Hay
Date
July 1, 2025, 12:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.203747] ==================================================================
[   20.204115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.204323] Read of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.204473] 
[   20.204539] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.204783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.204819] Hardware name: linux,dummy-virt (DT)
[   20.204982] Call trace:
[   20.205042]  show_stack+0x20/0x38 (C)
[   20.205098]  dump_stack_lvl+0x8c/0xd0
[   20.205151]  print_report+0x118/0x608
[   20.205350]  kasan_report+0xdc/0x128
[   20.205673]  __asan_report_load4_noabort+0x20/0x30
[   20.205786]  kasan_atomics_helper+0x3dd8/0x4858
[   20.205846]  kasan_atomics+0x198/0x2e0
[   20.205895]  kunit_try_run_case+0x170/0x3f0
[   20.206173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.206262]  kthread+0x328/0x630
[   20.206616]  ret_from_fork+0x10/0x20
[   20.206849] 
[   20.206977] Allocated by task 265:
[   20.207053]  kasan_save_stack+0x3c/0x68
[   20.207102]  kasan_save_track+0x20/0x40
[   20.207143]  kasan_save_alloc_info+0x40/0x58
[   20.207187]  __kasan_kmalloc+0xd4/0xd8
[   20.207628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.207905]  kasan_atomics+0xb8/0x2e0
[   20.208074]  kunit_try_run_case+0x170/0x3f0
[   20.208334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.208560]  kthread+0x328/0x630
[   20.208623]  ret_from_fork+0x10/0x20
[   20.208947] 
[   20.208978] The buggy address belongs to the object at fff00000c79f5980
[   20.208978]  which belongs to the cache kmalloc-64 of size 64
[   20.209275] The buggy address is located 0 bytes to the right of
[   20.209275]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.209775] 
[   20.209912] The buggy address belongs to the physical page:
[   20.209951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.210196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.210617] page_type: f5(slab)
[   20.210700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.210926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.210988] page dumped because: kasan: bad access detected
[   20.211121] 
[   20.211266] Memory state around the buggy address:
[   20.211401]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.211798]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.212120] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.212383]                                      ^
[   20.212473]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.212537]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.212806] ==================================================================
[   20.304611] ==================================================================
[   20.304792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.304853] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.304908] 
[   20.304949] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.305301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.305591] Hardware name: linux,dummy-virt (DT)
[   20.305678] Call trace:
[   20.305835]  show_stack+0x20/0x38 (C)
[   20.306151]  dump_stack_lvl+0x8c/0xd0
[   20.306235]  print_report+0x118/0x608
[   20.306741]  kasan_report+0xdc/0x128
[   20.306856]  kasan_check_range+0x100/0x1a8
[   20.306971]  __kasan_check_write+0x20/0x30
[   20.307071]  kasan_atomics_helper+0xff0/0x4858
[   20.307211]  kasan_atomics+0x198/0x2e0
[   20.307272]  kunit_try_run_case+0x170/0x3f0
[   20.307328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.307382]  kthread+0x328/0x630
[   20.307939]  ret_from_fork+0x10/0x20
[   20.308299] 
[   20.308427] Allocated by task 265:
[   20.308527]  kasan_save_stack+0x3c/0x68
[   20.308635]  kasan_save_track+0x20/0x40
[   20.308684]  kasan_save_alloc_info+0x40/0x58
[   20.308894]  __kasan_kmalloc+0xd4/0xd8
[   20.309210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.310693]  kasan_atomics+0xb8/0x2e0
[   20.310772]  kunit_try_run_case+0x170/0x3f0
[   20.310835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.310918]  kthread+0x328/0x630
[   20.310977]  ret_from_fork+0x10/0x20
[   20.311301] 
[   20.311474] The buggy address belongs to the object at fff00000c79f5980
[   20.311474]  which belongs to the cache kmalloc-64 of size 64
[   20.311690] The buggy address is located 0 bytes to the right of
[   20.311690]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.312009] 
[   20.312040] The buggy address belongs to the physical page:
[   20.312076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.312558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.312966] page_type: f5(slab)
[   20.313073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.313294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.313386] page dumped because: kasan: bad access detected
[   20.313669] 
[   20.313750] Memory state around the buggy address:
[   20.313937]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.314169]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.314581] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.314662]                                      ^
[   20.314875]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.314939]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.314990] ==================================================================
[   20.484116] ==================================================================
[   20.484331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.484535] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.484632] 
[   20.484666] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.484751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.485007] Hardware name: linux,dummy-virt (DT)
[   20.485399] Call trace:
[   20.485487]  show_stack+0x20/0x38 (C)
[   20.485549]  dump_stack_lvl+0x8c/0xd0
[   20.485651]  print_report+0x118/0x608
[   20.485723]  kasan_report+0xdc/0x128
[   20.485771]  kasan_check_range+0x100/0x1a8
[   20.486098]  __kasan_check_write+0x20/0x30
[   20.486266]  kasan_atomics_helper+0x16d0/0x4858
[   20.486329]  kasan_atomics+0x198/0x2e0
[   20.486442]  kunit_try_run_case+0x170/0x3f0
[   20.486519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.486572]  kthread+0x328/0x630
[   20.486619]  ret_from_fork+0x10/0x20
[   20.486666] 
[   20.486688] Allocated by task 265:
[   20.486717]  kasan_save_stack+0x3c/0x68
[   20.486760]  kasan_save_track+0x20/0x40
[   20.486882]  kasan_save_alloc_info+0x40/0x58
[   20.486933]  __kasan_kmalloc+0xd4/0xd8
[   20.486970]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.487061]  kasan_atomics+0xb8/0x2e0
[   20.487326]  kunit_try_run_case+0x170/0x3f0
[   20.487389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.488032]  kthread+0x328/0x630
[   20.488184]  ret_from_fork+0x10/0x20
[   20.488548] 
[   20.488634] The buggy address belongs to the object at fff00000c79f5980
[   20.488634]  which belongs to the cache kmalloc-64 of size 64
[   20.488913] The buggy address is located 0 bytes to the right of
[   20.488913]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.489352] 
[   20.489542] The buggy address belongs to the physical page:
[   20.489769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.489887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.489941] page_type: f5(slab)
[   20.490027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.490606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.490698] page dumped because: kasan: bad access detected
[   20.491118] 
[   20.491206] Memory state around the buggy address:
[   20.491484]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.491739]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.491982] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.492094]                                      ^
[   20.492197]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.492283]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.492673] ==================================================================
[   20.511565] ==================================================================
[   20.511691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.511764] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.511819] 
[   20.511851] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.512084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.512167] Hardware name: linux,dummy-virt (DT)
[   20.512304] Call trace:
[   20.512357]  show_stack+0x20/0x38 (C)
[   20.512800]  dump_stack_lvl+0x8c/0xd0
[   20.512989]  print_report+0x118/0x608
[   20.513051]  kasan_report+0xdc/0x128
[   20.513103]  __asan_report_load8_noabort+0x20/0x30
[   20.513340]  kasan_atomics_helper+0x3e20/0x4858
[   20.513914]  kasan_atomics+0x198/0x2e0
[   20.514093]  kunit_try_run_case+0x170/0x3f0
[   20.514154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.514247]  kthread+0x328/0x630
[   20.514358]  ret_from_fork+0x10/0x20
[   20.514411] 
[   20.514442] Allocated by task 265:
[   20.514484]  kasan_save_stack+0x3c/0x68
[   20.514683]  kasan_save_track+0x20/0x40
[   20.514726]  kasan_save_alloc_info+0x40/0x58
[   20.514769]  __kasan_kmalloc+0xd4/0xd8
[   20.514805]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.515144]  kasan_atomics+0xb8/0x2e0
[   20.515434]  kunit_try_run_case+0x170/0x3f0
[   20.515636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.515707]  kthread+0x328/0x630
[   20.515768]  ret_from_fork+0x10/0x20
[   20.515814] 
[   20.516092] The buggy address belongs to the object at fff00000c79f5980
[   20.516092]  which belongs to the cache kmalloc-64 of size 64
[   20.516959] The buggy address is located 0 bytes to the right of
[   20.516959]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.517377] 
[   20.517426] The buggy address belongs to the physical page:
[   20.517496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.517807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.517971] page_type: f5(slab)
[   20.518114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.518337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.518945] page dumped because: kasan: bad access detected
[   20.519049] 
[   20.519237] Memory state around the buggy address:
[   20.519286]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.519404]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.519908] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.520002]                                      ^
[   20.520102]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.520157]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.520199] ==================================================================
[   20.341668] ==================================================================
[   20.341730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.342238] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.342291] 
[   20.342625] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.342723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.342751] Hardware name: linux,dummy-virt (DT)
[   20.342784] Call trace:
[   20.343138]  show_stack+0x20/0x38 (C)
[   20.343226]  dump_stack_lvl+0x8c/0xd0
[   20.343507]  print_report+0x118/0x608
[   20.343937]  kasan_report+0xdc/0x128
[   20.344114]  kasan_check_range+0x100/0x1a8
[   20.344426]  __kasan_check_write+0x20/0x30
[   20.344750]  kasan_atomics_helper+0x1190/0x4858
[   20.344928]  kasan_atomics+0x198/0x2e0
[   20.345188]  kunit_try_run_case+0x170/0x3f0
[   20.345573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.345706]  kthread+0x328/0x630
[   20.345759]  ret_from_fork+0x10/0x20
[   20.345941] 
[   20.346046] Allocated by task 265:
[   20.346285]  kasan_save_stack+0x3c/0x68
[   20.346614]  kasan_save_track+0x20/0x40
[   20.346873]  kasan_save_alloc_info+0x40/0x58
[   20.347019]  __kasan_kmalloc+0xd4/0xd8
[   20.347061]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.347103]  kasan_atomics+0xb8/0x2e0
[   20.347147]  kunit_try_run_case+0x170/0x3f0
[   20.347189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.348174]  kthread+0x328/0x630
[   20.348241]  ret_from_fork+0x10/0x20
[   20.348316] 
[   20.348372] The buggy address belongs to the object at fff00000c79f5980
[   20.348372]  which belongs to the cache kmalloc-64 of size 64
[   20.348480] The buggy address is located 0 bytes to the right of
[   20.348480]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.348818] 
[   20.348949] The buggy address belongs to the physical page:
[   20.349363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.349484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.349540] page_type: f5(slab)
[   20.349581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.349895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.350100] page dumped because: kasan: bad access detected
[   20.350148] 
[   20.350422] Memory state around the buggy address:
[   20.350701]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.351079]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.351134] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.351179]                                      ^
[   20.351214]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.351539]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.351852] ==================================================================
[   20.234139] ==================================================================
[   20.234402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.234790] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.234855] 
[   20.235037] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.235985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.236069] Hardware name: linux,dummy-virt (DT)
[   20.236107] Call trace:
[   20.236133]  show_stack+0x20/0x38 (C)
[   20.236363]  dump_stack_lvl+0x8c/0xd0
[   20.236544]  print_report+0x118/0x608
[   20.236959]  kasan_report+0xdc/0x128
[   20.237110]  kasan_check_range+0x100/0x1a8
[   20.237560]  __kasan_check_read+0x20/0x30
[   20.237650]  kasan_atomics_helper+0xdd4/0x4858
[   20.238000]  kasan_atomics+0x198/0x2e0
[   20.238238]  kunit_try_run_case+0x170/0x3f0
[   20.238427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.238585]  kthread+0x328/0x630
[   20.238651]  ret_from_fork+0x10/0x20
[   20.238959] 
[   20.239204] Allocated by task 265:
[   20.239261]  kasan_save_stack+0x3c/0x68
[   20.239310]  kasan_save_track+0x20/0x40
[   20.239349]  kasan_save_alloc_info+0x40/0x58
[   20.239782]  __kasan_kmalloc+0xd4/0xd8
[   20.240277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.240506]  kasan_atomics+0xb8/0x2e0
[   20.240747]  kunit_try_run_case+0x170/0x3f0
[   20.240821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.241108]  kthread+0x328/0x630
[   20.241393]  ret_from_fork+0x10/0x20
[   20.241583] 
[   20.241852] The buggy address belongs to the object at fff00000c79f5980
[   20.241852]  which belongs to the cache kmalloc-64 of size 64
[   20.242052] The buggy address is located 0 bytes to the right of
[   20.242052]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.242273] 
[   20.242455] The buggy address belongs to the physical page:
[   20.242813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.242958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.243252] page_type: f5(slab)
[   20.243677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.243891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.243952] page dumped because: kasan: bad access detected
[   20.243994] 
[   20.244022] Memory state around the buggy address:
[   20.244715]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.244841]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.244978] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.245184]                                      ^
[   20.245429]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.245524]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.245689] ==================================================================
[   20.124205] ==================================================================
[   20.124316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.124371] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.124425] 
[   20.124473] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.124559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.124588] Hardware name: linux,dummy-virt (DT)
[   20.124624] Call trace:
[   20.124648]  show_stack+0x20/0x38 (C)
[   20.124698]  dump_stack_lvl+0x8c/0xd0
[   20.124766]  print_report+0x118/0x608
[   20.124816]  kasan_report+0xdc/0x128
[   20.124862]  kasan_check_range+0x100/0x1a8
[   20.124913]  __kasan_check_write+0x20/0x30
[   20.124961]  kasan_atomics_helper+0xa04/0x4858
[   20.125011]  kasan_atomics+0x198/0x2e0
[   20.125057]  kunit_try_run_case+0x170/0x3f0
[   20.125107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.125162]  kthread+0x328/0x630
[   20.125206]  ret_from_fork+0x10/0x20
[   20.125255] 
[   20.125285] Allocated by task 265:
[   20.125316]  kasan_save_stack+0x3c/0x68
[   20.125357]  kasan_save_track+0x20/0x40
[   20.125398]  kasan_save_alloc_info+0x40/0x58
[   20.125441]  __kasan_kmalloc+0xd4/0xd8
[   20.125655]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.125706]  kasan_atomics+0xb8/0x2e0
[   20.125743]  kunit_try_run_case+0x170/0x3f0
[   20.126407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.126711]  kthread+0x328/0x630
[   20.126802]  ret_from_fork+0x10/0x20
[   20.126882] 
[   20.127198] The buggy address belongs to the object at fff00000c79f5980
[   20.127198]  which belongs to the cache kmalloc-64 of size 64
[   20.127324] The buggy address is located 0 bytes to the right of
[   20.127324]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.127497] 
[   20.127680] The buggy address belongs to the physical page:
[   20.127736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.128080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.128261] page_type: f5(slab)
[   20.128388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.128625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.128886] page dumped because: kasan: bad access detected
[   20.129294] 
[   20.129344] Memory state around the buggy address:
[   20.129486]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.129539]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.129776] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.129976]                                      ^
[   20.130083]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.130179]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.130222] ==================================================================
[   20.257034] ==================================================================
[   20.257168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.257222] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.257288] 
[   20.257321] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.257408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.257659] Hardware name: linux,dummy-virt (DT)
[   20.257801] Call trace:
[   20.257835]  show_stack+0x20/0x38 (C)
[   20.258143]  dump_stack_lvl+0x8c/0xd0
[   20.258563]  print_report+0x118/0x608
[   20.258633]  kasan_report+0xdc/0x128
[   20.258733]  kasan_check_range+0x100/0x1a8
[   20.258787]  __kasan_check_write+0x20/0x30
[   20.259300]  kasan_atomics_helper+0xe44/0x4858
[   20.259470]  kasan_atomics+0x198/0x2e0
[   20.259832]  kunit_try_run_case+0x170/0x3f0
[   20.260470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.260659]  kthread+0x328/0x630
[   20.260785]  ret_from_fork+0x10/0x20
[   20.261189] 
[   20.261221] Allocated by task 265:
[   20.261438]  kasan_save_stack+0x3c/0x68
[   20.261695]  kasan_save_track+0x20/0x40
[   20.261754]  kasan_save_alloc_info+0x40/0x58
[   20.262006]  __kasan_kmalloc+0xd4/0xd8
[   20.262259]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.262544]  kasan_atomics+0xb8/0x2e0
[   20.262820]  kunit_try_run_case+0x170/0x3f0
[   20.263087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.263431]  kthread+0x328/0x630
[   20.263488]  ret_from_fork+0x10/0x20
[   20.263529] 
[   20.263553] The buggy address belongs to the object at fff00000c79f5980
[   20.263553]  which belongs to the cache kmalloc-64 of size 64
[   20.263940] The buggy address is located 0 bytes to the right of
[   20.263940]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.264433] 
[   20.264480] The buggy address belongs to the physical page:
[   20.264655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.264934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.265314] page_type: f5(slab)
[   20.265647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.266081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.266300] page dumped because: kasan: bad access detected
[   20.266557] 
[   20.266585] Memory state around the buggy address:
[   20.266628]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.266675]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.266889] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.266983]                                      ^
[   20.267041]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.267331]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.267689] ==================================================================
[   20.324245] ==================================================================
[   20.324476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.324602] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.324673] 
[   20.324853] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.324950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.324980] Hardware name: linux,dummy-virt (DT)
[   20.325144] Call trace:
[   20.325382]  show_stack+0x20/0x38 (C)
[   20.325594]  dump_stack_lvl+0x8c/0xd0
[   20.325798]  print_report+0x118/0x608
[   20.325860]  kasan_report+0xdc/0x128
[   20.325913]  kasan_check_range+0x100/0x1a8
[   20.325964]  __kasan_check_write+0x20/0x30
[   20.326533]  kasan_atomics_helper+0x10c0/0x4858
[   20.326743]  kasan_atomics+0x198/0x2e0
[   20.326806]  kunit_try_run_case+0x170/0x3f0
[   20.326856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.326918]  kthread+0x328/0x630
[   20.327368]  ret_from_fork+0x10/0x20
[   20.327817] 
[   20.327856] Allocated by task 265:
[   20.327950]  kasan_save_stack+0x3c/0x68
[   20.328006]  kasan_save_track+0x20/0x40
[   20.328045]  kasan_save_alloc_info+0x40/0x58
[   20.328089]  __kasan_kmalloc+0xd4/0xd8
[   20.328127]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.328391]  kasan_atomics+0xb8/0x2e0
[   20.328797]  kunit_try_run_case+0x170/0x3f0
[   20.329168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.329600]  kthread+0x328/0x630
[   20.329889]  ret_from_fork+0x10/0x20
[   20.330086] 
[   20.330130] The buggy address belongs to the object at fff00000c79f5980
[   20.330130]  which belongs to the cache kmalloc-64 of size 64
[   20.330378] The buggy address is located 0 bytes to the right of
[   20.330378]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.330601] 
[   20.330799] The buggy address belongs to the physical page:
[   20.330873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.331071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.331129] page_type: f5(slab)
[   20.331171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.331227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.331273] page dumped because: kasan: bad access detected
[   20.331596] 
[   20.331813] Memory state around the buggy address:
[   20.331870]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.332405]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.332707] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.332829]                                      ^
[   20.333406]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.333669]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.333897] ==================================================================
[   20.441424] ==================================================================
[   20.441495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.441547] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.441600] 
[   20.442128] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.442241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.442270] Hardware name: linux,dummy-virt (DT)
[   20.442526] Call trace:
[   20.442711]  show_stack+0x20/0x38 (C)
[   20.442863]  dump_stack_lvl+0x8c/0xd0
[   20.443069]  print_report+0x118/0x608
[   20.443750]  kasan_report+0xdc/0x128
[   20.443938]  kasan_check_range+0x100/0x1a8
[   20.444182]  __kasan_check_write+0x20/0x30
[   20.444234]  kasan_atomics_helper+0x15b4/0x4858
[   20.444285]  kasan_atomics+0x198/0x2e0
[   20.444332]  kunit_try_run_case+0x170/0x3f0
[   20.444825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.445121]  kthread+0x328/0x630
[   20.445395]  ret_from_fork+0x10/0x20
[   20.445522] 
[   20.445548] Allocated by task 265:
[   20.445719]  kasan_save_stack+0x3c/0x68
[   20.445827]  kasan_save_track+0x20/0x40
[   20.446013]  kasan_save_alloc_info+0x40/0x58
[   20.446326]  __kasan_kmalloc+0xd4/0xd8
[   20.446539]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.446658]  kasan_atomics+0xb8/0x2e0
[   20.446705]  kunit_try_run_case+0x170/0x3f0
[   20.446744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.446791]  kthread+0x328/0x630
[   20.446826]  ret_from_fork+0x10/0x20
[   20.446865] 
[   20.446888] The buggy address belongs to the object at fff00000c79f5980
[   20.446888]  which belongs to the cache kmalloc-64 of size 64
[   20.446951] The buggy address is located 0 bytes to the right of
[   20.446951]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.447021] 
[   20.447333] The buggy address belongs to the physical page:
[   20.447531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.447620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.447674] page_type: f5(slab)
[   20.447726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.447780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.447837] page dumped because: kasan: bad access detected
[   20.447873] 
[   20.447902] Memory state around the buggy address:
[   20.447948]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.447995]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.448041] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.448094]                                      ^
[   20.448138]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.448189]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.448240] ==================================================================
[   20.411024] ==================================================================
[   20.411215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.411628] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.411825] 
[   20.411930] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.412024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.412202] Hardware name: linux,dummy-virt (DT)
[   20.412619] Call trace:
[   20.412675]  show_stack+0x20/0x38 (C)
[   20.413116]  dump_stack_lvl+0x8c/0xd0
[   20.413624]  print_report+0x118/0x608
[   20.413814]  kasan_report+0xdc/0x128
[   20.413912]  kasan_check_range+0x100/0x1a8
[   20.414162]  __kasan_check_write+0x20/0x30
[   20.414574]  kasan_atomics_helper+0x147c/0x4858
[   20.414804]  kasan_atomics+0x198/0x2e0
[   20.414957]  kunit_try_run_case+0x170/0x3f0
[   20.415022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.415429]  kthread+0x328/0x630
[   20.415535]  ret_from_fork+0x10/0x20
[   20.415860] 
[   20.416030] Allocated by task 265:
[   20.416119]  kasan_save_stack+0x3c/0x68
[   20.416274]  kasan_save_track+0x20/0x40
[   20.416381]  kasan_save_alloc_info+0x40/0x58
[   20.416517]  __kasan_kmalloc+0xd4/0xd8
[   20.416560]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.416605]  kasan_atomics+0xb8/0x2e0
[   20.416641]  kunit_try_run_case+0x170/0x3f0
[   20.416681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.416728]  kthread+0x328/0x630
[   20.416764]  ret_from_fork+0x10/0x20
[   20.416802] 
[   20.416841] The buggy address belongs to the object at fff00000c79f5980
[   20.416841]  which belongs to the cache kmalloc-64 of size 64
[   20.416912] The buggy address is located 0 bytes to the right of
[   20.416912]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.416981] 
[   20.417017] The buggy address belongs to the physical page:
[   20.417060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.417137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.417198] page_type: f5(slab)
[   20.417239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.417293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.417357] page dumped because: kasan: bad access detected
[   20.417393] 
[   20.417422] Memory state around the buggy address:
[   20.417479]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.417526]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.417582] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.417631]                                      ^
[   20.417665]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.417721]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.417763] ==================================================================
[   20.114227] ==================================================================
[   20.114392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.114466] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.114521] 
[   20.114634] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.114728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.114775] Hardware name: linux,dummy-virt (DT)
[   20.115164] Call trace:
[   20.115215]  show_stack+0x20/0x38 (C)
[   20.115457]  dump_stack_lvl+0x8c/0xd0
[   20.115607]  print_report+0x118/0x608
[   20.115711]  kasan_report+0xdc/0x128
[   20.115768]  kasan_check_range+0x100/0x1a8
[   20.115818]  __kasan_check_write+0x20/0x30
[   20.116045]  kasan_atomics_helper+0x99c/0x4858
[   20.116201]  kasan_atomics+0x198/0x2e0
[   20.116401]  kunit_try_run_case+0x170/0x3f0
[   20.116633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.116713]  kthread+0x328/0x630
[   20.116799]  ret_from_fork+0x10/0x20
[   20.117288] 
[   20.117319] Allocated by task 265:
[   20.117390]  kasan_save_stack+0x3c/0x68
[   20.117727]  kasan_save_track+0x20/0x40
[   20.117920]  kasan_save_alloc_info+0x40/0x58
[   20.118072]  __kasan_kmalloc+0xd4/0xd8
[   20.118183]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.118329]  kasan_atomics+0xb8/0x2e0
[   20.118623]  kunit_try_run_case+0x170/0x3f0
[   20.118870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.118974]  kthread+0x328/0x630
[   20.119122]  ret_from_fork+0x10/0x20
[   20.119163] 
[   20.119185] The buggy address belongs to the object at fff00000c79f5980
[   20.119185]  which belongs to the cache kmalloc-64 of size 64
[   20.119255] The buggy address is located 0 bytes to the right of
[   20.119255]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.119666] 
[   20.119701] The buggy address belongs to the physical page:
[   20.119825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.119958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.120102] page_type: f5(slab)
[   20.120149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.120410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.120665] page dumped because: kasan: bad access detected
[   20.121181] 
[   20.121228] Memory state around the buggy address:
[   20.121694]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.121978]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.122042] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.122436]                                      ^
[   20.122711]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.122809]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.122921] ==================================================================
[   19.885600] ==================================================================
[   19.900033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   19.900456]  dump_stack_lvl+0x8c/0xd0
[   19.901145]  __kasan_kmalloc+0xd4/0xd8
[   19.902268] The buggy address belongs to the physical page:
[   19.903568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.904804]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.905202]                                      ^
[   19.905404] ==================================================================
[   20.431305] ==================================================================
[   20.431805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.432041] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.432156] 
[   20.432217] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.432878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.433079] Hardware name: linux,dummy-virt (DT)
[   20.433266] Call trace:
[   20.433371]  show_stack+0x20/0x38 (C)
[   20.433842]  dump_stack_lvl+0x8c/0xd0
[   20.434042]  print_report+0x118/0x608
[   20.434133]  kasan_report+0xdc/0x128
[   20.434296]  kasan_check_range+0x100/0x1a8
[   20.434436]  __kasan_check_write+0x20/0x30
[   20.434494]  kasan_atomics_helper+0x154c/0x4858
[   20.434546]  kasan_atomics+0x198/0x2e0
[   20.434601]  kunit_try_run_case+0x170/0x3f0
[   20.434651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.434705]  kthread+0x328/0x630
[   20.434751]  ret_from_fork+0x10/0x20
[   20.434800] 
[   20.434832] Allocated by task 265:
[   20.434878]  kasan_save_stack+0x3c/0x68
[   20.434921]  kasan_save_track+0x20/0x40
[   20.434971]  kasan_save_alloc_info+0x40/0x58
[   20.435276]  __kasan_kmalloc+0xd4/0xd8
[   20.435640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.435728]  kasan_atomics+0xb8/0x2e0
[   20.436085]  kunit_try_run_case+0x170/0x3f0
[   20.436135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.436191]  kthread+0x328/0x630
[   20.436226]  ret_from_fork+0x10/0x20
[   20.436587] 
[   20.437036] The buggy address belongs to the object at fff00000c79f5980
[   20.437036]  which belongs to the cache kmalloc-64 of size 64
[   20.437164] The buggy address is located 0 bytes to the right of
[   20.437164]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.437525] 
[   20.437740] The buggy address belongs to the physical page:
[   20.437860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.438028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.438246] page_type: f5(slab)
[   20.438722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.438793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.439016] page dumped because: kasan: bad access detected
[   20.439567] 
[   20.439613] Memory state around the buggy address:
[   20.439668]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.439717]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.439763] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.439805]                                      ^
[   20.440368]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.440602]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.440766] ==================================================================
[   20.298112] ==================================================================
[   20.298361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.298657] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.298727] 
[   20.298826] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.298956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.299021] Hardware name: linux,dummy-virt (DT)
[   20.299110] Call trace:
[   20.299170]  show_stack+0x20/0x38 (C)
[   20.299310]  dump_stack_lvl+0x8c/0xd0
[   20.299488]  print_report+0x118/0x608
[   20.299610]  kasan_report+0xdc/0x128
[   20.299658]  kasan_check_range+0x100/0x1a8
[   20.299717]  __kasan_check_write+0x20/0x30
[   20.299926]  kasan_atomics_helper+0xf88/0x4858
[   20.300028]  kasan_atomics+0x198/0x2e0
[   20.300086]  kunit_try_run_case+0x170/0x3f0
[   20.300136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.300192]  kthread+0x328/0x630
[   20.300237]  ret_from_fork+0x10/0x20
[   20.300295] 
[   20.300318] Allocated by task 265:
[   20.300347]  kasan_save_stack+0x3c/0x68
[   20.300407]  kasan_save_track+0x20/0x40
[   20.300460]  kasan_save_alloc_info+0x40/0x58
[   20.300511]  __kasan_kmalloc+0xd4/0xd8
[   20.300552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.300601]  kasan_atomics+0xb8/0x2e0
[   20.300647]  kunit_try_run_case+0x170/0x3f0
[   20.300688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.300748]  kthread+0x328/0x630
[   20.300783]  ret_from_fork+0x10/0x20
[   20.300821] 
[   20.300852] The buggy address belongs to the object at fff00000c79f5980
[   20.300852]  which belongs to the cache kmalloc-64 of size 64
[   20.300920] The buggy address is located 0 bytes to the right of
[   20.300920]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.300997] 
[   20.301034] The buggy address belongs to the physical page:
[   20.301068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.301136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.301188] page_type: f5(slab)
[   20.301228] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.301282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.301336] page dumped because: kasan: bad access detected
[   20.301380] 
[   20.301410] Memory state around the buggy address:
[   20.301552]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.302409]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.302618] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.302968]                                      ^
[   20.303031]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.303576]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.303708] ==================================================================
[   20.400083] ==================================================================
[   20.400612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.400769] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.400866] 
[   20.400900] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.401046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.401410] Hardware name: linux,dummy-virt (DT)
[   20.401824] Call trace:
[   20.401870]  show_stack+0x20/0x38 (C)
[   20.402014]  dump_stack_lvl+0x8c/0xd0
[   20.402071]  print_report+0x118/0x608
[   20.402203]  kasan_report+0xdc/0x128
[   20.402255]  kasan_check_range+0x100/0x1a8
[   20.402546]  __kasan_check_write+0x20/0x30
[   20.402596]  kasan_atomics_helper+0x1414/0x4858
[   20.402648]  kasan_atomics+0x198/0x2e0
[   20.402804]  kunit_try_run_case+0x170/0x3f0
[   20.402867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.402923]  kthread+0x328/0x630
[   20.402968]  ret_from_fork+0x10/0x20
[   20.403751] 
[   20.403878] Allocated by task 265:
[   20.404004]  kasan_save_stack+0x3c/0x68
[   20.404076]  kasan_save_track+0x20/0x40
[   20.404195]  kasan_save_alloc_info+0x40/0x58
[   20.404237]  __kasan_kmalloc+0xd4/0xd8
[   20.404277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.404318]  kasan_atomics+0xb8/0x2e0
[   20.404521]  kunit_try_run_case+0x170/0x3f0
[   20.404756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.405046]  kthread+0x328/0x630
[   20.405283]  ret_from_fork+0x10/0x20
[   20.405366] 
[   20.405415] The buggy address belongs to the object at fff00000c79f5980
[   20.405415]  which belongs to the cache kmalloc-64 of size 64
[   20.405698] The buggy address is located 0 bytes to the right of
[   20.405698]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.406166] 
[   20.406534] The buggy address belongs to the physical page:
[   20.406810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.407247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.407309] page_type: f5(slab)
[   20.407607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.408210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.408293] page dumped because: kasan: bad access detected
[   20.408334] 
[   20.408514] Memory state around the buggy address:
[   20.408788]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.409016]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.409071] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.409122]                                      ^
[   20.409158]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.409728]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.409793] ==================================================================
[   20.498979] ==================================================================
[   20.499927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.500026] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.500406] 
[   20.500474] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.500632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.500871] Hardware name: linux,dummy-virt (DT)
[   20.500911] Call trace:
[   20.501129]  show_stack+0x20/0x38 (C)
[   20.501328]  dump_stack_lvl+0x8c/0xd0
[   20.501567]  print_report+0x118/0x608
[   20.501871]  kasan_report+0xdc/0x128
[   20.501930]  kasan_check_range+0x100/0x1a8
[   20.502251]  __kasan_check_write+0x20/0x30
[   20.502682]  kasan_atomics_helper+0x175c/0x4858
[   20.502892]  kasan_atomics+0x198/0x2e0
[   20.503008]  kunit_try_run_case+0x170/0x3f0
[   20.503105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.503253]  kthread+0x328/0x630
[   20.503300]  ret_from_fork+0x10/0x20
[   20.503730] 
[   20.503772] Allocated by task 265:
[   20.504289]  kasan_save_stack+0x3c/0x68
[   20.504421]  kasan_save_track+0x20/0x40
[   20.504574]  kasan_save_alloc_info+0x40/0x58
[   20.504617]  __kasan_kmalloc+0xd4/0xd8
[   20.504832]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.504953]  kasan_atomics+0xb8/0x2e0
[   20.505529]  kunit_try_run_case+0x170/0x3f0
[   20.505653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.505807]  kthread+0x328/0x630
[   20.505847]  ret_from_fork+0x10/0x20
[   20.506477] 
[   20.506709] The buggy address belongs to the object at fff00000c79f5980
[   20.506709]  which belongs to the cache kmalloc-64 of size 64
[   20.506949] The buggy address is located 0 bytes to the right of
[   20.506949]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.507292] 
[   20.507506] The buggy address belongs to the physical page:
[   20.507566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.507753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.508009] page_type: f5(slab)
[   20.508256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.508738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.508831] page dumped because: kasan: bad access detected
[   20.508992] 
[   20.509301] Memory state around the buggy address:
[   20.509553]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.509618]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.509817] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.509915]                                      ^
[   20.510244]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.510557]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.510761] ==================================================================
[   20.316514] ==================================================================
[   20.316997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.317207] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.317262] 
[   20.317298] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.317422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.317462] Hardware name: linux,dummy-virt (DT)
[   20.317497] Call trace:
[   20.317532]  show_stack+0x20/0x38 (C)
[   20.317582]  dump_stack_lvl+0x8c/0xd0
[   20.317640]  print_report+0x118/0x608
[   20.317688]  kasan_report+0xdc/0x128
[   20.317744]  kasan_check_range+0x100/0x1a8
[   20.317794]  __kasan_check_write+0x20/0x30
[   20.317841]  kasan_atomics_helper+0x1058/0x4858
[   20.317894]  kasan_atomics+0x198/0x2e0
[   20.317939]  kunit_try_run_case+0x170/0x3f0
[   20.317988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.318043]  kthread+0x328/0x630
[   20.318085]  ret_from_fork+0x10/0x20
[   20.318134] 
[   20.318154] Allocated by task 265:
[   20.318188]  kasan_save_stack+0x3c/0x68
[   20.318231]  kasan_save_track+0x20/0x40
[   20.318269]  kasan_save_alloc_info+0x40/0x58
[   20.318312]  __kasan_kmalloc+0xd4/0xd8
[   20.318349]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.318397]  kasan_atomics+0xb8/0x2e0
[   20.318439]  kunit_try_run_case+0x170/0x3f0
[   20.318486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.318531]  kthread+0x328/0x630
[   20.318566]  ret_from_fork+0x10/0x20
[   20.318613] 
[   20.318636] The buggy address belongs to the object at fff00000c79f5980
[   20.318636]  which belongs to the cache kmalloc-64 of size 64
[   20.318699] The buggy address is located 0 bytes to the right of
[   20.318699]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.318768] 
[   20.318789] The buggy address belongs to the physical page:
[   20.318823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.318878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.318930] page_type: f5(slab)
[   20.318971] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.319411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.319960] page dumped because: kasan: bad access detected
[   20.320021] 
[   20.320089] Memory state around the buggy address:
[   20.320162]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.320396]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.320493] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.320821]                                      ^
[   20.321371]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.321657]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.321960] ==================================================================
[   20.364840] ==================================================================
[   20.364899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.364950] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.365014] 
[   20.365056] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.365141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.365176] Hardware name: linux,dummy-virt (DT)
[   20.365218] Call trace:
[   20.365253]  show_stack+0x20/0x38 (C)
[   20.365303]  dump_stack_lvl+0x8c/0xd0
[   20.365352]  print_report+0x118/0x608
[   20.365410]  kasan_report+0xdc/0x128
[   20.365471]  kasan_check_range+0x100/0x1a8
[   20.365531]  __kasan_check_write+0x20/0x30
[   20.365586]  kasan_atomics_helper+0x126c/0x4858
[   20.365644]  kasan_atomics+0x198/0x2e0
[   20.365700]  kunit_try_run_case+0x170/0x3f0
[   20.365750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.365805]  kthread+0x328/0x630
[   20.365847]  ret_from_fork+0x10/0x20
[   20.365896] 
[   20.365916] Allocated by task 265:
[   20.365946]  kasan_save_stack+0x3c/0x68
[   20.365987]  kasan_save_track+0x20/0x40
[   20.366027]  kasan_save_alloc_info+0x40/0x58
[   20.366073]  __kasan_kmalloc+0xd4/0xd8
[   20.366113]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.366158]  kasan_atomics+0xb8/0x2e0
[   20.366207]  kunit_try_run_case+0x170/0x3f0
[   20.366252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.366296]  kthread+0x328/0x630
[   20.366332]  ret_from_fork+0x10/0x20
[   20.366370] 
[   20.366399] The buggy address belongs to the object at fff00000c79f5980
[   20.366399]  which belongs to the cache kmalloc-64 of size 64
[   20.366898] The buggy address is located 0 bytes to the right of
[   20.366898]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.366975] 
[   20.366997] The buggy address belongs to the physical page:
[   20.367486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.367565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.367801] page_type: f5(slab)
[   20.368513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.369161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.369581] page dumped because: kasan: bad access detected
[   20.369627] 
[   20.370336] Memory state around the buggy address:
[   20.370397]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.370502]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.370552] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.370846]                                      ^
[   20.371278]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.371339]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.371380] ==================================================================
[   20.335917] ==================================================================
[   20.336008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.336071] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.336123] 
[   20.336154] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.336239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.336472] Hardware name: linux,dummy-virt (DT)
[   20.336907] Call trace:
[   20.336955]  show_stack+0x20/0x38 (C)
[   20.337009]  dump_stack_lvl+0x8c/0xd0
[   20.337210]  print_report+0x118/0x608
[   20.337286]  kasan_report+0xdc/0x128
[   20.337701]  kasan_check_range+0x100/0x1a8
[   20.337790]  __kasan_check_write+0x20/0x30
[   20.337840]  kasan_atomics_helper+0x1128/0x4858
[   20.338091]  kasan_atomics+0x198/0x2e0
[   20.338278]  kunit_try_run_case+0x170/0x3f0
[   20.338532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.338605]  kthread+0x328/0x630
[   20.338789]  ret_from_fork+0x10/0x20
[   20.339181] 
[   20.339291] Allocated by task 265:
[   20.339378]  kasan_save_stack+0x3c/0x68
[   20.339617]  kasan_save_track+0x20/0x40
[   20.339666]  kasan_save_alloc_info+0x40/0x58
[   20.339833]  __kasan_kmalloc+0xd4/0xd8
[   20.340043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.340094]  kasan_atomics+0xb8/0x2e0
[   20.340135]  kunit_try_run_case+0x170/0x3f0
[   20.340176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.340246]  kthread+0x328/0x630
[   20.340290]  ret_from_fork+0x10/0x20
[   20.340327] 
[   20.340361] The buggy address belongs to the object at fff00000c79f5980
[   20.340361]  which belongs to the cache kmalloc-64 of size 64
[   20.340431] The buggy address is located 0 bytes to the right of
[   20.340431]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.340512] 
[   20.340552] The buggy address belongs to the physical page:
[   20.340593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.340662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.340724] page_type: f5(slab)
[   20.340763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.340819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.340865] page dumped because: kasan: bad access detected
[   20.340900] 
[   20.340939] Memory state around the buggy address:
[   20.340994]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.341052]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.341108] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.341151]                                      ^
[   20.341187]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.341241]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.341285] ==================================================================
[   20.493652] ==================================================================
[   20.493720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.493772] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.493825] 
[   20.493855] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.493937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.493965] Hardware name: linux,dummy-virt (DT)
[   20.494000] Call trace:
[   20.494460]  show_stack+0x20/0x38 (C)
[   20.494725]  dump_stack_lvl+0x8c/0xd0
[   20.494809]  print_report+0x118/0x608
[   20.494862]  kasan_report+0xdc/0x128
[   20.494974]  __asan_report_load8_noabort+0x20/0x30
[   20.495092]  kasan_atomics_helper+0x3e10/0x4858
[   20.495434]  kasan_atomics+0x198/0x2e0
[   20.495588]  kunit_try_run_case+0x170/0x3f0
[   20.495700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.495914]  kthread+0x328/0x630
[   20.496125]  ret_from_fork+0x10/0x20
[   20.496622] 
[   20.496654] Allocated by task 265:
[   20.496691]  kasan_save_stack+0x3c/0x68
[   20.496935]  kasan_save_track+0x20/0x40
[   20.496987]  kasan_save_alloc_info+0x40/0x58
[   20.497029]  __kasan_kmalloc+0xd4/0xd8
[   20.497130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.497183]  kasan_atomics+0xb8/0x2e0
[   20.497233]  kunit_try_run_case+0x170/0x3f0
[   20.497273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.497320]  kthread+0x328/0x630
[   20.497353]  ret_from_fork+0x10/0x20
[   20.497389] 
[   20.497411] The buggy address belongs to the object at fff00000c79f5980
[   20.497411]  which belongs to the cache kmalloc-64 of size 64
[   20.497485] The buggy address is located 0 bytes to the right of
[   20.497485]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.497566] 
[   20.497605] The buggy address belongs to the physical page:
[   20.497639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.497697] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.497747] page_type: f5(slab)
[   20.497788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.497852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.497899] page dumped because: kasan: bad access detected
[   20.497941] 
[   20.497985] Memory state around the buggy address:
[   20.498025]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.498093]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.498139] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.498183]                                      ^
[   20.498219]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.498264]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.498306] ==================================================================
[   20.094976] ==================================================================
[   20.095254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.095426] Read of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.095692] 
[   20.095740] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.095917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.096115] Hardware name: linux,dummy-virt (DT)
[   20.096155] Call trace:
[   20.096177]  show_stack+0x20/0x38 (C)
[   20.096462]  dump_stack_lvl+0x8c/0xd0
[   20.096683]  print_report+0x118/0x608
[   20.096736]  kasan_report+0xdc/0x128
[   20.097199]  __asan_report_load4_noabort+0x20/0x30
[   20.097298]  kasan_atomics_helper+0x42d8/0x4858
[   20.097753]  kasan_atomics+0x198/0x2e0
[   20.097907]  kunit_try_run_case+0x170/0x3f0
[   20.097974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.098185]  kthread+0x328/0x630
[   20.098402]  ret_from_fork+0x10/0x20
[   20.098824] 
[   20.098881] Allocated by task 265:
[   20.099091]  kasan_save_stack+0x3c/0x68
[   20.099255]  kasan_save_track+0x20/0x40
[   20.099442]  kasan_save_alloc_info+0x40/0x58
[   20.099663]  __kasan_kmalloc+0xd4/0xd8
[   20.099710]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.100188]  kasan_atomics+0xb8/0x2e0
[   20.100364]  kunit_try_run_case+0x170/0x3f0
[   20.100496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.100693]  kthread+0x328/0x630
[   20.100738]  ret_from_fork+0x10/0x20
[   20.100986] 
[   20.101206] The buggy address belongs to the object at fff00000c79f5980
[   20.101206]  which belongs to the cache kmalloc-64 of size 64
[   20.101278] The buggy address is located 0 bytes to the right of
[   20.101278]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.101625] 
[   20.101717] The buggy address belongs to the physical page:
[   20.101763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.101983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.102172] page_type: f5(slab)
[   20.102456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.102527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.102890] Memory state around the buggy address:
[   20.103410] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.104911] ==================================================================
[   20.473272] ==================================================================
[   20.473325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.473377] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.473803] 
[   20.473884] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.474039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.474137] Hardware name: linux,dummy-virt (DT)
[   20.474181] Call trace:
[   20.474510]  show_stack+0x20/0x38 (C)
[   20.474576]  dump_stack_lvl+0x8c/0xd0
[   20.474871]  print_report+0x118/0x608
[   20.475207]  kasan_report+0xdc/0x128
[   20.475434]  __asan_report_load8_noabort+0x20/0x30
[   20.475674]  kasan_atomics_helper+0x3df4/0x4858
[   20.475790]  kasan_atomics+0x198/0x2e0
[   20.476085]  kunit_try_run_case+0x170/0x3f0
[   20.476367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.476531]  kthread+0x328/0x630
[   20.476581]  ret_from_fork+0x10/0x20
[   20.477146] 
[   20.477229] Allocated by task 265:
[   20.477544]  kasan_save_stack+0x3c/0x68
[   20.477683]  kasan_save_track+0x20/0x40
[   20.477964]  kasan_save_alloc_info+0x40/0x58
[   20.478327]  __kasan_kmalloc+0xd4/0xd8
[   20.478537]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.478599]  kasan_atomics+0xb8/0x2e0
[   20.478647]  kunit_try_run_case+0x170/0x3f0
[   20.478689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.478744]  kthread+0x328/0x630
[   20.478787]  ret_from_fork+0x10/0x20
[   20.478826] 
[   20.478849] The buggy address belongs to the object at fff00000c79f5980
[   20.478849]  which belongs to the cache kmalloc-64 of size 64
[   20.478922] The buggy address is located 0 bytes to the right of
[   20.478922]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.479186] 
[   20.479430] The buggy address belongs to the physical page:
[   20.479485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.480378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.480918] page_type: f5(slab)
[   20.481001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.481079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.481149] page dumped because: kasan: bad access detected
[   20.481201] 
[   20.481261] Memory state around the buggy address:
[   20.481610]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.481678]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.481855] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.482369]                                      ^
[   20.482651]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.482729]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.482978] ==================================================================
[   20.287934] ==================================================================
[   20.287991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.288043] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.288097] 
[   20.288603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.288708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.288737] Hardware name: linux,dummy-virt (DT)
[   20.288781] Call trace:
[   20.289241]  show_stack+0x20/0x38 (C)
[   20.289490]  dump_stack_lvl+0x8c/0xd0
[   20.289686]  print_report+0x118/0x608
[   20.289780]  kasan_report+0xdc/0x128
[   20.289959]  kasan_check_range+0x100/0x1a8
[   20.290195]  __kasan_check_write+0x20/0x30
[   20.290263]  kasan_atomics_helper+0xf20/0x4858
[   20.290313]  kasan_atomics+0x198/0x2e0
[   20.290361]  kunit_try_run_case+0x170/0x3f0
[   20.290551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.290748]  kthread+0x328/0x630
[   20.290834]  ret_from_fork+0x10/0x20
[   20.290896] 
[   20.290918] Allocated by task 265:
[   20.290947]  kasan_save_stack+0x3c/0x68
[   20.291354]  kasan_save_track+0x20/0x40
[   20.291441]  kasan_save_alloc_info+0x40/0x58
[   20.291586]  __kasan_kmalloc+0xd4/0xd8
[   20.291919]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.292305]  kasan_atomics+0xb8/0x2e0
[   20.292387]  kunit_try_run_case+0x170/0x3f0
[   20.292486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.292568]  kthread+0x328/0x630
[   20.292778]  ret_from_fork+0x10/0x20
[   20.292866] 
[   20.293361] The buggy address belongs to the object at fff00000c79f5980
[   20.293361]  which belongs to the cache kmalloc-64 of size 64
[   20.293631] The buggy address is located 0 bytes to the right of
[   20.293631]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.294032] 
[   20.294109] The buggy address belongs to the physical page:
[   20.294254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.294705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.294771] page_type: f5(slab)
[   20.294943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.295240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.295425] page dumped because: kasan: bad access detected
[   20.295678] 
[   20.295706] Memory state around the buggy address:
[   20.295748]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.296044]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.296510] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.296653]                                      ^
[   20.296715]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.296769]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.296812] ==================================================================
[   20.214784] ==================================================================
[   20.214926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.214982] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.215355] 
[   20.215464] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.215604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.215645] Hardware name: linux,dummy-virt (DT)
[   20.215678] Call trace:
[   20.215796]  show_stack+0x20/0x38 (C)
[   20.215869]  dump_stack_lvl+0x8c/0xd0
[   20.215920]  print_report+0x118/0x608
[   20.215977]  kasan_report+0xdc/0x128
[   20.216025]  kasan_check_range+0x100/0x1a8
[   20.216073]  __kasan_check_write+0x20/0x30
[   20.216120]  kasan_atomics_helper+0xd3c/0x4858
[   20.216179]  kasan_atomics+0x198/0x2e0
[   20.216245]  kunit_try_run_case+0x170/0x3f0
[   20.216302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.216375]  kthread+0x328/0x630
[   20.216441]  ret_from_fork+0x10/0x20
[   20.217190] 
[   20.217337] Allocated by task 265:
[   20.217968]  kasan_save_stack+0x3c/0x68
[   20.218035]  kasan_save_track+0x20/0x40
[   20.218405]  kasan_save_alloc_info+0x40/0x58
[   20.218735]  __kasan_kmalloc+0xd4/0xd8
[   20.218887]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.219220]  kasan_atomics+0xb8/0x2e0
[   20.219628]  kunit_try_run_case+0x170/0x3f0
[   20.219875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.220473]  kthread+0x328/0x630
[   20.220533]  ret_from_fork+0x10/0x20
[   20.220872] 
[   20.221124] The buggy address belongs to the object at fff00000c79f5980
[   20.221124]  which belongs to the cache kmalloc-64 of size 64
[   20.221266] The buggy address is located 0 bytes to the right of
[   20.221266]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.221636] 
[   20.221722] The buggy address belongs to the physical page:
[   20.221890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.222189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.222381] page_type: f5(slab)
[   20.222816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.222901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.223148] page dumped because: kasan: bad access detected
[   20.223377] 
[   20.223407] Memory state around the buggy address:
[   20.223583]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.223745]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.223983] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.224430]                                      ^
[   20.224515]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.224950]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.225103] ==================================================================
[   20.391414] ==================================================================
[   20.391737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.391805] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.391859] 
[   20.391890] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.391974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.392002] Hardware name: linux,dummy-virt (DT)
[   20.392037] Call trace:
[   20.392059]  show_stack+0x20/0x38 (C)
[   20.392108]  dump_stack_lvl+0x8c/0xd0
[   20.392156]  print_report+0x118/0x608
[   20.392883]  kasan_report+0xdc/0x128
[   20.392955]  __asan_report_load8_noabort+0x20/0x30
[   20.393008]  kasan_atomics_helper+0x3f04/0x4858
[   20.393069]  kasan_atomics+0x198/0x2e0
[   20.393189]  kunit_try_run_case+0x170/0x3f0
[   20.393271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.393329]  kthread+0x328/0x630
[   20.393797]  ret_from_fork+0x10/0x20
[   20.393994] 
[   20.394071] Allocated by task 265:
[   20.394106]  kasan_save_stack+0x3c/0x68
[   20.394159]  kasan_save_track+0x20/0x40
[   20.394248]  kasan_save_alloc_info+0x40/0x58
[   20.394293]  __kasan_kmalloc+0xd4/0xd8
[   20.394359]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.394562]  kasan_atomics+0xb8/0x2e0
[   20.394732]  kunit_try_run_case+0x170/0x3f0
[   20.394787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.394832]  kthread+0x328/0x630
[   20.394867]  ret_from_fork+0x10/0x20
[   20.395280] 
[   20.395333] The buggy address belongs to the object at fff00000c79f5980
[   20.395333]  which belongs to the cache kmalloc-64 of size 64
[   20.395774] The buggy address is located 0 bytes to the right of
[   20.395774]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.396338] 
[   20.396373] The buggy address belongs to the physical page:
[   20.396518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.396675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.396899] page_type: f5(slab)
[   20.397158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.397589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.397858] page dumped because: kasan: bad access detected
[   20.398097] 
[   20.398440] Memory state around the buggy address:
[   20.398514]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.398563]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.399002] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.399191]                                      ^
[   20.399433]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.399573]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.399614] ==================================================================
[   20.521940] ==================================================================
[   20.522520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.522653] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.522711] 
[   20.522742] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.522973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.523014] Hardware name: linux,dummy-virt (DT)
[   20.523477] Call trace:
[   20.523506]  show_stack+0x20/0x38 (C)
[   20.523561]  dump_stack_lvl+0x8c/0xd0
[   20.523610]  print_report+0x118/0x608
[   20.523659]  kasan_report+0xdc/0x128
[   20.523957]  kasan_check_range+0x100/0x1a8
[   20.524078]  __kasan_check_write+0x20/0x30
[   20.524126]  kasan_atomics_helper+0x17ec/0x4858
[   20.524193]  kasan_atomics+0x198/0x2e0
[   20.524261]  kunit_try_run_case+0x170/0x3f0
[   20.524320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.524382]  kthread+0x328/0x630
[   20.524438]  ret_from_fork+0x10/0x20
[   20.524506] 
[   20.524530] Allocated by task 265:
[   20.524560]  kasan_save_stack+0x3c/0x68
[   20.524613]  kasan_save_track+0x20/0x40
[   20.524661]  kasan_save_alloc_info+0x40/0x58
[   20.524714]  __kasan_kmalloc+0xd4/0xd8
[   20.524751]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.524794]  kasan_atomics+0xb8/0x2e0
[   20.524840]  kunit_try_run_case+0x170/0x3f0
[   20.524882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.524928]  kthread+0x328/0x630
[   20.524963]  ret_from_fork+0x10/0x20
[   20.525000] 
[   20.525035] The buggy address belongs to the object at fff00000c79f5980
[   20.525035]  which belongs to the cache kmalloc-64 of size 64
[   20.525106] The buggy address is located 0 bytes to the right of
[   20.525106]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.525175] 
[   20.525196] The buggy address belongs to the physical page:
[   20.525239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.525306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.525356] page_type: f5(slab)
[   20.525406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.526379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.526471] page dumped because: kasan: bad access detected
[   20.526521] 
[   20.526543] Memory state around the buggy address:
[   20.527139]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.527339]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.527886] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.528211]                                      ^
[   20.528359]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.528498]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.528824] ==================================================================
[   20.248316] ==================================================================
[   20.248459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.248658] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.248718] 
[   20.248831] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.248919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.248948] Hardware name: linux,dummy-virt (DT)
[   20.249017] Call trace:
[   20.249045]  show_stack+0x20/0x38 (C)
[   20.249097]  dump_stack_lvl+0x8c/0xd0
[   20.249457]  print_report+0x118/0x608
[   20.249528]  kasan_report+0xdc/0x128
[   20.249577]  __asan_report_load8_noabort+0x20/0x30
[   20.249634]  kasan_atomics_helper+0x3f58/0x4858
[   20.249703]  kasan_atomics+0x198/0x2e0
[   20.249752]  kunit_try_run_case+0x170/0x3f0
[   20.249809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.249865]  kthread+0x328/0x630
[   20.249912]  ret_from_fork+0x10/0x20
[   20.249963] 
[   20.249985] Allocated by task 265:
[   20.250020]  kasan_save_stack+0x3c/0x68
[   20.250063]  kasan_save_track+0x20/0x40
[   20.250103]  kasan_save_alloc_info+0x40/0x58
[   20.250154]  __kasan_kmalloc+0xd4/0xd8
[   20.250195]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.250237]  kasan_atomics+0xb8/0x2e0
[   20.250276]  kunit_try_run_case+0x170/0x3f0
[   20.250317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.250363]  kthread+0x328/0x630
[   20.250396]  ret_from_fork+0x10/0x20
[   20.250438] 
[   20.250785] The buggy address belongs to the object at fff00000c79f5980
[   20.250785]  which belongs to the cache kmalloc-64 of size 64
[   20.250854] The buggy address is located 0 bytes to the right of
[   20.250854]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.250973] 
[   20.251156] The buggy address belongs to the physical page:
[   20.251774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.251877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.252287] page_type: f5(slab)
[   20.252612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.253288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.253403] page dumped because: kasan: bad access detected
[   20.253673] 
[   20.253818] Memory state around the buggy address:
[   20.253888]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.254476]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.254978] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.255319]                                      ^
[   20.255550]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.255699]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.255784] ==================================================================
[   20.269501] ==================================================================
[   20.269562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.269618] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.269705] 
[   20.269740] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.269824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.269852] Hardware name: linux,dummy-virt (DT)
[   20.269888] Call trace:
[   20.270488]  show_stack+0x20/0x38 (C)
[   20.270651]  dump_stack_lvl+0x8c/0xd0
[   20.270711]  print_report+0x118/0x608
[   20.270925]  kasan_report+0xdc/0x128
[   20.270982]  __asan_report_store8_noabort+0x20/0x30
[   20.271151]  kasan_atomics_helper+0x3e5c/0x4858
[   20.271677]  kasan_atomics+0x198/0x2e0
[   20.271834]  kunit_try_run_case+0x170/0x3f0
[   20.271948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.272132]  kthread+0x328/0x630
[   20.272199]  ret_from_fork+0x10/0x20
[   20.272370] 
[   20.272583] Allocated by task 265:
[   20.272630]  kasan_save_stack+0x3c/0x68
[   20.273034]  kasan_save_track+0x20/0x40
[   20.273108]  kasan_save_alloc_info+0x40/0x58
[   20.273154]  __kasan_kmalloc+0xd4/0xd8
[   20.273194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.273237]  kasan_atomics+0xb8/0x2e0
[   20.273372]  kunit_try_run_case+0x170/0x3f0
[   20.273420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.273476]  kthread+0x328/0x630
[   20.273511]  ret_from_fork+0x10/0x20
[   20.273550] 
[   20.273798] The buggy address belongs to the object at fff00000c79f5980
[   20.273798]  which belongs to the cache kmalloc-64 of size 64
[   20.273883] The buggy address is located 0 bytes to the right of
[   20.273883]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.273955] 
[   20.273978] The buggy address belongs to the physical page:
[   20.274020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.274105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.274168] page_type: f5(slab)
[   20.274210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.274265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.274311] page dumped because: kasan: bad access detected
[   20.274354] 
[   20.274379] Memory state around the buggy address:
[   20.274427]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.274945]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.274997] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.275040]                                      ^
[   20.275625]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.275945]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.276562] ==================================================================
[   20.450083] ==================================================================
[   20.450186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.450492] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.450728] 
[   20.450803] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.450899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.450927] Hardware name: linux,dummy-virt (DT)
[   20.451011] Call trace:
[   20.451062]  show_stack+0x20/0x38 (C)
[   20.451116]  dump_stack_lvl+0x8c/0xd0
[   20.451324]  print_report+0x118/0x608
[   20.451839]  kasan_report+0xdc/0x128
[   20.452029]  __asan_report_load8_noabort+0x20/0x30
[   20.452333]  kasan_atomics_helper+0x3db0/0x4858
[   20.452503]  kasan_atomics+0x198/0x2e0
[   20.452787]  kunit_try_run_case+0x170/0x3f0
[   20.453264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.453707]  kthread+0x328/0x630
[   20.453768]  ret_from_fork+0x10/0x20
[   20.453977] 
[   20.454121] Allocated by task 265:
[   20.454291]  kasan_save_stack+0x3c/0x68
[   20.454595]  kasan_save_track+0x20/0x40
[   20.455347]  kasan_save_alloc_info+0x40/0x58
[   20.455751]  __kasan_kmalloc+0xd4/0xd8
[   20.455834]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.455877]  kasan_atomics+0xb8/0x2e0
[   20.455917]  kunit_try_run_case+0x170/0x3f0
[   20.455956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.456393]  kthread+0x328/0x630
[   20.456492]  ret_from_fork+0x10/0x20
[   20.456833] 
[   20.456869] The buggy address belongs to the object at fff00000c79f5980
[   20.456869]  which belongs to the cache kmalloc-64 of size 64
[   20.457333] The buggy address is located 0 bytes to the right of
[   20.457333]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.457960] 
[   20.458292] The buggy address belongs to the physical page:
[   20.458436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.458838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.459227] page_type: f5(slab)
[   20.459503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.459719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.459782] page dumped because: kasan: bad access detected
[   20.459818] 
[   20.459838] Memory state around the buggy address:
[   20.459876]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.460405]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.460726] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.460942]                                      ^
[   20.461114]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.461355]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.461537] ==================================================================
[   20.277856] ==================================================================
[   20.277926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.277980] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.278041] 
[   20.278362] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.278552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.278597] Hardware name: linux,dummy-virt (DT)
[   20.278634] Call trace:
[   20.278676]  show_stack+0x20/0x38 (C)
[   20.278730]  dump_stack_lvl+0x8c/0xd0
[   20.279161]  print_report+0x118/0x608
[   20.279293]  kasan_report+0xdc/0x128
[   20.279582]  kasan_check_range+0x100/0x1a8
[   20.279677]  __kasan_check_write+0x20/0x30
[   20.279725]  kasan_atomics_helper+0xeb8/0x4858
[   20.279774]  kasan_atomics+0x198/0x2e0
[   20.280307]  kunit_try_run_case+0x170/0x3f0
[   20.280594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.280710]  kthread+0x328/0x630
[   20.280818]  ret_from_fork+0x10/0x20
[   20.280927] 
[   20.280947] Allocated by task 265:
[   20.281383]  kasan_save_stack+0x3c/0x68
[   20.281721]  kasan_save_track+0x20/0x40
[   20.281930]  kasan_save_alloc_info+0x40/0x58
[   20.282193]  __kasan_kmalloc+0xd4/0xd8
[   20.282238]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.282573]  kasan_atomics+0xb8/0x2e0
[   20.282907]  kunit_try_run_case+0x170/0x3f0
[   20.283093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.283149]  kthread+0x328/0x630
[   20.283186]  ret_from_fork+0x10/0x20
[   20.283225] 
[   20.283249] The buggy address belongs to the object at fff00000c79f5980
[   20.283249]  which belongs to the cache kmalloc-64 of size 64
[   20.283312] The buggy address is located 0 bytes to the right of
[   20.283312]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.283921] 
[   20.284096] The buggy address belongs to the physical page:
[   20.284170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.284236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.284297] page_type: f5(slab)
[   20.284528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.285099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.285400] page dumped because: kasan: bad access detected
[   20.285558] 
[   20.285767] Memory state around the buggy address:
[   20.285845]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.286015]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.286225] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.286410]                                      ^
[   20.286642]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.286871]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.287145] ==================================================================
[   20.131497] ==================================================================
[   20.131560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.131613] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.131666] 
[   20.132248] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.132461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.132500] Hardware name: linux,dummy-virt (DT)
[   20.132681] Call trace:
[   20.132717]  show_stack+0x20/0x38 (C)
[   20.132945]  dump_stack_lvl+0x8c/0xd0
[   20.133035]  print_report+0x118/0x608
[   20.133086]  kasan_report+0xdc/0x128
[   20.133411]  kasan_check_range+0x100/0x1a8
[   20.133500]  __kasan_check_write+0x20/0x30
[   20.133717]  kasan_atomics_helper+0xa6c/0x4858
[   20.133904]  kasan_atomics+0x198/0x2e0
[   20.134090]  kunit_try_run_case+0x170/0x3f0
[   20.134225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.134428]  kthread+0x328/0x630
[   20.134508]  ret_from_fork+0x10/0x20
[   20.134577] 
[   20.134722] Allocated by task 265:
[   20.134765]  kasan_save_stack+0x3c/0x68
[   20.134999]  kasan_save_track+0x20/0x40
[   20.135077]  kasan_save_alloc_info+0x40/0x58
[   20.135122]  __kasan_kmalloc+0xd4/0xd8
[   20.135162]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.135204]  kasan_atomics+0xb8/0x2e0
[   20.135411]  kunit_try_run_case+0x170/0x3f0
[   20.135702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.135904]  kthread+0x328/0x630
[   20.136142]  ret_from_fork+0x10/0x20
[   20.136211] 
[   20.136289] The buggy address belongs to the object at fff00000c79f5980
[   20.136289]  which belongs to the cache kmalloc-64 of size 64
[   20.136394] The buggy address is located 0 bytes to the right of
[   20.136394]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.136683] 
[   20.136779] The buggy address belongs to the physical page:
[   20.136817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.137238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.137305] page_type: f5(slab)
[   20.137508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.137763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.138189] page dumped because: kasan: bad access detected
[   20.138342] 
[   20.138574] Memory state around the buggy address:
[   20.138627]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.138830]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.138908] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.138988]                                      ^
[   20.139041]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.139089]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.139139] ==================================================================
[   20.140733] ==================================================================
[   20.140790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.140841] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.140892] 
[   20.140923] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.141008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.141081] Hardware name: linux,dummy-virt (DT)
[   20.141121] Call trace:
[   20.141165]  show_stack+0x20/0x38 (C)
[   20.141218]  dump_stack_lvl+0x8c/0xd0
[   20.141267]  print_report+0x118/0x608
[   20.141315]  kasan_report+0xdc/0x128
[   20.141367]  kasan_check_range+0x100/0x1a8
[   20.141418]  __kasan_check_write+0x20/0x30
[   20.141476]  kasan_atomics_helper+0xad4/0x4858
[   20.141526]  kasan_atomics+0x198/0x2e0
[   20.141572]  kunit_try_run_case+0x170/0x3f0
[   20.141629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.141684]  kthread+0x328/0x630
[   20.141738]  ret_from_fork+0x10/0x20
[   20.141787] 
[   20.141809] Allocated by task 265:
[   20.141849]  kasan_save_stack+0x3c/0x68
[   20.141900]  kasan_save_track+0x20/0x40
[   20.141941]  kasan_save_alloc_info+0x40/0x58
[   20.141983]  __kasan_kmalloc+0xd4/0xd8
[   20.142022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.142064]  kasan_atomics+0xb8/0x2e0
[   20.142102]  kunit_try_run_case+0x170/0x3f0
[   20.142142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.142189]  kthread+0x328/0x630
[   20.142238]  ret_from_fork+0x10/0x20
[   20.142276] 
[   20.142298] The buggy address belongs to the object at fff00000c79f5980
[   20.142298]  which belongs to the cache kmalloc-64 of size 64
[   20.142362] The buggy address is located 0 bytes to the right of
[   20.142362]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.142436] 
[   20.143364] The buggy address belongs to the physical page:
[   20.143606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.143778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.144096] page_type: f5(slab)
[   20.144147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.144293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.144417] page dumped because: kasan: bad access detected
[   20.144558] 
[   20.144777] Memory state around the buggy address:
[   20.145042]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.145527]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.145772] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.145937]                                      ^
[   20.146180]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.146367]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.146412] ==================================================================
[   20.147245] ==================================================================
[   20.147320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   20.147374] Read of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.147428] 
[   20.147470] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.147924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.148099] Hardware name: linux,dummy-virt (DT)
[   20.148165] Call trace:
[   20.148192]  show_stack+0x20/0x38 (C)
[   20.148305]  dump_stack_lvl+0x8c/0xd0
[   20.148470]  print_report+0x118/0x608
[   20.148675]  kasan_report+0xdc/0x128
[   20.148737]  __asan_report_load4_noabort+0x20/0x30
[   20.148788]  kasan_atomics_helper+0x3dcc/0x4858
[   20.149009]  kasan_atomics+0x198/0x2e0
[   20.149219]  kunit_try_run_case+0x170/0x3f0
[   20.149513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.149584]  kthread+0x328/0x630
[   20.149636]  ret_from_fork+0x10/0x20
[   20.149819] 
[   20.149991] Allocated by task 265:
[   20.150037]  kasan_save_stack+0x3c/0x68
[   20.150226]  kasan_save_track+0x20/0x40
[   20.150331]  kasan_save_alloc_info+0x40/0x58
[   20.150383]  __kasan_kmalloc+0xd4/0xd8
[   20.150430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.150797]  kasan_atomics+0xb8/0x2e0
[   20.150859]  kunit_try_run_case+0x170/0x3f0
[   20.150901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.151063]  kthread+0x328/0x630
[   20.151154]  ret_from_fork+0x10/0x20
[   20.151320] 
[   20.151391] The buggy address belongs to the object at fff00000c79f5980
[   20.151391]  which belongs to the cache kmalloc-64 of size 64
[   20.151633] The buggy address is located 0 bytes to the right of
[   20.151633]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.153687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.154999] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.155733] ==================================================================
[   20.015344] ==================================================================
[   20.016915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   20.017642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.017759] Call trace:
[   20.018922]  kasan_atomics_helper+0x54c/0x4858
[   20.018974]  kasan_atomics+0x198/0x2e0
[   20.019826]  ret_from_fork+0x10/0x20
[   20.021576]  kunit_try_run_case+0x170/0x3f0
[   20.022153] The buggy address is located 0 bytes to the right of
[   20.022153]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.022361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.022442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.022783]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.022940]                                      ^
[   20.023610]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.026313] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.026526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.027778]  kasan_report+0xdc/0x128
[   20.029279]  kasan_atomics+0x198/0x2e0
[   20.031901]  kunit_try_run_case+0x170/0x3f0
[   20.032919] The buggy address is located 0 bytes to the right of
[   20.032919]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.035030] Memory state around the buggy address:
[   20.035514] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.036128] ==================================================================
[   20.353216] ==================================================================
[   20.353458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.353898] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.353968] 
[   20.354185] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.354477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.354520] Hardware name: linux,dummy-virt (DT)
[   20.354701] Call trace:
[   20.354759]  show_stack+0x20/0x38 (C)
[   20.354972]  dump_stack_lvl+0x8c/0xd0
[   20.355422]  print_report+0x118/0x608
[   20.355490]  kasan_report+0xdc/0x128
[   20.355538]  kasan_check_range+0x100/0x1a8
[   20.356118]  __kasan_check_write+0x20/0x30
[   20.356315]  kasan_atomics_helper+0x11f8/0x4858
[   20.356517]  kasan_atomics+0x198/0x2e0
[   20.356638]  kunit_try_run_case+0x170/0x3f0
[   20.356757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.356842]  kthread+0x328/0x630
[   20.357180]  ret_from_fork+0x10/0x20
[   20.357413] 
[   20.357672] Allocated by task 265:
[   20.357748]  kasan_save_stack+0x3c/0x68
[   20.357975]  kasan_save_track+0x20/0x40
[   20.358021]  kasan_save_alloc_info+0x40/0x58
[   20.358234]  __kasan_kmalloc+0xd4/0xd8
[   20.358503]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.358733]  kasan_atomics+0xb8/0x2e0
[   20.358891]  kunit_try_run_case+0x170/0x3f0
[   20.358938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.359457]  kthread+0x328/0x630
[   20.359664]  ret_from_fork+0x10/0x20
[   20.359757] 
[   20.359781] The buggy address belongs to the object at fff00000c79f5980
[   20.359781]  which belongs to the cache kmalloc-64 of size 64
[   20.360014] The buggy address is located 0 bytes to the right of
[   20.360014]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.360216] 
[   20.360339] The buggy address belongs to the physical page:
[   20.360713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.360809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.360992] page_type: f5(slab)
[   20.361579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.361996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.362069] page dumped because: kasan: bad access detected
[   20.362106] 
[   20.362126] Memory state around the buggy address:
[   20.362167]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.362785]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.363001] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.363053]                                      ^
[   20.363089]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.363136]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.363177] ==================================================================
[   20.372215] ==================================================================
[   20.372286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.372438] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.372508] 
[   20.372569] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.372656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.373060] Hardware name: linux,dummy-virt (DT)
[   20.373246] Call trace:
[   20.373282]  show_stack+0x20/0x38 (C)
[   20.373639]  dump_stack_lvl+0x8c/0xd0
[   20.373728]  print_report+0x118/0x608
[   20.374030]  kasan_report+0xdc/0x128
[   20.374313]  kasan_check_range+0x100/0x1a8
[   20.374454]  __kasan_check_write+0x20/0x30
[   20.374507]  kasan_atomics_helper+0x12d8/0x4858
[   20.374700]  kasan_atomics+0x198/0x2e0
[   20.374951]  kunit_try_run_case+0x170/0x3f0
[   20.375197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.375515]  kthread+0x328/0x630
[   20.375873]  ret_from_fork+0x10/0x20
[   20.376291] 
[   20.376336] Allocated by task 265:
[   20.376473]  kasan_save_stack+0x3c/0x68
[   20.376628]  kasan_save_track+0x20/0x40
[   20.376744]  kasan_save_alloc_info+0x40/0x58
[   20.376786]  __kasan_kmalloc+0xd4/0xd8
[   20.376826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.376985]  kasan_atomics+0xb8/0x2e0
[   20.377986]  kunit_try_run_case+0x170/0x3f0
[   20.378062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.378143]  kthread+0x328/0x630
[   20.378204]  ret_from_fork+0x10/0x20
[   20.378244] 
[   20.378283] The buggy address belongs to the object at fff00000c79f5980
[   20.378283]  which belongs to the cache kmalloc-64 of size 64
[   20.378579] The buggy address is located 0 bytes to the right of
[   20.378579]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.378848] 
[   20.379192] The buggy address belongs to the physical page:
[   20.379873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.379953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.380331] page_type: f5(slab)
[   20.380684] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.380765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.380913] page dumped because: kasan: bad access detected
[   20.381019] 
[   20.381048] Memory state around the buggy address:
[   20.381088]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.381275]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.381716] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.381912]                                      ^
[   20.381955]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.382243]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.382641] ==================================================================
[   20.419457] ==================================================================
[   20.419513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.420093] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.420180] 
[   20.420216] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.420440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.420546] Hardware name: linux,dummy-virt (DT)
[   20.420680] Call trace:
[   20.420766]  show_stack+0x20/0x38 (C)
[   20.420821]  dump_stack_lvl+0x8c/0xd0
[   20.421047]  print_report+0x118/0x608
[   20.421279]  kasan_report+0xdc/0x128
[   20.421345]  kasan_check_range+0x100/0x1a8
[   20.421561]  __kasan_check_write+0x20/0x30
[   20.421827]  kasan_atomics_helper+0x14e4/0x4858
[   20.421899]  kasan_atomics+0x198/0x2e0
[   20.421945]  kunit_try_run_case+0x170/0x3f0
[   20.421995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.422048]  kthread+0x328/0x630
[   20.422588]  ret_from_fork+0x10/0x20
[   20.422817] 
[   20.422845] Allocated by task 265:
[   20.422923]  kasan_save_stack+0x3c/0x68
[   20.423032]  kasan_save_track+0x20/0x40
[   20.423257]  kasan_save_alloc_info+0x40/0x58
[   20.423304]  __kasan_kmalloc+0xd4/0xd8
[   20.423534]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.424028]  kasan_atomics+0xb8/0x2e0
[   20.424239]  kunit_try_run_case+0x170/0x3f0
[   20.424383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.424569]  kthread+0x328/0x630
[   20.424609]  ret_from_fork+0x10/0x20
[   20.424957] 
[   20.425316] The buggy address belongs to the object at fff00000c79f5980
[   20.425316]  which belongs to the cache kmalloc-64 of size 64
[   20.425671] The buggy address is located 0 bytes to the right of
[   20.425671]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.426111] 
[   20.426149] The buggy address belongs to the physical page:
[   20.426469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.426711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.426943] page_type: f5(slab)
[   20.427100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.427399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.427657] page dumped because: kasan: bad access detected
[   20.427917] 
[   20.427967] Memory state around the buggy address:
[   20.428028]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.428324]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.428803] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.429021]                                      ^
[   20.429198]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.429290]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.429798] ==================================================================
[   20.226930] ==================================================================
[   20.226992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.227046] Read of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.227101] 
[   20.227138] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.227221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.227285] Hardware name: linux,dummy-virt (DT)
[   20.227324] Call trace:
[   20.227347]  show_stack+0x20/0x38 (C)
[   20.227398]  dump_stack_lvl+0x8c/0xd0
[   20.227462]  print_report+0x118/0x608
[   20.227511]  kasan_report+0xdc/0x128
[   20.227557]  __asan_report_load4_noabort+0x20/0x30
[   20.227617]  kasan_atomics_helper+0x3e04/0x4858
[   20.227679]  kasan_atomics+0x198/0x2e0
[   20.227735]  kunit_try_run_case+0x170/0x3f0
[   20.227786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.227840]  kthread+0x328/0x630
[   20.227886]  ret_from_fork+0x10/0x20
[   20.227943] 
[   20.227969] Allocated by task 265:
[   20.227999]  kasan_save_stack+0x3c/0x68
[   20.228042]  kasan_save_track+0x20/0x40
[   20.228081]  kasan_save_alloc_info+0x40/0x58
[   20.228123]  __kasan_kmalloc+0xd4/0xd8
[   20.228161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.228212]  kasan_atomics+0xb8/0x2e0
[   20.228256]  kunit_try_run_case+0x170/0x3f0
[   20.228296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.228341]  kthread+0x328/0x630
[   20.228384]  ret_from_fork+0x10/0x20
[   20.228421] 
[   20.228802] The buggy address belongs to the object at fff00000c79f5980
[   20.228802]  which belongs to the cache kmalloc-64 of size 64
[   20.229229] The buggy address is located 0 bytes to the right of
[   20.229229]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.229338] 
[   20.229360] The buggy address belongs to the physical page:
[   20.229395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.229467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.229519] page_type: f5(slab)
[   20.229944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.230570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.230866] page dumped because: kasan: bad access detected
[   20.230924] 
[   20.231157] Memory state around the buggy address:
[   20.231226]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.231276]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.231747] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.232062]                                      ^
[   20.232422]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.232550]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.232617] ==================================================================
[   20.383726] ==================================================================
[   20.383829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.384021] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.384138] 
[   20.384181] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.384266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.384296] Hardware name: linux,dummy-virt (DT)
[   20.384749] Call trace:
[   20.384810]  show_stack+0x20/0x38 (C)
[   20.384912]  dump_stack_lvl+0x8c/0xd0
[   20.384966]  print_report+0x118/0x608
[   20.385028]  kasan_report+0xdc/0x128
[   20.385269]  kasan_check_range+0x100/0x1a8
[   20.385620]  __kasan_check_write+0x20/0x30
[   20.385980]  kasan_atomics_helper+0x1384/0x4858
[   20.386065]  kasan_atomics+0x198/0x2e0
[   20.386263]  kunit_try_run_case+0x170/0x3f0
[   20.386374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.386612]  kthread+0x328/0x630
[   20.386693]  ret_from_fork+0x10/0x20
[   20.386747] 
[   20.386806] Allocated by task 265:
[   20.387111]  kasan_save_stack+0x3c/0x68
[   20.387379]  kasan_save_track+0x20/0x40
[   20.387540]  kasan_save_alloc_info+0x40/0x58
[   20.387642]  __kasan_kmalloc+0xd4/0xd8
[   20.387686]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.387727]  kasan_atomics+0xb8/0x2e0
[   20.387879]  kunit_try_run_case+0x170/0x3f0
[   20.388151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.388383]  kthread+0x328/0x630
[   20.388699]  ret_from_fork+0x10/0x20
[   20.388922] 
[   20.389242] The buggy address belongs to the object at fff00000c79f5980
[   20.389242]  which belongs to the cache kmalloc-64 of size 64
[   20.389469] The buggy address is located 0 bytes to the right of
[   20.389469]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.389567] 
[   20.389600] The buggy address belongs to the physical page:
[   20.389643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.389722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.389777] page_type: f5(slab)
[   20.389819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.389873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.389918] page dumped because: kasan: bad access detected
[   20.389967] 
[   20.389987] Memory state around the buggy address:
[   20.390023]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.390080]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.390141] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.390183]                                      ^
[   20.390217]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.390263]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.390313] ==================================================================
[   20.464056] ==================================================================
[   20.464364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.464561] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265
[   20.464631] 
[   20.464665] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.464811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.464909] Hardware name: linux,dummy-virt (DT)
[   20.464946] Call trace:
[   20.465315]  show_stack+0x20/0x38 (C)
[   20.465396]  dump_stack_lvl+0x8c/0xd0
[   20.465468]  print_report+0x118/0x608
[   20.465689]  kasan_report+0xdc/0x128
[   20.466032]  kasan_check_range+0x100/0x1a8
[   20.466111]  __kasan_check_write+0x20/0x30
[   20.466157]  kasan_atomics_helper+0x1644/0x4858
[   20.466207]  kasan_atomics+0x198/0x2e0
[   20.466648]  kunit_try_run_case+0x170/0x3f0
[   20.466893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.467197]  kthread+0x328/0x630
[   20.467483]  ret_from_fork+0x10/0x20
[   20.467825] 
[   20.468019] Allocated by task 265:
[   20.468056]  kasan_save_stack+0x3c/0x68
[   20.468103]  kasan_save_track+0x20/0x40
[   20.468143]  kasan_save_alloc_info+0x40/0x58
[   20.468536]  __kasan_kmalloc+0xd4/0xd8
[   20.468727]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.469039]  kasan_atomics+0xb8/0x2e0
[   20.469114]  kunit_try_run_case+0x170/0x3f0
[   20.469345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.469397]  kthread+0x328/0x630
[   20.469644]  ret_from_fork+0x10/0x20
[   20.469817] 
[   20.469869] The buggy address belongs to the object at fff00000c79f5980
[   20.469869]  which belongs to the cache kmalloc-64 of size 64
[   20.470286] The buggy address is located 0 bytes to the right of
[   20.470286]  allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0)
[   20.470547] 
[   20.470824] The buggy address belongs to the physical page:
[   20.470920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5
[   20.471110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.471168] page_type: f5(slab)
[   20.471209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.471265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.471311] page dumped because: kasan: bad access detected
[   20.471346] 
[   20.471366] Memory state around the buggy address:
[   20.471403]  fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.471713]  fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.472064] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.472141]                                      ^
[   20.472353]  fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.472471]  fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.472575] ==================================================================

[   14.360217] ==================================================================
[   14.360791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.361354] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.361596] 
[   14.361694] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.361736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.361750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.361771] Call Trace:
[   14.361785]  <TASK>
[   14.361802]  dump_stack_lvl+0x73/0xb0
[   14.361829]  print_report+0xd1/0x650
[   14.361853]  ? __virt_addr_valid+0x1db/0x2d0
[   14.361875]  ? kasan_atomics_helper+0x1148/0x5450
[   14.361896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.361918]  ? kasan_atomics_helper+0x1148/0x5450
[   14.361940]  kasan_report+0x141/0x180
[   14.361963]  ? kasan_atomics_helper+0x1148/0x5450
[   14.361989]  kasan_check_range+0x10c/0x1c0
[   14.362013]  __kasan_check_write+0x18/0x20
[   14.362047]  kasan_atomics_helper+0x1148/0x5450
[   14.362125]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.362149]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.362174]  ? kasan_atomics+0x152/0x310
[   14.362202]  kasan_atomics+0x1dc/0x310
[   14.362224]  ? __pfx_kasan_atomics+0x10/0x10
[   14.362249]  ? __pfx_read_tsc+0x10/0x10
[   14.362271]  ? ktime_get_ts64+0x86/0x230
[   14.362295]  kunit_try_run_case+0x1a5/0x480
[   14.362319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.362341]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.362364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.362387]  ? __kthread_parkme+0x82/0x180
[   14.362408]  ? preempt_count_sub+0x50/0x80
[   14.362432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.362456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.362479]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.362502]  kthread+0x337/0x6f0
[   14.362522]  ? trace_preempt_on+0x20/0xc0
[   14.362546]  ? __pfx_kthread+0x10/0x10
[   14.362567]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.362588]  ? calculate_sigpending+0x7b/0xa0
[   14.362612]  ? __pfx_kthread+0x10/0x10
[   14.362634]  ret_from_fork+0x116/0x1d0
[   14.362653]  ? __pfx_kthread+0x10/0x10
[   14.362674]  ret_from_fork_asm+0x1a/0x30
[   14.362705]  </TASK>
[   14.362716] 
[   14.370913] Allocated by task 282:
[   14.371152]  kasan_save_stack+0x45/0x70
[   14.371332]  kasan_save_track+0x18/0x40
[   14.371496]  kasan_save_alloc_info+0x3b/0x50
[   14.371648]  __kasan_kmalloc+0xb7/0xc0
[   14.371802]  __kmalloc_cache_noprof+0x189/0x420
[   14.372025]  kasan_atomics+0x95/0x310
[   14.372370]  kunit_try_run_case+0x1a5/0x480
[   14.372527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.372705]  kthread+0x337/0x6f0
[   14.372827]  ret_from_fork+0x116/0x1d0
[   14.372996]  ret_from_fork_asm+0x1a/0x30
[   14.373553] 
[   14.373681] The buggy address belongs to the object at ffff888103916a00
[   14.373681]  which belongs to the cache kmalloc-64 of size 64
[   14.374218] The buggy address is located 0 bytes to the right of
[   14.374218]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.374585] 
[   14.374688] The buggy address belongs to the physical page:
[   14.375363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.375662] flags: 0x200000000000000(node=0|zone=2)
[   14.375824] page_type: f5(slab)
[   14.375943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.376623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.377387] page dumped because: kasan: bad access detected
[   14.377568] 
[   14.377663] Memory state around the buggy address:
[   14.377891]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.378319]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.378608] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.378882]                                      ^
[   14.379169]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.379418]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.379636] ==================================================================
[   14.225813] ==================================================================
[   14.226148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.226475] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.226758] 
[   14.226872] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.226915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.226928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.226949] Call Trace:
[   14.226964]  <TASK>
[   14.226979]  dump_stack_lvl+0x73/0xb0
[   14.227008]  print_report+0xd1/0x650
[   14.227254]  ? __virt_addr_valid+0x1db/0x2d0
[   14.227288]  ? kasan_atomics_helper+0xde0/0x5450
[   14.227311]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.227334]  ? kasan_atomics_helper+0xde0/0x5450
[   14.227356]  kasan_report+0x141/0x180
[   14.227379]  ? kasan_atomics_helper+0xde0/0x5450
[   14.227406]  kasan_check_range+0x10c/0x1c0
[   14.227430]  __kasan_check_write+0x18/0x20
[   14.227450]  kasan_atomics_helper+0xde0/0x5450
[   14.227473]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.227496]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.227522]  ? kasan_atomics+0x152/0x310
[   14.227550]  kasan_atomics+0x1dc/0x310
[   14.227573]  ? __pfx_kasan_atomics+0x10/0x10
[   14.227598]  ? __pfx_read_tsc+0x10/0x10
[   14.227620]  ? ktime_get_ts64+0x86/0x230
[   14.227643]  kunit_try_run_case+0x1a5/0x480
[   14.227668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.227691]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.227715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.227741]  ? __kthread_parkme+0x82/0x180
[   14.227763]  ? preempt_count_sub+0x50/0x80
[   14.227787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.227812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.227836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.227859]  kthread+0x337/0x6f0
[   14.227879]  ? trace_preempt_on+0x20/0xc0
[   14.227902]  ? __pfx_kthread+0x10/0x10
[   14.227923]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.227945]  ? calculate_sigpending+0x7b/0xa0
[   14.227969]  ? __pfx_kthread+0x10/0x10
[   14.227991]  ret_from_fork+0x116/0x1d0
[   14.228010]  ? __pfx_kthread+0x10/0x10
[   14.228103]  ret_from_fork_asm+0x1a/0x30
[   14.228155]  </TASK>
[   14.228168] 
[   14.236010] Allocated by task 282:
[   14.236310]  kasan_save_stack+0x45/0x70
[   14.236527]  kasan_save_track+0x18/0x40
[   14.236677]  kasan_save_alloc_info+0x3b/0x50
[   14.236828]  __kasan_kmalloc+0xb7/0xc0
[   14.236984]  __kmalloc_cache_noprof+0x189/0x420
[   14.237312]  kasan_atomics+0x95/0x310
[   14.237506]  kunit_try_run_case+0x1a5/0x480
[   14.237714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.237951]  kthread+0x337/0x6f0
[   14.238211]  ret_from_fork+0x116/0x1d0
[   14.238399]  ret_from_fork_asm+0x1a/0x30
[   14.238542] 
[   14.238614] The buggy address belongs to the object at ffff888103916a00
[   14.238614]  which belongs to the cache kmalloc-64 of size 64
[   14.238990] The buggy address is located 0 bytes to the right of
[   14.238990]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.239801] 
[   14.239909] The buggy address belongs to the physical page:
[   14.240269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.240656] flags: 0x200000000000000(node=0|zone=2)
[   14.240873] page_type: f5(slab)
[   14.240994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.241422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.241785] page dumped because: kasan: bad access detected
[   14.242145] 
[   14.242267] Memory state around the buggy address:
[   14.242494]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.242765]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.243301] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.243619]                                      ^
[   14.243799]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.244242]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.244583] ==================================================================
[   14.321949] ==================================================================
[   14.322391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.322672] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.322898] 
[   14.323003] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.323248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.323265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.323287] Call Trace:
[   14.323324]  <TASK>
[   14.323340]  dump_stack_lvl+0x73/0xb0
[   14.323370]  print_report+0xd1/0x650
[   14.323394]  ? __virt_addr_valid+0x1db/0x2d0
[   14.323417]  ? kasan_atomics_helper+0x1079/0x5450
[   14.323439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.323462]  ? kasan_atomics_helper+0x1079/0x5450
[   14.323485]  kasan_report+0x141/0x180
[   14.323508]  ? kasan_atomics_helper+0x1079/0x5450
[   14.323535]  kasan_check_range+0x10c/0x1c0
[   14.323559]  __kasan_check_write+0x18/0x20
[   14.323580]  kasan_atomics_helper+0x1079/0x5450
[   14.323602]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.323626]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.323652]  ? kasan_atomics+0x152/0x310
[   14.323679]  kasan_atomics+0x1dc/0x310
[   14.323702]  ? __pfx_kasan_atomics+0x10/0x10
[   14.323729]  ? __pfx_read_tsc+0x10/0x10
[   14.323750]  ? ktime_get_ts64+0x86/0x230
[   14.323774]  kunit_try_run_case+0x1a5/0x480
[   14.323798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.323822]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.323845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.323868]  ? __kthread_parkme+0x82/0x180
[   14.323889]  ? preempt_count_sub+0x50/0x80
[   14.323912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.323936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.323958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.323982]  kthread+0x337/0x6f0
[   14.324002]  ? trace_preempt_on+0x20/0xc0
[   14.324025]  ? __pfx_kthread+0x10/0x10
[   14.324127]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.324151]  ? calculate_sigpending+0x7b/0xa0
[   14.324192]  ? __pfx_kthread+0x10/0x10
[   14.324215]  ret_from_fork+0x116/0x1d0
[   14.324235]  ? __pfx_kthread+0x10/0x10
[   14.324258]  ret_from_fork_asm+0x1a/0x30
[   14.324289]  </TASK>
[   14.324301] 
[   14.333018] Allocated by task 282:
[   14.333169]  kasan_save_stack+0x45/0x70
[   14.333321]  kasan_save_track+0x18/0x40
[   14.333515]  kasan_save_alloc_info+0x3b/0x50
[   14.333695]  __kasan_kmalloc+0xb7/0xc0
[   14.333881]  __kmalloc_cache_noprof+0x189/0x420
[   14.334248]  kasan_atomics+0x95/0x310
[   14.334443]  kunit_try_run_case+0x1a5/0x480
[   14.334618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.334858]  kthread+0x337/0x6f0
[   14.335025]  ret_from_fork+0x116/0x1d0
[   14.335395]  ret_from_fork_asm+0x1a/0x30
[   14.335573] 
[   14.335665] The buggy address belongs to the object at ffff888103916a00
[   14.335665]  which belongs to the cache kmalloc-64 of size 64
[   14.336232] The buggy address is located 0 bytes to the right of
[   14.336232]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.336610] 
[   14.336694] The buggy address belongs to the physical page:
[   14.336947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.337340] flags: 0x200000000000000(node=0|zone=2)
[   14.337512] page_type: f5(slab)
[   14.337669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.338017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.338453] page dumped because: kasan: bad access detected
[   14.338671] 
[   14.338766] Memory state around the buggy address:
[   14.338981]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.339499]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.339796] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.340104]                                      ^
[   14.340328]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.340651]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.340966] ==================================================================
[   14.419971] ==================================================================
[   14.420323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.420752] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.421189] 
[   14.421331] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.421396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.421409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.421432] Call Trace:
[   14.421448]  <TASK>
[   14.421464]  dump_stack_lvl+0x73/0xb0
[   14.421492]  print_report+0xd1/0x650
[   14.421516]  ? __virt_addr_valid+0x1db/0x2d0
[   14.421558]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.421581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.421603]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.421626]  kasan_report+0x141/0x180
[   14.421650]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.421677]  __asan_report_load4_noabort+0x18/0x20
[   14.421702]  kasan_atomics_helper+0x49e8/0x5450
[   14.421725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.421749]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.421775]  ? kasan_atomics+0x152/0x310
[   14.421802]  kasan_atomics+0x1dc/0x310
[   14.421826]  ? __pfx_kasan_atomics+0x10/0x10
[   14.421851]  ? __pfx_read_tsc+0x10/0x10
[   14.421892]  ? ktime_get_ts64+0x86/0x230
[   14.421917]  kunit_try_run_case+0x1a5/0x480
[   14.421940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.421963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.421987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.422012]  ? __kthread_parkme+0x82/0x180
[   14.422125]  ? preempt_count_sub+0x50/0x80
[   14.422188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.422213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.422237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.422261]  kthread+0x337/0x6f0
[   14.422281]  ? trace_preempt_on+0x20/0xc0
[   14.422323]  ? __pfx_kthread+0x10/0x10
[   14.422344]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.422366]  ? calculate_sigpending+0x7b/0xa0
[   14.422391]  ? __pfx_kthread+0x10/0x10
[   14.422413]  ret_from_fork+0x116/0x1d0
[   14.422432]  ? __pfx_kthread+0x10/0x10
[   14.422452]  ret_from_fork_asm+0x1a/0x30
[   14.422483]  </TASK>
[   14.422495] 
[   14.433857] Allocated by task 282:
[   14.434288]  kasan_save_stack+0x45/0x70
[   14.434475]  kasan_save_track+0x18/0x40
[   14.434660]  kasan_save_alloc_info+0x3b/0x50
[   14.434856]  __kasan_kmalloc+0xb7/0xc0
[   14.435067]  __kmalloc_cache_noprof+0x189/0x420
[   14.435292]  kasan_atomics+0x95/0x310
[   14.435473]  kunit_try_run_case+0x1a5/0x480
[   14.435666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.435905]  kthread+0x337/0x6f0
[   14.436603]  ret_from_fork+0x116/0x1d0
[   14.436797]  ret_from_fork_asm+0x1a/0x30
[   14.436986] 
[   14.437352] The buggy address belongs to the object at ffff888103916a00
[   14.437352]  which belongs to the cache kmalloc-64 of size 64
[   14.437940] The buggy address is located 0 bytes to the right of
[   14.437940]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.438948] 
[   14.439067] The buggy address belongs to the physical page:
[   14.439515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.439961] flags: 0x200000000000000(node=0|zone=2)
[   14.440340] page_type: f5(slab)
[   14.440595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.440937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.441497] page dumped because: kasan: bad access detected
[   14.441904] 
[   14.441990] Memory state around the buggy address:
[   14.442385]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.443130]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.443743] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.444044]                                      ^
[   14.444591]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.444945]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445568] ==================================================================
[   14.075878] ==================================================================
[   14.076357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.076699] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.076979] 
[   14.077206] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.077253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.077266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.077289] Call Trace:
[   14.077305]  <TASK>
[   14.077322]  dump_stack_lvl+0x73/0xb0
[   14.077361]  print_report+0xd1/0x650
[   14.077385]  ? __virt_addr_valid+0x1db/0x2d0
[   14.077407]  ? kasan_atomics_helper+0x992/0x5450
[   14.077441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.077464]  ? kasan_atomics_helper+0x992/0x5450
[   14.077486]  kasan_report+0x141/0x180
[   14.077508]  ? kasan_atomics_helper+0x992/0x5450
[   14.077534]  kasan_check_range+0x10c/0x1c0
[   14.077557]  __kasan_check_write+0x18/0x20
[   14.077576]  kasan_atomics_helper+0x992/0x5450
[   14.077600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.077622]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.077656]  ? kasan_atomics+0x152/0x310
[   14.077684]  kasan_atomics+0x1dc/0x310
[   14.077706]  ? __pfx_kasan_atomics+0x10/0x10
[   14.077741]  ? __pfx_read_tsc+0x10/0x10
[   14.077762]  ? ktime_get_ts64+0x86/0x230
[   14.077786]  kunit_try_run_case+0x1a5/0x480
[   14.077810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.077832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.077855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.077878]  ? __kthread_parkme+0x82/0x180
[   14.077899]  ? preempt_count_sub+0x50/0x80
[   14.077932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.077957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.077980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.078014]  kthread+0x337/0x6f0
[   14.078179]  ? trace_preempt_on+0x20/0xc0
[   14.078208]  ? __pfx_kthread+0x10/0x10
[   14.078281]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.078306]  ? calculate_sigpending+0x7b/0xa0
[   14.078350]  ? __pfx_kthread+0x10/0x10
[   14.078373]  ret_from_fork+0x116/0x1d0
[   14.078393]  ? __pfx_kthread+0x10/0x10
[   14.078414]  ret_from_fork_asm+0x1a/0x30
[   14.078445]  </TASK>
[   14.078457] 
[   14.086843] Allocated by task 282:
[   14.086998]  kasan_save_stack+0x45/0x70
[   14.087330]  kasan_save_track+0x18/0x40
[   14.087536]  kasan_save_alloc_info+0x3b/0x50
[   14.087749]  __kasan_kmalloc+0xb7/0xc0
[   14.087901]  __kmalloc_cache_noprof+0x189/0x420
[   14.088215]  kasan_atomics+0x95/0x310
[   14.088412]  kunit_try_run_case+0x1a5/0x480
[   14.088619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.088845]  kthread+0x337/0x6f0
[   14.089096]  ret_from_fork+0x116/0x1d0
[   14.089338]  ret_from_fork_asm+0x1a/0x30
[   14.089517] 
[   14.089637] The buggy address belongs to the object at ffff888103916a00
[   14.089637]  which belongs to the cache kmalloc-64 of size 64
[   14.090314] The buggy address is located 0 bytes to the right of
[   14.090314]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.090809] 
[   14.090908] The buggy address belongs to the physical page:
[   14.091293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.091543] flags: 0x200000000000000(node=0|zone=2)
[   14.091770] page_type: f5(slab)
[   14.091935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.092391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.092658] page dumped because: kasan: bad access detected
[   14.092914] 
[   14.093100] Memory state around the buggy address:
[   14.093370]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.093692]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.093953] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.094456]                                      ^
[   14.094685]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.094974]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.095378] ==================================================================
[   14.055511] ==================================================================
[   14.055846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.056309] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.056633] 
[   14.056734] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.056778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.056792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.056813] Call Trace:
[   14.056830]  <TASK>
[   14.056846]  dump_stack_lvl+0x73/0xb0
[   14.056887]  print_report+0xd1/0x650
[   14.056910]  ? __virt_addr_valid+0x1db/0x2d0
[   14.056933]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.056966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.056989]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.057012]  kasan_report+0x141/0x180
[   14.057116]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.057160]  kasan_check_range+0x10c/0x1c0
[   14.057200]  __kasan_check_write+0x18/0x20
[   14.057221]  kasan_atomics_helper+0x8f9/0x5450
[   14.057244]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.057267]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.057294]  ? kasan_atomics+0x152/0x310
[   14.057321]  kasan_atomics+0x1dc/0x310
[   14.057345]  ? __pfx_kasan_atomics+0x10/0x10
[   14.057369]  ? __pfx_read_tsc+0x10/0x10
[   14.057402]  ? ktime_get_ts64+0x86/0x230
[   14.057426]  kunit_try_run_case+0x1a5/0x480
[   14.057451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.057487]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.057511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.057535]  ? __kthread_parkme+0x82/0x180
[   14.057556]  ? preempt_count_sub+0x50/0x80
[   14.057579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.057603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.057627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.057652]  kthread+0x337/0x6f0
[   14.057672]  ? trace_preempt_on+0x20/0xc0
[   14.057695]  ? __pfx_kthread+0x10/0x10
[   14.057717]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.057739]  ? calculate_sigpending+0x7b/0xa0
[   14.057762]  ? __pfx_kthread+0x10/0x10
[   14.057784]  ret_from_fork+0x116/0x1d0
[   14.057802]  ? __pfx_kthread+0x10/0x10
[   14.057822]  ret_from_fork_asm+0x1a/0x30
[   14.057853]  </TASK>
[   14.057865] 
[   14.066435] Allocated by task 282:
[   14.066620]  kasan_save_stack+0x45/0x70
[   14.066804]  kasan_save_track+0x18/0x40
[   14.066947]  kasan_save_alloc_info+0x3b/0x50
[   14.067300]  __kasan_kmalloc+0xb7/0xc0
[   14.067498]  __kmalloc_cache_noprof+0x189/0x420
[   14.067701]  kasan_atomics+0x95/0x310
[   14.067836]  kunit_try_run_case+0x1a5/0x480
[   14.068113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.068443]  kthread+0x337/0x6f0
[   14.068651]  ret_from_fork+0x116/0x1d0
[   14.068792]  ret_from_fork_asm+0x1a/0x30
[   14.069006] 
[   14.069215] The buggy address belongs to the object at ffff888103916a00
[   14.069215]  which belongs to the cache kmalloc-64 of size 64
[   14.069705] The buggy address is located 0 bytes to the right of
[   14.069705]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.070457] 
[   14.070586] The buggy address belongs to the physical page:
[   14.070836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.071305] flags: 0x200000000000000(node=0|zone=2)
[   14.071526] page_type: f5(slab)
[   14.071691] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.072154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.072516] page dumped because: kasan: bad access detected
[   14.072756] 
[   14.072878] Memory state around the buggy address:
[   14.073166]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.073498]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.073813] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.074206]                                      ^
[   14.074468]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.074779]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.075398] ==================================================================
[   14.302985] ==================================================================
[   14.303586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.303938] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.304351] 
[   14.304467] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.304510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.304523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.304545] Call Trace:
[   14.304560]  <TASK>
[   14.304577]  dump_stack_lvl+0x73/0xb0
[   14.304606]  print_report+0xd1/0x650
[   14.304629]  ? __virt_addr_valid+0x1db/0x2d0
[   14.304652]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.304674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.304697]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.304721]  kasan_report+0x141/0x180
[   14.304743]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.304770]  __asan_report_load4_noabort+0x18/0x20
[   14.304795]  kasan_atomics_helper+0x4a36/0x5450
[   14.304819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.304842]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.304867]  ? kasan_atomics+0x152/0x310
[   14.304894]  kasan_atomics+0x1dc/0x310
[   14.304918]  ? __pfx_kasan_atomics+0x10/0x10
[   14.304943]  ? __pfx_read_tsc+0x10/0x10
[   14.304965]  ? ktime_get_ts64+0x86/0x230
[   14.304989]  kunit_try_run_case+0x1a5/0x480
[   14.305015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.305052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.305078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.305103]  ? __kthread_parkme+0x82/0x180
[   14.305124]  ? preempt_count_sub+0x50/0x80
[   14.305148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.305174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.305198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.305222]  kthread+0x337/0x6f0
[   14.305242]  ? trace_preempt_on+0x20/0xc0
[   14.305265]  ? __pfx_kthread+0x10/0x10
[   14.305287]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.305308]  ? calculate_sigpending+0x7b/0xa0
[   14.305332]  ? __pfx_kthread+0x10/0x10
[   14.305354]  ret_from_fork+0x116/0x1d0
[   14.305374]  ? __pfx_kthread+0x10/0x10
[   14.305395]  ret_from_fork_asm+0x1a/0x30
[   14.305426]  </TASK>
[   14.305438] 
[   14.313369] Allocated by task 282:
[   14.313555]  kasan_save_stack+0x45/0x70
[   14.313759]  kasan_save_track+0x18/0x40
[   14.313937]  kasan_save_alloc_info+0x3b/0x50
[   14.314228]  __kasan_kmalloc+0xb7/0xc0
[   14.314427]  __kmalloc_cache_noprof+0x189/0x420
[   14.314618]  kasan_atomics+0x95/0x310
[   14.314786]  kunit_try_run_case+0x1a5/0x480
[   14.314933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.315359]  kthread+0x337/0x6f0
[   14.315541]  ret_from_fork+0x116/0x1d0
[   14.315743]  ret_from_fork_asm+0x1a/0x30
[   14.315948] 
[   14.316133] The buggy address belongs to the object at ffff888103916a00
[   14.316133]  which belongs to the cache kmalloc-64 of size 64
[   14.316687] The buggy address is located 0 bytes to the right of
[   14.316687]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.317315] 
[   14.317402] The buggy address belongs to the physical page:
[   14.317616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.317942] flags: 0x200000000000000(node=0|zone=2)
[   14.318219] page_type: f5(slab)
[   14.318394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.318653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.318894] page dumped because: kasan: bad access detected
[   14.319303] 
[   14.319405] Memory state around the buggy address:
[   14.319629]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.319946]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.320381] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.320672]                                      ^
[   14.320831]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.321125]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.321480] ==================================================================
[   15.022508] ==================================================================
[   15.022813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.023250] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   15.023553] 
[   15.023648] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.023691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.023703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.023724] Call Trace:
[   15.023738]  <TASK>
[   15.023754]  dump_stack_lvl+0x73/0xb0
[   15.023782]  print_report+0xd1/0x650
[   15.023805]  ? __virt_addr_valid+0x1db/0x2d0
[   15.023827]  ? kasan_atomics_helper+0x2006/0x5450
[   15.023848]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.023871]  ? kasan_atomics_helper+0x2006/0x5450
[   15.023893]  kasan_report+0x141/0x180
[   15.023916]  ? kasan_atomics_helper+0x2006/0x5450
[   15.023943]  kasan_check_range+0x10c/0x1c0
[   15.023967]  __kasan_check_write+0x18/0x20
[   15.023987]  kasan_atomics_helper+0x2006/0x5450
[   15.024010]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.024044]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.024070]  ? kasan_atomics+0x152/0x310
[   15.024097]  kasan_atomics+0x1dc/0x310
[   15.024120]  ? __pfx_kasan_atomics+0x10/0x10
[   15.024145]  ? __pfx_read_tsc+0x10/0x10
[   15.024167]  ? ktime_get_ts64+0x86/0x230
[   15.024190]  kunit_try_run_case+0x1a5/0x480
[   15.024215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.024237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.024261]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.024284]  ? __kthread_parkme+0x82/0x180
[   15.024305]  ? preempt_count_sub+0x50/0x80
[   15.024329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.024353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.024376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.024400]  kthread+0x337/0x6f0
[   15.024419]  ? trace_preempt_on+0x20/0xc0
[   15.024443]  ? __pfx_kthread+0x10/0x10
[   15.024465]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.024487]  ? calculate_sigpending+0x7b/0xa0
[   15.024511]  ? __pfx_kthread+0x10/0x10
[   15.024534]  ret_from_fork+0x116/0x1d0
[   15.024553]  ? __pfx_kthread+0x10/0x10
[   15.024574]  ret_from_fork_asm+0x1a/0x30
[   15.024605]  </TASK>
[   15.024616] 
[   15.032727] Allocated by task 282:
[   15.032925]  kasan_save_stack+0x45/0x70
[   15.033395]  kasan_save_track+0x18/0x40
[   15.033562]  kasan_save_alloc_info+0x3b/0x50
[   15.033716]  __kasan_kmalloc+0xb7/0xc0
[   15.033851]  __kmalloc_cache_noprof+0x189/0x420
[   15.034088]  kasan_atomics+0x95/0x310
[   15.034284]  kunit_try_run_case+0x1a5/0x480
[   15.034492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.034746]  kthread+0x337/0x6f0
[   15.034907]  ret_from_fork+0x116/0x1d0
[   15.035270]  ret_from_fork_asm+0x1a/0x30
[   15.035479] 
[   15.035576] The buggy address belongs to the object at ffff888103916a00
[   15.035576]  which belongs to the cache kmalloc-64 of size 64
[   15.036106] The buggy address is located 0 bytes to the right of
[   15.036106]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   15.036634] 
[   15.036730] The buggy address belongs to the physical page:
[   15.036963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   15.037426] flags: 0x200000000000000(node=0|zone=2)
[   15.037596] page_type: f5(slab)
[   15.037715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.037947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.038292] page dumped because: kasan: bad access detected
[   15.038688] 
[   15.038783] Memory state around the buggy address:
[   15.039062]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.039363]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.039581] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.039794]                                      ^
[   15.040396]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.040747]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.041175] ==================================================================
[   14.615245] ==================================================================
[   14.615911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.616397] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.616995] 
[   14.617269] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.617316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.617431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.617458] Call Trace:
[   14.617475]  <TASK>
[   14.617493]  dump_stack_lvl+0x73/0xb0
[   14.617522]  print_report+0xd1/0x650
[   14.617545]  ? __virt_addr_valid+0x1db/0x2d0
[   14.617568]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.617624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.617647]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.617671]  kasan_report+0x141/0x180
[   14.617695]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.617722]  kasan_check_range+0x10c/0x1c0
[   14.617747]  __kasan_check_write+0x18/0x20
[   14.617767]  kasan_atomics_helper+0x15b6/0x5450
[   14.617790]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.617813]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.617839]  ? kasan_atomics+0x152/0x310
[   14.617866]  kasan_atomics+0x1dc/0x310
[   14.617890]  ? __pfx_kasan_atomics+0x10/0x10
[   14.617915]  ? __pfx_read_tsc+0x10/0x10
[   14.617937]  ? ktime_get_ts64+0x86/0x230
[   14.617960]  kunit_try_run_case+0x1a5/0x480
[   14.617985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.618007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.618042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.618085]  ? __kthread_parkme+0x82/0x180
[   14.618106]  ? preempt_count_sub+0x50/0x80
[   14.618130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.618154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.618178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.618201]  kthread+0x337/0x6f0
[   14.618221]  ? trace_preempt_on+0x20/0xc0
[   14.618246]  ? __pfx_kthread+0x10/0x10
[   14.618266]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.618288]  ? calculate_sigpending+0x7b/0xa0
[   14.618312]  ? __pfx_kthread+0x10/0x10
[   14.618334]  ret_from_fork+0x116/0x1d0
[   14.618353]  ? __pfx_kthread+0x10/0x10
[   14.618374]  ret_from_fork_asm+0x1a/0x30
[   14.618406]  </TASK>
[   14.618417] 
[   14.630150] Allocated by task 282:
[   14.630551]  kasan_save_stack+0x45/0x70
[   14.630910]  kasan_save_track+0x18/0x40
[   14.631247]  kasan_save_alloc_info+0x3b/0x50
[   14.631598]  __kasan_kmalloc+0xb7/0xc0
[   14.631794]  __kmalloc_cache_noprof+0x189/0x420
[   14.632004]  kasan_atomics+0x95/0x310
[   14.632364]  kunit_try_run_case+0x1a5/0x480
[   14.632766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.633256]  kthread+0x337/0x6f0
[   14.633561]  ret_from_fork+0x116/0x1d0
[   14.633745]  ret_from_fork_asm+0x1a/0x30
[   14.633928] 
[   14.634022] The buggy address belongs to the object at ffff888103916a00
[   14.634022]  which belongs to the cache kmalloc-64 of size 64
[   14.634883] The buggy address is located 0 bytes to the right of
[   14.634883]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.635883] 
[   14.636152] The buggy address belongs to the physical page:
[   14.636391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.636721] flags: 0x200000000000000(node=0|zone=2)
[   14.636937] page_type: f5(slab)
[   14.637402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.637849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.638789] page dumped because: kasan: bad access detected
[   14.639112] 
[   14.639351] Memory state around the buggy address:
[   14.639773]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.640284]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.640737] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.641212]                                      ^
[   14.641559]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.641859]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.642329] ==================================================================
[   13.806638] ==================================================================
[   13.806991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.807252] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.807627] 
[   13.807733] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.807775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.807786] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.807806] Call Trace:
[   13.807820]  <TASK>
[   13.807834]  dump_stack_lvl+0x73/0xb0
[   13.807862]  print_report+0xd1/0x650
[   13.807883]  ? __virt_addr_valid+0x1db/0x2d0
[   13.807905]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.807925]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.807946]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.807967]  kasan_report+0x141/0x180
[   13.808071]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.808103]  __asan_report_load4_noabort+0x18/0x20
[   13.808138]  kasan_atomics_helper+0x4b88/0x5450
[   13.808161]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.808183]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.808220]  ? kasan_atomics+0x152/0x310
[   13.808247]  kasan_atomics+0x1dc/0x310
[   13.808269]  ? __pfx_kasan_atomics+0x10/0x10
[   13.808301]  ? __pfx_read_tsc+0x10/0x10
[   13.808323]  ? ktime_get_ts64+0x86/0x230
[   13.808357]  kunit_try_run_case+0x1a5/0x480
[   13.808380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.808402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.808424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.808446]  ? __kthread_parkme+0x82/0x180
[   13.808465]  ? preempt_count_sub+0x50/0x80
[   13.808487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.808509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.808531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.808553]  kthread+0x337/0x6f0
[   13.808572]  ? trace_preempt_on+0x20/0xc0
[   13.808595]  ? __pfx_kthread+0x10/0x10
[   13.808614]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.808634]  ? calculate_sigpending+0x7b/0xa0
[   13.808656]  ? __pfx_kthread+0x10/0x10
[   13.808677]  ret_from_fork+0x116/0x1d0
[   13.808695]  ? __pfx_kthread+0x10/0x10
[   13.808835]  ret_from_fork_asm+0x1a/0x30
[   13.808867]  </TASK>
[   13.808910] 
[   13.817971] Allocated by task 282:
[   13.818177]  kasan_save_stack+0x45/0x70
[   13.818384]  kasan_save_track+0x18/0x40
[   13.818577]  kasan_save_alloc_info+0x3b/0x50
[   13.819009]  __kasan_kmalloc+0xb7/0xc0
[   13.819403]  __kmalloc_cache_noprof+0x189/0x420
[   13.819616]  kasan_atomics+0x95/0x310
[   13.819804]  kunit_try_run_case+0x1a5/0x480
[   13.819953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.820152]  kthread+0x337/0x6f0
[   13.820348]  ret_from_fork+0x116/0x1d0
[   13.820536]  ret_from_fork_asm+0x1a/0x30
[   13.820716] 
[   13.820790] The buggy address belongs to the object at ffff888103916a00
[   13.820790]  which belongs to the cache kmalloc-64 of size 64
[   13.821647] The buggy address is located 0 bytes to the right of
[   13.821647]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.822258] 
[   13.822333] The buggy address belongs to the physical page:
[   13.822590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.823190] flags: 0x200000000000000(node=0|zone=2)
[   13.823420] page_type: f5(slab)
[   13.823584] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.823819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.824181] page dumped because: kasan: bad access detected
[   13.824433] 
[   13.824638] Memory state around the buggy address:
[   13.824858]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.825319]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.825641] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.825952]                                      ^
[   13.826381]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.826695]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.827294] ==================================================================
[   15.161775] ==================================================================
[   15.162310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.162723] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   15.163343] 
[   15.163481] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.163526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.163539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.163561] Call Trace:
[   15.163577]  <TASK>
[   15.163592]  dump_stack_lvl+0x73/0xb0
[   15.163621]  print_report+0xd1/0x650
[   15.163644]  ? __virt_addr_valid+0x1db/0x2d0
[   15.163665]  ? kasan_atomics_helper+0x224c/0x5450
[   15.163687]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.163709]  ? kasan_atomics_helper+0x224c/0x5450
[   15.163731]  kasan_report+0x141/0x180
[   15.163755]  ? kasan_atomics_helper+0x224c/0x5450
[   15.163783]  kasan_check_range+0x10c/0x1c0
[   15.163807]  __kasan_check_write+0x18/0x20
[   15.163827]  kasan_atomics_helper+0x224c/0x5450
[   15.163850]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.163873]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.163898]  ? kasan_atomics+0x152/0x310
[   15.163925]  kasan_atomics+0x1dc/0x310
[   15.163948]  ? __pfx_kasan_atomics+0x10/0x10
[   15.163973]  ? __pfx_read_tsc+0x10/0x10
[   15.163994]  ? ktime_get_ts64+0x86/0x230
[   15.164020]  kunit_try_run_case+0x1a5/0x480
[   15.164072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.164095]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.164118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.164141]  ? __kthread_parkme+0x82/0x180
[   15.164163]  ? preempt_count_sub+0x50/0x80
[   15.164187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.164219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.164242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.164265]  kthread+0x337/0x6f0
[   15.164285]  ? trace_preempt_on+0x20/0xc0
[   15.164309]  ? __pfx_kthread+0x10/0x10
[   15.164330]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.164351]  ? calculate_sigpending+0x7b/0xa0
[   15.164375]  ? __pfx_kthread+0x10/0x10
[   15.164397]  ret_from_fork+0x116/0x1d0
[   15.164415]  ? __pfx_kthread+0x10/0x10
[   15.164436]  ret_from_fork_asm+0x1a/0x30
[   15.164467]  </TASK>
[   15.164479] 
[   15.173697] Allocated by task 282:
[   15.173934]  kasan_save_stack+0x45/0x70
[   15.174304]  kasan_save_track+0x18/0x40
[   15.174553]  kasan_save_alloc_info+0x3b/0x50
[   15.174793]  __kasan_kmalloc+0xb7/0xc0
[   15.175292]  __kmalloc_cache_noprof+0x189/0x420
[   15.175610]  kasan_atomics+0x95/0x310
[   15.175781]  kunit_try_run_case+0x1a5/0x480
[   15.176255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.176612]  kthread+0x337/0x6f0
[   15.176763]  ret_from_fork+0x116/0x1d0
[   15.177015]  ret_from_fork_asm+0x1a/0x30
[   15.177378] 
[   15.177503] The buggy address belongs to the object at ffff888103916a00
[   15.177503]  which belongs to the cache kmalloc-64 of size 64
[   15.178170] The buggy address is located 0 bytes to the right of
[   15.178170]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   15.178875] 
[   15.178980] The buggy address belongs to the physical page:
[   15.179432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   15.179853] flags: 0x200000000000000(node=0|zone=2)
[   15.180388] page_type: f5(slab)
[   15.180551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.180865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.181401] page dumped because: kasan: bad access detected
[   15.181626] 
[   15.181782] Memory state around the buggy address:
[   15.182105]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.182512]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.182890] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.183372]                                      ^
[   15.183561]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.183967]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.184302] ==================================================================
[   14.033807] ==================================================================
[   14.034479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.034818] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.035263] 
[   14.035398] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.035442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.035456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.035477] Call Trace:
[   14.035492]  <TASK>
[   14.035508]  dump_stack_lvl+0x73/0xb0
[   14.035536]  print_report+0xd1/0x650
[   14.035560]  ? __virt_addr_valid+0x1db/0x2d0
[   14.035594]  ? kasan_atomics_helper+0x860/0x5450
[   14.035615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.035639]  ? kasan_atomics_helper+0x860/0x5450
[   14.035680]  kasan_report+0x141/0x180
[   14.035703]  ? kasan_atomics_helper+0x860/0x5450
[   14.035756]  kasan_check_range+0x10c/0x1c0
[   14.035782]  __kasan_check_write+0x18/0x20
[   14.035802]  kasan_atomics_helper+0x860/0x5450
[   14.035825]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.035848]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.035874]  ? kasan_atomics+0x152/0x310
[   14.035902]  kasan_atomics+0x1dc/0x310
[   14.036503]  ? __pfx_kasan_atomics+0x10/0x10
[   14.036544]  ? __pfx_read_tsc+0x10/0x10
[   14.036569]  ? ktime_get_ts64+0x86/0x230
[   14.036594]  kunit_try_run_case+0x1a5/0x480
[   14.036620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.036643]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.036667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.036691]  ? __kthread_parkme+0x82/0x180
[   14.036951]  ? preempt_count_sub+0x50/0x80
[   14.037003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.037107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.037154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.037179]  kthread+0x337/0x6f0
[   14.037200]  ? trace_preempt_on+0x20/0xc0
[   14.037226]  ? __pfx_kthread+0x10/0x10
[   14.037246]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.037269]  ? calculate_sigpending+0x7b/0xa0
[   14.037293]  ? __pfx_kthread+0x10/0x10
[   14.037315]  ret_from_fork+0x116/0x1d0
[   14.037334]  ? __pfx_kthread+0x10/0x10
[   14.037355]  ret_from_fork_asm+0x1a/0x30
[   14.037385]  </TASK>
[   14.037398] 
[   14.045952] Allocated by task 282:
[   14.046266]  kasan_save_stack+0x45/0x70
[   14.046482]  kasan_save_track+0x18/0x40
[   14.046712]  kasan_save_alloc_info+0x3b/0x50
[   14.046953]  __kasan_kmalloc+0xb7/0xc0
[   14.047278]  __kmalloc_cache_noprof+0x189/0x420
[   14.047500]  kasan_atomics+0x95/0x310
[   14.047678]  kunit_try_run_case+0x1a5/0x480
[   14.048171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.048443]  kthread+0x337/0x6f0
[   14.048619]  ret_from_fork+0x116/0x1d0
[   14.048798]  ret_from_fork_asm+0x1a/0x30
[   14.049004] 
[   14.049219] The buggy address belongs to the object at ffff888103916a00
[   14.049219]  which belongs to the cache kmalloc-64 of size 64
[   14.049724] The buggy address is located 0 bytes to the right of
[   14.049724]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.050285] 
[   14.050389] The buggy address belongs to the physical page:
[   14.050638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.050980] flags: 0x200000000000000(node=0|zone=2)
[   14.051205] page_type: f5(slab)
[   14.051323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.051667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.051969] page dumped because: kasan: bad access detected
[   14.052428] 
[   14.052525] Memory state around the buggy address:
[   14.052745]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.053097]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.053475] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.053710]                                      ^
[   14.053933]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.054566]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.054891] ==================================================================
[   15.113657] ==================================================================
[   15.114042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.114486] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   15.114749] 
[   15.114836] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.114877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.114890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.114909] Call Trace:
[   15.114924]  <TASK>
[   15.114939]  dump_stack_lvl+0x73/0xb0
[   15.114965]  print_report+0xd1/0x650
[   15.114989]  ? __virt_addr_valid+0x1db/0x2d0
[   15.115011]  ? kasan_atomics_helper+0x218a/0x5450
[   15.115044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.115075]  ? kasan_atomics_helper+0x218a/0x5450
[   15.115096]  kasan_report+0x141/0x180
[   15.115119]  ? kasan_atomics_helper+0x218a/0x5450
[   15.115146]  kasan_check_range+0x10c/0x1c0
[   15.115170]  __kasan_check_write+0x18/0x20
[   15.115190]  kasan_atomics_helper+0x218a/0x5450
[   15.115213]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.115236]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.115261]  ? kasan_atomics+0x152/0x310
[   15.115289]  kasan_atomics+0x1dc/0x310
[   15.115312]  ? __pfx_kasan_atomics+0x10/0x10
[   15.115336]  ? __pfx_read_tsc+0x10/0x10
[   15.115358]  ? ktime_get_ts64+0x86/0x230
[   15.115381]  kunit_try_run_case+0x1a5/0x480
[   15.115405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.115428]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.115451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.115474]  ? __kthread_parkme+0x82/0x180
[   15.115496]  ? preempt_count_sub+0x50/0x80
[   15.115520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.115544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.115567]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.115591]  kthread+0x337/0x6f0
[   15.115611]  ? trace_preempt_on+0x20/0xc0
[   15.115634]  ? __pfx_kthread+0x10/0x10
[   15.115655]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.115678]  ? calculate_sigpending+0x7b/0xa0
[   15.115702]  ? __pfx_kthread+0x10/0x10
[   15.115724]  ret_from_fork+0x116/0x1d0
[   15.115743]  ? __pfx_kthread+0x10/0x10
[   15.115763]  ret_from_fork_asm+0x1a/0x30
[   15.115795]  </TASK>
[   15.115807] 
[   15.126722] Allocated by task 282:
[   15.126886]  kasan_save_stack+0x45/0x70
[   15.127120]  kasan_save_track+0x18/0x40
[   15.127643]  kasan_save_alloc_info+0x3b/0x50
[   15.127829]  __kasan_kmalloc+0xb7/0xc0
[   15.128012]  __kmalloc_cache_noprof+0x189/0x420
[   15.128382]  kasan_atomics+0x95/0x310
[   15.128694]  kunit_try_run_case+0x1a5/0x480
[   15.128911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.129230]  kthread+0x337/0x6f0
[   15.129424]  ret_from_fork+0x116/0x1d0
[   15.129733]  ret_from_fork_asm+0x1a/0x30
[   15.129942] 
[   15.130025] The buggy address belongs to the object at ffff888103916a00
[   15.130025]  which belongs to the cache kmalloc-64 of size 64
[   15.130822] The buggy address is located 0 bytes to the right of
[   15.130822]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   15.131569] 
[   15.131748] The buggy address belongs to the physical page:
[   15.132068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   15.132513] flags: 0x200000000000000(node=0|zone=2)
[   15.132853] page_type: f5(slab)
[   15.133010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.133586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.133898] page dumped because: kasan: bad access detected
[   15.134143] 
[   15.134456] Memory state around the buggy address:
[   15.134757]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.135146]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.135693] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.136082]                                      ^
[   15.136443]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.136823]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.137104] ==================================================================
[   14.245002] ==================================================================
[   14.245444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.245747] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.246125] 
[   14.246330] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.246377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.246390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.246412] Call Trace:
[   14.246428]  <TASK>
[   14.246444]  dump_stack_lvl+0x73/0xb0
[   14.246472]  print_report+0xd1/0x650
[   14.246495]  ? __virt_addr_valid+0x1db/0x2d0
[   14.246517]  ? kasan_atomics_helper+0xe78/0x5450
[   14.246559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.246583]  ? kasan_atomics_helper+0xe78/0x5450
[   14.246605]  kasan_report+0x141/0x180
[   14.246644]  ? kasan_atomics_helper+0xe78/0x5450
[   14.246671]  kasan_check_range+0x10c/0x1c0
[   14.246708]  __kasan_check_write+0x18/0x20
[   14.246728]  kasan_atomics_helper+0xe78/0x5450
[   14.246751]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.246774]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.246799]  ? kasan_atomics+0x152/0x310
[   14.246826]  kasan_atomics+0x1dc/0x310
[   14.246866]  ? __pfx_kasan_atomics+0x10/0x10
[   14.246891]  ? __pfx_read_tsc+0x10/0x10
[   14.246912]  ? ktime_get_ts64+0x86/0x230
[   14.246937]  kunit_try_run_case+0x1a5/0x480
[   14.246961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.246984]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.247024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.247236]  ? __kthread_parkme+0x82/0x180
[   14.247262]  ? preempt_count_sub+0x50/0x80
[   14.247287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.247312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.247336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.247360]  kthread+0x337/0x6f0
[   14.247380]  ? trace_preempt_on+0x20/0xc0
[   14.247404]  ? __pfx_kthread+0x10/0x10
[   14.247425]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.247447]  ? calculate_sigpending+0x7b/0xa0
[   14.247471]  ? __pfx_kthread+0x10/0x10
[   14.247493]  ret_from_fork+0x116/0x1d0
[   14.247512]  ? __pfx_kthread+0x10/0x10
[   14.247533]  ret_from_fork_asm+0x1a/0x30
[   14.247562]  </TASK>
[   14.247574] 
[   14.255915] Allocated by task 282:
[   14.256221]  kasan_save_stack+0x45/0x70
[   14.256410]  kasan_save_track+0x18/0x40
[   14.256623]  kasan_save_alloc_info+0x3b/0x50
[   14.256833]  __kasan_kmalloc+0xb7/0xc0
[   14.257007]  __kmalloc_cache_noprof+0x189/0x420
[   14.258213]  kasan_atomics+0x95/0x310
[   14.258416]  kunit_try_run_case+0x1a5/0x480
[   14.258602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.258830]  kthread+0x337/0x6f0
[   14.258996]  ret_from_fork+0x116/0x1d0
[   14.259373]  ret_from_fork_asm+0x1a/0x30
[   14.259578] 
[   14.259678] The buggy address belongs to the object at ffff888103916a00
[   14.259678]  which belongs to the cache kmalloc-64 of size 64
[   14.260210] The buggy address is located 0 bytes to the right of
[   14.260210]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.260722] 
[   14.260804] The buggy address belongs to the physical page:
[   14.261013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.261353] flags: 0x200000000000000(node=0|zone=2)
[   14.261576] page_type: f5(slab)
[   14.261718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.262098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.262385] page dumped because: kasan: bad access detected
[   14.262632] 
[   14.262728] Memory state around the buggy address:
[   14.262953]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.263436]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.263769] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.264022]                                      ^
[   14.264355]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264647]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264941] ==================================================================
[   14.187965] ==================================================================
[   14.188627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.188962] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.189286] 
[   14.189390] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.189435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.189449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.189470] Call Trace:
[   14.189485]  <TASK>
[   14.189501]  dump_stack_lvl+0x73/0xb0
[   14.189529]  print_report+0xd1/0x650
[   14.189552]  ? __virt_addr_valid+0x1db/0x2d0
[   14.189576]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.189598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.189621]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.189644]  kasan_report+0x141/0x180
[   14.189667]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.189693]  __asan_report_load4_noabort+0x18/0x20
[   14.189718]  kasan_atomics_helper+0x4a84/0x5450
[   14.189831]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.189856]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.189884]  ? kasan_atomics+0x152/0x310
[   14.189911]  kasan_atomics+0x1dc/0x310
[   14.189935]  ? __pfx_kasan_atomics+0x10/0x10
[   14.189960]  ? __pfx_read_tsc+0x10/0x10
[   14.189981]  ? ktime_get_ts64+0x86/0x230
[   14.190005]  kunit_try_run_case+0x1a5/0x480
[   14.190214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.190250]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.190276]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.190299]  ? __kthread_parkme+0x82/0x180
[   14.190321]  ? preempt_count_sub+0x50/0x80
[   14.190345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.190370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.190393]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.190416]  kthread+0x337/0x6f0
[   14.190436]  ? trace_preempt_on+0x20/0xc0
[   14.190460]  ? __pfx_kthread+0x10/0x10
[   14.190482]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.190504]  ? calculate_sigpending+0x7b/0xa0
[   14.190528]  ? __pfx_kthread+0x10/0x10
[   14.190550]  ret_from_fork+0x116/0x1d0
[   14.190568]  ? __pfx_kthread+0x10/0x10
[   14.190590]  ret_from_fork_asm+0x1a/0x30
[   14.190620]  </TASK>
[   14.190632] 
[   14.198474] Allocated by task 282:
[   14.198609]  kasan_save_stack+0x45/0x70
[   14.198754]  kasan_save_track+0x18/0x40
[   14.198934]  kasan_save_alloc_info+0x3b/0x50
[   14.199249]  __kasan_kmalloc+0xb7/0xc0
[   14.199442]  __kmalloc_cache_noprof+0x189/0x420
[   14.199671]  kasan_atomics+0x95/0x310
[   14.199856]  kunit_try_run_case+0x1a5/0x480
[   14.200140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.200388]  kthread+0x337/0x6f0
[   14.200512]  ret_from_fork+0x116/0x1d0
[   14.200645]  ret_from_fork_asm+0x1a/0x30
[   14.200804] 
[   14.200902] The buggy address belongs to the object at ffff888103916a00
[   14.200902]  which belongs to the cache kmalloc-64 of size 64
[   14.201664] The buggy address is located 0 bytes to the right of
[   14.201664]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.202352] 
[   14.202452] The buggy address belongs to the physical page:
[   14.202703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.203154] flags: 0x200000000000000(node=0|zone=2)
[   14.203355] page_type: f5(slab)
[   14.203476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.203823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.204239] page dumped because: kasan: bad access detected
[   14.204418] 
[   14.204515] Memory state around the buggy address:
[   14.204736]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.205130]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.205423] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.205669]                                      ^
[   14.205861]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.206396]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.206695] ==================================================================
[   14.820806] ==================================================================
[   14.821209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.821543] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.821872] 
[   14.821982] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.822037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.822050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.822071] Call Trace:
[   14.822087]  <TASK>
[   14.822104]  dump_stack_lvl+0x73/0xb0
[   14.822131]  print_report+0xd1/0x650
[   14.822155]  ? __virt_addr_valid+0x1db/0x2d0
[   14.822177]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.822199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.822222]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.822245]  kasan_report+0x141/0x180
[   14.822268]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.822294]  kasan_check_range+0x10c/0x1c0
[   14.822318]  __kasan_check_write+0x18/0x20
[   14.822337]  kasan_atomics_helper+0x1b22/0x5450
[   14.822361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.822382]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.822407]  ? kasan_atomics+0x152/0x310
[   14.822434]  kasan_atomics+0x1dc/0x310
[   14.822456]  ? __pfx_kasan_atomics+0x10/0x10
[   14.822481]  ? __pfx_read_tsc+0x10/0x10
[   14.822501]  ? ktime_get_ts64+0x86/0x230
[   14.822524]  kunit_try_run_case+0x1a5/0x480
[   14.822547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.822569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.822593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.822615]  ? __kthread_parkme+0x82/0x180
[   14.822637]  ? preempt_count_sub+0x50/0x80
[   14.822659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.822682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.822706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.822729]  kthread+0x337/0x6f0
[   14.822748]  ? trace_preempt_on+0x20/0xc0
[   14.822770]  ? __pfx_kthread+0x10/0x10
[   14.822791]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.822812]  ? calculate_sigpending+0x7b/0xa0
[   14.822835]  ? __pfx_kthread+0x10/0x10
[   14.822857]  ret_from_fork+0x116/0x1d0
[   14.822875]  ? __pfx_kthread+0x10/0x10
[   14.822896]  ret_from_fork_asm+0x1a/0x30
[   14.822925]  </TASK>
[   14.822936] 
[   14.830812] Allocated by task 282:
[   14.830993]  kasan_save_stack+0x45/0x70
[   14.831299]  kasan_save_track+0x18/0x40
[   14.831537]  kasan_save_alloc_info+0x3b/0x50
[   14.831786]  __kasan_kmalloc+0xb7/0xc0
[   14.831978]  __kmalloc_cache_noprof+0x189/0x420
[   14.832232]  kasan_atomics+0x95/0x310
[   14.832428]  kunit_try_run_case+0x1a5/0x480
[   14.832639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.832895]  kthread+0x337/0x6f0
[   14.833184]  ret_from_fork+0x116/0x1d0
[   14.833533]  ret_from_fork_asm+0x1a/0x30
[   14.833722] 
[   14.833902] The buggy address belongs to the object at ffff888103916a00
[   14.833902]  which belongs to the cache kmalloc-64 of size 64
[   14.834327] The buggy address is located 0 bytes to the right of
[   14.834327]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.834695] 
[   14.834767] The buggy address belongs to the physical page:
[   14.835116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.835468] flags: 0x200000000000000(node=0|zone=2)
[   14.835698] page_type: f5(slab)
[   14.835866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.836215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.836553] page dumped because: kasan: bad access detected
[   14.836782] 
[   14.836856] Memory state around the buggy address:
[   14.837014]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.837288]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.837507] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.837722]                                      ^
[   14.837879]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.838433]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.838753] ==================================================================
[   14.981045] ==================================================================
[   14.981621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   14.982001] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.982629] 
[   14.982764] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.982806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.982819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.982840] Call Trace:
[   14.982855]  <TASK>
[   14.982871]  dump_stack_lvl+0x73/0xb0
[   14.982900]  print_report+0xd1/0x650
[   14.982922]  ? __virt_addr_valid+0x1db/0x2d0
[   14.982944]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.982966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.982989]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.983011]  kasan_report+0x141/0x180
[   14.983044]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.983080]  kasan_check_range+0x10c/0x1c0
[   14.983105]  __kasan_check_write+0x18/0x20
[   14.983125]  kasan_atomics_helper+0x1f43/0x5450
[   14.983148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.983181]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.983206]  ? kasan_atomics+0x152/0x310
[   14.984528]  kasan_atomics+0x1dc/0x310
[   14.984553]  ? __pfx_kasan_atomics+0x10/0x10
[   14.984578]  ? __pfx_read_tsc+0x10/0x10
[   14.984600]  ? ktime_get_ts64+0x86/0x230
[   14.984625]  kunit_try_run_case+0x1a5/0x480
[   14.984649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.984672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.984695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.984719]  ? __kthread_parkme+0x82/0x180
[   14.984740]  ? preempt_count_sub+0x50/0x80
[   14.984764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.984787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.984811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.984835]  kthread+0x337/0x6f0
[   14.984855]  ? trace_preempt_on+0x20/0xc0
[   14.984878]  ? __pfx_kthread+0x10/0x10
[   14.984899]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.984921]  ? calculate_sigpending+0x7b/0xa0
[   14.984945]  ? __pfx_kthread+0x10/0x10
[   14.984967]  ret_from_fork+0x116/0x1d0
[   14.984986]  ? __pfx_kthread+0x10/0x10
[   14.985006]  ret_from_fork_asm+0x1a/0x30
[   14.985047]  </TASK>
[   14.985232] 
[   14.993218] Allocated by task 282:
[   14.993407]  kasan_save_stack+0x45/0x70
[   14.993612]  kasan_save_track+0x18/0x40
[   14.993806]  kasan_save_alloc_info+0x3b/0x50
[   14.994010]  __kasan_kmalloc+0xb7/0xc0
[   14.994153]  __kmalloc_cache_noprof+0x189/0x420
[   14.994308]  kasan_atomics+0x95/0x310
[   14.994443]  kunit_try_run_case+0x1a5/0x480
[   14.994666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.994925]  kthread+0x337/0x6f0
[   14.995109]  ret_from_fork+0x116/0x1d0
[   14.995686]  ret_from_fork_asm+0x1a/0x30
[   14.995882] 
[   14.995985] The buggy address belongs to the object at ffff888103916a00
[   14.995985]  which belongs to the cache kmalloc-64 of size 64
[   14.996581] The buggy address is located 0 bytes to the right of
[   14.996581]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.997145] 
[   14.997247] The buggy address belongs to the physical page:
[   14.997472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.997775] flags: 0x200000000000000(node=0|zone=2)
[   14.997996] page_type: f5(slab)
[   14.998239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.998475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.998702] page dumped because: kasan: bad access detected
[   14.998875] 
[   14.998973] Memory state around the buggy address:
[   14.999215]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.999537]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.999853] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.000168]                                      ^
[   15.000390]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.000943]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.001425] ==================================================================
[   15.001749] ==================================================================
[   15.002051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.002857] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   15.003287] 
[   15.003403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.003446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.003459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.003480] Call Trace:
[   15.003496]  <TASK>
[   15.003512]  dump_stack_lvl+0x73/0xb0
[   15.003539]  print_report+0xd1/0x650
[   15.003562]  ? __virt_addr_valid+0x1db/0x2d0
[   15.003585]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.003607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.003630]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.003652]  kasan_report+0x141/0x180
[   15.003675]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.003702]  __asan_report_load8_noabort+0x18/0x20
[   15.003727]  kasan_atomics_helper+0x4f71/0x5450
[   15.003750]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.003772]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.003798]  ? kasan_atomics+0x152/0x310
[   15.003825]  kasan_atomics+0x1dc/0x310
[   15.003848]  ? __pfx_kasan_atomics+0x10/0x10
[   15.003873]  ? __pfx_read_tsc+0x10/0x10
[   15.003895]  ? ktime_get_ts64+0x86/0x230
[   15.003918]  kunit_try_run_case+0x1a5/0x480
[   15.003943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.003966]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.003989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.004013]  ? __kthread_parkme+0x82/0x180
[   15.004048]  ? preempt_count_sub+0x50/0x80
[   15.004072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.004096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.004120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.004144]  kthread+0x337/0x6f0
[   15.004164]  ? trace_preempt_on+0x20/0xc0
[   15.004188]  ? __pfx_kthread+0x10/0x10
[   15.004209]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.004230]  ? calculate_sigpending+0x7b/0xa0
[   15.004413]  ? __pfx_kthread+0x10/0x10
[   15.004437]  ret_from_fork+0x116/0x1d0
[   15.004457]  ? __pfx_kthread+0x10/0x10
[   15.004478]  ret_from_fork_asm+0x1a/0x30
[   15.004509]  </TASK>
[   15.004523] 
[   15.012431] Allocated by task 282:
[   15.012621]  kasan_save_stack+0x45/0x70
[   15.012815]  kasan_save_track+0x18/0x40
[   15.012952]  kasan_save_alloc_info+0x3b/0x50
[   15.013116]  __kasan_kmalloc+0xb7/0xc0
[   15.013252]  __kmalloc_cache_noprof+0x189/0x420
[   15.013409]  kasan_atomics+0x95/0x310
[   15.013542]  kunit_try_run_case+0x1a5/0x480
[   15.013938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.014524]  kthread+0x337/0x6f0
[   15.014701]  ret_from_fork+0x116/0x1d0
[   15.014887]  ret_from_fork_asm+0x1a/0x30
[   15.015806] 
[   15.015932] The buggy address belongs to the object at ffff888103916a00
[   15.015932]  which belongs to the cache kmalloc-64 of size 64
[   15.016996] The buggy address is located 0 bytes to the right of
[   15.016996]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   15.017683] 
[   15.017763] The buggy address belongs to the physical page:
[   15.017940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   15.018396] flags: 0x200000000000000(node=0|zone=2)
[   15.018586] page_type: f5(slab)
[   15.018714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.019099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.019438] page dumped because: kasan: bad access detected
[   15.019707] 
[   15.019803] Memory state around the buggy address:
[   15.020040]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.020519]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.020820] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.021220]                                      ^
[   15.021436]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.021729]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.021989] ==================================================================
[   13.970314] ==================================================================
[   13.970677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.971012] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.971441] 
[   13.971569] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.971624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.971638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.971659] Call Trace:
[   13.971676]  <TASK>
[   13.971691]  dump_stack_lvl+0x73/0xb0
[   13.971719]  print_report+0xd1/0x650
[   13.971753]  ? __virt_addr_valid+0x1db/0x2d0
[   13.971777]  ? kasan_atomics_helper+0x697/0x5450
[   13.971799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.971832]  ? kasan_atomics_helper+0x697/0x5450
[   13.971855]  kasan_report+0x141/0x180
[   13.971878]  ? kasan_atomics_helper+0x697/0x5450
[   13.971913]  kasan_check_range+0x10c/0x1c0
[   13.971937]  __kasan_check_write+0x18/0x20
[   13.971957]  kasan_atomics_helper+0x697/0x5450
[   13.971990]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.972014]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.972133]  ? kasan_atomics+0x152/0x310
[   13.972164]  kasan_atomics+0x1dc/0x310
[   13.972212]  ? __pfx_kasan_atomics+0x10/0x10
[   13.972237]  ? __pfx_read_tsc+0x10/0x10
[   13.972259]  ? ktime_get_ts64+0x86/0x230
[   13.972294]  kunit_try_run_case+0x1a5/0x480
[   13.972318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.972341]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.972364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.972387]  ? __kthread_parkme+0x82/0x180
[   13.972408]  ? preempt_count_sub+0x50/0x80
[   13.972431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.972455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.972478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.972502]  kthread+0x337/0x6f0
[   13.972522]  ? trace_preempt_on+0x20/0xc0
[   13.972544]  ? __pfx_kthread+0x10/0x10
[   13.972566]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.972588]  ? calculate_sigpending+0x7b/0xa0
[   13.972620]  ? __pfx_kthread+0x10/0x10
[   13.972642]  ret_from_fork+0x116/0x1d0
[   13.972661]  ? __pfx_kthread+0x10/0x10
[   13.972692]  ret_from_fork_asm+0x1a/0x30
[   13.972722]  </TASK>
[   13.972734] 
[   13.981111] Allocated by task 282:
[   13.981265]  kasan_save_stack+0x45/0x70
[   13.981497]  kasan_save_track+0x18/0x40
[   13.981691]  kasan_save_alloc_info+0x3b/0x50
[   13.981899]  __kasan_kmalloc+0xb7/0xc0
[   13.982852]  __kmalloc_cache_noprof+0x189/0x420
[   13.983543]  kasan_atomics+0x95/0x310
[   13.983780]  kunit_try_run_case+0x1a5/0x480
[   13.983975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.984554]  kthread+0x337/0x6f0
[   13.984863]  ret_from_fork+0x116/0x1d0
[   13.985305]  ret_from_fork_asm+0x1a/0x30
[   13.985500] 
[   13.985592] The buggy address belongs to the object at ffff888103916a00
[   13.985592]  which belongs to the cache kmalloc-64 of size 64
[   13.986269] The buggy address is located 0 bytes to the right of
[   13.986269]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.986856] 
[   13.986940] The buggy address belongs to the physical page:
[   13.987297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.987663] flags: 0x200000000000000(node=0|zone=2)
[   13.987866] page_type: f5(slab)
[   13.988019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.988482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.988799] page dumped because: kasan: bad access detected
[   13.989100] 
[   13.989221] Memory state around the buggy address:
[   13.989477]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.989730]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.990283] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.990602]                                      ^
[   13.990818]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.991223]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.991539] ==================================================================
[   14.864301] ==================================================================
[   14.864627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.864968] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.865655] 
[   14.865930] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.866138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.866157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.866178] Call Trace:
[   14.866194]  <TASK>
[   14.866210]  dump_stack_lvl+0x73/0xb0
[   14.866240]  print_report+0xd1/0x650
[   14.866265]  ? __virt_addr_valid+0x1db/0x2d0
[   14.866288]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.866311]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.866334]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.866357]  kasan_report+0x141/0x180
[   14.866380]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.866406]  __asan_report_load8_noabort+0x18/0x20
[   14.866431]  kasan_atomics_helper+0x4f30/0x5450
[   14.866454]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.866477]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.866502]  ? kasan_atomics+0x152/0x310
[   14.866529]  kasan_atomics+0x1dc/0x310
[   14.866553]  ? __pfx_kasan_atomics+0x10/0x10
[   14.866578]  ? __pfx_read_tsc+0x10/0x10
[   14.866600]  ? ktime_get_ts64+0x86/0x230
[   14.866623]  kunit_try_run_case+0x1a5/0x480
[   14.866647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.866669]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.866692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.866716]  ? __kthread_parkme+0x82/0x180
[   14.866737]  ? preempt_count_sub+0x50/0x80
[   14.866761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.866784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.866808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.866831]  kthread+0x337/0x6f0
[   14.866851]  ? trace_preempt_on+0x20/0xc0
[   14.866874]  ? __pfx_kthread+0x10/0x10
[   14.866895]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.866916]  ? calculate_sigpending+0x7b/0xa0
[   14.866941]  ? __pfx_kthread+0x10/0x10
[   14.866963]  ret_from_fork+0x116/0x1d0
[   14.866981]  ? __pfx_kthread+0x10/0x10
[   14.867002]  ret_from_fork_asm+0x1a/0x30
[   14.867048]  </TASK>
[   14.867087] 
[   14.878131] Allocated by task 282:
[   14.878565]  kasan_save_stack+0x45/0x70
[   14.879001]  kasan_save_track+0x18/0x40
[   14.879248]  kasan_save_alloc_info+0x3b/0x50
[   14.879462]  __kasan_kmalloc+0xb7/0xc0
[   14.879659]  __kmalloc_cache_noprof+0x189/0x420
[   14.879864]  kasan_atomics+0x95/0x310
[   14.880070]  kunit_try_run_case+0x1a5/0x480
[   14.880557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.880763]  kthread+0x337/0x6f0
[   14.881001]  ret_from_fork+0x116/0x1d0
[   14.881255]  ret_from_fork_asm+0x1a/0x30
[   14.881579] 
[   14.881672] The buggy address belongs to the object at ffff888103916a00
[   14.881672]  which belongs to the cache kmalloc-64 of size 64
[   14.882415] The buggy address is located 0 bytes to the right of
[   14.882415]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.883044] 
[   14.883256] The buggy address belongs to the physical page:
[   14.883665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.884276] flags: 0x200000000000000(node=0|zone=2)
[   14.884460] page_type: f5(slab)
[   14.884704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.885185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.885537] page dumped because: kasan: bad access detected
[   14.885770] 
[   14.885854] Memory state around the buggy address:
[   14.886216]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.886595]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.886941] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.887363]                                      ^
[   14.887569]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888165]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888540] ==================================================================
[   14.889214] ==================================================================
[   14.889491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.889837] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.890181] 
[   14.890268] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.890311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.890747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.890774] Call Trace:
[   14.890789]  <TASK>
[   14.890859]  dump_stack_lvl+0x73/0xb0
[   14.890892]  print_report+0xd1/0x650
[   14.890916]  ? __virt_addr_valid+0x1db/0x2d0
[   14.890940]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.890962]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.890985]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.891008]  kasan_report+0x141/0x180
[   14.891042]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.891073]  kasan_check_range+0x10c/0x1c0
[   14.891097]  __kasan_check_write+0x18/0x20
[   14.891266]  kasan_atomics_helper+0x1ce1/0x5450
[   14.891405]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.891432]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.891459]  ? kasan_atomics+0x152/0x310
[   14.891487]  kasan_atomics+0x1dc/0x310
[   14.891510]  ? __pfx_kasan_atomics+0x10/0x10
[   14.891534]  ? __pfx_read_tsc+0x10/0x10
[   14.891557]  ? ktime_get_ts64+0x86/0x230
[   14.891581]  kunit_try_run_case+0x1a5/0x480
[   14.891606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.891630]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.891652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.891675]  ? __kthread_parkme+0x82/0x180
[   14.891695]  ? preempt_count_sub+0x50/0x80
[   14.891719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.891744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.891769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.891794]  kthread+0x337/0x6f0
[   14.891814]  ? trace_preempt_on+0x20/0xc0
[   14.891838]  ? __pfx_kthread+0x10/0x10
[   14.891859]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.891881]  ? calculate_sigpending+0x7b/0xa0
[   14.891905]  ? __pfx_kthread+0x10/0x10
[   14.891928]  ret_from_fork+0x116/0x1d0
[   14.891947]  ? __pfx_kthread+0x10/0x10
[   14.891968]  ret_from_fork_asm+0x1a/0x30
[   14.891998]  </TASK>
[   14.892010] 
[   14.902303] Allocated by task 282:
[   14.902638]  kasan_save_stack+0x45/0x70
[   14.902897]  kasan_save_track+0x18/0x40
[   14.903335]  kasan_save_alloc_info+0x3b/0x50
[   14.903663]  __kasan_kmalloc+0xb7/0xc0
[   14.903840]  __kmalloc_cache_noprof+0x189/0x420
[   14.904056]  kasan_atomics+0x95/0x310
[   14.904513]  kunit_try_run_case+0x1a5/0x480
[   14.904701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.905063]  kthread+0x337/0x6f0
[   14.905281]  ret_from_fork+0x116/0x1d0
[   14.905559]  ret_from_fork_asm+0x1a/0x30
[   14.905743] 
[   14.905924] The buggy address belongs to the object at ffff888103916a00
[   14.905924]  which belongs to the cache kmalloc-64 of size 64
[   14.906542] The buggy address is located 0 bytes to the right of
[   14.906542]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.907352] 
[   14.907618] The buggy address belongs to the physical page:
[   14.907899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.908436] flags: 0x200000000000000(node=0|zone=2)
[   14.908649] page_type: f5(slab)
[   14.908808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.909325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.909628] page dumped because: kasan: bad access detected
[   14.909936] 
[   14.910113] Memory state around the buggy address:
[   14.910304]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.910852]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.911214] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.911643]                                      ^
[   14.911821]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912330]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912595] ==================================================================
[   14.729732] ==================================================================
[   14.730167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.730642] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.730909] 
[   14.731021] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.731123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.731137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.731174] Call Trace:
[   14.731191]  <TASK>
[   14.731208]  dump_stack_lvl+0x73/0xb0
[   14.731238]  print_report+0xd1/0x650
[   14.731261]  ? __virt_addr_valid+0x1db/0x2d0
[   14.731284]  ? kasan_atomics_helper+0x1818/0x5450
[   14.731305]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.731328]  ? kasan_atomics_helper+0x1818/0x5450
[   14.731350]  kasan_report+0x141/0x180
[   14.731372]  ? kasan_atomics_helper+0x1818/0x5450
[   14.731398]  kasan_check_range+0x10c/0x1c0
[   14.731422]  __kasan_check_write+0x18/0x20
[   14.731442]  kasan_atomics_helper+0x1818/0x5450
[   14.731464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.731486]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.731512]  ? kasan_atomics+0x152/0x310
[   14.731539]  kasan_atomics+0x1dc/0x310
[   14.731562]  ? __pfx_kasan_atomics+0x10/0x10
[   14.731587]  ? __pfx_read_tsc+0x10/0x10
[   14.731607]  ? ktime_get_ts64+0x86/0x230
[   14.731631]  kunit_try_run_case+0x1a5/0x480
[   14.731655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.731677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.731700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.731723]  ? __kthread_parkme+0x82/0x180
[   14.731743]  ? preempt_count_sub+0x50/0x80
[   14.731767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.731791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.731814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.731837]  kthread+0x337/0x6f0
[   14.731856]  ? trace_preempt_on+0x20/0xc0
[   14.731879]  ? __pfx_kthread+0x10/0x10
[   14.731900]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.731921]  ? calculate_sigpending+0x7b/0xa0
[   14.731944]  ? __pfx_kthread+0x10/0x10
[   14.731966]  ret_from_fork+0x116/0x1d0
[   14.731984]  ? __pfx_kthread+0x10/0x10
[   14.732006]  ret_from_fork_asm+0x1a/0x30
[   14.732058]  </TASK>
[   14.732070] 
[   14.740417] Allocated by task 282:
[   14.740560]  kasan_save_stack+0x45/0x70
[   14.740704]  kasan_save_track+0x18/0x40
[   14.740849]  kasan_save_alloc_info+0x3b/0x50
[   14.741077]  __kasan_kmalloc+0xb7/0xc0
[   14.741269]  __kmalloc_cache_noprof+0x189/0x420
[   14.741501]  kasan_atomics+0x95/0x310
[   14.741690]  kunit_try_run_case+0x1a5/0x480
[   14.741883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.742129]  kthread+0x337/0x6f0
[   14.742299]  ret_from_fork+0x116/0x1d0
[   14.742522]  ret_from_fork_asm+0x1a/0x30
[   14.742718] 
[   14.742791] The buggy address belongs to the object at ffff888103916a00
[   14.742791]  which belongs to the cache kmalloc-64 of size 64
[   14.743252] The buggy address is located 0 bytes to the right of
[   14.743252]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.743786] 
[   14.743885] The buggy address belongs to the physical page:
[   14.744181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.744528] flags: 0x200000000000000(node=0|zone=2)
[   14.744733] page_type: f5(slab)
[   14.744891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.745175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.745503] page dumped because: kasan: bad access detected
[   14.745715] 
[   14.745787] Memory state around the buggy address:
[   14.745943]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.746209]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.746427] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.746710]                                      ^
[   14.746934]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.747462]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.747783] ==================================================================
[   14.766403] ==================================================================
[   14.767121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.767501] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.767825] 
[   14.767915] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.767960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.767975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.767998] Call Trace:
[   14.768013]  <TASK>
[   14.768039]  dump_stack_lvl+0x73/0xb0
[   14.768066]  print_report+0xd1/0x650
[   14.768089]  ? __virt_addr_valid+0x1db/0x2d0
[   14.768111]  ? kasan_atomics_helper+0x194a/0x5450
[   14.768169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.768192]  ? kasan_atomics_helper+0x194a/0x5450
[   14.768231]  kasan_report+0x141/0x180
[   14.768253]  ? kasan_atomics_helper+0x194a/0x5450
[   14.768279]  kasan_check_range+0x10c/0x1c0
[   14.768304]  __kasan_check_write+0x18/0x20
[   14.768324]  kasan_atomics_helper+0x194a/0x5450
[   14.768346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.768368]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.768393]  ? kasan_atomics+0x152/0x310
[   14.768420]  kasan_atomics+0x1dc/0x310
[   14.768442]  ? __pfx_kasan_atomics+0x10/0x10
[   14.768467]  ? __pfx_read_tsc+0x10/0x10
[   14.768488]  ? ktime_get_ts64+0x86/0x230
[   14.768512]  kunit_try_run_case+0x1a5/0x480
[   14.768536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.768559]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.768582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.768605]  ? __kthread_parkme+0x82/0x180
[   14.768626]  ? preempt_count_sub+0x50/0x80
[   14.768649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.768674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.768697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.768720]  kthread+0x337/0x6f0
[   14.768739]  ? trace_preempt_on+0x20/0xc0
[   14.768763]  ? __pfx_kthread+0x10/0x10
[   14.768783]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.768804]  ? calculate_sigpending+0x7b/0xa0
[   14.768829]  ? __pfx_kthread+0x10/0x10
[   14.768850]  ret_from_fork+0x116/0x1d0
[   14.768868]  ? __pfx_kthread+0x10/0x10
[   14.768889]  ret_from_fork_asm+0x1a/0x30
[   14.768919]  </TASK>
[   14.768931] 
[   14.777410] Allocated by task 282:
[   14.777589]  kasan_save_stack+0x45/0x70
[   14.777745]  kasan_save_track+0x18/0x40
[   14.777941]  kasan_save_alloc_info+0x3b/0x50
[   14.778289]  __kasan_kmalloc+0xb7/0xc0
[   14.778457]  __kmalloc_cache_noprof+0x189/0x420
[   14.778674]  kasan_atomics+0x95/0x310
[   14.778865]  kunit_try_run_case+0x1a5/0x480
[   14.779083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.779311]  kthread+0x337/0x6f0
[   14.779466]  ret_from_fork+0x116/0x1d0
[   14.779639]  ret_from_fork_asm+0x1a/0x30
[   14.779821] 
[   14.779913] The buggy address belongs to the object at ffff888103916a00
[   14.779913]  which belongs to the cache kmalloc-64 of size 64
[   14.780472] The buggy address is located 0 bytes to the right of
[   14.780472]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.780843] 
[   14.780915] The buggy address belongs to the physical page:
[   14.781102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.781363] flags: 0x200000000000000(node=0|zone=2)
[   14.781528] page_type: f5(slab)
[   14.781648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.781988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.782356] page dumped because: kasan: bad access detected
[   14.782606] 
[   14.782700] Memory state around the buggy address:
[   14.782931]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.783339]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.783661] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.783976]                                      ^
[   14.784275]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.784602]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.784943] ==================================================================
[   14.962756] ==================================================================
[   14.963090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   14.963670] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.963967] 
[   14.964098] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.964142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.964157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.964179] Call Trace:
[   14.964195]  <TASK>
[   14.964211]  dump_stack_lvl+0x73/0xb0
[   14.964239]  print_report+0xd1/0x650
[   14.964263]  ? __virt_addr_valid+0x1db/0x2d0
[   14.964286]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.964309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.964332]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.964355]  kasan_report+0x141/0x180
[   14.964377]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.964404]  kasan_check_range+0x10c/0x1c0
[   14.964428]  __kasan_check_write+0x18/0x20
[   14.964448]  kasan_atomics_helper+0x1eaa/0x5450
[   14.964471]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.964494]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.964519]  ? kasan_atomics+0x152/0x310
[   14.964547]  kasan_atomics+0x1dc/0x310
[   14.964570]  ? __pfx_kasan_atomics+0x10/0x10
[   14.964595]  ? __pfx_read_tsc+0x10/0x10
[   14.964617]  ? ktime_get_ts64+0x86/0x230
[   14.964642]  kunit_try_run_case+0x1a5/0x480
[   14.964667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.964689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.964712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.964735]  ? __kthread_parkme+0x82/0x180
[   14.964757]  ? preempt_count_sub+0x50/0x80
[   14.964781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.964805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.964828]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.964852]  kthread+0x337/0x6f0
[   14.964872]  ? trace_preempt_on+0x20/0xc0
[   14.964895]  ? __pfx_kthread+0x10/0x10
[   14.964916]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.964937]  ? calculate_sigpending+0x7b/0xa0
[   14.964962]  ? __pfx_kthread+0x10/0x10
[   14.964984]  ret_from_fork+0x116/0x1d0
[   14.965002]  ? __pfx_kthread+0x10/0x10
[   14.965023]  ret_from_fork_asm+0x1a/0x30
[   14.965085]  </TASK>
[   14.965097] 
[   14.972984] Allocated by task 282:
[   14.973175]  kasan_save_stack+0x45/0x70
[   14.973396]  kasan_save_track+0x18/0x40
[   14.973587]  kasan_save_alloc_info+0x3b/0x50
[   14.973758]  __kasan_kmalloc+0xb7/0xc0
[   14.973936]  __kmalloc_cache_noprof+0x189/0x420
[   14.974218]  kasan_atomics+0x95/0x310
[   14.974356]  kunit_try_run_case+0x1a5/0x480
[   14.974501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.974818]  kthread+0x337/0x6f0
[   14.974988]  ret_from_fork+0x116/0x1d0
[   14.975252]  ret_from_fork_asm+0x1a/0x30
[   14.975500] 
[   14.975575] The buggy address belongs to the object at ffff888103916a00
[   14.975575]  which belongs to the cache kmalloc-64 of size 64
[   14.976017] The buggy address is located 0 bytes to the right of
[   14.976017]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.976569] 
[   14.976670] The buggy address belongs to the physical page:
[   14.976894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.977146] flags: 0x200000000000000(node=0|zone=2)
[   14.977307] page_type: f5(slab)
[   14.977426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.977655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.978215] page dumped because: kasan: bad access detected
[   14.978515] 
[   14.978611] Memory state around the buggy address:
[   14.978832]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.979280]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.979522] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.979735]                                      ^
[   14.979891]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.980231]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.980556] ==================================================================
[   14.748335] ==================================================================
[   14.748678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.748944] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.749548] 
[   14.749665] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.749707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.749720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.749741] Call Trace:
[   14.749757]  <TASK>
[   14.749773]  dump_stack_lvl+0x73/0xb0
[   14.749808]  print_report+0xd1/0x650
[   14.749859]  ? __virt_addr_valid+0x1db/0x2d0
[   14.749882]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.749904]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.749926]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.749948]  kasan_report+0x141/0x180
[   14.749970]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.749997]  kasan_check_range+0x10c/0x1c0
[   14.750020]  __kasan_check_write+0x18/0x20
[   14.750057]  kasan_atomics_helper+0x18b1/0x5450
[   14.750081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.750103]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.750128]  ? kasan_atomics+0x152/0x310
[   14.750155]  kasan_atomics+0x1dc/0x310
[   14.750178]  ? __pfx_kasan_atomics+0x10/0x10
[   14.750203]  ? __pfx_read_tsc+0x10/0x10
[   14.750224]  ? ktime_get_ts64+0x86/0x230
[   14.750248]  kunit_try_run_case+0x1a5/0x480
[   14.750271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.750294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.750317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.750339]  ? __kthread_parkme+0x82/0x180
[   14.750359]  ? preempt_count_sub+0x50/0x80
[   14.750383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.750407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.750429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.750453]  kthread+0x337/0x6f0
[   14.750473]  ? trace_preempt_on+0x20/0xc0
[   14.750496]  ? __pfx_kthread+0x10/0x10
[   14.750517]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.750538]  ? calculate_sigpending+0x7b/0xa0
[   14.750562]  ? __pfx_kthread+0x10/0x10
[   14.750583]  ret_from_fork+0x116/0x1d0
[   14.750602]  ? __pfx_kthread+0x10/0x10
[   14.750623]  ret_from_fork_asm+0x1a/0x30
[   14.750652]  </TASK>
[   14.750663] 
[   14.758297] Allocated by task 282:
[   14.758465]  kasan_save_stack+0x45/0x70
[   14.758687]  kasan_save_track+0x18/0x40
[   14.758882]  kasan_save_alloc_info+0x3b/0x50
[   14.759120]  __kasan_kmalloc+0xb7/0xc0
[   14.759289]  __kmalloc_cache_noprof+0x189/0x420
[   14.759446]  kasan_atomics+0x95/0x310
[   14.759580]  kunit_try_run_case+0x1a5/0x480
[   14.759922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.760216]  kthread+0x337/0x6f0
[   14.760389]  ret_from_fork+0x116/0x1d0
[   14.760580]  ret_from_fork_asm+0x1a/0x30
[   14.760782] 
[   14.760857] The buggy address belongs to the object at ffff888103916a00
[   14.760857]  which belongs to the cache kmalloc-64 of size 64
[   14.761403] The buggy address is located 0 bytes to the right of
[   14.761403]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.761871] 
[   14.761967] The buggy address belongs to the physical page:
[   14.762180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.762487] flags: 0x200000000000000(node=0|zone=2)
[   14.762704] page_type: f5(slab)
[   14.762869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.763386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.763705] page dumped because: kasan: bad access detected
[   14.763876] 
[   14.763946] Memory state around the buggy address:
[   14.764119]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.764337]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.764553] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.764764]                                      ^
[   14.764977]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.765535]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.765847] ==================================================================
[   14.284351] ==================================================================
[   14.284684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.284970] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.285357] 
[   14.285469] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.285511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.285524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.285545] Call Trace:
[   14.285559]  <TASK>
[   14.285573]  dump_stack_lvl+0x73/0xb0
[   14.285601]  print_report+0xd1/0x650
[   14.285623]  ? __virt_addr_valid+0x1db/0x2d0
[   14.285648]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.285669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.285692]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.285714]  kasan_report+0x141/0x180
[   14.285736]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.285762]  kasan_check_range+0x10c/0x1c0
[   14.285787]  __kasan_check_write+0x18/0x20
[   14.285807]  kasan_atomics_helper+0xfa9/0x5450
[   14.285830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.285853]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.285879]  ? kasan_atomics+0x152/0x310
[   14.285906]  kasan_atomics+0x1dc/0x310
[   14.285928]  ? __pfx_kasan_atomics+0x10/0x10
[   14.285953]  ? __pfx_read_tsc+0x10/0x10
[   14.285975]  ? ktime_get_ts64+0x86/0x230
[   14.285999]  kunit_try_run_case+0x1a5/0x480
[   14.286023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.286117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.286160]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.286184]  ? __kthread_parkme+0x82/0x180
[   14.286205]  ? preempt_count_sub+0x50/0x80
[   14.286228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.286253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.286276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.286302]  kthread+0x337/0x6f0
[   14.286322]  ? trace_preempt_on+0x20/0xc0
[   14.286346]  ? __pfx_kthread+0x10/0x10
[   14.286367]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.286389]  ? calculate_sigpending+0x7b/0xa0
[   14.286413]  ? __pfx_kthread+0x10/0x10
[   14.286435]  ret_from_fork+0x116/0x1d0
[   14.286453]  ? __pfx_kthread+0x10/0x10
[   14.286475]  ret_from_fork_asm+0x1a/0x30
[   14.286506]  </TASK>
[   14.286517] 
[   14.294570] Allocated by task 282:
[   14.294704]  kasan_save_stack+0x45/0x70
[   14.294852]  kasan_save_track+0x18/0x40
[   14.295219]  kasan_save_alloc_info+0x3b/0x50
[   14.295480]  __kasan_kmalloc+0xb7/0xc0
[   14.295670]  __kmalloc_cache_noprof+0x189/0x420
[   14.295891]  kasan_atomics+0x95/0x310
[   14.296171]  kunit_try_run_case+0x1a5/0x480
[   14.296400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.296620]  kthread+0x337/0x6f0
[   14.296741]  ret_from_fork+0x116/0x1d0
[   14.296873]  ret_from_fork_asm+0x1a/0x30
[   14.297014] 
[   14.297207] The buggy address belongs to the object at ffff888103916a00
[   14.297207]  which belongs to the cache kmalloc-64 of size 64
[   14.297735] The buggy address is located 0 bytes to the right of
[   14.297735]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.298320] 
[   14.298396] The buggy address belongs to the physical page:
[   14.298572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.298845] flags: 0x200000000000000(node=0|zone=2)
[   14.299298] page_type: f5(slab)
[   14.299479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.299826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.300272] page dumped because: kasan: bad access detected
[   14.300458] 
[   14.300560] Memory state around the buggy address:
[   14.300784]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.301114]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.301362] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.301653]                                      ^
[   14.301882]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.302293]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.302611] ==================================================================
[   13.908660] ==================================================================
[   13.908947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.909388] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.909735] 
[   13.909858] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.909902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.909915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.909936] Call Trace:
[   13.909954]  <TASK>
[   13.909969]  dump_stack_lvl+0x73/0xb0
[   13.910005]  print_report+0xd1/0x650
[   13.910110]  ? __virt_addr_valid+0x1db/0x2d0
[   13.910138]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.910160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.910211]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.910233]  kasan_report+0x141/0x180
[   13.910256]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.910283]  __asan_report_store4_noabort+0x1b/0x30
[   13.910305]  kasan_atomics_helper+0x4b3a/0x5450
[   13.910327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.910350]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.910376]  ? kasan_atomics+0x152/0x310
[   13.910413]  kasan_atomics+0x1dc/0x310
[   13.910437]  ? __pfx_kasan_atomics+0x10/0x10
[   13.910461]  ? __pfx_read_tsc+0x10/0x10
[   13.910493]  ? ktime_get_ts64+0x86/0x230
[   13.910517]  kunit_try_run_case+0x1a5/0x480
[   13.910542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910563]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.910587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.910611]  ? __kthread_parkme+0x82/0x180
[   13.910631]  ? preempt_count_sub+0x50/0x80
[   13.910655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910679]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.910702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.910726]  kthread+0x337/0x6f0
[   13.910745]  ? trace_preempt_on+0x20/0xc0
[   13.910769]  ? __pfx_kthread+0x10/0x10
[   13.910798]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.910820]  ? calculate_sigpending+0x7b/0xa0
[   13.910843]  ? __pfx_kthread+0x10/0x10
[   13.910875]  ret_from_fork+0x116/0x1d0
[   13.910893]  ? __pfx_kthread+0x10/0x10
[   13.910915]  ret_from_fork_asm+0x1a/0x30
[   13.910944]  </TASK>
[   13.910957] 
[   13.919373] Allocated by task 282:
[   13.919548]  kasan_save_stack+0x45/0x70
[   13.919764]  kasan_save_track+0x18/0x40
[   13.919959]  kasan_save_alloc_info+0x3b/0x50
[   13.920372]  __kasan_kmalloc+0xb7/0xc0
[   13.920596]  __kmalloc_cache_noprof+0x189/0x420
[   13.920816]  kasan_atomics+0x95/0x310
[   13.920955]  kunit_try_run_case+0x1a5/0x480
[   13.921288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.921532]  kthread+0x337/0x6f0
[   13.921709]  ret_from_fork+0x116/0x1d0
[   13.921912]  ret_from_fork_asm+0x1a/0x30
[   13.922125] 
[   13.922212] The buggy address belongs to the object at ffff888103916a00
[   13.922212]  which belongs to the cache kmalloc-64 of size 64
[   13.922735] The buggy address is located 0 bytes to the right of
[   13.922735]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.923225] 
[   13.923299] The buggy address belongs to the physical page:
[   13.923474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.923828] flags: 0x200000000000000(node=0|zone=2)
[   13.924309] page_type: f5(slab)
[   13.924489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.924823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.925243] page dumped because: kasan: bad access detected
[   13.925485] 
[   13.925584] Memory state around the buggy address:
[   13.925810]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.926214]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.926508] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.926722]                                      ^
[   13.926948]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.927377]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.927723] ==================================================================
[   14.643187] ==================================================================
[   14.643509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.643824] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.644796] 
[   14.645057] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.645107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.645121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.645154] Call Trace:
[   14.645205]  <TASK>
[   14.645221]  dump_stack_lvl+0x73/0xb0
[   14.645253]  print_report+0xd1/0x650
[   14.645276]  ? __virt_addr_valid+0x1db/0x2d0
[   14.645299]  ? kasan_atomics_helper+0x164f/0x5450
[   14.645321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.645345]  ? kasan_atomics_helper+0x164f/0x5450
[   14.645368]  kasan_report+0x141/0x180
[   14.645391]  ? kasan_atomics_helper+0x164f/0x5450
[   14.645418]  kasan_check_range+0x10c/0x1c0
[   14.645441]  __kasan_check_write+0x18/0x20
[   14.645461]  kasan_atomics_helper+0x164f/0x5450
[   14.645485]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.645506]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.645534]  ? kasan_atomics+0x152/0x310
[   14.645562]  kasan_atomics+0x1dc/0x310
[   14.645585]  ? __pfx_kasan_atomics+0x10/0x10
[   14.645610]  ? __pfx_read_tsc+0x10/0x10
[   14.645632]  ? ktime_get_ts64+0x86/0x230
[   14.645658]  kunit_try_run_case+0x1a5/0x480
[   14.645682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.645705]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.645730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.645753]  ? __kthread_parkme+0x82/0x180
[   14.645774]  ? preempt_count_sub+0x50/0x80
[   14.645798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.645822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.645845]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.645870]  kthread+0x337/0x6f0
[   14.645889]  ? trace_preempt_on+0x20/0xc0
[   14.645913]  ? __pfx_kthread+0x10/0x10
[   14.645934]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.645955]  ? calculate_sigpending+0x7b/0xa0
[   14.645979]  ? __pfx_kthread+0x10/0x10
[   14.646001]  ret_from_fork+0x116/0x1d0
[   14.646020]  ? __pfx_kthread+0x10/0x10
[   14.646073]  ret_from_fork_asm+0x1a/0x30
[   14.646103]  </TASK>
[   14.646116] 
[   14.659457] Allocated by task 282:
[   14.659713]  kasan_save_stack+0x45/0x70
[   14.659911]  kasan_save_track+0x18/0x40
[   14.660378]  kasan_save_alloc_info+0x3b/0x50
[   14.660657]  __kasan_kmalloc+0xb7/0xc0
[   14.660937]  __kmalloc_cache_noprof+0x189/0x420
[   14.661374]  kasan_atomics+0x95/0x310
[   14.661569]  kunit_try_run_case+0x1a5/0x480
[   14.661766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.661993]  kthread+0x337/0x6f0
[   14.662545]  ret_from_fork+0x116/0x1d0
[   14.662901]  ret_from_fork_asm+0x1a/0x30
[   14.663343] 
[   14.663618] The buggy address belongs to the object at ffff888103916a00
[   14.663618]  which belongs to the cache kmalloc-64 of size 64
[   14.664573] The buggy address is located 0 bytes to the right of
[   14.664573]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.665240] 
[   14.665460] The buggy address belongs to the physical page:
[   14.665809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.666356] flags: 0x200000000000000(node=0|zone=2)
[   14.666871] page_type: f5(slab)
[   14.667044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.667769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.668443] page dumped because: kasan: bad access detected
[   14.668746] 
[   14.668847] Memory state around the buggy address:
[   14.669263]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.669703]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.670009] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.670548]                                      ^
[   14.670776]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.671290]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.671753] ==================================================================
[   14.542981] ==================================================================
[   14.543376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.543635] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.544209] 
[   14.544308] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.544350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.544363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.544383] Call Trace:
[   14.544398]  <TASK>
[   14.544413]  dump_stack_lvl+0x73/0xb0
[   14.544441]  print_report+0xd1/0x650
[   14.544484]  ? __virt_addr_valid+0x1db/0x2d0
[   14.544507]  ? kasan_atomics_helper+0x1467/0x5450
[   14.544529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.544551]  ? kasan_atomics_helper+0x1467/0x5450
[   14.544574]  kasan_report+0x141/0x180
[   14.544596]  ? kasan_atomics_helper+0x1467/0x5450
[   14.544622]  kasan_check_range+0x10c/0x1c0
[   14.544653]  __kasan_check_write+0x18/0x20
[   14.544674]  kasan_atomics_helper+0x1467/0x5450
[   14.544697]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.544720]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.544745]  ? kasan_atomics+0x152/0x310
[   14.544772]  kasan_atomics+0x1dc/0x310
[   14.544795]  ? __pfx_kasan_atomics+0x10/0x10
[   14.544819]  ? __pfx_read_tsc+0x10/0x10
[   14.544840]  ? ktime_get_ts64+0x86/0x230
[   14.544865]  kunit_try_run_case+0x1a5/0x480
[   14.544889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.544912]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.544935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.544959]  ? __kthread_parkme+0x82/0x180
[   14.544980]  ? preempt_count_sub+0x50/0x80
[   14.545004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.545038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.545062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.545086]  kthread+0x337/0x6f0
[   14.545105]  ? trace_preempt_on+0x20/0xc0
[   14.545130]  ? __pfx_kthread+0x10/0x10
[   14.545152]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.545174]  ? calculate_sigpending+0x7b/0xa0
[   14.545197]  ? __pfx_kthread+0x10/0x10
[   14.545219]  ret_from_fork+0x116/0x1d0
[   14.545238]  ? __pfx_kthread+0x10/0x10
[   14.545259]  ret_from_fork_asm+0x1a/0x30
[   14.545300]  </TASK>
[   14.545312] 
[   14.553262] Allocated by task 282:
[   14.553392]  kasan_save_stack+0x45/0x70
[   14.553603]  kasan_save_track+0x18/0x40
[   14.553792]  kasan_save_alloc_info+0x3b/0x50
[   14.554001]  __kasan_kmalloc+0xb7/0xc0
[   14.554159]  __kmalloc_cache_noprof+0x189/0x420
[   14.554315]  kasan_atomics+0x95/0x310
[   14.554449]  kunit_try_run_case+0x1a5/0x480
[   14.554741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.554994]  kthread+0x337/0x6f0
[   14.555195]  ret_from_fork+0x116/0x1d0
[   14.555409]  ret_from_fork_asm+0x1a/0x30
[   14.555585] 
[   14.555690] The buggy address belongs to the object at ffff888103916a00
[   14.555690]  which belongs to the cache kmalloc-64 of size 64
[   14.556268] The buggy address is located 0 bytes to the right of
[   14.556268]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.556871] 
[   14.556969] The buggy address belongs to the physical page:
[   14.557369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.557931] flags: 0x200000000000000(node=0|zone=2)
[   14.558258] page_type: f5(slab)
[   14.558470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.558769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.559089] page dumped because: kasan: bad access detected
[   14.559379] 
[   14.559475] Memory state around the buggy address:
[   14.559665]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.559944]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.560231] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.560628]                                      ^
[   14.560900]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.561130]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.561347] ==================================================================
[   14.379947] ==================================================================
[   14.380366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.380722] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.381061] 
[   14.381338] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.381385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.381399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.381420] Call Trace:
[   14.381435]  <TASK>
[   14.381450]  dump_stack_lvl+0x73/0xb0
[   14.381480]  print_report+0xd1/0x650
[   14.381503]  ? __virt_addr_valid+0x1db/0x2d0
[   14.381527]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.381549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.381571]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.381594]  kasan_report+0x141/0x180
[   14.381615]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.381642]  __asan_report_load4_noabort+0x18/0x20
[   14.381667]  kasan_atomics_helper+0x4a02/0x5450
[   14.381690]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.381713]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.381738]  ? kasan_atomics+0x152/0x310
[   14.381765]  kasan_atomics+0x1dc/0x310
[   14.381788]  ? __pfx_kasan_atomics+0x10/0x10
[   14.381813]  ? __pfx_read_tsc+0x10/0x10
[   14.381834]  ? ktime_get_ts64+0x86/0x230
[   14.381858]  kunit_try_run_case+0x1a5/0x480
[   14.381883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.381906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.381928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.381952]  ? __kthread_parkme+0x82/0x180
[   14.381972]  ? preempt_count_sub+0x50/0x80
[   14.381996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.382020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.382111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.382137]  kthread+0x337/0x6f0
[   14.382158]  ? trace_preempt_on+0x20/0xc0
[   14.382182]  ? __pfx_kthread+0x10/0x10
[   14.382204]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.382225]  ? calculate_sigpending+0x7b/0xa0
[   14.382250]  ? __pfx_kthread+0x10/0x10
[   14.382272]  ret_from_fork+0x116/0x1d0
[   14.382290]  ? __pfx_kthread+0x10/0x10
[   14.382312]  ret_from_fork_asm+0x1a/0x30
[   14.382343]  </TASK>
[   14.382354] 
[   14.390403] Allocated by task 282:
[   14.390589]  kasan_save_stack+0x45/0x70
[   14.390791]  kasan_save_track+0x18/0x40
[   14.390984]  kasan_save_alloc_info+0x3b/0x50
[   14.391233]  __kasan_kmalloc+0xb7/0xc0
[   14.391371]  __kmalloc_cache_noprof+0x189/0x420
[   14.391527]  kasan_atomics+0x95/0x310
[   14.391811]  kunit_try_run_case+0x1a5/0x480
[   14.392023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.392349]  kthread+0x337/0x6f0
[   14.392514]  ret_from_fork+0x116/0x1d0
[   14.392706]  ret_from_fork_asm+0x1a/0x30
[   14.392892] 
[   14.392970] The buggy address belongs to the object at ffff888103916a00
[   14.392970]  which belongs to the cache kmalloc-64 of size 64
[   14.393525] The buggy address is located 0 bytes to the right of
[   14.393525]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.393903] 
[   14.393976] The buggy address belongs to the physical page:
[   14.394368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.394729] flags: 0x200000000000000(node=0|zone=2)
[   14.394960] page_type: f5(slab)
[   14.395356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.395734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.396167] page dumped because: kasan: bad access detected
[   14.396424] 
[   14.396515] Memory state around the buggy address:
[   14.396673]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.396962]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.397420] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.397768]                                      ^
[   14.397996]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.398507]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.398832] ==================================================================
[   15.137760] ==================================================================
[   15.138195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.138594] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   15.138895] 
[   15.139008] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.139063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.139080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.139101] Call Trace:
[   15.139116]  <TASK>
[   15.139132]  dump_stack_lvl+0x73/0xb0
[   15.139162]  print_report+0xd1/0x650
[   15.139185]  ? __virt_addr_valid+0x1db/0x2d0
[   15.139207]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.139229]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.139552]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.139670]  kasan_report+0x141/0x180
[   15.139697]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.139725]  __asan_report_load8_noabort+0x18/0x20
[   15.139751]  kasan_atomics_helper+0x4fa5/0x5450
[   15.139774]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.139797]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.139823]  ? kasan_atomics+0x152/0x310
[   15.139850]  kasan_atomics+0x1dc/0x310
[   15.139873]  ? __pfx_kasan_atomics+0x10/0x10
[   15.139897]  ? __pfx_read_tsc+0x10/0x10
[   15.139919]  ? ktime_get_ts64+0x86/0x230
[   15.139944]  kunit_try_run_case+0x1a5/0x480
[   15.139968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.139991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.140015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.140065]  ? __kthread_parkme+0x82/0x180
[   15.140086]  ? preempt_count_sub+0x50/0x80
[   15.140111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.140135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.140159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.140184]  kthread+0x337/0x6f0
[   15.140204]  ? trace_preempt_on+0x20/0xc0
[   15.140228]  ? __pfx_kthread+0x10/0x10
[   15.140250]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.140272]  ? calculate_sigpending+0x7b/0xa0
[   15.140296]  ? __pfx_kthread+0x10/0x10
[   15.140317]  ret_from_fork+0x116/0x1d0
[   15.140336]  ? __pfx_kthread+0x10/0x10
[   15.140357]  ret_from_fork_asm+0x1a/0x30
[   15.140387]  </TASK>
[   15.140400] 
[   15.150432] Allocated by task 282:
[   15.150620]  kasan_save_stack+0x45/0x70
[   15.151372]  kasan_save_track+0x18/0x40
[   15.151594]  kasan_save_alloc_info+0x3b/0x50
[   15.151918]  __kasan_kmalloc+0xb7/0xc0
[   15.152195]  __kmalloc_cache_noprof+0x189/0x420
[   15.152550]  kasan_atomics+0x95/0x310
[   15.152803]  kunit_try_run_case+0x1a5/0x480
[   15.152961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.153436]  kthread+0x337/0x6f0
[   15.153591]  ret_from_fork+0x116/0x1d0
[   15.153783]  ret_from_fork_asm+0x1a/0x30
[   15.153957] 
[   15.154149] The buggy address belongs to the object at ffff888103916a00
[   15.154149]  which belongs to the cache kmalloc-64 of size 64
[   15.154782] The buggy address is located 0 bytes to the right of
[   15.154782]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   15.155634] 
[   15.155738] The buggy address belongs to the physical page:
[   15.155961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   15.156530] flags: 0x200000000000000(node=0|zone=2)
[   15.156737] page_type: f5(slab)
[   15.157038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.157564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.158186] page dumped because: kasan: bad access detected
[   15.158503] 
[   15.158685] Memory state around the buggy address:
[   15.158902]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.159488]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.159802] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.160184]                                      ^
[   15.160529]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.160830]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.161135] ==================================================================
[   15.041605] ==================================================================
[   15.041907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.042200] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   15.042631] 
[   15.042741] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.042797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.042812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.042832] Call Trace:
[   15.042847]  <TASK>
[   15.042862]  dump_stack_lvl+0x73/0xb0
[   15.042888]  print_report+0xd1/0x650
[   15.042912]  ? __virt_addr_valid+0x1db/0x2d0
[   15.042934]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.042956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.042979]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.043001]  kasan_report+0x141/0x180
[   15.043024]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.043061]  __asan_report_load8_noabort+0x18/0x20
[   15.043089]  kasan_atomics_helper+0x4f98/0x5450
[   15.043112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.043136]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.043161]  ? kasan_atomics+0x152/0x310
[   15.043188]  kasan_atomics+0x1dc/0x310
[   15.043212]  ? __pfx_kasan_atomics+0x10/0x10
[   15.043237]  ? __pfx_read_tsc+0x10/0x10
[   15.043339]  ? ktime_get_ts64+0x86/0x230
[   15.043364]  kunit_try_run_case+0x1a5/0x480
[   15.043390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.043436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.043459]  ? __kthread_parkme+0x82/0x180
[   15.043480]  ? preempt_count_sub+0x50/0x80
[   15.043503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.043551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.043575]  kthread+0x337/0x6f0
[   15.043594]  ? trace_preempt_on+0x20/0xc0
[   15.043617]  ? __pfx_kthread+0x10/0x10
[   15.043639]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.043660]  ? calculate_sigpending+0x7b/0xa0
[   15.043686]  ? __pfx_kthread+0x10/0x10
[   15.043708]  ret_from_fork+0x116/0x1d0
[   15.043727]  ? __pfx_kthread+0x10/0x10
[   15.043748]  ret_from_fork_asm+0x1a/0x30
[   15.043779]  </TASK>
[   15.043790] 
[   15.056451] Allocated by task 282:
[   15.056629]  kasan_save_stack+0x45/0x70
[   15.056823]  kasan_save_track+0x18/0x40
[   15.057003]  kasan_save_alloc_info+0x3b/0x50
[   15.057531]  __kasan_kmalloc+0xb7/0xc0
[   15.057789]  __kmalloc_cache_noprof+0x189/0x420
[   15.058375]  kasan_atomics+0x95/0x310
[   15.058579]  kunit_try_run_case+0x1a5/0x480
[   15.058773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.059002]  kthread+0x337/0x6f0
[   15.059599]  ret_from_fork+0x116/0x1d0
[   15.059799]  ret_from_fork_asm+0x1a/0x30
[   15.059983] 
[   15.060466] The buggy address belongs to the object at ffff888103916a00
[   15.060466]  which belongs to the cache kmalloc-64 of size 64
[   15.060949] The buggy address is located 0 bytes to the right of
[   15.060949]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   15.062199] 
[   15.062308] The buggy address belongs to the physical page:
[   15.062552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   15.062874] flags: 0x200000000000000(node=0|zone=2)
[   15.063420] page_type: f5(slab)
[   15.063713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.064234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.064564] page dumped because: kasan: bad access detected
[   15.064794] 
[   15.064888] Memory state around the buggy address:
[   15.065475]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.065801]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.066231] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.066523]                                      ^
[   15.066729]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.066948]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.067179] ==================================================================
[   15.184834] ==================================================================
[   15.185125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.185576] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   15.186229] 
[   15.186500] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.186547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.186561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.186582] Call Trace:
[   15.186597]  <TASK>
[   15.186614]  dump_stack_lvl+0x73/0xb0
[   15.186641]  print_report+0xd1/0x650
[   15.186664]  ? __virt_addr_valid+0x1db/0x2d0
[   15.186686]  ? kasan_atomics_helper+0x5115/0x5450
[   15.186708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.186730]  ? kasan_atomics_helper+0x5115/0x5450
[   15.186753]  kasan_report+0x141/0x180
[   15.186776]  ? kasan_atomics_helper+0x5115/0x5450
[   15.186802]  __asan_report_load8_noabort+0x18/0x20
[   15.186827]  kasan_atomics_helper+0x5115/0x5450
[   15.186850]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.186873]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.186898]  ? kasan_atomics+0x152/0x310
[   15.186925]  kasan_atomics+0x1dc/0x310
[   15.186947]  ? __pfx_kasan_atomics+0x10/0x10
[   15.186972]  ? __pfx_read_tsc+0x10/0x10
[   15.186993]  ? ktime_get_ts64+0x86/0x230
[   15.187017]  kunit_try_run_case+0x1a5/0x480
[   15.187073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.187096]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.187119]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.187144]  ? __kthread_parkme+0x82/0x180
[   15.187166]  ? preempt_count_sub+0x50/0x80
[   15.187194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.187222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.187247]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.187271]  kthread+0x337/0x6f0
[   15.187291]  ? trace_preempt_on+0x20/0xc0
[   15.187315]  ? __pfx_kthread+0x10/0x10
[   15.187336]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.187356]  ? calculate_sigpending+0x7b/0xa0
[   15.187381]  ? __pfx_kthread+0x10/0x10
[   15.187403]  ret_from_fork+0x116/0x1d0
[   15.187422]  ? __pfx_kthread+0x10/0x10
[   15.187445]  ret_from_fork_asm+0x1a/0x30
[   15.187476]  </TASK>
[   15.187488] 
[   15.195364] Allocated by task 282:
[   15.195590]  kasan_save_stack+0x45/0x70
[   15.195790]  kasan_save_track+0x18/0x40
[   15.195981]  kasan_save_alloc_info+0x3b/0x50
[   15.196271]  __kasan_kmalloc+0xb7/0xc0
[   15.196471]  __kmalloc_cache_noprof+0x189/0x420
[   15.196693]  kasan_atomics+0x95/0x310
[   15.196830]  kunit_try_run_case+0x1a5/0x480
[   15.196976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.197470]  kthread+0x337/0x6f0
[   15.197704]  ret_from_fork+0x116/0x1d0
[   15.197855]  ret_from_fork_asm+0x1a/0x30
[   15.198141] 
[   15.198246] The buggy address belongs to the object at ffff888103916a00
[   15.198246]  which belongs to the cache kmalloc-64 of size 64
[   15.198682] The buggy address is located 0 bytes to the right of
[   15.198682]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   15.199114] 
[   15.199213] The buggy address belongs to the physical page:
[   15.199469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   15.199969] flags: 0x200000000000000(node=0|zone=2)
[   15.200199] page_type: f5(slab)
[   15.200430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.200814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.201215] page dumped because: kasan: bad access detected
[   15.201432] 
[   15.201504] Memory state around the buggy address:
[   15.201728]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.202063]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.202362] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.202638]                                      ^
[   15.202851]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.203212]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.203441] ==================================================================
[   13.748516] ==================================================================
[   13.749562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.750239] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.751163] 
[   13.751469] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.751521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.751533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.751554] Call Trace:
[   13.751568]  <TASK>
[   13.751583]  dump_stack_lvl+0x73/0xb0
[   13.751612]  print_report+0xd1/0x650
[   13.751634]  ? __virt_addr_valid+0x1db/0x2d0
[   13.751655]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.751676]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.751696]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.751718]  kasan_report+0x141/0x180
[   13.751739]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.751764]  __asan_report_load4_noabort+0x18/0x20
[   13.751788]  kasan_atomics_helper+0x4bbc/0x5450
[   13.751809]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.751831]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.751857]  ? kasan_atomics+0x152/0x310
[   13.751883]  kasan_atomics+0x1dc/0x310
[   13.751905]  ? __pfx_kasan_atomics+0x10/0x10
[   13.751931]  ? __pfx_read_tsc+0x10/0x10
[   13.751952]  ? ktime_get_ts64+0x86/0x230
[   13.751975]  kunit_try_run_case+0x1a5/0x480
[   13.751999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.752022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.752057]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.752079]  ? __kthread_parkme+0x82/0x180
[   13.752099]  ? preempt_count_sub+0x50/0x80
[   13.752122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.752145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.752167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.752190]  kthread+0x337/0x6f0
[   13.752208]  ? trace_preempt_on+0x20/0xc0
[   13.752231]  ? __pfx_kthread+0x10/0x10
[   13.752251]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.752271]  ? calculate_sigpending+0x7b/0xa0
[   13.752295]  ? __pfx_kthread+0x10/0x10
[   13.752315]  ret_from_fork+0x116/0x1d0
[   13.752333]  ? __pfx_kthread+0x10/0x10
[   13.752353]  ret_from_fork_asm+0x1a/0x30
[   13.752382]  </TASK>
[   13.752395] 
[   13.766483] Allocated by task 282:
[   13.766981]  kasan_save_stack+0x45/0x70
[   13.767334]  kasan_save_track+0x18/0x40
[   13.767966]  kasan_save_alloc_info+0x3b/0x50
[   13.768652]  __kasan_kmalloc+0xb7/0xc0
[   13.769149]  __kmalloc_cache_noprof+0x189/0x420
[   13.769612]  kasan_atomics+0x95/0x310
[   13.770136]  kunit_try_run_case+0x1a5/0x480
[   13.770528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.770715]  kthread+0x337/0x6f0
[   13.770835]  ret_from_fork+0x116/0x1d0
[   13.770967]  ret_from_fork_asm+0x1a/0x30
[   13.771137] 
[   13.771368] The buggy address belongs to the object at ffff888103916a00
[   13.771368]  which belongs to the cache kmalloc-64 of size 64
[   13.772506] The buggy address is located 0 bytes to the right of
[   13.772506]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.773858] 
[   13.774119] The buggy address belongs to the physical page:
[   13.774664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.775557] flags: 0x200000000000000(node=0|zone=2)
[   13.775795] page_type: f5(slab)
[   13.775918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.776369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.777024] page dumped because: kasan: bad access detected
[   13.777752] 
[   13.777939] Memory state around the buggy address:
[   13.778480]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.778968]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.779402] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.780008]                                      ^
[   13.780553]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.780962]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.781498] ==================================================================
[   13.868540] ==================================================================
[   13.868841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.869314] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.869612] 
[   13.869699] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.869741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.869755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.869775] Call Trace:
[   13.869800]  <TASK>
[   13.869816]  dump_stack_lvl+0x73/0xb0
[   13.869842]  print_report+0xd1/0x650
[   13.869877]  ? __virt_addr_valid+0x1db/0x2d0
[   13.869900]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.869922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.869945]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.869967]  kasan_report+0x141/0x180
[   13.869990]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.870016]  __asan_report_load4_noabort+0x18/0x20
[   13.870109]  kasan_atomics_helper+0x4b54/0x5450
[   13.870160]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.870183]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.870221]  ? kasan_atomics+0x152/0x310
[   13.870249]  kasan_atomics+0x1dc/0x310
[   13.870273]  ? __pfx_kasan_atomics+0x10/0x10
[   13.870297]  ? __pfx_read_tsc+0x10/0x10
[   13.870319]  ? ktime_get_ts64+0x86/0x230
[   13.870343]  kunit_try_run_case+0x1a5/0x480
[   13.870367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.870389]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.870413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.870436]  ? __kthread_parkme+0x82/0x180
[   13.870456]  ? preempt_count_sub+0x50/0x80
[   13.870480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.870506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.870530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.870554]  kthread+0x337/0x6f0
[   13.870574]  ? trace_preempt_on+0x20/0xc0
[   13.870597]  ? __pfx_kthread+0x10/0x10
[   13.870619]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.870641]  ? calculate_sigpending+0x7b/0xa0
[   13.870675]  ? __pfx_kthread+0x10/0x10
[   13.870697]  ret_from_fork+0x116/0x1d0
[   13.870716]  ? __pfx_kthread+0x10/0x10
[   13.870747]  ret_from_fork_asm+0x1a/0x30
[   13.870778]  </TASK>
[   13.870789] 
[   13.879298] Allocated by task 282:
[   13.879477]  kasan_save_stack+0x45/0x70
[   13.879694]  kasan_save_track+0x18/0x40
[   13.879878]  kasan_save_alloc_info+0x3b/0x50
[   13.880322]  __kasan_kmalloc+0xb7/0xc0
[   13.880517]  __kmalloc_cache_noprof+0x189/0x420
[   13.880740]  kasan_atomics+0x95/0x310
[   13.880924]  kunit_try_run_case+0x1a5/0x480
[   13.881114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.881292]  kthread+0x337/0x6f0
[   13.881416]  ret_from_fork+0x116/0x1d0
[   13.881603]  ret_from_fork_asm+0x1a/0x30
[   13.881908] 
[   13.882008] The buggy address belongs to the object at ffff888103916a00
[   13.882008]  which belongs to the cache kmalloc-64 of size 64
[   13.882600] The buggy address is located 0 bytes to the right of
[   13.882600]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.883103] 
[   13.883244] The buggy address belongs to the physical page:
[   13.883521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.883833] flags: 0x200000000000000(node=0|zone=2)
[   13.884107] page_type: f5(slab)
[   13.884268] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.884909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.885279] page dumped because: kasan: bad access detected
[   13.885573] 
[   13.885675] Memory state around the buggy address:
[   13.885908]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.886299]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.886627] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.886936]                                      ^
[   13.887249]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.887576]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.887886] ==================================================================
[   14.802780] ==================================================================
[   14.803014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.803589] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.803938] 
[   14.804071] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.804113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.804127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.804163] Call Trace:
[   14.804178]  <TASK>
[   14.804193]  dump_stack_lvl+0x73/0xb0
[   14.804221]  print_report+0xd1/0x650
[   14.804244]  ? __virt_addr_valid+0x1db/0x2d0
[   14.804267]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.804289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.804311]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.804334]  kasan_report+0x141/0x180
[   14.804357]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.804384]  kasan_check_range+0x10c/0x1c0
[   14.804407]  __kasan_check_write+0x18/0x20
[   14.804427]  kasan_atomics_helper+0x1a7f/0x5450
[   14.804450]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.804472]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.804497]  ? kasan_atomics+0x152/0x310
[   14.804525]  kasan_atomics+0x1dc/0x310
[   14.804548]  ? __pfx_kasan_atomics+0x10/0x10
[   14.804572]  ? __pfx_read_tsc+0x10/0x10
[   14.804593]  ? ktime_get_ts64+0x86/0x230
[   14.804617]  kunit_try_run_case+0x1a5/0x480
[   14.804642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.804664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.804687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.804709]  ? __kthread_parkme+0x82/0x180
[   14.804730]  ? preempt_count_sub+0x50/0x80
[   14.804754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.804778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.804801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.804824]  kthread+0x337/0x6f0
[   14.804844]  ? trace_preempt_on+0x20/0xc0
[   14.804867]  ? __pfx_kthread+0x10/0x10
[   14.804888]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.804910]  ? calculate_sigpending+0x7b/0xa0
[   14.804934]  ? __pfx_kthread+0x10/0x10
[   14.804955]  ret_from_fork+0x116/0x1d0
[   14.804974]  ? __pfx_kthread+0x10/0x10
[   14.804995]  ret_from_fork_asm+0x1a/0x30
[   14.805025]  </TASK>
[   14.805060] 
[   14.812851] Allocated by task 282:
[   14.813119]  kasan_save_stack+0x45/0x70
[   14.813338]  kasan_save_track+0x18/0x40
[   14.813531]  kasan_save_alloc_info+0x3b/0x50
[   14.813742]  __kasan_kmalloc+0xb7/0xc0
[   14.813895]  __kmalloc_cache_noprof+0x189/0x420
[   14.814155]  kasan_atomics+0x95/0x310
[   14.814322]  kunit_try_run_case+0x1a5/0x480
[   14.814470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.814646]  kthread+0x337/0x6f0
[   14.814765]  ret_from_fork+0x116/0x1d0
[   14.814896]  ret_from_fork_asm+0x1a/0x30
[   14.815045] 
[   14.815197] The buggy address belongs to the object at ffff888103916a00
[   14.815197]  which belongs to the cache kmalloc-64 of size 64
[   14.815720] The buggy address is located 0 bytes to the right of
[   14.815720]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.816275] 
[   14.816359] The buggy address belongs to the physical page:
[   14.816530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.816768] flags: 0x200000000000000(node=0|zone=2)
[   14.816929] page_type: f5(slab)
[   14.817081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.817705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.818089] page dumped because: kasan: bad access detected
[   14.818691] 
[   14.818811] Memory state around the buggy address:
[   14.819049]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.819373]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.819607] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.819824]                                      ^
[   14.819980]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.820205]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.820418] ==================================================================
[   14.095833] ==================================================================
[   14.096300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.096607] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.096931] 
[   14.097262] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.097342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.097358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.097379] Call Trace:
[   14.097394]  <TASK>
[   14.097420]  dump_stack_lvl+0x73/0xb0
[   14.097448]  print_report+0xd1/0x650
[   14.097471]  ? __virt_addr_valid+0x1db/0x2d0
[   14.097493]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.097525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.097547]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.097569]  kasan_report+0x141/0x180
[   14.097602]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.097628]  kasan_check_range+0x10c/0x1c0
[   14.097652]  __kasan_check_write+0x18/0x20
[   14.097672]  kasan_atomics_helper+0xa2b/0x5450
[   14.097695]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.097717]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.097742]  ? kasan_atomics+0x152/0x310
[   14.097770]  kasan_atomics+0x1dc/0x310
[   14.097802]  ? __pfx_kasan_atomics+0x10/0x10
[   14.097826]  ? __pfx_read_tsc+0x10/0x10
[   14.097847]  ? ktime_get_ts64+0x86/0x230
[   14.097884]  kunit_try_run_case+0x1a5/0x480
[   14.097909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.097931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.097955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.097986]  ? __kthread_parkme+0x82/0x180
[   14.098009]  ? preempt_count_sub+0x50/0x80
[   14.098213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.098247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.098285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.098309]  kthread+0x337/0x6f0
[   14.098330]  ? trace_preempt_on+0x20/0xc0
[   14.098367]  ? __pfx_kthread+0x10/0x10
[   14.098388]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.098410]  ? calculate_sigpending+0x7b/0xa0
[   14.098435]  ? __pfx_kthread+0x10/0x10
[   14.098457]  ret_from_fork+0x116/0x1d0
[   14.098477]  ? __pfx_kthread+0x10/0x10
[   14.098498]  ret_from_fork_asm+0x1a/0x30
[   14.098528]  </TASK>
[   14.098540] 
[   14.107659] Allocated by task 282:
[   14.107854]  kasan_save_stack+0x45/0x70
[   14.108515]  kasan_save_track+0x18/0x40
[   14.108700]  kasan_save_alloc_info+0x3b/0x50
[   14.108875]  __kasan_kmalloc+0xb7/0xc0
[   14.109083]  __kmalloc_cache_noprof+0x189/0x420
[   14.109373]  kasan_atomics+0x95/0x310
[   14.109581]  kunit_try_run_case+0x1a5/0x480
[   14.109772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.110014]  kthread+0x337/0x6f0
[   14.110728]  ret_from_fork+0x116/0x1d0
[   14.110927]  ret_from_fork_asm+0x1a/0x30
[   14.111223] 
[   14.111337] The buggy address belongs to the object at ffff888103916a00
[   14.111337]  which belongs to the cache kmalloc-64 of size 64
[   14.111805] The buggy address is located 0 bytes to the right of
[   14.111805]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.112580] 
[   14.112684] The buggy address belongs to the physical page:
[   14.113081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.113701] flags: 0x200000000000000(node=0|zone=2)
[   14.113891] page_type: f5(slab)
[   14.114516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.114839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.115318] page dumped because: kasan: bad access detected
[   14.115572] 
[   14.115667] Memory state around the buggy address:
[   14.115862]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.116481]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.116774] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.117260]                                      ^
[   14.117466]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.117944]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.118432] ==================================================================
[   13.928985] ==================================================================
[   13.929654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.930446] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.930787] 
[   13.930999] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.931141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.931157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.931194] Call Trace:
[   13.931208]  <TASK>
[   13.931223]  dump_stack_lvl+0x73/0xb0
[   13.931263]  print_report+0xd1/0x650
[   13.931287]  ? __virt_addr_valid+0x1db/0x2d0
[   13.931310]  ? kasan_atomics_helper+0x565/0x5450
[   13.931344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.931368]  ? kasan_atomics_helper+0x565/0x5450
[   13.931390]  kasan_report+0x141/0x180
[   13.931415]  ? kasan_atomics_helper+0x565/0x5450
[   13.931442]  kasan_check_range+0x10c/0x1c0
[   13.931466]  __kasan_check_write+0x18/0x20
[   13.931487]  kasan_atomics_helper+0x565/0x5450
[   13.931510]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.931532]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.931561]  ? kasan_atomics+0x152/0x310
[   13.931589]  kasan_atomics+0x1dc/0x310
[   13.931622]  ? __pfx_kasan_atomics+0x10/0x10
[   13.931646]  ? __pfx_read_tsc+0x10/0x10
[   13.931667]  ? ktime_get_ts64+0x86/0x230
[   13.931702]  kunit_try_run_case+0x1a5/0x480
[   13.931726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.931748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.931781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.931804]  ? __kthread_parkme+0x82/0x180
[   13.931825]  ? preempt_count_sub+0x50/0x80
[   13.931859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.931884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.931907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.931931]  kthread+0x337/0x6f0
[   13.931951]  ? trace_preempt_on+0x20/0xc0
[   13.931974]  ? __pfx_kthread+0x10/0x10
[   13.931995]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.932017]  ? calculate_sigpending+0x7b/0xa0
[   13.932160]  ? __pfx_kthread+0x10/0x10
[   13.932183]  ret_from_fork+0x116/0x1d0
[   13.932203]  ? __pfx_kthread+0x10/0x10
[   13.932241]  ret_from_fork_asm+0x1a/0x30
[   13.932272]  </TASK>
[   13.932283] 
[   13.940945] Allocated by task 282:
[   13.941315]  kasan_save_stack+0x45/0x70
[   13.941538]  kasan_save_track+0x18/0x40
[   13.941729]  kasan_save_alloc_info+0x3b/0x50
[   13.941944]  __kasan_kmalloc+0xb7/0xc0
[   13.942228]  __kmalloc_cache_noprof+0x189/0x420
[   13.942471]  kasan_atomics+0x95/0x310
[   13.942637]  kunit_try_run_case+0x1a5/0x480
[   13.942844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.943155]  kthread+0x337/0x6f0
[   13.943283]  ret_from_fork+0x116/0x1d0
[   13.943472]  ret_from_fork_asm+0x1a/0x30
[   13.943696] 
[   13.943795] The buggy address belongs to the object at ffff888103916a00
[   13.943795]  which belongs to the cache kmalloc-64 of size 64
[   13.944379] The buggy address is located 0 bytes to the right of
[   13.944379]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.944936] 
[   13.945236] The buggy address belongs to the physical page:
[   13.945490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.945845] flags: 0x200000000000000(node=0|zone=2)
[   13.946186] page_type: f5(slab)
[   13.946345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.946650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.946920] page dumped because: kasan: bad access detected
[   13.947282] 
[   13.947383] Memory state around the buggy address:
[   13.947607]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.947933]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.948313] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.948671]                                      ^
[   13.948910]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.949381]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.949702] ==================================================================
[   14.265452] ==================================================================
[   14.265764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.266197] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.266472] 
[   14.266585] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.266629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.266641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.266662] Call Trace:
[   14.266676]  <TASK>
[   14.266692]  dump_stack_lvl+0x73/0xb0
[   14.266719]  print_report+0xd1/0x650
[   14.266742]  ? __virt_addr_valid+0x1db/0x2d0
[   14.266764]  ? kasan_atomics_helper+0xf10/0x5450
[   14.266785]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.266808]  ? kasan_atomics_helper+0xf10/0x5450
[   14.266830]  kasan_report+0x141/0x180
[   14.266853]  ? kasan_atomics_helper+0xf10/0x5450
[   14.266880]  kasan_check_range+0x10c/0x1c0
[   14.266904]  __kasan_check_write+0x18/0x20
[   14.266923]  kasan_atomics_helper+0xf10/0x5450
[   14.266945]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.266969]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.266994]  ? kasan_atomics+0x152/0x310
[   14.267022]  kasan_atomics+0x1dc/0x310
[   14.267257]  ? __pfx_kasan_atomics+0x10/0x10
[   14.267283]  ? __pfx_read_tsc+0x10/0x10
[   14.267327]  ? ktime_get_ts64+0x86/0x230
[   14.267351]  kunit_try_run_case+0x1a5/0x480
[   14.267376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.267399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.267423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.267446]  ? __kthread_parkme+0x82/0x180
[   14.267467]  ? preempt_count_sub+0x50/0x80
[   14.267491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.267515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.267538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.267563]  kthread+0x337/0x6f0
[   14.267583]  ? trace_preempt_on+0x20/0xc0
[   14.267607]  ? __pfx_kthread+0x10/0x10
[   14.267628]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.267650]  ? calculate_sigpending+0x7b/0xa0
[   14.267675]  ? __pfx_kthread+0x10/0x10
[   14.267697]  ret_from_fork+0x116/0x1d0
[   14.267716]  ? __pfx_kthread+0x10/0x10
[   14.267737]  ret_from_fork_asm+0x1a/0x30
[   14.267767]  </TASK>
[   14.267779] 
[   14.275963] Allocated by task 282:
[   14.276263]  kasan_save_stack+0x45/0x70
[   14.276431]  kasan_save_track+0x18/0x40
[   14.276568]  kasan_save_alloc_info+0x3b/0x50
[   14.276770]  __kasan_kmalloc+0xb7/0xc0
[   14.276922]  __kmalloc_cache_noprof+0x189/0x420
[   14.277251]  kasan_atomics+0x95/0x310
[   14.277429]  kunit_try_run_case+0x1a5/0x480
[   14.277616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.277825]  kthread+0x337/0x6f0
[   14.277993]  ret_from_fork+0x116/0x1d0
[   14.278271]  ret_from_fork_asm+0x1a/0x30
[   14.278478] 
[   14.278568] The buggy address belongs to the object at ffff888103916a00
[   14.278568]  which belongs to the cache kmalloc-64 of size 64
[   14.279219] The buggy address is located 0 bytes to the right of
[   14.279219]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.279773] 
[   14.279868] The buggy address belongs to the physical page:
[   14.280126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.280404] flags: 0x200000000000000(node=0|zone=2)
[   14.280643] page_type: f5(slab)
[   14.280809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.281246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.281478] page dumped because: kasan: bad access detected
[   14.281668] 
[   14.281763] Memory state around the buggy address:
[   14.281991]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.282406]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.282715] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.282998]                                      ^
[   14.283373]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.283683]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.283896] ==================================================================
[   14.162364] ==================================================================
[   14.162605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.162835] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.163270] 
[   14.163396] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.163441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.163469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.163490] Call Trace:
[   14.163507]  <TASK>
[   14.163523]  dump_stack_lvl+0x73/0xb0
[   14.163566]  print_report+0xd1/0x650
[   14.163589]  ? __virt_addr_valid+0x1db/0x2d0
[   14.163612]  ? kasan_atomics_helper+0xc70/0x5450
[   14.163633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.163657]  ? kasan_atomics_helper+0xc70/0x5450
[   14.163679]  kasan_report+0x141/0x180
[   14.163701]  ? kasan_atomics_helper+0xc70/0x5450
[   14.163727]  kasan_check_range+0x10c/0x1c0
[   14.163751]  __kasan_check_write+0x18/0x20
[   14.163771]  kasan_atomics_helper+0xc70/0x5450
[   14.163794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.163817]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.163842]  ? kasan_atomics+0x152/0x310
[   14.163869]  kasan_atomics+0x1dc/0x310
[   14.163892]  ? __pfx_kasan_atomics+0x10/0x10
[   14.163916]  ? __pfx_read_tsc+0x10/0x10
[   14.163937]  ? ktime_get_ts64+0x86/0x230
[   14.163961]  kunit_try_run_case+0x1a5/0x480
[   14.163986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.164008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.164041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.164117]  ? __kthread_parkme+0x82/0x180
[   14.164139]  ? preempt_count_sub+0x50/0x80
[   14.164163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.164187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.164210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.164234]  kthread+0x337/0x6f0
[   14.164254]  ? trace_preempt_on+0x20/0xc0
[   14.164277]  ? __pfx_kthread+0x10/0x10
[   14.164299]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.164319]  ? calculate_sigpending+0x7b/0xa0
[   14.164343]  ? __pfx_kthread+0x10/0x10
[   14.164365]  ret_from_fork+0x116/0x1d0
[   14.164384]  ? __pfx_kthread+0x10/0x10
[   14.164404]  ret_from_fork_asm+0x1a/0x30
[   14.164434]  </TASK>
[   14.164445] 
[   14.176600] Allocated by task 282:
[   14.176769]  kasan_save_stack+0x45/0x70
[   14.176963]  kasan_save_track+0x18/0x40
[   14.177158]  kasan_save_alloc_info+0x3b/0x50
[   14.177344]  __kasan_kmalloc+0xb7/0xc0
[   14.177537]  __kmalloc_cache_noprof+0x189/0x420
[   14.177737]  kasan_atomics+0x95/0x310
[   14.177926]  kunit_try_run_case+0x1a5/0x480
[   14.178589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.178809]  kthread+0x337/0x6f0
[   14.179105]  ret_from_fork+0x116/0x1d0
[   14.179524]  ret_from_fork_asm+0x1a/0x30
[   14.179801] 
[   14.179881] The buggy address belongs to the object at ffff888103916a00
[   14.179881]  which belongs to the cache kmalloc-64 of size 64
[   14.180655] The buggy address is located 0 bytes to the right of
[   14.180655]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.181476] 
[   14.181634] The buggy address belongs to the physical page:
[   14.181869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.182571] flags: 0x200000000000000(node=0|zone=2)
[   14.182799] page_type: f5(slab)
[   14.182946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.183575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.183883] page dumped because: kasan: bad access detected
[   14.184363] 
[   14.184461] Memory state around the buggy address:
[   14.184806]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.185287]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.185683] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.186003]                                      ^
[   14.186530]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.186901]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.187395] ==================================================================
[   15.093489] ==================================================================
[   15.093808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.094162] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   15.094432] 
[   15.094528] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.094572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.094585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.094606] Call Trace:
[   15.094622]  <TASK>
[   15.094638]  dump_stack_lvl+0x73/0xb0
[   15.094664]  print_report+0xd1/0x650
[   15.094688]  ? __virt_addr_valid+0x1db/0x2d0
[   15.094711]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.094733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.094756]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.094778]  kasan_report+0x141/0x180
[   15.094800]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.094827]  __asan_report_load8_noabort+0x18/0x20
[   15.094851]  kasan_atomics_helper+0x4fb2/0x5450
[   15.094874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.094897]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.094923]  ? kasan_atomics+0x152/0x310
[   15.094949]  kasan_atomics+0x1dc/0x310
[   15.094973]  ? __pfx_kasan_atomics+0x10/0x10
[   15.094998]  ? __pfx_read_tsc+0x10/0x10
[   15.095020]  ? ktime_get_ts64+0x86/0x230
[   15.095056]  kunit_try_run_case+0x1a5/0x480
[   15.095085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.095108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.095132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.095235]  ? __kthread_parkme+0x82/0x180
[   15.095261]  ? preempt_count_sub+0x50/0x80
[   15.095285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.095310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.095345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.095369]  kthread+0x337/0x6f0
[   15.095389]  ? trace_preempt_on+0x20/0xc0
[   15.095413]  ? __pfx_kthread+0x10/0x10
[   15.095434]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.095456]  ? calculate_sigpending+0x7b/0xa0
[   15.095481]  ? __pfx_kthread+0x10/0x10
[   15.095502]  ret_from_fork+0x116/0x1d0
[   15.095522]  ? __pfx_kthread+0x10/0x10
[   15.095543]  ret_from_fork_asm+0x1a/0x30
[   15.095573]  </TASK>
[   15.095586] 
[   15.103776] Allocated by task 282:
[   15.103913]  kasan_save_stack+0x45/0x70
[   15.104252]  kasan_save_track+0x18/0x40
[   15.104473]  kasan_save_alloc_info+0x3b/0x50
[   15.104691]  __kasan_kmalloc+0xb7/0xc0
[   15.104884]  __kmalloc_cache_noprof+0x189/0x420
[   15.105210]  kasan_atomics+0x95/0x310
[   15.105382]  kunit_try_run_case+0x1a5/0x480
[   15.105586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.105816]  kthread+0x337/0x6f0
[   15.105979]  ret_from_fork+0x116/0x1d0
[   15.106282]  ret_from_fork_asm+0x1a/0x30
[   15.106447] 
[   15.106546] The buggy address belongs to the object at ffff888103916a00
[   15.106546]  which belongs to the cache kmalloc-64 of size 64
[   15.107095] The buggy address is located 0 bytes to the right of
[   15.107095]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   15.107471] 
[   15.107546] The buggy address belongs to the physical page:
[   15.107947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   15.108742] flags: 0x200000000000000(node=0|zone=2)
[   15.108915] page_type: f5(slab)
[   15.109050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.109783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.110147] page dumped because: kasan: bad access detected
[   15.110547] 
[   15.110630] Memory state around the buggy address:
[   15.110797]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.111007]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.111356] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.111710]                                      ^
[   15.112096]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.112645]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.112982] ==================================================================
[   13.848831] ==================================================================
[   13.849258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.849645] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.849958] 
[   13.850139] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.850184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.850197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.850218] Call Trace:
[   13.850232]  <TASK>
[   13.850247]  dump_stack_lvl+0x73/0xb0
[   13.850276]  print_report+0xd1/0x650
[   13.850298]  ? __virt_addr_valid+0x1db/0x2d0
[   13.850320]  ? kasan_atomics_helper+0x3df/0x5450
[   13.850355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.850379]  ? kasan_atomics_helper+0x3df/0x5450
[   13.850400]  kasan_report+0x141/0x180
[   13.850435]  ? kasan_atomics_helper+0x3df/0x5450
[   13.850461]  kasan_check_range+0x10c/0x1c0
[   13.850485]  __kasan_check_read+0x15/0x20
[   13.850504]  kasan_atomics_helper+0x3df/0x5450
[   13.850528]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.850549]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.850576]  ? kasan_atomics+0x152/0x310
[   13.850603]  kasan_atomics+0x1dc/0x310
[   13.850626]  ? __pfx_kasan_atomics+0x10/0x10
[   13.850650]  ? __pfx_read_tsc+0x10/0x10
[   13.850673]  ? ktime_get_ts64+0x86/0x230
[   13.850697]  kunit_try_run_case+0x1a5/0x480
[   13.850721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.850777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.850799]  ? __kthread_parkme+0x82/0x180
[   13.850831]  ? preempt_count_sub+0x50/0x80
[   13.850856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.850911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.850935]  kthread+0x337/0x6f0
[   13.850955]  ? trace_preempt_on+0x20/0xc0
[   13.850988]  ? __pfx_kthread+0x10/0x10
[   13.851009]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.851040]  ? calculate_sigpending+0x7b/0xa0
[   13.851070]  ? __pfx_kthread+0x10/0x10
[   13.851091]  ret_from_fork+0x116/0x1d0
[   13.851111]  ? __pfx_kthread+0x10/0x10
[   13.851132]  ret_from_fork_asm+0x1a/0x30
[   13.851163]  </TASK>
[   13.851173] 
[   13.859326] Allocated by task 282:
[   13.859481]  kasan_save_stack+0x45/0x70
[   13.859670]  kasan_save_track+0x18/0x40
[   13.859852]  kasan_save_alloc_info+0x3b/0x50
[   13.860011]  __kasan_kmalloc+0xb7/0xc0
[   13.860464]  __kmalloc_cache_noprof+0x189/0x420
[   13.860696]  kasan_atomics+0x95/0x310
[   13.860886]  kunit_try_run_case+0x1a5/0x480
[   13.861192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.861463]  kthread+0x337/0x6f0
[   13.861653]  ret_from_fork+0x116/0x1d0
[   13.861841]  ret_from_fork_asm+0x1a/0x30
[   13.862089] 
[   13.862234] The buggy address belongs to the object at ffff888103916a00
[   13.862234]  which belongs to the cache kmalloc-64 of size 64
[   13.862726] The buggy address is located 0 bytes to the right of
[   13.862726]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.863318] 
[   13.863396] The buggy address belongs to the physical page:
[   13.863570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.863940] flags: 0x200000000000000(node=0|zone=2)
[   13.864406] page_type: f5(slab)
[   13.864587] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.864928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.865367] page dumped because: kasan: bad access detected
[   13.865563] 
[   13.865644] Memory state around the buggy address:
[   13.865871]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.866338]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.866641] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.866947]                                      ^
[   13.867276]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.867588]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.867897] ==================================================================
[   14.399407] ==================================================================
[   14.399769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.400189] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.400542] 
[   14.400630] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.400673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.400707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.400729] Call Trace:
[   14.400745]  <TASK>
[   14.400761]  dump_stack_lvl+0x73/0xb0
[   14.400806]  print_report+0xd1/0x650
[   14.400829]  ? __virt_addr_valid+0x1db/0x2d0
[   14.400852]  ? kasan_atomics_helper+0x1217/0x5450
[   14.400874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.400897]  ? kasan_atomics_helper+0x1217/0x5450
[   14.400919]  kasan_report+0x141/0x180
[   14.400960]  ? kasan_atomics_helper+0x1217/0x5450
[   14.400987]  kasan_check_range+0x10c/0x1c0
[   14.401011]  __kasan_check_write+0x18/0x20
[   14.401127]  kasan_atomics_helper+0x1217/0x5450
[   14.401156]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.401180]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.401206]  ? kasan_atomics+0x152/0x310
[   14.401233]  kasan_atomics+0x1dc/0x310
[   14.401257]  ? __pfx_kasan_atomics+0x10/0x10
[   14.401306]  ? __pfx_read_tsc+0x10/0x10
[   14.401342]  ? ktime_get_ts64+0x86/0x230
[   14.401401]  kunit_try_run_case+0x1a5/0x480
[   14.401427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.401450]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.401473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.401496]  ? __kthread_parkme+0x82/0x180
[   14.401516]  ? preempt_count_sub+0x50/0x80
[   14.401542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.401566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.401589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.401613]  kthread+0x337/0x6f0
[   14.401632]  ? trace_preempt_on+0x20/0xc0
[   14.401656]  ? __pfx_kthread+0x10/0x10
[   14.401676]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.401698]  ? calculate_sigpending+0x7b/0xa0
[   14.401722]  ? __pfx_kthread+0x10/0x10
[   14.401744]  ret_from_fork+0x116/0x1d0
[   14.401763]  ? __pfx_kthread+0x10/0x10
[   14.401783]  ret_from_fork_asm+0x1a/0x30
[   14.401832]  </TASK>
[   14.401844] 
[   14.410438] Allocated by task 282:
[   14.410625]  kasan_save_stack+0x45/0x70
[   14.410854]  kasan_save_track+0x18/0x40
[   14.411253]  kasan_save_alloc_info+0x3b/0x50
[   14.411499]  __kasan_kmalloc+0xb7/0xc0
[   14.411687]  __kmalloc_cache_noprof+0x189/0x420
[   14.411916]  kasan_atomics+0x95/0x310
[   14.412261]  kunit_try_run_case+0x1a5/0x480
[   14.412457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.412700]  kthread+0x337/0x6f0
[   14.412881]  ret_from_fork+0x116/0x1d0
[   14.413115]  ret_from_fork_asm+0x1a/0x30
[   14.413371] 
[   14.413467] The buggy address belongs to the object at ffff888103916a00
[   14.413467]  which belongs to the cache kmalloc-64 of size 64
[   14.414105] The buggy address is located 0 bytes to the right of
[   14.414105]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.414680] 
[   14.414777] The buggy address belongs to the physical page:
[   14.414972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.415582] flags: 0x200000000000000(node=0|zone=2)
[   14.415854] page_type: f5(slab)
[   14.415985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.416481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.416815] page dumped because: kasan: bad access detected
[   14.417123] 
[   14.417249] Memory state around the buggy address:
[   14.417481]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.417752]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.418167] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.418504]                                      ^
[   14.418731]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.419263]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.419564] ==================================================================
[   14.012428] ==================================================================
[   14.012801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.013257] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.013578] 
[   14.013704] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.013747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.013761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.013783] Call Trace:
[   14.013797]  <TASK>
[   14.013813]  dump_stack_lvl+0x73/0xb0
[   14.013840]  print_report+0xd1/0x650
[   14.013863]  ? __virt_addr_valid+0x1db/0x2d0
[   14.013886]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.013907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.013941]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.013964]  kasan_report+0x141/0x180
[   14.013986]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.014025]  kasan_check_range+0x10c/0x1c0
[   14.014074]  __kasan_check_write+0x18/0x20
[   14.014094]  kasan_atomics_helper+0x7c7/0x5450
[   14.014118]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.014147]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.014173]  ? kasan_atomics+0x152/0x310
[   14.014200]  kasan_atomics+0x1dc/0x310
[   14.014224]  ? __pfx_kasan_atomics+0x10/0x10
[   14.014249]  ? __pfx_read_tsc+0x10/0x10
[   14.014271]  ? ktime_get_ts64+0x86/0x230
[   14.014295]  kunit_try_run_case+0x1a5/0x480
[   14.014320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.014525]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.014552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.014577]  ? __kthread_parkme+0x82/0x180
[   14.014599]  ? preempt_count_sub+0x50/0x80
[   14.014635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.014660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.014694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.014719]  kthread+0x337/0x6f0
[   14.014740]  ? trace_preempt_on+0x20/0xc0
[   14.014763]  ? __pfx_kthread+0x10/0x10
[   14.014786]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.014808]  ? calculate_sigpending+0x7b/0xa0
[   14.014842]  ? __pfx_kthread+0x10/0x10
[   14.014863]  ret_from_fork+0x116/0x1d0
[   14.014882]  ? __pfx_kthread+0x10/0x10
[   14.014914]  ret_from_fork_asm+0x1a/0x30
[   14.014945]  </TASK>
[   14.014956] 
[   14.023353] Allocated by task 282:
[   14.023548]  kasan_save_stack+0x45/0x70
[   14.023765]  kasan_save_track+0x18/0x40
[   14.023938]  kasan_save_alloc_info+0x3b/0x50
[   14.024273]  __kasan_kmalloc+0xb7/0xc0
[   14.024479]  __kmalloc_cache_noprof+0x189/0x420
[   14.024669]  kasan_atomics+0x95/0x310
[   14.024804]  kunit_try_run_case+0x1a5/0x480
[   14.024952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.025226]  kthread+0x337/0x6f0
[   14.025396]  ret_from_fork+0x116/0x1d0
[   14.025584]  ret_from_fork_asm+0x1a/0x30
[   14.025781] 
[   14.025877] The buggy address belongs to the object at ffff888103916a00
[   14.025877]  which belongs to the cache kmalloc-64 of size 64
[   14.026532] The buggy address is located 0 bytes to the right of
[   14.026532]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.027208] 
[   14.027327] The buggy address belongs to the physical page:
[   14.027579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.027935] flags: 0x200000000000000(node=0|zone=2)
[   14.028219] page_type: f5(slab)
[   14.028346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.028693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.029831] page dumped because: kasan: bad access detected
[   14.030354] 
[   14.030476] Memory state around the buggy address:
[   14.030929]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.031384]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.031697] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.031947]                                      ^
[   14.032598]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.032892]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.033317] ==================================================================
[   14.446368] ==================================================================
[   14.446840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.447567] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.447992] 
[   14.448245] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.448292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.448307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.448329] Call Trace:
[   14.448345]  <TASK>
[   14.448361]  dump_stack_lvl+0x73/0xb0
[   14.448532]  print_report+0xd1/0x650
[   14.448697]  ? __virt_addr_valid+0x1db/0x2d0
[   14.448722]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.448745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.448769]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.448791]  kasan_report+0x141/0x180
[   14.448813]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.448840]  kasan_check_range+0x10c/0x1c0
[   14.448864]  __kasan_check_write+0x18/0x20
[   14.448884]  kasan_atomics_helper+0x12e6/0x5450
[   14.448907]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.448929]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.448954]  ? kasan_atomics+0x152/0x310
[   14.448981]  kasan_atomics+0x1dc/0x310
[   14.449003]  ? __pfx_kasan_atomics+0x10/0x10
[   14.449041]  ? __pfx_read_tsc+0x10/0x10
[   14.449077]  ? ktime_get_ts64+0x86/0x230
[   14.449101]  kunit_try_run_case+0x1a5/0x480
[   14.449126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.449160]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.449183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.449206]  ? __kthread_parkme+0x82/0x180
[   14.449226]  ? preempt_count_sub+0x50/0x80
[   14.449250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.449273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.449296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.449321]  kthread+0x337/0x6f0
[   14.449340]  ? trace_preempt_on+0x20/0xc0
[   14.449363]  ? __pfx_kthread+0x10/0x10
[   14.449384]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.449405]  ? calculate_sigpending+0x7b/0xa0
[   14.449429]  ? __pfx_kthread+0x10/0x10
[   14.449451]  ret_from_fork+0x116/0x1d0
[   14.449470]  ? __pfx_kthread+0x10/0x10
[   14.449492]  ret_from_fork_asm+0x1a/0x30
[   14.449522]  </TASK>
[   14.449533] 
[   14.460864] Allocated by task 282:
[   14.461392]  kasan_save_stack+0x45/0x70
[   14.461623]  kasan_save_track+0x18/0x40
[   14.462059]  kasan_save_alloc_info+0x3b/0x50
[   14.462297]  __kasan_kmalloc+0xb7/0xc0
[   14.462682]  __kmalloc_cache_noprof+0x189/0x420
[   14.462900]  kasan_atomics+0x95/0x310
[   14.463237]  kunit_try_run_case+0x1a5/0x480
[   14.463478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.463844]  kthread+0x337/0x6f0
[   14.464044]  ret_from_fork+0x116/0x1d0
[   14.464272]  ret_from_fork_asm+0x1a/0x30
[   14.464496] 
[   14.464684] The buggy address belongs to the object at ffff888103916a00
[   14.464684]  which belongs to the cache kmalloc-64 of size 64
[   14.465486] The buggy address is located 0 bytes to the right of
[   14.465486]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.466107] 
[   14.466385] The buggy address belongs to the physical page:
[   14.466775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.467266] flags: 0x200000000000000(node=0|zone=2)
[   14.467512] page_type: f5(slab)
[   14.467681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.468278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.468725] page dumped because: kasan: bad access detected
[   14.469105] 
[   14.469371] Memory state around the buggy address:
[   14.469674]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.469982]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.470512] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.470890]                                      ^
[   14.471216]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.471634]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.471973] ==================================================================
[   14.499507] ==================================================================
[   14.499819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.500494] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.500877] 
[   14.501103] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.501152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.501165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.501260] Call Trace:
[   14.501280]  <TASK>
[   14.501298]  dump_stack_lvl+0x73/0xb0
[   14.501327]  print_report+0xd1/0x650
[   14.501351]  ? __virt_addr_valid+0x1db/0x2d0
[   14.501375]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.501396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.501524]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.501547]  kasan_report+0x141/0x180
[   14.501570]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.501597]  kasan_check_range+0x10c/0x1c0
[   14.501621]  __kasan_check_read+0x15/0x20
[   14.501641]  kasan_atomics_helper+0x13b5/0x5450
[   14.501663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.501686]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.501713]  ? kasan_atomics+0x152/0x310
[   14.501740]  kasan_atomics+0x1dc/0x310
[   14.501763]  ? __pfx_kasan_atomics+0x10/0x10
[   14.501788]  ? __pfx_read_tsc+0x10/0x10
[   14.501809]  ? ktime_get_ts64+0x86/0x230
[   14.501833]  kunit_try_run_case+0x1a5/0x480
[   14.501858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.501880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.501904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.501927]  ? __kthread_parkme+0x82/0x180
[   14.501949]  ? preempt_count_sub+0x50/0x80
[   14.501972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.501996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.502020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.502077]  kthread+0x337/0x6f0
[   14.502098]  ? trace_preempt_on+0x20/0xc0
[   14.502121]  ? __pfx_kthread+0x10/0x10
[   14.502142]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.502163]  ? calculate_sigpending+0x7b/0xa0
[   14.502188]  ? __pfx_kthread+0x10/0x10
[   14.502210]  ret_from_fork+0x116/0x1d0
[   14.502228]  ? __pfx_kthread+0x10/0x10
[   14.502250]  ret_from_fork_asm+0x1a/0x30
[   14.502280]  </TASK>
[   14.502292] 
[   14.512302] Allocated by task 282:
[   14.512627]  kasan_save_stack+0x45/0x70
[   14.513195]  kasan_save_track+0x18/0x40
[   14.513490]  kasan_save_alloc_info+0x3b/0x50
[   14.513765]  __kasan_kmalloc+0xb7/0xc0
[   14.513931]  __kmalloc_cache_noprof+0x189/0x420
[   14.514303]  kasan_atomics+0x95/0x310
[   14.514741]  kunit_try_run_case+0x1a5/0x480
[   14.515241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.515480]  kthread+0x337/0x6f0
[   14.515726]  ret_from_fork+0x116/0x1d0
[   14.515900]  ret_from_fork_asm+0x1a/0x30
[   14.516105] 
[   14.516404] The buggy address belongs to the object at ffff888103916a00
[   14.516404]  which belongs to the cache kmalloc-64 of size 64
[   14.517087] The buggy address is located 0 bytes to the right of
[   14.517087]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.517722] 
[   14.517829] The buggy address belongs to the physical page:
[   14.518216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.518687] flags: 0x200000000000000(node=0|zone=2)
[   14.518906] page_type: f5(slab)
[   14.519199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.519614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.520010] page dumped because: kasan: bad access detected
[   14.520337] 
[   14.520567] Memory state around the buggy address:
[   14.520926]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.521392]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.521843] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.522309]                                      ^
[   14.522600]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.522884]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.523373] ==================================================================
[   14.472892] ==================================================================
[   14.473297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.474063] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.474680] 
[   14.474824] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.474884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.474898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.474920] Call Trace:
[   14.474937]  <TASK>
[   14.474953]  dump_stack_lvl+0x73/0xb0
[   14.474983]  print_report+0xd1/0x650
[   14.475007]  ? __virt_addr_valid+0x1db/0x2d0
[   14.475041]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.475071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.475233]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.475270]  kasan_report+0x141/0x180
[   14.475293]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.475320]  __asan_report_load4_noabort+0x18/0x20
[   14.475345]  kasan_atomics_helper+0x49ce/0x5450
[   14.475368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.475391]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.475418]  ? kasan_atomics+0x152/0x310
[   14.475444]  kasan_atomics+0x1dc/0x310
[   14.475468]  ? __pfx_kasan_atomics+0x10/0x10
[   14.475492]  ? __pfx_read_tsc+0x10/0x10
[   14.475515]  ? ktime_get_ts64+0x86/0x230
[   14.475539]  kunit_try_run_case+0x1a5/0x480
[   14.475563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.475609]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.475633]  ? __kthread_parkme+0x82/0x180
[   14.475654]  ? preempt_count_sub+0x50/0x80
[   14.475677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.475725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.475749]  kthread+0x337/0x6f0
[   14.475769]  ? trace_preempt_on+0x20/0xc0
[   14.475791]  ? __pfx_kthread+0x10/0x10
[   14.475813]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.475833]  ? calculate_sigpending+0x7b/0xa0
[   14.475857]  ? __pfx_kthread+0x10/0x10
[   14.475880]  ret_from_fork+0x116/0x1d0
[   14.475899]  ? __pfx_kthread+0x10/0x10
[   14.475920]  ret_from_fork_asm+0x1a/0x30
[   14.475951]  </TASK>
[   14.475963] 
[   14.487748] Allocated by task 282:
[   14.488166]  kasan_save_stack+0x45/0x70
[   14.488542]  kasan_save_track+0x18/0x40
[   14.488745]  kasan_save_alloc_info+0x3b/0x50
[   14.489246]  __kasan_kmalloc+0xb7/0xc0
[   14.489587]  __kmalloc_cache_noprof+0x189/0x420
[   14.489868]  kasan_atomics+0x95/0x310
[   14.490163]  kunit_try_run_case+0x1a5/0x480
[   14.490385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.490659]  kthread+0x337/0x6f0
[   14.490826]  ret_from_fork+0x116/0x1d0
[   14.491005]  ret_from_fork_asm+0x1a/0x30
[   14.491460] 
[   14.491544] The buggy address belongs to the object at ffff888103916a00
[   14.491544]  which belongs to the cache kmalloc-64 of size 64
[   14.492277] The buggy address is located 0 bytes to the right of
[   14.492277]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.493166] 
[   14.493295] The buggy address belongs to the physical page:
[   14.493610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.494076] flags: 0x200000000000000(node=0|zone=2)
[   14.494407] page_type: f5(slab)
[   14.494706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.495124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.495519] page dumped because: kasan: bad access detected
[   14.495839] 
[   14.495937] Memory state around the buggy address:
[   14.496154]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.496824]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.497148] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.497500]                                      ^
[   14.497953]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.498362]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.498750] ==================================================================
[   14.587828] ==================================================================
[   14.588310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.588750] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.589241] 
[   14.589562] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.589618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.589634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.589656] Call Trace:
[   14.589673]  <TASK>
[   14.589690]  dump_stack_lvl+0x73/0xb0
[   14.589753]  print_report+0xd1/0x650
[   14.589778]  ? __virt_addr_valid+0x1db/0x2d0
[   14.589801]  ? kasan_atomics_helper+0x151d/0x5450
[   14.589825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.589848]  ? kasan_atomics_helper+0x151d/0x5450
[   14.589870]  kasan_report+0x141/0x180
[   14.589893]  ? kasan_atomics_helper+0x151d/0x5450
[   14.589919]  kasan_check_range+0x10c/0x1c0
[   14.589943]  __kasan_check_write+0x18/0x20
[   14.589963]  kasan_atomics_helper+0x151d/0x5450
[   14.589987]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.590009]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.590045]  ? kasan_atomics+0x152/0x310
[   14.590074]  kasan_atomics+0x1dc/0x310
[   14.590097]  ? __pfx_kasan_atomics+0x10/0x10
[   14.590121]  ? __pfx_read_tsc+0x10/0x10
[   14.590143]  ? ktime_get_ts64+0x86/0x230
[   14.590167]  kunit_try_run_case+0x1a5/0x480
[   14.590193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.590216]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.590239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.590262]  ? __kthread_parkme+0x82/0x180
[   14.590283]  ? preempt_count_sub+0x50/0x80
[   14.590307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.590331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.590354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.590378]  kthread+0x337/0x6f0
[   14.590398]  ? trace_preempt_on+0x20/0xc0
[   14.590422]  ? __pfx_kthread+0x10/0x10
[   14.590444]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.590465]  ? calculate_sigpending+0x7b/0xa0
[   14.590490]  ? __pfx_kthread+0x10/0x10
[   14.590512]  ret_from_fork+0x116/0x1d0
[   14.590530]  ? __pfx_kthread+0x10/0x10
[   14.590551]  ret_from_fork_asm+0x1a/0x30
[   14.590582]  </TASK>
[   14.590595] 
[   14.601591] Allocated by task 282:
[   14.601768]  kasan_save_stack+0x45/0x70
[   14.601954]  kasan_save_track+0x18/0x40
[   14.602676]  kasan_save_alloc_info+0x3b/0x50
[   14.603156]  __kasan_kmalloc+0xb7/0xc0
[   14.603566]  __kmalloc_cache_noprof+0x189/0x420
[   14.603898]  kasan_atomics+0x95/0x310
[   14.604338]  kunit_try_run_case+0x1a5/0x480
[   14.604553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.604784]  kthread+0x337/0x6f0
[   14.604944]  ret_from_fork+0x116/0x1d0
[   14.605541]  ret_from_fork_asm+0x1a/0x30
[   14.605810] 
[   14.606045] The buggy address belongs to the object at ffff888103916a00
[   14.606045]  which belongs to the cache kmalloc-64 of size 64
[   14.606998] The buggy address is located 0 bytes to the right of
[   14.606998]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.607896] 
[   14.608005] The buggy address belongs to the physical page:
[   14.608421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.608732] flags: 0x200000000000000(node=0|zone=2)
[   14.608951] page_type: f5(slab)
[   14.609377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.609874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.610510] page dumped because: kasan: bad access detected
[   14.610914] 
[   14.611022] Memory state around the buggy address:
[   14.611403]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.611703]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.611995] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.612925]                                      ^
[   14.613268]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.613861]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.614371] ==================================================================
[   14.913244] ==================================================================
[   14.913591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   14.913924] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.914618] 
[   14.914714] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.914772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.914785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.914807] Call Trace:
[   14.914823]  <TASK>
[   14.914946]  dump_stack_lvl+0x73/0xb0
[   14.914978]  print_report+0xd1/0x650
[   14.915002]  ? __virt_addr_valid+0x1db/0x2d0
[   14.915024]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.915176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.915202]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.915227]  kasan_report+0x141/0x180
[   14.915250]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.915278]  kasan_check_range+0x10c/0x1c0
[   14.915302]  __kasan_check_write+0x18/0x20
[   14.915323]  kasan_atomics_helper+0x1d7a/0x5450
[   14.915347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.915371]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.915397]  ? kasan_atomics+0x152/0x310
[   14.915424]  kasan_atomics+0x1dc/0x310
[   14.915448]  ? __pfx_kasan_atomics+0x10/0x10
[   14.915473]  ? __pfx_read_tsc+0x10/0x10
[   14.915495]  ? ktime_get_ts64+0x86/0x230
[   14.915520]  kunit_try_run_case+0x1a5/0x480
[   14.915544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.915567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.915591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.915614]  ? __kthread_parkme+0x82/0x180
[   14.915636]  ? preempt_count_sub+0x50/0x80
[   14.915659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.915683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.915705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.915729]  kthread+0x337/0x6f0
[   14.915748]  ? trace_preempt_on+0x20/0xc0
[   14.915771]  ? __pfx_kthread+0x10/0x10
[   14.915792]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.915813]  ? calculate_sigpending+0x7b/0xa0
[   14.915837]  ? __pfx_kthread+0x10/0x10
[   14.915859]  ret_from_fork+0x116/0x1d0
[   14.915877]  ? __pfx_kthread+0x10/0x10
[   14.915898]  ret_from_fork_asm+0x1a/0x30
[   14.915927]  </TASK>
[   14.915939] 
[   14.926627] Allocated by task 282:
[   14.927117]  kasan_save_stack+0x45/0x70
[   14.927289]  kasan_save_track+0x18/0x40
[   14.927545]  kasan_save_alloc_info+0x3b/0x50
[   14.927737]  __kasan_kmalloc+0xb7/0xc0
[   14.927913]  __kmalloc_cache_noprof+0x189/0x420
[   14.928487]  kasan_atomics+0x95/0x310
[   14.928674]  kunit_try_run_case+0x1a5/0x480
[   14.928998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.929248]  kthread+0x337/0x6f0
[   14.929539]  ret_from_fork+0x116/0x1d0
[   14.929694]  ret_from_fork_asm+0x1a/0x30
[   14.929894] 
[   14.930110] The buggy address belongs to the object at ffff888103916a00
[   14.930110]  which belongs to the cache kmalloc-64 of size 64
[   14.930737] The buggy address is located 0 bytes to the right of
[   14.930737]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.931248] 
[   14.931590] The buggy address belongs to the physical page:
[   14.931950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.932478] flags: 0x200000000000000(node=0|zone=2)
[   14.932769] page_type: f5(slab)
[   14.932931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.933376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.933811] page dumped because: kasan: bad access detected
[   14.934266] 
[   14.934366] Memory state around the buggy address:
[   14.934983]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.935408]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.935792] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.936119]                                      ^
[   14.936486]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.936779]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.937233] ==================================================================
[   15.067552] ==================================================================
[   15.067785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.068019] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   15.069795] 
[   15.069907] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.070063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.070077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.070099] Call Trace:
[   15.070230]  <TASK>
[   15.070253]  dump_stack_lvl+0x73/0xb0
[   15.070286]  print_report+0xd1/0x650
[   15.070310]  ? __virt_addr_valid+0x1db/0x2d0
[   15.070334]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.070356]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.070379]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.070401]  kasan_report+0x141/0x180
[   15.070424]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.070450]  kasan_check_range+0x10c/0x1c0
[   15.070474]  __kasan_check_write+0x18/0x20
[   15.070494]  kasan_atomics_helper+0x20c8/0x5450
[   15.070517]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.070540]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.070566]  ? kasan_atomics+0x152/0x310
[   15.070593]  kasan_atomics+0x1dc/0x310
[   15.070616]  ? __pfx_kasan_atomics+0x10/0x10
[   15.070641]  ? __pfx_read_tsc+0x10/0x10
[   15.070662]  ? ktime_get_ts64+0x86/0x230
[   15.070686]  kunit_try_run_case+0x1a5/0x480
[   15.070711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.070734]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.070757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.070780]  ? __kthread_parkme+0x82/0x180
[   15.070802]  ? preempt_count_sub+0x50/0x80
[   15.070825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.070849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.070872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.070896]  kthread+0x337/0x6f0
[   15.070916]  ? trace_preempt_on+0x20/0xc0
[   15.070939]  ? __pfx_kthread+0x10/0x10
[   15.070960]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.070982]  ? calculate_sigpending+0x7b/0xa0
[   15.071007]  ? __pfx_kthread+0x10/0x10
[   15.071042]  ret_from_fork+0x116/0x1d0
[   15.071119]  ? __pfx_kthread+0x10/0x10
[   15.071141]  ret_from_fork_asm+0x1a/0x30
[   15.071172]  </TASK>
[   15.071185] 
[   15.083661] Allocated by task 282:
[   15.083852]  kasan_save_stack+0x45/0x70
[   15.084254]  kasan_save_track+0x18/0x40
[   15.084417]  kasan_save_alloc_info+0x3b/0x50
[   15.084649]  __kasan_kmalloc+0xb7/0xc0
[   15.084825]  __kmalloc_cache_noprof+0x189/0x420
[   15.085041]  kasan_atomics+0x95/0x310
[   15.085823]  kunit_try_run_case+0x1a5/0x480
[   15.085996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.086403]  kthread+0x337/0x6f0
[   15.086584]  ret_from_fork+0x116/0x1d0
[   15.086753]  ret_from_fork_asm+0x1a/0x30
[   15.086942] 
[   15.087019] The buggy address belongs to the object at ffff888103916a00
[   15.087019]  which belongs to the cache kmalloc-64 of size 64
[   15.087710] The buggy address is located 0 bytes to the right of
[   15.087710]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   15.088612] 
[   15.088696] The buggy address belongs to the physical page:
[   15.088900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   15.089403] flags: 0x200000000000000(node=0|zone=2)
[   15.089582] page_type: f5(slab)
[   15.089752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.090125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.090409] page dumped because: kasan: bad access detected
[   15.090661] 
[   15.090738] Memory state around the buggy address:
[   15.090965]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.091315]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.091699] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.091924]                                      ^
[   15.092161]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.092512]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.092941] ==================================================================
[   13.888534] ==================================================================
[   13.888886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.889480] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.889771] 
[   13.889883] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.889924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.889937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.889972] Call Trace:
[   13.889990]  <TASK>
[   13.890004]  dump_stack_lvl+0x73/0xb0
[   13.890115]  print_report+0xd1/0x650
[   13.890162]  ? __virt_addr_valid+0x1db/0x2d0
[   13.890187]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.890209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.890233]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.890254]  kasan_report+0x141/0x180
[   13.890277]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.890304]  kasan_check_range+0x10c/0x1c0
[   13.890328]  __kasan_check_write+0x18/0x20
[   13.890349]  kasan_atomics_helper+0x4a0/0x5450
[   13.890372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.890394]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.890420]  ? kasan_atomics+0x152/0x310
[   13.890457]  kasan_atomics+0x1dc/0x310
[   13.890481]  ? __pfx_kasan_atomics+0x10/0x10
[   13.890517]  ? __pfx_read_tsc+0x10/0x10
[   13.890538]  ? ktime_get_ts64+0x86/0x230
[   13.890563]  kunit_try_run_case+0x1a5/0x480
[   13.890588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.890611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.890634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.890657]  ? __kthread_parkme+0x82/0x180
[   13.890678]  ? preempt_count_sub+0x50/0x80
[   13.890701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.890725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.890749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.890773]  kthread+0x337/0x6f0
[   13.890793]  ? trace_preempt_on+0x20/0xc0
[   13.890815]  ? __pfx_kthread+0x10/0x10
[   13.890836]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.890858]  ? calculate_sigpending+0x7b/0xa0
[   13.890882]  ? __pfx_kthread+0x10/0x10
[   13.890903]  ret_from_fork+0x116/0x1d0
[   13.890922]  ? __pfx_kthread+0x10/0x10
[   13.890944]  ret_from_fork_asm+0x1a/0x30
[   13.890974]  </TASK>
[   13.890986] 
[   13.899485] Allocated by task 282:
[   13.899701]  kasan_save_stack+0x45/0x70
[   13.899920]  kasan_save_track+0x18/0x40
[   13.900338]  kasan_save_alloc_info+0x3b/0x50
[   13.900539]  __kasan_kmalloc+0xb7/0xc0
[   13.900678]  __kmalloc_cache_noprof+0x189/0x420
[   13.900883]  kasan_atomics+0x95/0x310
[   13.901112]  kunit_try_run_case+0x1a5/0x480
[   13.901438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.901716]  kthread+0x337/0x6f0
[   13.901877]  ret_from_fork+0x116/0x1d0
[   13.902212]  ret_from_fork_asm+0x1a/0x30
[   13.902365] 
[   13.902441] The buggy address belongs to the object at ffff888103916a00
[   13.902441]  which belongs to the cache kmalloc-64 of size 64
[   13.902929] The buggy address is located 0 bytes to the right of
[   13.902929]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.903483] 
[   13.903574] The buggy address belongs to the physical page:
[   13.903829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.904461] flags: 0x200000000000000(node=0|zone=2)
[   13.904711] page_type: f5(slab)
[   13.904860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.905242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.905585] page dumped because: kasan: bad access detected
[   13.905811] 
[   13.905931] Memory state around the buggy address:
[   13.906230]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.906508]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.906833] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.907246]                                      ^
[   13.907460]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.907725]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.908197] ==================================================================
[   13.827741] ==================================================================
[   13.828161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.828498] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.828769] 
[   13.828875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.828918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.828930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.828962] Call Trace:
[   13.828978]  <TASK>
[   13.828994]  dump_stack_lvl+0x73/0xb0
[   13.829041]  print_report+0xd1/0x650
[   13.829080]  ? __virt_addr_valid+0x1db/0x2d0
[   13.829150]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.829175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.829197]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.829219]  kasan_report+0x141/0x180
[   13.829242]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.829268]  __asan_report_store4_noabort+0x1b/0x30
[   13.829302]  kasan_atomics_helper+0x4b6e/0x5450
[   13.829326]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.829349]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.829387]  ? kasan_atomics+0x152/0x310
[   13.829415]  kasan_atomics+0x1dc/0x310
[   13.829438]  ? __pfx_kasan_atomics+0x10/0x10
[   13.829462]  ? __pfx_read_tsc+0x10/0x10
[   13.829483]  ? ktime_get_ts64+0x86/0x230
[   13.829507]  kunit_try_run_case+0x1a5/0x480
[   13.829532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.829555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.829579]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.829601]  ? __kthread_parkme+0x82/0x180
[   13.829633]  ? preempt_count_sub+0x50/0x80
[   13.829657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.829681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.829715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.829739]  kthread+0x337/0x6f0
[   13.829759]  ? trace_preempt_on+0x20/0xc0
[   13.829791]  ? __pfx_kthread+0x10/0x10
[   13.829811]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.829833]  ? calculate_sigpending+0x7b/0xa0
[   13.829868]  ? __pfx_kthread+0x10/0x10
[   13.829889]  ret_from_fork+0x116/0x1d0
[   13.829909]  ? __pfx_kthread+0x10/0x10
[   13.829931]  ret_from_fork_asm+0x1a/0x30
[   13.829970]  </TASK>
[   13.829982] 
[   13.838775] Allocated by task 282:
[   13.838910]  kasan_save_stack+0x45/0x70
[   13.839428]  kasan_save_track+0x18/0x40
[   13.839627]  kasan_save_alloc_info+0x3b/0x50
[   13.839867]  __kasan_kmalloc+0xb7/0xc0
[   13.840040]  __kmalloc_cache_noprof+0x189/0x420
[   13.840413]  kasan_atomics+0x95/0x310
[   13.840571]  kunit_try_run_case+0x1a5/0x480
[   13.840813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.841049]  kthread+0x337/0x6f0
[   13.841278]  ret_from_fork+0x116/0x1d0
[   13.841415]  ret_from_fork_asm+0x1a/0x30
[   13.841557] 
[   13.841633] The buggy address belongs to the object at ffff888103916a00
[   13.841633]  which belongs to the cache kmalloc-64 of size 64
[   13.842241] The buggy address is located 0 bytes to the right of
[   13.842241]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.843017] 
[   13.843111] The buggy address belongs to the physical page:
[   13.843384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.843977] flags: 0x200000000000000(node=0|zone=2)
[   13.844184] page_type: f5(slab)
[   13.844306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.844917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.845396] page dumped because: kasan: bad access detected
[   13.845655] 
[   13.845747] Memory state around the buggy address:
[   13.845966]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.846196]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.846817] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.847197]                                      ^
[   13.847478]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.847773]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.848017] ==================================================================
[   13.992008] ==================================================================
[   13.992462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   13.992788] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.993378] 
[   13.993512] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.993569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.993583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.993605] Call Trace:
[   13.993622]  <TASK>
[   13.993638]  dump_stack_lvl+0x73/0xb0
[   13.993667]  print_report+0xd1/0x650
[   13.993691]  ? __virt_addr_valid+0x1db/0x2d0
[   13.993715]  ? kasan_atomics_helper+0x72f/0x5450
[   13.993736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.993771]  ? kasan_atomics_helper+0x72f/0x5450
[   13.993793]  kasan_report+0x141/0x180
[   13.993816]  ? kasan_atomics_helper+0x72f/0x5450
[   13.993853]  kasan_check_range+0x10c/0x1c0
[   13.993877]  __kasan_check_write+0x18/0x20
[   13.993897]  kasan_atomics_helper+0x72f/0x5450
[   13.993920]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.993943]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.993969]  ? kasan_atomics+0x152/0x310
[   13.993997]  kasan_atomics+0x1dc/0x310
[   13.994019]  ? __pfx_kasan_atomics+0x10/0x10
[   13.994236]  ? __pfx_read_tsc+0x10/0x10
[   13.994260]  ? ktime_get_ts64+0x86/0x230
[   13.994297]  kunit_try_run_case+0x1a5/0x480
[   13.994322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.994346]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.994369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.994392]  ? __kthread_parkme+0x82/0x180
[   13.994414]  ? preempt_count_sub+0x50/0x80
[   13.994437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.994462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.994486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.994510]  kthread+0x337/0x6f0
[   13.994530]  ? trace_preempt_on+0x20/0xc0
[   13.994555]  ? __pfx_kthread+0x10/0x10
[   13.994575]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.994597]  ? calculate_sigpending+0x7b/0xa0
[   13.994621]  ? __pfx_kthread+0x10/0x10
[   13.994642]  ret_from_fork+0x116/0x1d0
[   13.994661]  ? __pfx_kthread+0x10/0x10
[   13.994682]  ret_from_fork_asm+0x1a/0x30
[   13.994712]  </TASK>
[   13.994724] 
[   14.003387] Allocated by task 282:
[   14.003597]  kasan_save_stack+0x45/0x70
[   14.003823]  kasan_save_track+0x18/0x40
[   14.004070]  kasan_save_alloc_info+0x3b/0x50
[   14.004288]  __kasan_kmalloc+0xb7/0xc0
[   14.004467]  __kmalloc_cache_noprof+0x189/0x420
[   14.004692]  kasan_atomics+0x95/0x310
[   14.004954]  kunit_try_run_case+0x1a5/0x480
[   14.005256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.005496]  kthread+0x337/0x6f0
[   14.005669]  ret_from_fork+0x116/0x1d0
[   14.005856]  ret_from_fork_asm+0x1a/0x30
[   14.006015] 
[   14.006296] The buggy address belongs to the object at ffff888103916a00
[   14.006296]  which belongs to the cache kmalloc-64 of size 64
[   14.006800] The buggy address is located 0 bytes to the right of
[   14.006800]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.007357] 
[   14.007440] The buggy address belongs to the physical page:
[   14.007697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.008183] flags: 0x200000000000000(node=0|zone=2)
[   14.008352] page_type: f5(slab)
[   14.008500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.008871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.009310] page dumped because: kasan: bad access detected
[   14.009562] 
[   14.009654] Memory state around the buggy address:
[   14.009878]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.010411]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.010725] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.010982]                                      ^
[   14.011157]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.011577]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.011890] ==================================================================
[   14.207139] ==================================================================
[   14.207542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.207791] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.208136] 
[   14.208242] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.208284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.208297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.208318] Call Trace:
[   14.208334]  <TASK>
[   14.208349]  dump_stack_lvl+0x73/0xb0
[   14.208375]  print_report+0xd1/0x650
[   14.208398]  ? __virt_addr_valid+0x1db/0x2d0
[   14.208422]  ? kasan_atomics_helper+0xd47/0x5450
[   14.208445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.208468]  ? kasan_atomics_helper+0xd47/0x5450
[   14.208490]  kasan_report+0x141/0x180
[   14.208513]  ? kasan_atomics_helper+0xd47/0x5450
[   14.208542]  kasan_check_range+0x10c/0x1c0
[   14.208568]  __kasan_check_write+0x18/0x20
[   14.208590]  kasan_atomics_helper+0xd47/0x5450
[   14.208615]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.208639]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.208665]  ? kasan_atomics+0x152/0x310
[   14.208692]  kasan_atomics+0x1dc/0x310
[   14.208717]  ? __pfx_kasan_atomics+0x10/0x10
[   14.208742]  ? __pfx_read_tsc+0x10/0x10
[   14.208763]  ? ktime_get_ts64+0x86/0x230
[   14.208788]  kunit_try_run_case+0x1a5/0x480
[   14.208814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.208838]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.208862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.208885]  ? __kthread_parkme+0x82/0x180
[   14.208906]  ? preempt_count_sub+0x50/0x80
[   14.208930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.208954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.208978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.209002]  kthread+0x337/0x6f0
[   14.209021]  ? trace_preempt_on+0x20/0xc0
[   14.209121]  ? __pfx_kthread+0x10/0x10
[   14.209162]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.209184]  ? calculate_sigpending+0x7b/0xa0
[   14.209209]  ? __pfx_kthread+0x10/0x10
[   14.209231]  ret_from_fork+0x116/0x1d0
[   14.209249]  ? __pfx_kthread+0x10/0x10
[   14.209270]  ret_from_fork_asm+0x1a/0x30
[   14.209301]  </TASK>
[   14.209312] 
[   14.217396] Allocated by task 282:
[   14.217530]  kasan_save_stack+0x45/0x70
[   14.217713]  kasan_save_track+0x18/0x40
[   14.217907]  kasan_save_alloc_info+0x3b/0x50
[   14.218338]  __kasan_kmalloc+0xb7/0xc0
[   14.218545]  __kmalloc_cache_noprof+0x189/0x420
[   14.218764]  kasan_atomics+0x95/0x310
[   14.218930]  kunit_try_run_case+0x1a5/0x480
[   14.219245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.219446]  kthread+0x337/0x6f0
[   14.219616]  ret_from_fork+0x116/0x1d0
[   14.219803]  ret_from_fork_asm+0x1a/0x30
[   14.219973] 
[   14.220151] The buggy address belongs to the object at ffff888103916a00
[   14.220151]  which belongs to the cache kmalloc-64 of size 64
[   14.220538] The buggy address is located 0 bytes to the right of
[   14.220538]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.220975] 
[   14.221153] The buggy address belongs to the physical page:
[   14.221434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.221785] flags: 0x200000000000000(node=0|zone=2)
[   14.222017] page_type: f5(slab)
[   14.222389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.222627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.222880] page dumped because: kasan: bad access detected
[   14.223241] 
[   14.223342] Memory state around the buggy address:
[   14.223570]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.223889]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.224305] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.224587]                                      ^
[   14.224780]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.225112]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.225401] ==================================================================
[   14.341433] ==================================================================
[   14.341770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.342195] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.342475] 
[   14.342588] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.342629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.342642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.342664] Call Trace:
[   14.342678]  <TASK>
[   14.342694]  dump_stack_lvl+0x73/0xb0
[   14.342721]  print_report+0xd1/0x650
[   14.342745]  ? __virt_addr_valid+0x1db/0x2d0
[   14.342768]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.342789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.342812]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.342834]  kasan_report+0x141/0x180
[   14.342857]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.342884]  __asan_report_load4_noabort+0x18/0x20
[   14.342908]  kasan_atomics_helper+0x4a1c/0x5450
[   14.342932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.342955]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.342980]  ? kasan_atomics+0x152/0x310
[   14.343008]  kasan_atomics+0x1dc/0x310
[   14.343045]  ? __pfx_kasan_atomics+0x10/0x10
[   14.343077]  ? __pfx_read_tsc+0x10/0x10
[   14.343099]  ? ktime_get_ts64+0x86/0x230
[   14.343122]  kunit_try_run_case+0x1a5/0x480
[   14.343148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.343170]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.343194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.343217]  ? __kthread_parkme+0x82/0x180
[   14.343237]  ? preempt_count_sub+0x50/0x80
[   14.343261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.343285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.343309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.343334]  kthread+0x337/0x6f0
[   14.343354]  ? trace_preempt_on+0x20/0xc0
[   14.343378]  ? __pfx_kthread+0x10/0x10
[   14.343400]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.343421]  ? calculate_sigpending+0x7b/0xa0
[   14.343606]  ? __pfx_kthread+0x10/0x10
[   14.343637]  ret_from_fork+0x116/0x1d0
[   14.343657]  ? __pfx_kthread+0x10/0x10
[   14.343679]  ret_from_fork_asm+0x1a/0x30
[   14.343710]  </TASK>
[   14.343721] 
[   14.351726] Allocated by task 282:
[   14.351904]  kasan_save_stack+0x45/0x70
[   14.352098]  kasan_save_track+0x18/0x40
[   14.352444]  kasan_save_alloc_info+0x3b/0x50
[   14.352614]  __kasan_kmalloc+0xb7/0xc0
[   14.352749]  __kmalloc_cache_noprof+0x189/0x420
[   14.352985]  kasan_atomics+0x95/0x310
[   14.353333]  kunit_try_run_case+0x1a5/0x480
[   14.353626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.353807]  kthread+0x337/0x6f0
[   14.353991]  ret_from_fork+0x116/0x1d0
[   14.354204]  ret_from_fork_asm+0x1a/0x30
[   14.354380] 
[   14.354454] The buggy address belongs to the object at ffff888103916a00
[   14.354454]  which belongs to the cache kmalloc-64 of size 64
[   14.354805] The buggy address is located 0 bytes to the right of
[   14.354805]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.355829] 
[   14.355902] The buggy address belongs to the physical page:
[   14.356086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.356334] flags: 0x200000000000000(node=0|zone=2)
[   14.356501] page_type: f5(slab)
[   14.356899] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.357270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.357615] page dumped because: kasan: bad access detected
[   14.357870] 
[   14.357967] Memory state around the buggy address:
[   14.358194]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.358510]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.358793] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.359086]                                      ^
[   14.359299]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.359521]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.359734] ==================================================================
[   14.672594] ==================================================================
[   14.672919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.673772] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.674286] 
[   14.674546] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.674596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.674610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.674632] Call Trace:
[   14.674657]  <TASK>
[   14.674673]  dump_stack_lvl+0x73/0xb0
[   14.674704]  print_report+0xd1/0x650
[   14.674728]  ? __virt_addr_valid+0x1db/0x2d0
[   14.674751]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.674773]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.674796]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.674817]  kasan_report+0x141/0x180
[   14.674840]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.674866]  kasan_check_range+0x10c/0x1c0
[   14.674890]  __kasan_check_write+0x18/0x20
[   14.674910]  kasan_atomics_helper+0x16e7/0x5450
[   14.674932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.674955]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.674981]  ? kasan_atomics+0x152/0x310
[   14.675008]  kasan_atomics+0x1dc/0x310
[   14.675043]  ? __pfx_kasan_atomics+0x10/0x10
[   14.675109]  ? __pfx_read_tsc+0x10/0x10
[   14.675131]  ? ktime_get_ts64+0x86/0x230
[   14.675167]  kunit_try_run_case+0x1a5/0x480
[   14.675192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.675214]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.675239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.675262]  ? __kthread_parkme+0x82/0x180
[   14.675283]  ? preempt_count_sub+0x50/0x80
[   14.675307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.675331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.675354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.675378]  kthread+0x337/0x6f0
[   14.675398]  ? trace_preempt_on+0x20/0xc0
[   14.675421]  ? __pfx_kthread+0x10/0x10
[   14.675442]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.675464]  ? calculate_sigpending+0x7b/0xa0
[   14.675488]  ? __pfx_kthread+0x10/0x10
[   14.675510]  ret_from_fork+0x116/0x1d0
[   14.675529]  ? __pfx_kthread+0x10/0x10
[   14.675550]  ret_from_fork_asm+0x1a/0x30
[   14.675581]  </TASK>
[   14.675593] 
[   14.687881] Allocated by task 282:
[   14.688257]  kasan_save_stack+0x45/0x70
[   14.688498]  kasan_save_track+0x18/0x40
[   14.688687]  kasan_save_alloc_info+0x3b/0x50
[   14.688879]  __kasan_kmalloc+0xb7/0xc0
[   14.689288]  __kmalloc_cache_noprof+0x189/0x420
[   14.689551]  kasan_atomics+0x95/0x310
[   14.689842]  kunit_try_run_case+0x1a5/0x480
[   14.690238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.690733]  kthread+0x337/0x6f0
[   14.690998]  ret_from_fork+0x116/0x1d0
[   14.691366]  ret_from_fork_asm+0x1a/0x30
[   14.691566] 
[   14.691661] The buggy address belongs to the object at ffff888103916a00
[   14.691661]  which belongs to the cache kmalloc-64 of size 64
[   14.692420] The buggy address is located 0 bytes to the right of
[   14.692420]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.693498] 
[   14.693588] The buggy address belongs to the physical page:
[   14.693943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.694767] flags: 0x200000000000000(node=0|zone=2)
[   14.695080] page_type: f5(slab)
[   14.695477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.695931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.696558] page dumped because: kasan: bad access detected
[   14.696863] 
[   14.696965] Memory state around the buggy address:
[   14.697380]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.697666]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.697959] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.698755]                                      ^
[   14.699070]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.699715]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.700178] ==================================================================
[   14.700950] ==================================================================
[   14.701567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.701877] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.702399] 
[   14.702717] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.702765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.702779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.702891] Call Trace:
[   14.702913]  <TASK>
[   14.702931]  dump_stack_lvl+0x73/0xb0
[   14.702960]  print_report+0xd1/0x650
[   14.702984]  ? __virt_addr_valid+0x1db/0x2d0
[   14.703007]  ? kasan_atomics_helper+0x177f/0x5450
[   14.703075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.703101]  ? kasan_atomics_helper+0x177f/0x5450
[   14.703125]  kasan_report+0x141/0x180
[   14.703148]  ? kasan_atomics_helper+0x177f/0x5450
[   14.703173]  kasan_check_range+0x10c/0x1c0
[   14.703197]  __kasan_check_write+0x18/0x20
[   14.703218]  kasan_atomics_helper+0x177f/0x5450
[   14.703240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.703262]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.703288]  ? kasan_atomics+0x152/0x310
[   14.703316]  kasan_atomics+0x1dc/0x310
[   14.703338]  ? __pfx_kasan_atomics+0x10/0x10
[   14.703362]  ? __pfx_read_tsc+0x10/0x10
[   14.703383]  ? ktime_get_ts64+0x86/0x230
[   14.703407]  kunit_try_run_case+0x1a5/0x480
[   14.703430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.703453]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.703476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.703500]  ? __kthread_parkme+0x82/0x180
[   14.703520]  ? preempt_count_sub+0x50/0x80
[   14.703543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.703567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.703590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.703614]  kthread+0x337/0x6f0
[   14.703634]  ? trace_preempt_on+0x20/0xc0
[   14.703657]  ? __pfx_kthread+0x10/0x10
[   14.703679]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.703700]  ? calculate_sigpending+0x7b/0xa0
[   14.703725]  ? __pfx_kthread+0x10/0x10
[   14.703746]  ret_from_fork+0x116/0x1d0
[   14.703764]  ? __pfx_kthread+0x10/0x10
[   14.703786]  ret_from_fork_asm+0x1a/0x30
[   14.703817]  </TASK>
[   14.703828] 
[   14.717264] Allocated by task 282:
[   14.717562]  kasan_save_stack+0x45/0x70
[   14.717763]  kasan_save_track+0x18/0x40
[   14.717934]  kasan_save_alloc_info+0x3b/0x50
[   14.718327]  __kasan_kmalloc+0xb7/0xc0
[   14.718608]  __kmalloc_cache_noprof+0x189/0x420
[   14.719025]  kasan_atomics+0x95/0x310
[   14.719409]  kunit_try_run_case+0x1a5/0x480
[   14.719610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.719840]  kthread+0x337/0x6f0
[   14.719997]  ret_from_fork+0x116/0x1d0
[   14.720530]  ret_from_fork_asm+0x1a/0x30
[   14.720802] 
[   14.721022] The buggy address belongs to the object at ffff888103916a00
[   14.721022]  which belongs to the cache kmalloc-64 of size 64
[   14.721963] The buggy address is located 0 bytes to the right of
[   14.721963]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.722894] 
[   14.723150] The buggy address belongs to the physical page:
[   14.723577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.724198] flags: 0x200000000000000(node=0|zone=2)
[   14.724421] page_type: f5(slab)
[   14.724589] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.724910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.725239] page dumped because: kasan: bad access detected
[   14.725467] 
[   14.725558] Memory state around the buggy address:
[   14.725763]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.726420]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.726858] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.727772]                                      ^
[   14.728102]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.728749]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.729199] ==================================================================
[   13.950245] ==================================================================
[   13.950561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.950887] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.951472] 
[   13.951589] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.951635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.951648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.951669] Call Trace:
[   13.951685]  <TASK>
[   13.951700]  dump_stack_lvl+0x73/0xb0
[   13.951730]  print_report+0xd1/0x650
[   13.951754]  ? __virt_addr_valid+0x1db/0x2d0
[   13.951778]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.951802]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.951825]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.951848]  kasan_report+0x141/0x180
[   13.951870]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.951897]  kasan_check_range+0x10c/0x1c0
[   13.951921]  __kasan_check_write+0x18/0x20
[   13.951942]  kasan_atomics_helper+0x5fe/0x5450
[   13.951965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.951987]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.952013]  ? kasan_atomics+0x152/0x310
[   13.952055]  kasan_atomics+0x1dc/0x310
[   13.952079]  ? __pfx_kasan_atomics+0x10/0x10
[   13.952103]  ? __pfx_read_tsc+0x10/0x10
[   13.952152]  ? ktime_get_ts64+0x86/0x230
[   13.952177]  kunit_try_run_case+0x1a5/0x480
[   13.952212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.952251]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.952276]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.952299]  ? __kthread_parkme+0x82/0x180
[   13.952319]  ? preempt_count_sub+0x50/0x80
[   13.952344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.952368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.952392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.952418]  kthread+0x337/0x6f0
[   13.952438]  ? trace_preempt_on+0x20/0xc0
[   13.952472]  ? __pfx_kthread+0x10/0x10
[   13.952494]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.952515]  ? calculate_sigpending+0x7b/0xa0
[   13.952553]  ? __pfx_kthread+0x10/0x10
[   13.952574]  ret_from_fork+0x116/0x1d0
[   13.952593]  ? __pfx_kthread+0x10/0x10
[   13.952614]  ret_from_fork_asm+0x1a/0x30
[   13.952645]  </TASK>
[   13.952656] 
[   13.961055] Allocated by task 282:
[   13.961241]  kasan_save_stack+0x45/0x70
[   13.961404]  kasan_save_track+0x18/0x40
[   13.961809]  kasan_save_alloc_info+0x3b/0x50
[   13.962159]  __kasan_kmalloc+0xb7/0xc0
[   13.962340]  __kmalloc_cache_noprof+0x189/0x420
[   13.962590]  kasan_atomics+0x95/0x310
[   13.962794]  kunit_try_run_case+0x1a5/0x480
[   13.962990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.963376]  kthread+0x337/0x6f0
[   13.963554]  ret_from_fork+0x116/0x1d0
[   13.963741]  ret_from_fork_asm+0x1a/0x30
[   13.963946] 
[   13.964174] The buggy address belongs to the object at ffff888103916a00
[   13.964174]  which belongs to the cache kmalloc-64 of size 64
[   13.964558] The buggy address is located 0 bytes to the right of
[   13.964558]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.965131] 
[   13.965227] The buggy address belongs to the physical page:
[   13.965422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.965685] flags: 0x200000000000000(node=0|zone=2)
[   13.965919] page_type: f5(slab)
[   13.966355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.966726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.967112] page dumped because: kasan: bad access detected
[   13.967394] 
[   13.967478] Memory state around the buggy address:
[   13.967713]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.968008]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.968444] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.968758]                                      ^
[   13.968922]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.969359]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.969661] ==================================================================
[   14.937814] ==================================================================
[   14.938211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   14.938612] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.939285] 
[   14.939481] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.939551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.939565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.939587] Call Trace:
[   14.939602]  <TASK>
[   14.939618]  dump_stack_lvl+0x73/0xb0
[   14.939647]  print_report+0xd1/0x650
[   14.939671]  ? __virt_addr_valid+0x1db/0x2d0
[   14.939694]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.939717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.939740]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.939762]  kasan_report+0x141/0x180
[   14.939784]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.939812]  kasan_check_range+0x10c/0x1c0
[   14.939836]  __kasan_check_write+0x18/0x20
[   14.939856]  kasan_atomics_helper+0x1e12/0x5450
[   14.939879]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.939902]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.939927]  ? kasan_atomics+0x152/0x310
[   14.939955]  kasan_atomics+0x1dc/0x310
[   14.939978]  ? __pfx_kasan_atomics+0x10/0x10
[   14.940003]  ? __pfx_read_tsc+0x10/0x10
[   14.940025]  ? ktime_get_ts64+0x86/0x230
[   14.940257]  kunit_try_run_case+0x1a5/0x480
[   14.940283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.940306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.940330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.940352]  ? __kthread_parkme+0x82/0x180
[   14.940374]  ? preempt_count_sub+0x50/0x80
[   14.940398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.940422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.940446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.940469]  kthread+0x337/0x6f0
[   14.940488]  ? trace_preempt_on+0x20/0xc0
[   14.940512]  ? __pfx_kthread+0x10/0x10
[   14.940533]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.940554]  ? calculate_sigpending+0x7b/0xa0
[   14.940578]  ? __pfx_kthread+0x10/0x10
[   14.940601]  ret_from_fork+0x116/0x1d0
[   14.940619]  ? __pfx_kthread+0x10/0x10
[   14.940640]  ret_from_fork_asm+0x1a/0x30
[   14.940670]  </TASK>
[   14.940682] 
[   14.951369] Allocated by task 282:
[   14.951613]  kasan_save_stack+0x45/0x70
[   14.951817]  kasan_save_track+0x18/0x40
[   14.951986]  kasan_save_alloc_info+0x3b/0x50
[   14.952231]  __kasan_kmalloc+0xb7/0xc0
[   14.952778]  __kmalloc_cache_noprof+0x189/0x420
[   14.953064]  kasan_atomics+0x95/0x310
[   14.953346]  kunit_try_run_case+0x1a5/0x480
[   14.953719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.954023]  kthread+0x337/0x6f0
[   14.954268]  ret_from_fork+0x116/0x1d0
[   14.954654]  ret_from_fork_asm+0x1a/0x30
[   14.954842] 
[   14.954917] The buggy address belongs to the object at ffff888103916a00
[   14.954917]  which belongs to the cache kmalloc-64 of size 64
[   14.955674] The buggy address is located 0 bytes to the right of
[   14.955674]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.956409] 
[   14.956672] The buggy address belongs to the physical page:
[   14.956895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.957457] flags: 0x200000000000000(node=0|zone=2)
[   14.957691] page_type: f5(slab)
[   14.957910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.958383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.958998] page dumped because: kasan: bad access detected
[   14.959484] 
[   14.959588] Memory state around the buggy address:
[   14.959899]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.960176]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.960721] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.961080]                                      ^
[   14.961326]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.961719]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.962145] ==================================================================
[   14.785379] ==================================================================
[   14.785727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.786111] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.786442] 
[   14.786532] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.786573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.786586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.786607] Call Trace:
[   14.786620]  <TASK>
[   14.786636]  dump_stack_lvl+0x73/0xb0
[   14.786662]  print_report+0xd1/0x650
[   14.786685]  ? __virt_addr_valid+0x1db/0x2d0
[   14.786708]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.786730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.786753]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.786775]  kasan_report+0x141/0x180
[   14.786797]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.786823]  kasan_check_range+0x10c/0x1c0
[   14.786847]  __kasan_check_write+0x18/0x20
[   14.786866]  kasan_atomics_helper+0x19e3/0x5450
[   14.786889]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.786912]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.786938]  ? kasan_atomics+0x152/0x310
[   14.786965]  kasan_atomics+0x1dc/0x310
[   14.786987]  ? __pfx_kasan_atomics+0x10/0x10
[   14.787013]  ? __pfx_read_tsc+0x10/0x10
[   14.787073]  ? ktime_get_ts64+0x86/0x230
[   14.787098]  kunit_try_run_case+0x1a5/0x480
[   14.787124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.787162]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.787185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.787209]  ? __kthread_parkme+0x82/0x180
[   14.787230]  ? preempt_count_sub+0x50/0x80
[   14.787252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.787276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.787299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.787323]  kthread+0x337/0x6f0
[   14.787343]  ? trace_preempt_on+0x20/0xc0
[   14.787366]  ? __pfx_kthread+0x10/0x10
[   14.787387]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.787408]  ? calculate_sigpending+0x7b/0xa0
[   14.787432]  ? __pfx_kthread+0x10/0x10
[   14.787454]  ret_from_fork+0x116/0x1d0
[   14.787472]  ? __pfx_kthread+0x10/0x10
[   14.787493]  ret_from_fork_asm+0x1a/0x30
[   14.787523]  </TASK>
[   14.787534] 
[   14.794956] Allocated by task 282:
[   14.795222]  kasan_save_stack+0x45/0x70
[   14.795499]  kasan_save_track+0x18/0x40
[   14.795704]  kasan_save_alloc_info+0x3b/0x50
[   14.795897]  __kasan_kmalloc+0xb7/0xc0
[   14.796059]  __kmalloc_cache_noprof+0x189/0x420
[   14.796283]  kasan_atomics+0x95/0x310
[   14.796430]  kunit_try_run_case+0x1a5/0x480
[   14.796639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.796868]  kthread+0x337/0x6f0
[   14.797010]  ret_from_fork+0x116/0x1d0
[   14.797190]  ret_from_fork_asm+0x1a/0x30
[   14.797390] 
[   14.797469] The buggy address belongs to the object at ffff888103916a00
[   14.797469]  which belongs to the cache kmalloc-64 of size 64
[   14.797930] The buggy address is located 0 bytes to the right of
[   14.797930]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.798465] 
[   14.798566] The buggy address belongs to the physical page:
[   14.798799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.799210] flags: 0x200000000000000(node=0|zone=2)
[   14.799423] page_type: f5(slab)
[   14.799583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.799874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.800268] page dumped because: kasan: bad access detected
[   14.800443] 
[   14.800514] Memory state around the buggy address:
[   14.800672]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.800890]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.801171] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.801482]                                      ^
[   14.801701]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.802020]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.802384] ==================================================================
[   14.144467] ==================================================================
[   14.144997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.145407] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.145873] 
[   14.145994] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.146052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.146065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.146087] Call Trace:
[   14.146104]  <TASK>
[   14.146119]  dump_stack_lvl+0x73/0xb0
[   14.146173]  print_report+0xd1/0x650
[   14.146354]  ? __virt_addr_valid+0x1db/0x2d0
[   14.146387]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.146410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.146433]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.146454]  kasan_report+0x141/0x180
[   14.146477]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.146504]  kasan_check_range+0x10c/0x1c0
[   14.146528]  __kasan_check_write+0x18/0x20
[   14.146547]  kasan_atomics_helper+0xb6a/0x5450
[   14.146570]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.146593]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.146619]  ? kasan_atomics+0x152/0x310
[   14.146647]  kasan_atomics+0x1dc/0x310
[   14.146670]  ? __pfx_kasan_atomics+0x10/0x10
[   14.146694]  ? __pfx_read_tsc+0x10/0x10
[   14.146716]  ? ktime_get_ts64+0x86/0x230
[   14.146740]  kunit_try_run_case+0x1a5/0x480
[   14.146764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.146787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.146810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.146833]  ? __kthread_parkme+0x82/0x180
[   14.146854]  ? preempt_count_sub+0x50/0x80
[   14.146877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.146901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.146925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.146948]  kthread+0x337/0x6f0
[   14.146968]  ? trace_preempt_on+0x20/0xc0
[   14.146990]  ? __pfx_kthread+0x10/0x10
[   14.147012]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.147103]  ? calculate_sigpending+0x7b/0xa0
[   14.147132]  ? __pfx_kthread+0x10/0x10
[   14.147154]  ret_from_fork+0x116/0x1d0
[   14.147172]  ? __pfx_kthread+0x10/0x10
[   14.147193]  ret_from_fork_asm+0x1a/0x30
[   14.147224]  </TASK>
[   14.147236] 
[   14.154698] Allocated by task 282:
[   14.154840]  kasan_save_stack+0x45/0x70
[   14.154988]  kasan_save_track+0x18/0x40
[   14.155143]  kasan_save_alloc_info+0x3b/0x50
[   14.155338]  __kasan_kmalloc+0xb7/0xc0
[   14.155524]  __kmalloc_cache_noprof+0x189/0x420
[   14.155745]  kasan_atomics+0x95/0x310
[   14.155901]  kunit_try_run_case+0x1a5/0x480
[   14.156057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.156250]  kthread+0x337/0x6f0
[   14.156385]  ret_from_fork+0x116/0x1d0
[   14.156518]  ret_from_fork_asm+0x1a/0x30
[   14.156661] 
[   14.156736] The buggy address belongs to the object at ffff888103916a00
[   14.156736]  which belongs to the cache kmalloc-64 of size 64
[   14.157101] The buggy address is located 0 bytes to the right of
[   14.157101]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.157452] 
[   14.157523] The buggy address belongs to the physical page:
[   14.157689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.157918] flags: 0x200000000000000(node=0|zone=2)
[   14.158094] page_type: f5(slab)
[   14.158211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.158745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.159160] page dumped because: kasan: bad access detected
[   14.159421] 
[   14.159515] Memory state around the buggy address:
[   14.159744]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.160167]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.160510] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.160841]                                      ^
[   14.161138]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.161468]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.161787] ==================================================================
[   14.119044] ==================================================================
[   14.119577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.120090] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.120494] 
[   14.120608] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.120652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.120667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.120687] Call Trace:
[   14.120703]  <TASK>
[   14.120718]  dump_stack_lvl+0x73/0xb0
[   14.120746]  print_report+0xd1/0x650
[   14.120770]  ? __virt_addr_valid+0x1db/0x2d0
[   14.120793]  ? kasan_atomics_helper+0xac7/0x5450
[   14.120815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.120838]  ? kasan_atomics_helper+0xac7/0x5450
[   14.120859]  kasan_report+0x141/0x180
[   14.120882]  ? kasan_atomics_helper+0xac7/0x5450
[   14.120908]  kasan_check_range+0x10c/0x1c0
[   14.120932]  __kasan_check_write+0x18/0x20
[   14.120951]  kasan_atomics_helper+0xac7/0x5450
[   14.120974]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.120996]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.121022]  ? kasan_atomics+0x152/0x310
[   14.121250]  kasan_atomics+0x1dc/0x310
[   14.121275]  ? __pfx_kasan_atomics+0x10/0x10
[   14.121300]  ? __pfx_read_tsc+0x10/0x10
[   14.121321]  ? ktime_get_ts64+0x86/0x230
[   14.121345]  kunit_try_run_case+0x1a5/0x480
[   14.121370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.121393]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.121416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.121439]  ? __kthread_parkme+0x82/0x180
[   14.121460]  ? preempt_count_sub+0x50/0x80
[   14.121483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.121507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.121530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.121554]  kthread+0x337/0x6f0
[   14.121573]  ? trace_preempt_on+0x20/0xc0
[   14.121596]  ? __pfx_kthread+0x10/0x10
[   14.121617]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.121638]  ? calculate_sigpending+0x7b/0xa0
[   14.121662]  ? __pfx_kthread+0x10/0x10
[   14.121684]  ret_from_fork+0x116/0x1d0
[   14.121702]  ? __pfx_kthread+0x10/0x10
[   14.121723]  ret_from_fork_asm+0x1a/0x30
[   14.121753]  </TASK>
[   14.121766] 
[   14.132912] Allocated by task 282:
[   14.133208]  kasan_save_stack+0x45/0x70
[   14.133410]  kasan_save_track+0x18/0x40
[   14.133597]  kasan_save_alloc_info+0x3b/0x50
[   14.133790]  __kasan_kmalloc+0xb7/0xc0
[   14.133967]  __kmalloc_cache_noprof+0x189/0x420
[   14.134740]  kasan_atomics+0x95/0x310
[   14.134930]  kunit_try_run_case+0x1a5/0x480
[   14.135222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.135573]  kthread+0x337/0x6f0
[   14.135741]  ret_from_fork+0x116/0x1d0
[   14.136042]  ret_from_fork_asm+0x1a/0x30
[   14.136419] 
[   14.136502] The buggy address belongs to the object at ffff888103916a00
[   14.136502]  which belongs to the cache kmalloc-64 of size 64
[   14.136995] The buggy address is located 0 bytes to the right of
[   14.136995]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.137538] 
[   14.137636] The buggy address belongs to the physical page:
[   14.137863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.138564] flags: 0x200000000000000(node=0|zone=2)
[   14.138741] page_type: f5(slab)
[   14.138914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.139515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.139959] page dumped because: kasan: bad access detected
[   14.140354] 
[   14.140457] Memory state around the buggy address:
[   14.140663]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.141229]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.141635] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.142023]                                      ^
[   14.142530]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.142930]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.143516] ==================================================================
[   14.561666] ==================================================================
[   14.561969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.562417] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.562738] 
[   14.562843] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.562882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.562894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.562915] Call Trace:
[   14.562929]  <TASK>
[   14.562944]  dump_stack_lvl+0x73/0xb0
[   14.562972]  print_report+0xd1/0x650
[   14.562995]  ? __virt_addr_valid+0x1db/0x2d0
[   14.563016]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.563049]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.563078]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.563100]  kasan_report+0x141/0x180
[   14.563123]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.563149]  __asan_report_store8_noabort+0x1b/0x30
[   14.563170]  kasan_atomics_helper+0x50d4/0x5450
[   14.563193]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.563215]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.563240]  ? kasan_atomics+0x152/0x310
[   14.563267]  kasan_atomics+0x1dc/0x310
[   14.563291]  ? __pfx_kasan_atomics+0x10/0x10
[   14.563317]  ? __pfx_read_tsc+0x10/0x10
[   14.563338]  ? ktime_get_ts64+0x86/0x230
[   14.563361]  kunit_try_run_case+0x1a5/0x480
[   14.563385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.563408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.563431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.563454]  ? __kthread_parkme+0x82/0x180
[   14.563474]  ? preempt_count_sub+0x50/0x80
[   14.563498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.563522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.563545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.563568]  kthread+0x337/0x6f0
[   14.563588]  ? trace_preempt_on+0x20/0xc0
[   14.563611]  ? __pfx_kthread+0x10/0x10
[   14.563632]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.563653]  ? calculate_sigpending+0x7b/0xa0
[   14.563676]  ? __pfx_kthread+0x10/0x10
[   14.563698]  ret_from_fork+0x116/0x1d0
[   14.563716]  ? __pfx_kthread+0x10/0x10
[   14.563737]  ret_from_fork_asm+0x1a/0x30
[   14.563766]  </TASK>
[   14.563778] 
[   14.573397] Allocated by task 282:
[   14.573543]  kasan_save_stack+0x45/0x70
[   14.573694]  kasan_save_track+0x18/0x40
[   14.573833]  kasan_save_alloc_info+0x3b/0x50
[   14.573983]  __kasan_kmalloc+0xb7/0xc0
[   14.574756]  __kmalloc_cache_noprof+0x189/0x420
[   14.575207]  kasan_atomics+0x95/0x310
[   14.575675]  kunit_try_run_case+0x1a5/0x480
[   14.576093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.576579]  kthread+0x337/0x6f0
[   14.576772]  ret_from_fork+0x116/0x1d0
[   14.576962]  ret_from_fork_asm+0x1a/0x30
[   14.577551] 
[   14.577664] The buggy address belongs to the object at ffff888103916a00
[   14.577664]  which belongs to the cache kmalloc-64 of size 64
[   14.578766] The buggy address is located 0 bytes to the right of
[   14.578766]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.579732] 
[   14.579841] The buggy address belongs to the physical page:
[   14.580341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.580802] flags: 0x200000000000000(node=0|zone=2)
[   14.581285] page_type: f5(slab)
[   14.581483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.581797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.582344] page dumped because: kasan: bad access detected
[   14.582775] 
[   14.582874] Memory state around the buggy address:
[   14.583526]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.583947]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.584754] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.585259]                                      ^
[   14.585699]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.586207]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.586797] ==================================================================
[   14.839365] ==================================================================
[   14.839716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.840095] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.840549] 
[   14.840690] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.840734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.840747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.840768] Call Trace:
[   14.840782]  <TASK>
[   14.840798]  dump_stack_lvl+0x73/0xb0
[   14.840825]  print_report+0xd1/0x650
[   14.840849]  ? __virt_addr_valid+0x1db/0x2d0
[   14.840871]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.840894]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.840916]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.840938]  kasan_report+0x141/0x180
[   14.840961]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.840987]  kasan_check_range+0x10c/0x1c0
[   14.841011]  __kasan_check_write+0x18/0x20
[   14.841043]  kasan_atomics_helper+0x1c18/0x5450
[   14.841068]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.841091]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.841117]  ? kasan_atomics+0x152/0x310
[   14.841179]  kasan_atomics+0x1dc/0x310
[   14.841202]  ? __pfx_kasan_atomics+0x10/0x10
[   14.841227]  ? __pfx_read_tsc+0x10/0x10
[   14.841249]  ? ktime_get_ts64+0x86/0x230
[   14.841274]  kunit_try_run_case+0x1a5/0x480
[   14.841299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.841322]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.841345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.841368]  ? __kthread_parkme+0x82/0x180
[   14.841389]  ? preempt_count_sub+0x50/0x80
[   14.841413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.841436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.841459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.841482]  kthread+0x337/0x6f0
[   14.841502]  ? trace_preempt_on+0x20/0xc0
[   14.841525]  ? __pfx_kthread+0x10/0x10
[   14.841547]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.841568]  ? calculate_sigpending+0x7b/0xa0
[   14.841592]  ? __pfx_kthread+0x10/0x10
[   14.841614]  ret_from_fork+0x116/0x1d0
[   14.841632]  ? __pfx_kthread+0x10/0x10
[   14.841654]  ret_from_fork_asm+0x1a/0x30
[   14.841684]  </TASK>
[   14.841695] 
[   14.851394] Allocated by task 282:
[   14.851758]  kasan_save_stack+0x45/0x70
[   14.852406]  kasan_save_track+0x18/0x40
[   14.853246]  kasan_save_alloc_info+0x3b/0x50
[   14.853463]  __kasan_kmalloc+0xb7/0xc0
[   14.853811]  __kmalloc_cache_noprof+0x189/0x420
[   14.854150]  kasan_atomics+0x95/0x310
[   14.854327]  kunit_try_run_case+0x1a5/0x480
[   14.854635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.854878]  kthread+0x337/0x6f0
[   14.855313]  ret_from_fork+0x116/0x1d0
[   14.855508]  ret_from_fork_asm+0x1a/0x30
[   14.855931] 
[   14.856123] The buggy address belongs to the object at ffff888103916a00
[   14.856123]  which belongs to the cache kmalloc-64 of size 64
[   14.856864] The buggy address is located 0 bytes to the right of
[   14.856864]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.857755] 
[   14.857851] The buggy address belongs to the physical page:
[   14.858236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.858818] flags: 0x200000000000000(node=0|zone=2)
[   14.859088] page_type: f5(slab)
[   14.859368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.859970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.860409] page dumped because: kasan: bad access detected
[   14.860723] 
[   14.860819] Memory state around the buggy address:
[   14.861019]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.861682]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.862156] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.862427]                                      ^
[   14.862645]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.863267]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.863711] ==================================================================
[   14.523833] ==================================================================
[   14.524306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.524665] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282
[   14.524976] 
[   14.525346] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.525396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.525409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.525430] Call Trace:
[   14.525444]  <TASK>
[   14.525460]  dump_stack_lvl+0x73/0xb0
[   14.525487]  print_report+0xd1/0x650
[   14.525511]  ? __virt_addr_valid+0x1db/0x2d0
[   14.525534]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.525556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.525579]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.525601]  kasan_report+0x141/0x180
[   14.525623]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.525650]  __asan_report_load8_noabort+0x18/0x20
[   14.525675]  kasan_atomics_helper+0x4eae/0x5450
[   14.525697]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.525720]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.525746]  ? kasan_atomics+0x152/0x310
[   14.525773]  kasan_atomics+0x1dc/0x310
[   14.525797]  ? __pfx_kasan_atomics+0x10/0x10
[   14.525823]  ? __pfx_read_tsc+0x10/0x10
[   14.525844]  ? ktime_get_ts64+0x86/0x230
[   14.525868]  kunit_try_run_case+0x1a5/0x480
[   14.525891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.525914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.525937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.525960]  ? __kthread_parkme+0x82/0x180
[   14.525982]  ? preempt_count_sub+0x50/0x80
[   14.526005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.526042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.526080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.526103]  kthread+0x337/0x6f0
[   14.526123]  ? trace_preempt_on+0x20/0xc0
[   14.526147]  ? __pfx_kthread+0x10/0x10
[   14.526169]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.526190]  ? calculate_sigpending+0x7b/0xa0
[   14.526215]  ? __pfx_kthread+0x10/0x10
[   14.526237]  ret_from_fork+0x116/0x1d0
[   14.526255]  ? __pfx_kthread+0x10/0x10
[   14.526276]  ret_from_fork_asm+0x1a/0x30
[   14.526308]  </TASK>
[   14.526320] 
[   14.534087] Allocated by task 282:
[   14.534381]  kasan_save_stack+0x45/0x70
[   14.534585]  kasan_save_track+0x18/0x40
[   14.534776]  kasan_save_alloc_info+0x3b/0x50
[   14.534992]  __kasan_kmalloc+0xb7/0xc0
[   14.535260]  __kmalloc_cache_noprof+0x189/0x420
[   14.535468]  kasan_atomics+0x95/0x310
[   14.535605]  kunit_try_run_case+0x1a5/0x480
[   14.535752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.535926]  kthread+0x337/0x6f0
[   14.536114]  ret_from_fork+0x116/0x1d0
[   14.536312]  ret_from_fork_asm+0x1a/0x30
[   14.536544] 
[   14.536646] The buggy address belongs to the object at ffff888103916a00
[   14.536646]  which belongs to the cache kmalloc-64 of size 64
[   14.537321] The buggy address is located 0 bytes to the right of
[   14.537321]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   14.538404] 
[   14.538478] The buggy address belongs to the physical page:
[   14.538651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   14.538889] flags: 0x200000000000000(node=0|zone=2)
[   14.539065] page_type: f5(slab)
[   14.539233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.539704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.540048] page dumped because: kasan: bad access detected
[   14.540269] 
[   14.540341] Memory state around the buggy address:
[   14.540495]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540711]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540944] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.541277]                                      ^
[   14.541521]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.541861]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.542360] ==================================================================
[   13.782593] ==================================================================
[   13.783338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.783680] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282
[   13.783906] 
[   13.783993] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.784095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.784112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.784131] Call Trace:
[   13.784163]  <TASK>
[   13.784177]  dump_stack_lvl+0x73/0xb0
[   13.784206]  print_report+0xd1/0x650
[   13.784240]  ? __virt_addr_valid+0x1db/0x2d0
[   13.784263]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.784283]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.784305]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.784325]  kasan_report+0x141/0x180
[   13.784355]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.784380]  __asan_report_store4_noabort+0x1b/0x30
[   13.784400]  kasan_atomics_helper+0x4ba2/0x5450
[   13.784432]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.784454]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.784479]  ? kasan_atomics+0x152/0x310
[   13.784514]  kasan_atomics+0x1dc/0x310
[   13.784536]  ? __pfx_kasan_atomics+0x10/0x10
[   13.784559]  ? __pfx_read_tsc+0x10/0x10
[   13.784590]  ? ktime_get_ts64+0x86/0x230
[   13.784613]  kunit_try_run_case+0x1a5/0x480
[   13.784636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.784657]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.784680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.784702]  ? __kthread_parkme+0x82/0x180
[   13.784721]  ? preempt_count_sub+0x50/0x80
[   13.784743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.784766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.784787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.784810]  kthread+0x337/0x6f0
[   13.784839]  ? trace_preempt_on+0x20/0xc0
[   13.784861]  ? __pfx_kthread+0x10/0x10
[   13.784880]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.784911]  ? calculate_sigpending+0x7b/0xa0
[   13.784934]  ? __pfx_kthread+0x10/0x10
[   13.784955]  ret_from_fork+0x116/0x1d0
[   13.784972]  ? __pfx_kthread+0x10/0x10
[   13.784992]  ret_from_fork_asm+0x1a/0x30
[   13.785021]  </TASK>
[   13.785041] 
[   13.797409] Allocated by task 282:
[   13.797773]  kasan_save_stack+0x45/0x70
[   13.797992]  kasan_save_track+0x18/0x40
[   13.798300]  kasan_save_alloc_info+0x3b/0x50
[   13.798494]  __kasan_kmalloc+0xb7/0xc0
[   13.798626]  __kmalloc_cache_noprof+0x189/0x420
[   13.799124]  kasan_atomics+0x95/0x310
[   13.799310]  kunit_try_run_case+0x1a5/0x480
[   13.799459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.799740]  kthread+0x337/0x6f0
[   13.799908]  ret_from_fork+0x116/0x1d0
[   13.800165]  ret_from_fork_asm+0x1a/0x30
[   13.800314] 
[   13.800389] The buggy address belongs to the object at ffff888103916a00
[   13.800389]  which belongs to the cache kmalloc-64 of size 64
[   13.800928] The buggy address is located 0 bytes to the right of
[   13.800928]  allocated 48-byte region [ffff888103916a00, ffff888103916a30)
[   13.801504] 
[   13.801604] The buggy address belongs to the physical page:
[   13.801841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916
[   13.802316] flags: 0x200000000000000(node=0|zone=2)
[   13.802584] page_type: f5(slab)
[   13.802738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.803132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.803430] page dumped because: kasan: bad access detected
[   13.803655] 
[   13.803757] Memory state around the buggy address:
[   13.803996]  ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.804309]  ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.804665] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.804971]                                      ^
[   13.805305]  ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.805626]  ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.805935] ==================================================================