================================================================
[   14.618402] ==================================================================
[   14.618678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.619297] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.619677] 
[   14.619822] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.619893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.619906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.619928] Call Trace:
[   14.619947]  <TASK>
[   14.619965]  dump_stack_lvl+0x73/0xb0
[   14.619994]  print_report+0xd1/0x650
[   14.620017]  ? __virt_addr_valid+0x1db/0x2d0
[   14.620041]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.620062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.620117]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.620140]  kasan_report+0x141/0x180
[   14.620163]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.620189]  kasan_check_range+0x10c/0x1c0
[   14.620213]  __kasan_check_read+0x15/0x20
[   14.620233]  kasan_atomics_helper+0x13b5/0x5450
[   14.620256]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.620279]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.620306]  ? kasan_atomics+0x152/0x310
[   14.620369]  kasan_atomics+0x1dc/0x310
[   14.620392]  ? __pfx_kasan_atomics+0x10/0x10
[   14.620418]  ? __pfx_read_tsc+0x10/0x10
[   14.620439]  ? ktime_get_ts64+0x86/0x230
[   14.620465]  kunit_try_run_case+0x1a5/0x480
[   14.620488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.620512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.620536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.620559]  ? __kthread_parkme+0x82/0x180
[   14.620581]  ? preempt_count_sub+0x50/0x80
[   14.620605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.620629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.620653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.620676]  kthread+0x337/0x6f0
[   14.620696]  ? trace_preempt_on+0x20/0xc0
[   14.620720]  ? __pfx_kthread+0x10/0x10
[   14.620752]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.620775]  ? calculate_sigpending+0x7b/0xa0
[   14.620799]  ? __pfx_kthread+0x10/0x10
[   14.620821]  ret_from_fork+0x116/0x1d0
[   14.620840]  ? __pfx_kthread+0x10/0x10
[   14.620862]  ret_from_fork_asm+0x1a/0x30
[   14.620893]  </TASK>
[   14.620905] 
[   14.631275] Allocated by task 284:
[   14.631463]  kasan_save_stack+0x45/0x70
[   14.631652]  kasan_save_track+0x18/0x40
[   14.632254]  kasan_save_alloc_info+0x3b/0x50
[   14.632483]  __kasan_kmalloc+0xb7/0xc0
[   14.632941]  __kmalloc_cache_noprof+0x189/0x420
[   14.633151]  kasan_atomics+0x95/0x310
[   14.633323]  kunit_try_run_case+0x1a5/0x480
[   14.633477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.633810]  kthread+0x337/0x6f0
[   14.634090]  ret_from_fork+0x116/0x1d0
[   14.634242]  ret_from_fork_asm+0x1a/0x30
[   14.634488] 
[   14.634616] The buggy address belongs to the object at ffff888103128480
[   14.634616]  which belongs to the cache kmalloc-64 of size 64
[   14.635227] The buggy address is located 0 bytes to the right of
[   14.635227]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.635858] 
[   14.635948] The buggy address belongs to the physical page:
[   14.636236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.636526] flags: 0x200000000000000(node=0|zone=2)
[   14.636774] page_type: f5(slab)
[   14.637008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.637359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.637692] page dumped because: kasan: bad access detected
[   14.638034] 
[   14.638169] Memory state around the buggy address:
[   14.638335]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.638676]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.639115] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.639445]                                      ^
[   14.639690]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.639992]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.640339] ==================================================================
[   14.139174] ==================================================================
[   14.139693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.140152] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.140483] 
[   14.140673] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.140733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.140746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.140768] Call Trace:
[   14.140785]  <TASK>
[   14.140825]  dump_stack_lvl+0x73/0xb0
[   14.140855]  print_report+0xd1/0x650
[   14.140879]  ? __virt_addr_valid+0x1db/0x2d0
[   14.140914]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.140936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.140959]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.140982]  kasan_report+0x141/0x180
[   14.141004]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.141031]  kasan_check_range+0x10c/0x1c0
[   14.141087]  __kasan_check_write+0x18/0x20
[   14.141107]  kasan_atomics_helper+0x7c7/0x5450
[   14.141143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.141167]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.141194]  ? kasan_atomics+0x152/0x310
[   14.141221]  kasan_atomics+0x1dc/0x310
[   14.141245]  ? __pfx_kasan_atomics+0x10/0x10
[   14.141270]  ? __pfx_read_tsc+0x10/0x10
[   14.141291]  ? ktime_get_ts64+0x86/0x230
[   14.141316]  kunit_try_run_case+0x1a5/0x480
[   14.141341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.141374]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.141399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.141422]  ? __kthread_parkme+0x82/0x180
[   14.141444]  ? preempt_count_sub+0x50/0x80
[   14.141468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.141491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.141515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.141538]  kthread+0x337/0x6f0
[   14.141629]  ? trace_preempt_on+0x20/0xc0
[   14.141668]  ? __pfx_kthread+0x10/0x10
[   14.141689]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.141711]  ? calculate_sigpending+0x7b/0xa0
[   14.141735]  ? __pfx_kthread+0x10/0x10
[   14.141767]  ret_from_fork+0x116/0x1d0
[   14.141786]  ? __pfx_kthread+0x10/0x10
[   14.141807]  ret_from_fork_asm+0x1a/0x30
[   14.141839]  </TASK>
[   14.141851] 
[   14.151763] Allocated by task 284:
[   14.152167]  kasan_save_stack+0x45/0x70
[   14.152318]  kasan_save_track+0x18/0x40
[   14.152462]  kasan_save_alloc_info+0x3b/0x50
[   14.152714]  __kasan_kmalloc+0xb7/0xc0
[   14.153189]  __kmalloc_cache_noprof+0x189/0x420
[   14.153638]  kasan_atomics+0x95/0x310
[   14.154142]  kunit_try_run_case+0x1a5/0x480
[   14.154608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.155126]  kthread+0x337/0x6f0
[   14.155306]  ret_from_fork+0x116/0x1d0
[   14.155574]  ret_from_fork_asm+0x1a/0x30
[   14.156183] 
[   14.156346] The buggy address belongs to the object at ffff888103128480
[   14.156346]  which belongs to the cache kmalloc-64 of size 64
[   14.157252] The buggy address is located 0 bytes to the right of
[   14.157252]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.158133] 
[   14.158330] The buggy address belongs to the physical page:
[   14.158924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.159257] flags: 0x200000000000000(node=0|zone=2)
[   14.159437] page_type: f5(slab)
[   14.159561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.160277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.161172] page dumped because: kasan: bad access detected
[   14.161745] 
[   14.161983] Memory state around the buggy address:
[   14.162424]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.163163]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.163526] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.164285]                                      ^
[   14.164677]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.165030]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.165258] ==================================================================
[   15.168642] ==================================================================
[   15.168948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.169292] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.170241] 
[   15.170441] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.170491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.170504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.170527] Call Trace:
[   15.170545]  <TASK>
[   15.170629]  dump_stack_lvl+0x73/0xb0
[   15.170663]  print_report+0xd1/0x650
[   15.170689]  ? __virt_addr_valid+0x1db/0x2d0
[   15.170714]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.170748]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.170771]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.170793]  kasan_report+0x141/0x180
[   15.170816]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.170842]  __asan_report_load8_noabort+0x18/0x20
[   15.170867]  kasan_atomics_helper+0x4fb2/0x5450
[   15.170890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.170913]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.170939]  ? kasan_atomics+0x152/0x310
[   15.170966]  kasan_atomics+0x1dc/0x310
[   15.170988]  ? __pfx_kasan_atomics+0x10/0x10
[   15.171013]  ? __pfx_read_tsc+0x10/0x10
[   15.171035]  ? ktime_get_ts64+0x86/0x230
[   15.171059]  kunit_try_run_case+0x1a5/0x480
[   15.171084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.171108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.171132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.171156]  ? __kthread_parkme+0x82/0x180
[   15.171178]  ? preempt_count_sub+0x50/0x80
[   15.171202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.171226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.171249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.171273]  kthread+0x337/0x6f0
[   15.171293]  ? trace_preempt_on+0x20/0xc0
[   15.171317]  ? __pfx_kthread+0x10/0x10
[   15.171339]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.171373]  ? calculate_sigpending+0x7b/0xa0
[   15.171398]  ? __pfx_kthread+0x10/0x10
[   15.171421]  ret_from_fork+0x116/0x1d0
[   15.171440]  ? __pfx_kthread+0x10/0x10
[   15.171462]  ret_from_fork_asm+0x1a/0x30
[   15.171495]  </TASK>
[   15.171507] 
[   15.181186] Allocated by task 284:
[   15.181505]  kasan_save_stack+0x45/0x70
[   15.181713]  kasan_save_track+0x18/0x40
[   15.182051]  kasan_save_alloc_info+0x3b/0x50
[   15.182322]  __kasan_kmalloc+0xb7/0xc0
[   15.182488]  __kmalloc_cache_noprof+0x189/0x420
[   15.182930]  kasan_atomics+0x95/0x310
[   15.183116]  kunit_try_run_case+0x1a5/0x480
[   15.183428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.183676]  kthread+0x337/0x6f0
[   15.184043]  ret_from_fork+0x116/0x1d0
[   15.184217]  ret_from_fork_asm+0x1a/0x30
[   15.184521] 
[   15.184623] The buggy address belongs to the object at ffff888103128480
[   15.184623]  which belongs to the cache kmalloc-64 of size 64
[   15.185249] The buggy address is located 0 bytes to the right of
[   15.185249]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.185760] 
[   15.186128] The buggy address belongs to the physical page:
[   15.186399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.186823] flags: 0x200000000000000(node=0|zone=2)
[   15.187050] page_type: f5(slab)
[   15.187334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.187749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.188170] page dumped because: kasan: bad access detected
[   15.188489] 
[   15.188567] Memory state around the buggy address:
[   15.188851]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.189271]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.189652] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.190000]                                      ^
[   15.190328]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.190641]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.191055] ==================================================================
[   14.931849] ==================================================================
[   14.932269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.932714] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.933006] 
[   14.933093] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.933134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.933147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.933168] Call Trace:
[   14.933184]  <TASK>
[   14.933219]  dump_stack_lvl+0x73/0xb0
[   14.933246]  print_report+0xd1/0x650
[   14.933270]  ? __virt_addr_valid+0x1db/0x2d0
[   14.933294]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.933316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.933338]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.933372]  kasan_report+0x141/0x180
[   14.933405]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.933430]  kasan_check_range+0x10c/0x1c0
[   14.933466]  __kasan_check_write+0x18/0x20
[   14.933486]  kasan_atomics_helper+0x1b22/0x5450
[   14.933509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.933531]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.933557]  ? kasan_atomics+0x152/0x310
[   14.933593]  kasan_atomics+0x1dc/0x310
[   14.933617]  ? __pfx_kasan_atomics+0x10/0x10
[   14.933651]  ? __pfx_read_tsc+0x10/0x10
[   14.933672]  ? ktime_get_ts64+0x86/0x230
[   14.933696]  kunit_try_run_case+0x1a5/0x480
[   14.933730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.933754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.933778]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.933811]  ? __kthread_parkme+0x82/0x180
[   14.933832]  ? preempt_count_sub+0x50/0x80
[   14.933856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.933880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.933903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.933935]  kthread+0x337/0x6f0
[   14.933954]  ? trace_preempt_on+0x20/0xc0
[   14.933979]  ? __pfx_kthread+0x10/0x10
[   14.934011]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.934033]  ? calculate_sigpending+0x7b/0xa0
[   14.934058]  ? __pfx_kthread+0x10/0x10
[   14.934088]  ret_from_fork+0x116/0x1d0
[   14.934107]  ? __pfx_kthread+0x10/0x10
[   14.934128]  ret_from_fork_asm+0x1a/0x30
[   14.934169]  </TASK>
[   14.934183] 
[   14.941975] Allocated by task 284:
[   14.942166]  kasan_save_stack+0x45/0x70
[   14.942381]  kasan_save_track+0x18/0x40
[   14.942563]  kasan_save_alloc_info+0x3b/0x50
[   14.942784]  __kasan_kmalloc+0xb7/0xc0
[   14.942973]  __kmalloc_cache_noprof+0x189/0x420
[   14.943192]  kasan_atomics+0x95/0x310
[   14.943368]  kunit_try_run_case+0x1a5/0x480
[   14.943559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.943741]  kthread+0x337/0x6f0
[   14.943865]  ret_from_fork+0x116/0x1d0
[   14.943999]  ret_from_fork_asm+0x1a/0x30
[   14.944139] 
[   14.944211] The buggy address belongs to the object at ffff888103128480
[   14.944211]  which belongs to the cache kmalloc-64 of size 64
[   14.944652] The buggy address is located 0 bytes to the right of
[   14.944652]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.945274] 
[   14.945381] The buggy address belongs to the physical page:
[   14.945634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.946004] flags: 0x200000000000000(node=0|zone=2)
[   14.946240] page_type: f5(slab)
[   14.946420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.946681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.947225] page dumped because: kasan: bad access detected
[   14.947502] 
[   14.947575] Memory state around the buggy address:
[   14.947739]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.948074]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.948430] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.948755]                                      ^
[   14.948930]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.949147]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.949421] ==================================================================
[   15.009671] ==================================================================
[   15.010577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.010820] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.011209] 
[   15.011327] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.011381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.011394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.011426] Call Trace:
[   15.011444]  <TASK>
[   15.011462]  dump_stack_lvl+0x73/0xb0
[   15.011503]  print_report+0xd1/0x650
[   15.011526]  ? __virt_addr_valid+0x1db/0x2d0
[   15.011550]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.011572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.011595]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.011618]  kasan_report+0x141/0x180
[   15.011641]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.011674]  kasan_check_range+0x10c/0x1c0
[   15.011698]  __kasan_check_write+0x18/0x20
[   15.011718]  kasan_atomics_helper+0x1d7a/0x5450
[   15.011752]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.011774]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.011801]  ? kasan_atomics+0x152/0x310
[   15.011828]  kasan_atomics+0x1dc/0x310
[   15.011851]  ? __pfx_kasan_atomics+0x10/0x10
[   15.011876]  ? __pfx_read_tsc+0x10/0x10
[   15.011897]  ? ktime_get_ts64+0x86/0x230
[   15.011923]  kunit_try_run_case+0x1a5/0x480
[   15.011958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.011980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.012005]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.012038]  ? __kthread_parkme+0x82/0x180
[   15.012059]  ? preempt_count_sub+0x50/0x80
[   15.012083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.012108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.012131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.012154]  kthread+0x337/0x6f0
[   15.012175]  ? trace_preempt_on+0x20/0xc0
[   15.012199]  ? __pfx_kthread+0x10/0x10
[   15.012221]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.012242]  ? calculate_sigpending+0x7b/0xa0
[   15.012267]  ? __pfx_kthread+0x10/0x10
[   15.012290]  ret_from_fork+0x116/0x1d0
[   15.012309]  ? __pfx_kthread+0x10/0x10
[   15.012330]  ret_from_fork_asm+0x1a/0x30
[   15.012381]  </TASK>
[   15.012393] 
[   15.019973] Allocated by task 284:
[   15.020165]  kasan_save_stack+0x45/0x70
[   15.020335]  kasan_save_track+0x18/0x40
[   15.020558]  kasan_save_alloc_info+0x3b/0x50
[   15.020710]  __kasan_kmalloc+0xb7/0xc0
[   15.020843]  __kmalloc_cache_noprof+0x189/0x420
[   15.021014]  kasan_atomics+0x95/0x310
[   15.021184]  kunit_try_run_case+0x1a5/0x480
[   15.021356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.021629]  kthread+0x337/0x6f0
[   15.021820]  ret_from_fork+0x116/0x1d0
[   15.022037]  ret_from_fork_asm+0x1a/0x30
[   15.022205] 
[   15.022278] The buggy address belongs to the object at ffff888103128480
[   15.022278]  which belongs to the cache kmalloc-64 of size 64
[   15.022665] The buggy address is located 0 bytes to the right of
[   15.022665]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.023208] 
[   15.023319] The buggy address belongs to the physical page:
[   15.023621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.023921] flags: 0x200000000000000(node=0|zone=2)
[   15.024087] page_type: f5(slab)
[   15.024212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.024545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.025130] page dumped because: kasan: bad access detected
[   15.025402] 
[   15.025490] Memory state around the buggy address:
[   15.025718]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.026029]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.026356] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.026657]                                      ^
[   15.026929]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.027242]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.027562] ==================================================================
[   14.735809] ==================================================================
[   14.736206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.736855] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.737357] 
[   14.737449] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.737494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.737507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.737530] Call Trace:
[   14.737547]  <TASK>
[   14.737563]  dump_stack_lvl+0x73/0xb0
[   14.737590]  print_report+0xd1/0x650
[   14.737614]  ? __virt_addr_valid+0x1db/0x2d0
[   14.737638]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.737661]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.737684]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.737706]  kasan_report+0x141/0x180
[   14.737757]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.737785]  kasan_check_range+0x10c/0x1c0
[   14.737809]  __kasan_check_write+0x18/0x20
[   14.737829]  kasan_atomics_helper+0x15b6/0x5450
[   14.737863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.737885]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.737911]  ? kasan_atomics+0x152/0x310
[   14.737949]  kasan_atomics+0x1dc/0x310
[   14.737973]  ? __pfx_kasan_atomics+0x10/0x10
[   14.737998]  ? __pfx_read_tsc+0x10/0x10
[   14.738019]  ? ktime_get_ts64+0x86/0x230
[   14.738042]  kunit_try_run_case+0x1a5/0x480
[   14.738068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.738091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.738115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.738138]  ? __kthread_parkme+0x82/0x180
[   14.738160]  ? preempt_count_sub+0x50/0x80
[   14.738184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.738208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.738232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.738255]  kthread+0x337/0x6f0
[   14.738276]  ? trace_preempt_on+0x20/0xc0
[   14.738302]  ? __pfx_kthread+0x10/0x10
[   14.738324]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.738361]  ? calculate_sigpending+0x7b/0xa0
[   14.738387]  ? __pfx_kthread+0x10/0x10
[   14.738410]  ret_from_fork+0x116/0x1d0
[   14.738428]  ? __pfx_kthread+0x10/0x10
[   14.738450]  ret_from_fork_asm+0x1a/0x30
[   14.738481]  </TASK>
[   14.738493] 
[   14.751717] Allocated by task 284:
[   14.752017]  kasan_save_stack+0x45/0x70
[   14.752166]  kasan_save_track+0x18/0x40
[   14.752305]  kasan_save_alloc_info+0x3b/0x50
[   14.752475]  __kasan_kmalloc+0xb7/0xc0
[   14.752611]  __kmalloc_cache_noprof+0x189/0x420
[   14.752921]  kasan_atomics+0x95/0x310
[   14.753117]  kunit_try_run_case+0x1a5/0x480
[   14.753314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.753554]  kthread+0x337/0x6f0
[   14.753707]  ret_from_fork+0x116/0x1d0
[   14.754448]  ret_from_fork_asm+0x1a/0x30
[   14.754752] 
[   14.755001] The buggy address belongs to the object at ffff888103128480
[   14.755001]  which belongs to the cache kmalloc-64 of size 64
[   14.755486] The buggy address is located 0 bytes to the right of
[   14.755486]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.756304] 
[   14.756459] The buggy address belongs to the physical page:
[   14.756676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.757505] flags: 0x200000000000000(node=0|zone=2)
[   14.757919] page_type: f5(slab)
[   14.758222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.758714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.759250] page dumped because: kasan: bad access detected
[   14.759502] 
[   14.759595] Memory state around the buggy address:
[   14.760119]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.760444]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.760733] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.761422]                                      ^
[   14.761730]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.762202]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.762512] ==================================================================
[   13.970494] ==================================================================
[   13.970748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.971246] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   13.971560] 
[   13.971662] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.971709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.971723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.971744] Call Trace:
[   13.971761]  <TASK>
[   13.971778]  dump_stack_lvl+0x73/0xb0
[   13.971804]  print_report+0xd1/0x650
[   13.971828]  ? __virt_addr_valid+0x1db/0x2d0
[   13.971851]  ? kasan_atomics_helper+0x3df/0x5450
[   13.971871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.971895]  ? kasan_atomics_helper+0x3df/0x5450
[   13.971917]  kasan_report+0x141/0x180
[   13.971940]  ? kasan_atomics_helper+0x3df/0x5450
[   13.971965]  kasan_check_range+0x10c/0x1c0
[   13.971990]  __kasan_check_read+0x15/0x20
[   13.972009]  kasan_atomics_helper+0x3df/0x5450
[   13.972032]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.972054]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.972081]  ? kasan_atomics+0x152/0x310
[   13.972107]  kasan_atomics+0x1dc/0x310
[   13.972130]  ? __pfx_kasan_atomics+0x10/0x10
[   13.972155]  ? __pfx_read_tsc+0x10/0x10
[   13.972175]  ? ktime_get_ts64+0x86/0x230
[   13.972199]  kunit_try_run_case+0x1a5/0x480
[   13.972224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.972247]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.972271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.972294]  ? __kthread_parkme+0x82/0x180
[   13.972315]  ? preempt_count_sub+0x50/0x80
[   13.972339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.972372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.972397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.972431]  kthread+0x337/0x6f0
[   13.972452]  ? trace_preempt_on+0x20/0xc0
[   13.972476]  ? __pfx_kthread+0x10/0x10
[   13.972508]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.972530]  ? calculate_sigpending+0x7b/0xa0
[   13.972554]  ? __pfx_kthread+0x10/0x10
[   13.972576]  ret_from_fork+0x116/0x1d0
[   13.972595]  ? __pfx_kthread+0x10/0x10
[   13.972616]  ret_from_fork_asm+0x1a/0x30
[   13.972647]  </TASK>
[   13.972659] 
[   13.981137] Allocated by task 284:
[   13.981330]  kasan_save_stack+0x45/0x70
[   13.981544]  kasan_save_track+0x18/0x40
[   13.981844]  kasan_save_alloc_info+0x3b/0x50
[   13.982084]  __kasan_kmalloc+0xb7/0xc0
[   13.982221]  __kmalloc_cache_noprof+0x189/0x420
[   13.982450]  kasan_atomics+0x95/0x310
[   13.982766]  kunit_try_run_case+0x1a5/0x480
[   13.982969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.983225]  kthread+0x337/0x6f0
[   13.983422]  ret_from_fork+0x116/0x1d0
[   13.983639]  ret_from_fork_asm+0x1a/0x30
[   13.983940] 
[   13.984030] The buggy address belongs to the object at ffff888103128480
[   13.984030]  which belongs to the cache kmalloc-64 of size 64
[   13.984442] The buggy address is located 0 bytes to the right of
[   13.984442]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   13.985033] 
[   13.985218] The buggy address belongs to the physical page:
[   13.985484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   13.986120] flags: 0x200000000000000(node=0|zone=2)
[   13.986411] page_type: f5(slab)
[   13.986544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.986777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.987295] page dumped because: kasan: bad access detected
[   13.987569] 
[   13.987736] Memory state around the buggy address:
[   13.988017]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.988426]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.988860] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.989128]                                      ^
[   13.989285]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.989696]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.990168] ==================================================================
[   14.165715] ==================================================================
[   14.166129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.166598] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.166909] 
[   14.167028] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.167073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.167096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.167119] Call Trace:
[   14.167136]  <TASK>
[   14.167155]  dump_stack_lvl+0x73/0xb0
[   14.167196]  print_report+0xd1/0x650
[   14.167221]  ? __virt_addr_valid+0x1db/0x2d0
[   14.167245]  ? kasan_atomics_helper+0x860/0x5450
[   14.167267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.167290]  ? kasan_atomics_helper+0x860/0x5450
[   14.167314]  kasan_report+0x141/0x180
[   14.167337]  ? kasan_atomics_helper+0x860/0x5450
[   14.167373]  kasan_check_range+0x10c/0x1c0
[   14.167408]  __kasan_check_write+0x18/0x20
[   14.167432]  kasan_atomics_helper+0x860/0x5450
[   14.167456]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.167492]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.167519]  ? kasan_atomics+0x152/0x310
[   14.167556]  kasan_atomics+0x1dc/0x310
[   14.167581]  ? __pfx_kasan_atomics+0x10/0x10
[   14.167655]  ? __pfx_read_tsc+0x10/0x10
[   14.167686]  ? ktime_get_ts64+0x86/0x230
[   14.167712]  kunit_try_run_case+0x1a5/0x480
[   14.167739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.167762]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.167786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.167810]  ? __kthread_parkme+0x82/0x180
[   14.167832]  ? preempt_count_sub+0x50/0x80
[   14.167868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.167892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.167916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.167951]  kthread+0x337/0x6f0
[   14.167981]  ? trace_preempt_on+0x20/0xc0
[   14.168005]  ? __pfx_kthread+0x10/0x10
[   14.168027]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.168059]  ? calculate_sigpending+0x7b/0xa0
[   14.168084]  ? __pfx_kthread+0x10/0x10
[   14.168106]  ret_from_fork+0x116/0x1d0
[   14.168125]  ? __pfx_kthread+0x10/0x10
[   14.168146]  ret_from_fork_asm+0x1a/0x30
[   14.168177]  </TASK>
[   14.168190] 
[   14.176672] Allocated by task 284:
[   14.177023]  kasan_save_stack+0x45/0x70
[   14.177215]  kasan_save_track+0x18/0x40
[   14.177358]  kasan_save_alloc_info+0x3b/0x50
[   14.177584]  __kasan_kmalloc+0xb7/0xc0
[   14.177905]  __kmalloc_cache_noprof+0x189/0x420
[   14.178143]  kasan_atomics+0x95/0x310
[   14.178340]  kunit_try_run_case+0x1a5/0x480
[   14.178605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.178895]  kthread+0x337/0x6f0
[   14.179018]  ret_from_fork+0x116/0x1d0
[   14.179148]  ret_from_fork_asm+0x1a/0x30
[   14.179283] 
[   14.179388] The buggy address belongs to the object at ffff888103128480
[   14.179388]  which belongs to the cache kmalloc-64 of size 64
[   14.179912] The buggy address is located 0 bytes to the right of
[   14.179912]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.180307] 
[   14.180425] The buggy address belongs to the physical page:
[   14.180944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.181311] flags: 0x200000000000000(node=0|zone=2)
[   14.181610] page_type: f5(slab)
[   14.181745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.182105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.182421] page dumped because: kasan: bad access detected
[   14.182706] 
[   14.182854] Memory state around the buggy address:
[   14.183072]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.183386]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.183603] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.183815]                                      ^
[   14.184114]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.184443]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.184988] ==================================================================
[   14.559806] ==================================================================
[   14.560112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.560392] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.560715] 
[   14.560808] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.560852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.560865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.560886] Call Trace:
[   14.560903]  <TASK>
[   14.560920]  dump_stack_lvl+0x73/0xb0
[   14.560947]  print_report+0xd1/0x650
[   14.560970]  ? __virt_addr_valid+0x1db/0x2d0
[   14.560994]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.561016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.561037]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.561059]  kasan_report+0x141/0x180
[   14.561082]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.561107]  __asan_report_load4_noabort+0x18/0x20
[   14.561131]  kasan_atomics_helper+0x49e8/0x5450
[   14.561153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.561175]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.561201]  ? kasan_atomics+0x152/0x310
[   14.561227]  kasan_atomics+0x1dc/0x310
[   14.561251]  ? __pfx_kasan_atomics+0x10/0x10
[   14.561296]  ? __pfx_read_tsc+0x10/0x10
[   14.561318]  ? ktime_get_ts64+0x86/0x230
[   14.561343]  kunit_try_run_case+0x1a5/0x480
[   14.561379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.561402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.561426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.561449]  ? __kthread_parkme+0x82/0x180
[   14.561472]  ? preempt_count_sub+0x50/0x80
[   14.561498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.561522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.561544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.561567]  kthread+0x337/0x6f0
[   14.561588]  ? trace_preempt_on+0x20/0xc0
[   14.561612]  ? __pfx_kthread+0x10/0x10
[   14.561633]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.561654]  ? calculate_sigpending+0x7b/0xa0
[   14.561678]  ? __pfx_kthread+0x10/0x10
[   14.561700]  ret_from_fork+0x116/0x1d0
[   14.561718]  ? __pfx_kthread+0x10/0x10
[   14.561740]  ret_from_fork_asm+0x1a/0x30
[   14.561778]  </TASK>
[   14.561789] 
[   14.569366] Allocated by task 284:
[   14.569507]  kasan_save_stack+0x45/0x70
[   14.569651]  kasan_save_track+0x18/0x40
[   14.569785]  kasan_save_alloc_info+0x3b/0x50
[   14.569933]  __kasan_kmalloc+0xb7/0xc0
[   14.570067]  __kmalloc_cache_noprof+0x189/0x420
[   14.570292]  kasan_atomics+0x95/0x310
[   14.570495]  kunit_try_run_case+0x1a5/0x480
[   14.570712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.571087]  kthread+0x337/0x6f0
[   14.571261]  ret_from_fork+0x116/0x1d0
[   14.571464]  ret_from_fork_asm+0x1a/0x30
[   14.571676] 
[   14.571770] The buggy address belongs to the object at ffff888103128480
[   14.571770]  which belongs to the cache kmalloc-64 of size 64
[   14.572358] The buggy address is located 0 bytes to the right of
[   14.572358]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.572723] 
[   14.572822] The buggy address belongs to the physical page:
[   14.573080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.573678] flags: 0x200000000000000(node=0|zone=2)
[   14.573924] page_type: f5(slab)
[   14.574093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.574331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.574567] page dumped because: kasan: bad access detected
[   14.574739] 
[   14.574809] Memory state around the buggy address:
[   14.574963]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.575280]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.575601] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.576093]                                      ^
[   14.576312]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.576596]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.576894] ==================================================================
[   14.031556] ==================================================================
[   14.032241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.032691] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.033042] 
[   14.033135] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.033180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.033194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.033217] Call Trace:
[   14.033235]  <TASK>
[   14.033253]  dump_stack_lvl+0x73/0xb0
[   14.033281]  print_report+0xd1/0x650
[   14.033304]  ? __virt_addr_valid+0x1db/0x2d0
[   14.033329]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.033362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.033386]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.033410]  kasan_report+0x141/0x180
[   14.033432]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.033458]  __asan_report_store4_noabort+0x1b/0x30
[   14.033480]  kasan_atomics_helper+0x4b3a/0x5450
[   14.033513]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.033536]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.033574]  ? kasan_atomics+0x152/0x310
[   14.033675]  kasan_atomics+0x1dc/0x310
[   14.033701]  ? __pfx_kasan_atomics+0x10/0x10
[   14.033725]  ? __pfx_read_tsc+0x10/0x10
[   14.033758]  ? ktime_get_ts64+0x86/0x230
[   14.033782]  kunit_try_run_case+0x1a5/0x480
[   14.033807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.033854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.033877]  ? __kthread_parkme+0x82/0x180
[   14.033899]  ? preempt_count_sub+0x50/0x80
[   14.033924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.033970]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.033994]  kthread+0x337/0x6f0
[   14.034014]  ? trace_preempt_on+0x20/0xc0
[   14.034039]  ? __pfx_kthread+0x10/0x10
[   14.034060]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.034081]  ? calculate_sigpending+0x7b/0xa0
[   14.034104]  ? __pfx_kthread+0x10/0x10
[   14.034127]  ret_from_fork+0x116/0x1d0
[   14.034145]  ? __pfx_kthread+0x10/0x10
[   14.034167]  ret_from_fork_asm+0x1a/0x30
[   14.034198]  </TASK>
[   14.034210] 
[   14.042622] Allocated by task 284:
[   14.042921]  kasan_save_stack+0x45/0x70
[   14.043182]  kasan_save_track+0x18/0x40
[   14.043344]  kasan_save_alloc_info+0x3b/0x50
[   14.043743]  __kasan_kmalloc+0xb7/0xc0
[   14.043971]  __kmalloc_cache_noprof+0x189/0x420
[   14.044133]  kasan_atomics+0x95/0x310
[   14.044307]  kunit_try_run_case+0x1a5/0x480
[   14.044559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.044984]  kthread+0x337/0x6f0
[   14.045160]  ret_from_fork+0x116/0x1d0
[   14.045333]  ret_from_fork_asm+0x1a/0x30
[   14.045514] 
[   14.045628] The buggy address belongs to the object at ffff888103128480
[   14.045628]  which belongs to the cache kmalloc-64 of size 64
[   14.046215] The buggy address is located 0 bytes to the right of
[   14.046215]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.046779] 
[   14.046941] The buggy address belongs to the physical page:
[   14.047116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.047361] flags: 0x200000000000000(node=0|zone=2)
[   14.047529] page_type: f5(slab)
[   14.047837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.048635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.049002] page dumped because: kasan: bad access detected
[   14.049179] 
[   14.049252] Memory state around the buggy address:
[   14.049421]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.049983]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.050327] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.050925]                                      ^
[   14.051168]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.051462]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.051749] ==================================================================
[   14.667194] ==================================================================
[   14.667519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.668567] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.669042] 
[   14.669288] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.669338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.669364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.669387] Call Trace:
[   14.669404]  <TASK>
[   14.669457]  dump_stack_lvl+0x73/0xb0
[   14.669490]  print_report+0xd1/0x650
[   14.669514]  ? __virt_addr_valid+0x1db/0x2d0
[   14.669538]  ? kasan_atomics_helper+0x1467/0x5450
[   14.669560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.669585]  ? kasan_atomics_helper+0x1467/0x5450
[   14.669607]  kasan_report+0x141/0x180
[   14.669631]  ? kasan_atomics_helper+0x1467/0x5450
[   14.669659]  kasan_check_range+0x10c/0x1c0
[   14.669683]  __kasan_check_write+0x18/0x20
[   14.669703]  kasan_atomics_helper+0x1467/0x5450
[   14.669727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.669764]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.669791]  ? kasan_atomics+0x152/0x310
[   14.669818]  kasan_atomics+0x1dc/0x310
[   14.669841]  ? __pfx_kasan_atomics+0x10/0x10
[   14.669866]  ? __pfx_read_tsc+0x10/0x10
[   14.669888]  ? ktime_get_ts64+0x86/0x230
[   14.669913]  kunit_try_run_case+0x1a5/0x480
[   14.669938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.669984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.670007]  ? __kthread_parkme+0x82/0x180
[   14.670030]  ? preempt_count_sub+0x50/0x80
[   14.670054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.670079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.670102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.670126]  kthread+0x337/0x6f0
[   14.670147]  ? trace_preempt_on+0x20/0xc0
[   14.670171]  ? __pfx_kthread+0x10/0x10
[   14.670192]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.670213]  ? calculate_sigpending+0x7b/0xa0
[   14.670238]  ? __pfx_kthread+0x10/0x10
[   14.670260]  ret_from_fork+0x116/0x1d0
[   14.670279]  ? __pfx_kthread+0x10/0x10
[   14.670301]  ret_from_fork_asm+0x1a/0x30
[   14.670332]  </TASK>
[   14.670344] 
[   14.678730] Allocated by task 284:
[   14.678889]  kasan_save_stack+0x45/0x70
[   14.679039]  kasan_save_track+0x18/0x40
[   14.679201]  kasan_save_alloc_info+0x3b/0x50
[   14.679409]  __kasan_kmalloc+0xb7/0xc0
[   14.679584]  __kmalloc_cache_noprof+0x189/0x420
[   14.680316]  kasan_atomics+0x95/0x310
[   14.680677]  kunit_try_run_case+0x1a5/0x480
[   14.681096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.681361]  kthread+0x337/0x6f0
[   14.681524]  ret_from_fork+0x116/0x1d0
[   14.681697]  ret_from_fork_asm+0x1a/0x30
[   14.682305] 
[   14.682488] The buggy address belongs to the object at ffff888103128480
[   14.682488]  which belongs to the cache kmalloc-64 of size 64
[   14.683555] The buggy address is located 0 bytes to the right of
[   14.683555]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.684319] 
[   14.684438] The buggy address belongs to the physical page:
[   14.684680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.685396] flags: 0x200000000000000(node=0|zone=2)
[   14.685587] page_type: f5(slab)
[   14.685714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.686001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.686293] page dumped because: kasan: bad access detected
[   14.686479] 
[   14.686554] Memory state around the buggy address:
[   14.686711]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.687322]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.687958] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.688554]                                      ^
[   14.688982]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.689602]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.689932] ==================================================================
[   14.185381] ==================================================================
[   14.186065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.186433] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.187003] 
[   14.187132] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.187190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.187203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.187226] Call Trace:
[   14.187255]  <TASK>
[   14.187273]  dump_stack_lvl+0x73/0xb0
[   14.187302]  print_report+0xd1/0x650
[   14.187326]  ? __virt_addr_valid+0x1db/0x2d0
[   14.187360]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.187382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.187406]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.187428]  kasan_report+0x141/0x180
[   14.187451]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.187478]  kasan_check_range+0x10c/0x1c0
[   14.187503]  __kasan_check_write+0x18/0x20
[   14.187523]  kasan_atomics_helper+0x8f9/0x5450
[   14.187547]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.187569]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.187606]  ? kasan_atomics+0x152/0x310
[   14.187634]  kasan_atomics+0x1dc/0x310
[   14.187674]  ? __pfx_kasan_atomics+0x10/0x10
[   14.187699]  ? __pfx_read_tsc+0x10/0x10
[   14.187722]  ? ktime_get_ts64+0x86/0x230
[   14.187747]  kunit_try_run_case+0x1a5/0x480
[   14.187771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.187794]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.187818]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.187842]  ? __kthread_parkme+0x82/0x180
[   14.187865]  ? preempt_count_sub+0x50/0x80
[   14.187909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.187934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.187958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.187982]  kthread+0x337/0x6f0
[   14.188002]  ? trace_preempt_on+0x20/0xc0
[   14.188027]  ? __pfx_kthread+0x10/0x10
[   14.188049]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.188145]  ? calculate_sigpending+0x7b/0xa0
[   14.188179]  ? __pfx_kthread+0x10/0x10
[   14.188201]  ret_from_fork+0x116/0x1d0
[   14.188221]  ? __pfx_kthread+0x10/0x10
[   14.188253]  ret_from_fork_asm+0x1a/0x30
[   14.188283]  </TASK>
[   14.188295] 
[   14.196497] Allocated by task 284:
[   14.196669]  kasan_save_stack+0x45/0x70
[   14.197035]  kasan_save_track+0x18/0x40
[   14.197299]  kasan_save_alloc_info+0x3b/0x50
[   14.197525]  __kasan_kmalloc+0xb7/0xc0
[   14.197851]  __kmalloc_cache_noprof+0x189/0x420
[   14.198056]  kasan_atomics+0x95/0x310
[   14.198252]  kunit_try_run_case+0x1a5/0x480
[   14.198411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.198694]  kthread+0x337/0x6f0
[   14.198926]  ret_from_fork+0x116/0x1d0
[   14.199073]  ret_from_fork_asm+0x1a/0x30
[   14.199273] 
[   14.199371] The buggy address belongs to the object at ffff888103128480
[   14.199371]  which belongs to the cache kmalloc-64 of size 64
[   14.199970] The buggy address is located 0 bytes to the right of
[   14.199970]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.200342] 
[   14.200427] The buggy address belongs to the physical page:
[   14.200672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.201148] flags: 0x200000000000000(node=0|zone=2)
[   14.201421] page_type: f5(slab)
[   14.201668] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.202155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.202398] page dumped because: kasan: bad access detected
[   14.202571] 
[   14.202701] Memory state around the buggy address:
[   14.202975]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.203704]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.204071] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.204397]                                      ^
[   14.204628]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.205001]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.205242] ==================================================================
[   14.471308] ==================================================================
[   14.472340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.472680] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.473031] 
[   14.473154] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.473198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.473212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.473234] Call Trace:
[   14.473253]  <TASK>
[   14.473272]  dump_stack_lvl+0x73/0xb0
[   14.473302]  print_report+0xd1/0x650
[   14.473327]  ? __virt_addr_valid+0x1db/0x2d0
[   14.473361]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.473385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.473408]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.473429]  kasan_report+0x141/0x180
[   14.473452]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.473478]  __asan_report_load4_noabort+0x18/0x20
[   14.473505]  kasan_atomics_helper+0x4a1c/0x5450
[   14.473528]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.473551]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.473577]  ? kasan_atomics+0x152/0x310
[   14.473603]  kasan_atomics+0x1dc/0x310
[   14.473628]  ? __pfx_kasan_atomics+0x10/0x10
[   14.473653]  ? __pfx_read_tsc+0x10/0x10
[   14.473675]  ? ktime_get_ts64+0x86/0x230
[   14.473699]  kunit_try_run_case+0x1a5/0x480
[   14.473725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.473747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.473772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.473796]  ? __kthread_parkme+0x82/0x180
[   14.473818]  ? preempt_count_sub+0x50/0x80
[   14.473843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.473867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.473890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.473914]  kthread+0x337/0x6f0
[   14.473934]  ? trace_preempt_on+0x20/0xc0
[   14.473959]  ? __pfx_kthread+0x10/0x10
[   14.473982]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.474004]  ? calculate_sigpending+0x7b/0xa0
[   14.474029]  ? __pfx_kthread+0x10/0x10
[   14.474051]  ret_from_fork+0x116/0x1d0
[   14.474070]  ? __pfx_kthread+0x10/0x10
[   14.474091]  ret_from_fork_asm+0x1a/0x30
[   14.474122]  </TASK>
[   14.474135] 
[   14.482730] Allocated by task 284:
[   14.482868]  kasan_save_stack+0x45/0x70
[   14.483034]  kasan_save_track+0x18/0x40
[   14.483276]  kasan_save_alloc_info+0x3b/0x50
[   14.483714]  __kasan_kmalloc+0xb7/0xc0
[   14.483929]  __kmalloc_cache_noprof+0x189/0x420
[   14.484144]  kasan_atomics+0x95/0x310
[   14.484308]  kunit_try_run_case+0x1a5/0x480
[   14.484491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.484762]  kthread+0x337/0x6f0
[   14.484974]  ret_from_fork+0x116/0x1d0
[   14.485106]  ret_from_fork_asm+0x1a/0x30
[   14.485302] 
[   14.485445] The buggy address belongs to the object at ffff888103128480
[   14.485445]  which belongs to the cache kmalloc-64 of size 64
[   14.485975] The buggy address is located 0 bytes to the right of
[   14.485975]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.486666] 
[   14.486800] The buggy address belongs to the physical page:
[   14.487076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.487476] flags: 0x200000000000000(node=0|zone=2)
[   14.487735] page_type: f5(slab)
[   14.487913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.488280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.488642] page dumped because: kasan: bad access detected
[   14.488912] 
[   14.488994] Memory state around the buggy address:
[   14.489232]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.489608]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.489980] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.490290]                                      ^
[   14.490522]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.490741]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.490947] ==================================================================
[   14.806396] ==================================================================
[   14.807436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.807809] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.808142] 
[   14.808261] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.808304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.808317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.808339] Call Trace:
[   14.808376]  <TASK>
[   14.808392]  dump_stack_lvl+0x73/0xb0
[   14.808420]  print_report+0xd1/0x650
[   14.808457]  ? __virt_addr_valid+0x1db/0x2d0
[   14.808480]  ? kasan_atomics_helper+0x177f/0x5450
[   14.808502]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.808525]  ? kasan_atomics_helper+0x177f/0x5450
[   14.808556]  kasan_report+0x141/0x180
[   14.808579]  ? kasan_atomics_helper+0x177f/0x5450
[   14.808616]  kasan_check_range+0x10c/0x1c0
[   14.808641]  __kasan_check_write+0x18/0x20
[   14.808660]  kasan_atomics_helper+0x177f/0x5450
[   14.808692]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.808715]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.808740]  ? kasan_atomics+0x152/0x310
[   14.808778]  kasan_atomics+0x1dc/0x310
[   14.808801]  ? __pfx_kasan_atomics+0x10/0x10
[   14.808825]  ? __pfx_read_tsc+0x10/0x10
[   14.808846]  ? ktime_get_ts64+0x86/0x230
[   14.808871]  kunit_try_run_case+0x1a5/0x480
[   14.808894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.808927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.808952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.808987]  ? __kthread_parkme+0x82/0x180
[   14.809008]  ? preempt_count_sub+0x50/0x80
[   14.809033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.809057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.809089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.809114]  kthread+0x337/0x6f0
[   14.809134]  ? trace_preempt_on+0x20/0xc0
[   14.809168]  ? __pfx_kthread+0x10/0x10
[   14.809190]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.809211]  ? calculate_sigpending+0x7b/0xa0
[   14.809235]  ? __pfx_kthread+0x10/0x10
[   14.809257]  ret_from_fork+0x116/0x1d0
[   14.809283]  ? __pfx_kthread+0x10/0x10
[   14.809304]  ret_from_fork_asm+0x1a/0x30
[   14.809335]  </TASK>
[   14.809363] 
[   14.817029] Allocated by task 284:
[   14.817161]  kasan_save_stack+0x45/0x70
[   14.817333]  kasan_save_track+0x18/0x40
[   14.817551]  kasan_save_alloc_info+0x3b/0x50
[   14.817758]  __kasan_kmalloc+0xb7/0xc0
[   14.817945]  __kmalloc_cache_noprof+0x189/0x420
[   14.818166]  kasan_atomics+0x95/0x310
[   14.818361]  kunit_try_run_case+0x1a5/0x480
[   14.818563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.818850]  kthread+0x337/0x6f0
[   14.819020]  ret_from_fork+0x116/0x1d0
[   14.819168]  ret_from_fork_asm+0x1a/0x30
[   14.819306] 
[   14.819389] The buggy address belongs to the object at ffff888103128480
[   14.819389]  which belongs to the cache kmalloc-64 of size 64
[   14.819889] The buggy address is located 0 bytes to the right of
[   14.819889]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.820446] 
[   14.820544] The buggy address belongs to the physical page:
[   14.820837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.821081] flags: 0x200000000000000(node=0|zone=2)
[   14.821246] page_type: f5(slab)
[   14.821382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.821699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.822173] page dumped because: kasan: bad access detected
[   14.822476] 
[   14.822575] Memory state around the buggy address:
[   14.822851]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.823195]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.823497] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.823847]                                      ^
[   14.824057]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824367]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824666] ==================================================================
[   14.989248] ==================================================================
[   14.989671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.990106] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.990381] 
[   14.990470] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.990513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.990526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.990547] Call Trace:
[   14.990563]  <TASK>
[   14.990579]  dump_stack_lvl+0x73/0xb0
[   14.990605]  print_report+0xd1/0x650
[   14.990629]  ? __virt_addr_valid+0x1db/0x2d0
[   14.990652]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.990674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.990697]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.990720]  kasan_report+0x141/0x180
[   14.990744]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.990771]  kasan_check_range+0x10c/0x1c0
[   14.990795]  __kasan_check_write+0x18/0x20
[   14.990815]  kasan_atomics_helper+0x1ce1/0x5450
[   14.990838]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.990861]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.990887]  ? kasan_atomics+0x152/0x310
[   14.990915]  kasan_atomics+0x1dc/0x310
[   14.990937]  ? __pfx_kasan_atomics+0x10/0x10
[   14.990962]  ? __pfx_read_tsc+0x10/0x10
[   14.990983]  ? ktime_get_ts64+0x86/0x230
[   14.991006]  kunit_try_run_case+0x1a5/0x480
[   14.991030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.991053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.991077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.991100]  ? __kthread_parkme+0x82/0x180
[   14.991122]  ? preempt_count_sub+0x50/0x80
[   14.991146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.991171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.991194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.991218]  kthread+0x337/0x6f0
[   14.991238]  ? trace_preempt_on+0x20/0xc0
[   14.991262]  ? __pfx_kthread+0x10/0x10
[   14.991283]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.991304]  ? calculate_sigpending+0x7b/0xa0
[   14.991328]  ? __pfx_kthread+0x10/0x10
[   14.991392]  ret_from_fork+0x116/0x1d0
[   14.991413]  ? __pfx_kthread+0x10/0x10
[   14.991434]  ret_from_fork_asm+0x1a/0x30
[   14.991476]  </TASK>
[   14.991488] 
[   14.999872] Allocated by task 284:
[   15.000054]  kasan_save_stack+0x45/0x70
[   15.000302]  kasan_save_track+0x18/0x40
[   15.000522]  kasan_save_alloc_info+0x3b/0x50
[   15.000769]  __kasan_kmalloc+0xb7/0xc0
[   15.000961]  __kmalloc_cache_noprof+0x189/0x420
[   15.001236]  kasan_atomics+0x95/0x310
[   15.001540]  kunit_try_run_case+0x1a5/0x480
[   15.001768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.002020]  kthread+0x337/0x6f0
[   15.002189]  ret_from_fork+0x116/0x1d0
[   15.002457]  ret_from_fork_asm+0x1a/0x30
[   15.002598] 
[   15.002684] The buggy address belongs to the object at ffff888103128480
[   15.002684]  which belongs to the cache kmalloc-64 of size 64
[   15.003502] The buggy address is located 0 bytes to the right of
[   15.003502]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.004473] 
[   15.004615] The buggy address belongs to the physical page:
[   15.004915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.005201] flags: 0x200000000000000(node=0|zone=2)
[   15.005378] page_type: f5(slab)
[   15.005588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.006080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.006422] page dumped because: kasan: bad access detected
[   15.006595] 
[   15.006665] Memory state around the buggy address:
[   15.007078]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.007498]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.007951] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.008212]                                      ^
[   15.008410]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.008778]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.009042] ==================================================================
[   15.215644] ==================================================================
[   15.216079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.216409] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.216901] 
[   15.217002] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.217194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.217259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.217281] Call Trace:
[   15.217298]  <TASK>
[   15.217316]  dump_stack_lvl+0x73/0xb0
[   15.217360]  print_report+0xd1/0x650
[   15.217385]  ? __virt_addr_valid+0x1db/0x2d0
[   15.217409]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.217431]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.217453]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.217475]  kasan_report+0x141/0x180
[   15.217498]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.217525]  __asan_report_load8_noabort+0x18/0x20
[   15.217550]  kasan_atomics_helper+0x4fa5/0x5450
[   15.217574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.217596]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.217622]  ? kasan_atomics+0x152/0x310
[   15.217649]  kasan_atomics+0x1dc/0x310
[   15.217672]  ? __pfx_kasan_atomics+0x10/0x10
[   15.217697]  ? __pfx_read_tsc+0x10/0x10
[   15.217718]  ? ktime_get_ts64+0x86/0x230
[   15.217754]  kunit_try_run_case+0x1a5/0x480
[   15.217779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.217802]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.217826]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.217849]  ? __kthread_parkme+0x82/0x180
[   15.217871]  ? preempt_count_sub+0x50/0x80
[   15.217896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.217920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.217944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.217967]  kthread+0x337/0x6f0
[   15.217987]  ? trace_preempt_on+0x20/0xc0
[   15.218012]  ? __pfx_kthread+0x10/0x10
[   15.218033]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.218054]  ? calculate_sigpending+0x7b/0xa0
[   15.218079]  ? __pfx_kthread+0x10/0x10
[   15.218100]  ret_from_fork+0x116/0x1d0
[   15.218119]  ? __pfx_kthread+0x10/0x10
[   15.218140]  ret_from_fork_asm+0x1a/0x30
[   15.218171]  </TASK>
[   15.218183] 
[   15.227691] Allocated by task 284:
[   15.228062]  kasan_save_stack+0x45/0x70
[   15.228319]  kasan_save_track+0x18/0x40
[   15.228593]  kasan_save_alloc_info+0x3b/0x50
[   15.228762]  __kasan_kmalloc+0xb7/0xc0
[   15.229098]  __kmalloc_cache_noprof+0x189/0x420
[   15.229305]  kasan_atomics+0x95/0x310
[   15.229646]  kunit_try_run_case+0x1a5/0x480
[   15.229884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.230121]  kthread+0x337/0x6f0
[   15.230277]  ret_from_fork+0x116/0x1d0
[   15.230455]  ret_from_fork_asm+0x1a/0x30
[   15.230641] 
[   15.230720] The buggy address belongs to the object at ffff888103128480
[   15.230720]  which belongs to the cache kmalloc-64 of size 64
[   15.231511] The buggy address is located 0 bytes to the right of
[   15.231511]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.232261] 
[   15.232375] The buggy address belongs to the physical page:
[   15.232721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.233131] flags: 0x200000000000000(node=0|zone=2)
[   15.233416] page_type: f5(slab)
[   15.233628] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.234048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.234431] page dumped because: kasan: bad access detected
[   15.234666] 
[   15.234844] Memory state around the buggy address:
[   15.235080]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.235469]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.235775] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.236231]                                      ^
[   15.236520]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.236885]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.237247] ==================================================================
[   14.969210] ==================================================================
[   14.969704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.970429] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.970805] 
[   14.970917] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.970959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.970972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.970994] Call Trace:
[   14.971009]  <TASK>
[   14.971025]  dump_stack_lvl+0x73/0xb0
[   14.971053]  print_report+0xd1/0x650
[   14.971077]  ? __virt_addr_valid+0x1db/0x2d0
[   14.971100]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.971122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.971145]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.971168]  kasan_report+0x141/0x180
[   14.971190]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.971217]  __asan_report_load8_noabort+0x18/0x20
[   14.971242]  kasan_atomics_helper+0x4f30/0x5450
[   14.971265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.971287]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.971313]  ? kasan_atomics+0x152/0x310
[   14.971339]  kasan_atomics+0x1dc/0x310
[   14.971373]  ? __pfx_kasan_atomics+0x10/0x10
[   14.971397]  ? __pfx_read_tsc+0x10/0x10
[   14.971418]  ? ktime_get_ts64+0x86/0x230
[   14.971443]  kunit_try_run_case+0x1a5/0x480
[   14.971466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.971490]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.971513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.971536]  ? __kthread_parkme+0x82/0x180
[   14.971558]  ? preempt_count_sub+0x50/0x80
[   14.971582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.971608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.971636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.971669]  kthread+0x337/0x6f0
[   14.971689]  ? trace_preempt_on+0x20/0xc0
[   14.971713]  ? __pfx_kthread+0x10/0x10
[   14.971734]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.971757]  ? calculate_sigpending+0x7b/0xa0
[   14.971780]  ? __pfx_kthread+0x10/0x10
[   14.971803]  ret_from_fork+0x116/0x1d0
[   14.971822]  ? __pfx_kthread+0x10/0x10
[   14.971865]  ret_from_fork_asm+0x1a/0x30
[   14.971921]  </TASK>
[   14.971932] 
[   14.980135] Allocated by task 284:
[   14.980341]  kasan_save_stack+0x45/0x70
[   14.980581]  kasan_save_track+0x18/0x40
[   14.980792]  kasan_save_alloc_info+0x3b/0x50
[   14.980991]  __kasan_kmalloc+0xb7/0xc0
[   14.981217]  __kmalloc_cache_noprof+0x189/0x420
[   14.981460]  kasan_atomics+0x95/0x310
[   14.981666]  kunit_try_run_case+0x1a5/0x480
[   14.981907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.982175]  kthread+0x337/0x6f0
[   14.982358]  ret_from_fork+0x116/0x1d0
[   14.982568]  ret_from_fork_asm+0x1a/0x30
[   14.982808] 
[   14.982921] The buggy address belongs to the object at ffff888103128480
[   14.982921]  which belongs to the cache kmalloc-64 of size 64
[   14.983491] The buggy address is located 0 bytes to the right of
[   14.983491]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.984051] 
[   14.984166] The buggy address belongs to the physical page:
[   14.984410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.984767] flags: 0x200000000000000(node=0|zone=2)
[   14.985037] page_type: f5(slab)
[   14.985259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.985650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.985996] page dumped because: kasan: bad access detected
[   14.986201] 
[   14.986272] Memory state around the buggy address:
[   14.986433]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.986750]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.987143] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.987543]                                      ^
[   14.987874]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.988144]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.988432] ==================================================================
[   14.577520] ==================================================================
[   14.578560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.578905] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.579158] 
[   14.579247] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.579291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.579304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.579325] Call Trace:
[   14.579343]  <TASK>
[   14.579373]  dump_stack_lvl+0x73/0xb0
[   14.579400]  print_report+0xd1/0x650
[   14.579424]  ? __virt_addr_valid+0x1db/0x2d0
[   14.579447]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.579469]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.579492]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.579515]  kasan_report+0x141/0x180
[   14.579537]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.579563]  kasan_check_range+0x10c/0x1c0
[   14.579588]  __kasan_check_write+0x18/0x20
[   14.579607]  kasan_atomics_helper+0x12e6/0x5450
[   14.579630]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.579653]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.579683]  ? kasan_atomics+0x152/0x310
[   14.579710]  kasan_atomics+0x1dc/0x310
[   14.579733]  ? __pfx_kasan_atomics+0x10/0x10
[   14.579759]  ? __pfx_read_tsc+0x10/0x10
[   14.579781]  ? ktime_get_ts64+0x86/0x230
[   14.579807]  kunit_try_run_case+0x1a5/0x480
[   14.579831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.579853]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.579878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.579900]  ? __kthread_parkme+0x82/0x180
[   14.579922]  ? preempt_count_sub+0x50/0x80
[   14.579946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.579970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.579994]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.580016]  kthread+0x337/0x6f0
[   14.580037]  ? trace_preempt_on+0x20/0xc0
[   14.580062]  ? __pfx_kthread+0x10/0x10
[   14.580083]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.580105]  ? calculate_sigpending+0x7b/0xa0
[   14.580130]  ? __pfx_kthread+0x10/0x10
[   14.580152]  ret_from_fork+0x116/0x1d0
[   14.580170]  ? __pfx_kthread+0x10/0x10
[   14.580191]  ret_from_fork_asm+0x1a/0x30
[   14.580223]  </TASK>
[   14.580235] 
[   14.587678] Allocated by task 284:
[   14.587867]  kasan_save_stack+0x45/0x70
[   14.588069]  kasan_save_track+0x18/0x40
[   14.588268]  kasan_save_alloc_info+0x3b/0x50
[   14.588456]  __kasan_kmalloc+0xb7/0xc0
[   14.588590]  __kmalloc_cache_noprof+0x189/0x420
[   14.588744]  kasan_atomics+0x95/0x310
[   14.588878]  kunit_try_run_case+0x1a5/0x480
[   14.589023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.589196]  kthread+0x337/0x6f0
[   14.589404]  ret_from_fork+0x116/0x1d0
[   14.589599]  ret_from_fork_asm+0x1a/0x30
[   14.589860] 
[   14.589955] The buggy address belongs to the object at ffff888103128480
[   14.589955]  which belongs to the cache kmalloc-64 of size 64
[   14.590490] The buggy address is located 0 bytes to the right of
[   14.590490]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.591337] 
[   14.591423] The buggy address belongs to the physical page:
[   14.591597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.591841] flags: 0x200000000000000(node=0|zone=2)
[   14.592004] page_type: f5(slab)
[   14.592124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.592820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.593160] page dumped because: kasan: bad access detected
[   14.593374] 
[   14.593444] Memory state around the buggy address:
[   14.593600]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.593991]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.594310] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.594651]                                      ^
[   14.594862]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.595079]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.595290] ==================================================================
[   13.874789] ==================================================================
[   13.876244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.877038] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   13.877438] 
[   13.877536] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.877590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.877602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.877623] Call Trace:
[   13.877636]  <TASK>
[   13.877654]  dump_stack_lvl+0x73/0xb0
[   13.877685]  print_report+0xd1/0x650
[   13.877708]  ? __virt_addr_valid+0x1db/0x2d0
[   13.877731]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.877750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.877772]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.877792]  kasan_report+0x141/0x180
[   13.877813]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.877838]  __asan_report_load4_noabort+0x18/0x20
[   13.877861]  kasan_atomics_helper+0x4bbc/0x5450
[   13.877882]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.877903]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.877929]  ? kasan_atomics+0x152/0x310
[   13.877956]  kasan_atomics+0x1dc/0x310
[   13.877978]  ? __pfx_kasan_atomics+0x10/0x10
[   13.878001]  ? __pfx_read_tsc+0x10/0x10
[   13.878023]  ? ktime_get_ts64+0x86/0x230
[   13.878047]  kunit_try_run_case+0x1a5/0x480
[   13.878073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.878094]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.878116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.878138]  ? __kthread_parkme+0x82/0x180
[   13.878158]  ? preempt_count_sub+0x50/0x80
[   13.878182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.878205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.878227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.878249]  kthread+0x337/0x6f0
[   13.878268]  ? trace_preempt_on+0x20/0xc0
[   13.878291]  ? __pfx_kthread+0x10/0x10
[   13.878312]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.878332]  ? calculate_sigpending+0x7b/0xa0
[   13.878366]  ? __pfx_kthread+0x10/0x10
[   13.878387]  ret_from_fork+0x116/0x1d0
[   13.878404]  ? __pfx_kthread+0x10/0x10
[   13.878424]  ret_from_fork_asm+0x1a/0x30
[   13.878455]  </TASK>
[   13.878466] 
[   13.891810] Allocated by task 284:
[   13.892204]  kasan_save_stack+0x45/0x70
[   13.892679]  kasan_save_track+0x18/0x40
[   13.893143]  kasan_save_alloc_info+0x3b/0x50
[   13.893584]  __kasan_kmalloc+0xb7/0xc0
[   13.894049]  __kmalloc_cache_noprof+0x189/0x420
[   13.894515]  kasan_atomics+0x95/0x310
[   13.894915]  kunit_try_run_case+0x1a5/0x480
[   13.895139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.895307]  kthread+0x337/0x6f0
[   13.895437]  ret_from_fork+0x116/0x1d0
[   13.895669]  ret_from_fork_asm+0x1a/0x30
[   13.896166] 
[   13.896388] The buggy address belongs to the object at ffff888103128480
[   13.896388]  which belongs to the cache kmalloc-64 of size 64
[   13.897679] The buggy address is located 0 bytes to the right of
[   13.897679]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   13.899100] 
[   13.899278] The buggy address belongs to the physical page:
[   13.899767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   13.900605] flags: 0x200000000000000(node=0|zone=2)
[   13.901079] page_type: f5(slab)
[   13.901238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.902016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.902512] page dumped because: kasan: bad access detected
[   13.903079] 
[   13.903216] Memory state around the buggy address:
[   13.903957]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.904211]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.905045] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.905825]                                      ^
[   13.905984]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.906190]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.906424] ==================================================================
[   15.128425] ==================================================================
[   15.129050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.129413] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284
[   15.129751] 
[   15.129853] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.129898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.129911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.129932] Call Trace:
[   15.129951]  <TASK>
[   15.129968]  dump_stack_lvl+0x73/0xb0
[   15.129997]  print_report+0xd1/0x650
[   15.130020]  ? __virt_addr_valid+0x1db/0x2d0
[   15.130044]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.130067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.130088]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.130111]  kasan_report+0x141/0x180
[   15.130134]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.130160]  __asan_report_load8_noabort+0x18/0x20
[   15.130185]  kasan_atomics_helper+0x4f98/0x5450
[   15.130208]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.130230]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.130256]  ? kasan_atomics+0x152/0x310
[   15.130283]  kasan_atomics+0x1dc/0x310
[   15.130307]  ? __pfx_kasan_atomics+0x10/0x10
[   15.130331]  ? __pfx_read_tsc+0x10/0x10
[   15.130365]  ? ktime_get_ts64+0x86/0x230
[   15.130389]  kunit_try_run_case+0x1a5/0x480
[   15.130414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.130436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.130462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.130485]  ? __kthread_parkme+0x82/0x180
[   15.130506]  ? preempt_count_sub+0x50/0x80
[   15.130531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.130555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.130579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.130602]  kthread+0x337/0x6f0
[   15.130622]  ? trace_preempt_on+0x20/0xc0
[   15.130648]  ? __pfx_kthread+0x10/0x10
[   15.130669]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.130691]  ? calculate_sigpending+0x7b/0xa0
[   15.130717]  ? __pfx_kthread+0x10/0x10
[   15.130751]  ret_from_fork+0x116/0x1d0
[   15.130770]  ? __pfx_kthread+0x10/0x10
[   15.130792]  ret_from_fork_asm+0x1a/0x30
[   15.130823]  </TASK>
[   15.130835] 
[   15.138060] Allocated by task 284:
[   15.138242]  kasan_save_stack+0x45/0x70
[   15.138443]  kasan_save_track+0x18/0x40
[   15.138616]  kasan_save_alloc_info+0x3b/0x50
[   15.138852]  __kasan_kmalloc+0xb7/0xc0
[   15.139019]  __kmalloc_cache_noprof+0x189/0x420
[   15.139227]  kasan_atomics+0x95/0x310
[   15.139404]  kunit_try_run_case+0x1a5/0x480
[   15.139559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.139751]  kthread+0x337/0x6f0
[   15.139923]  ret_from_fork+0x116/0x1d0
[   15.140109]  ret_from_fork_asm+0x1a/0x30
[   15.140306] 
[   15.140428] The buggy address belongs to the object at ffff888103128480
[   15.140428]  which belongs to the cache kmalloc-64 of size 64
[   15.140920] The buggy address is located 0 bytes to the right of
[   15.140920]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   15.141424] 
[   15.141524] The buggy address belongs to the physical page:
[   15.141807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   15.142112] flags: 0x200000000000000(node=0|zone=2)
[   15.142325] page_type: f5(slab)
[   15.142482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.142715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.142943] page dumped because: kasan: bad access detected
[   15.143116] 
[   15.143186] Memory state around the buggy address:
[   15.143361]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.143684]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.144259] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.144572]                                      ^
[   15.144729]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.145049]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.145292] ==================================================================
[   14.097654] ==================================================================
[   14.098039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.098302] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284
[   14.098830] 
[   14.098983] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.099029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.099042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.099074] Call Trace:
[   14.099092]  <TASK>
[   14.099119]  dump_stack_lvl+0x73/0xb0
[   14.099147]  print_report+0xd1/0x650
[   14.099171]  ? __virt_addr_valid+0x1db/0x2d0
[   14.099205]  ? kasan_atomics_helper+0x697/0x5450
[   14.099228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.099251]  ? kasan_atomics_helper+0x697/0x5450
[   14.099273]  kasan_report+0x141/0x180
[   14.099296]  ? kasan_atomics_helper+0x697/0x5450
[   14.099325]  kasan_check_range+0x10c/0x1c0
[   14.099358]  __kasan_check_write+0x18/0x20
[   14.099379]  kasan_atomics_helper+0x697/0x5450
[   14.099402]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.099425]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.099452]  ? kasan_atomics+0x152/0x310
[   14.099479]  kasan_atomics+0x1dc/0x310
[   14.099503]  ? __pfx_kasan_atomics+0x10/0x10
[   14.099536]  ? __pfx_read_tsc+0x10/0x10
[   14.099557]  ? ktime_get_ts64+0x86/0x230
[   14.099636]  kunit_try_run_case+0x1a5/0x480
[   14.099671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.099693]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.099728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.099752]  ? __kthread_parkme+0x82/0x180
[   14.099773]  ? preempt_count_sub+0x50/0x80
[   14.099797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.099821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.099854]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.099878]  kthread+0x337/0x6f0
[   14.099899]  ? trace_preempt_on+0x20/0xc0
[   14.099934]  ? __pfx_kthread+0x10/0x10
[   14.099955]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.099977]  ? calculate_sigpending+0x7b/0xa0
[   14.100002]  ? __pfx_kthread+0x10/0x10
[   14.100024]  ret_from_fork+0x116/0x1d0
[   14.100043]  ? __pfx_kthread+0x10/0x10
[   14.100064]  ret_from_fork_asm+0x1a/0x30
[   14.100095]  </TASK>
[   14.100107] 
[   14.108668] Allocated by task 284:
[   14.108940]  kasan_save_stack+0x45/0x70
[   14.109106]  kasan_save_track+0x18/0x40
[   14.109244]  kasan_save_alloc_info+0x3b/0x50
[   14.109402]  __kasan_kmalloc+0xb7/0xc0
[   14.109612]  __kmalloc_cache_noprof+0x189/0x420
[   14.109837]  kasan_atomics+0x95/0x310
[   14.110032]  kunit_try_run_case+0x1a5/0x480
[   14.110236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.110660]  kthread+0x337/0x6f0
[   14.110907]  ret_from_fork+0x116/0x1d0
[   14.111084]  ret_from_fork_asm+0x1a/0x30
[   14.111224] 
[   14.111298] The buggy address belongs to the object at ffff888103128480
[   14.111298]  which belongs to the cache kmalloc-64 of size 64
[   14.112086] The buggy address is located 0 bytes to the right of
[   14.112086]  allocated 48-byte region [ffff888103128480, ffff8881031284b0)
[   14.112797] 
[   14.112898] The buggy address belongs to the physical page:
[   14.113134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128
[   14.113484] flags: 0x200000000000000(node=0|zone=2)
[   14.113711] page_type: f5(slab)
[   14.113944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.114239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.114533] page dumped because: kasan: bad access detected
[   14.114837] 
[   14.114948] Memory state around the buggy address:
[   14.115183]  ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.115498]  ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.115865] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.116083]                                      ^
[   14.116238]  ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.116518]  ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.117189] ==================================================================