Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.401574] ==================================================================
[   19.401621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.401960] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.402047] 
[   19.402213] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.402307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.402466] Hardware name: linux,dummy-virt (DT)
[   19.402604] Call trace:
[   19.402718]  show_stack+0x20/0x38 (C)
[   19.402772]  dump_stack_lvl+0x8c/0xd0
[   19.402890]  print_report+0x118/0x5d0
[   19.402957]  kasan_report+0xdc/0x128
[   19.403012]  kasan_check_range+0x100/0x1a8
[   19.403062]  __kasan_check_write+0x20/0x30
[   19.403107]  kasan_atomics_helper+0x17ec/0x4858
[   19.403206]  kasan_atomics+0x198/0x2e0
[   19.403265]  kunit_try_run_case+0x170/0x3f0
[   19.403333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.403395]  kthread+0x328/0x630
[   19.403502]  ret_from_fork+0x10/0x20
[   19.403549] 
[   19.403570] Allocated by task 265:
[   19.403600]  kasan_save_stack+0x3c/0x68
[   19.403641]  kasan_save_track+0x20/0x40
[   19.403696]  kasan_save_alloc_info+0x40/0x58
[   19.403897]  __kasan_kmalloc+0xd4/0xd8
[   19.404212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.404297]  kasan_atomics+0xb8/0x2e0
[   19.404365]  kunit_try_run_case+0x170/0x3f0
[   19.404420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.404480]  kthread+0x328/0x630
[   19.404517]  ret_from_fork+0x10/0x20
[   19.404555] 
[   19.404585] The buggy address belongs to the object at fff00000c79fb480
[   19.404585]  which belongs to the cache kmalloc-64 of size 64
[   19.404652] The buggy address is located 0 bytes to the right of
[   19.404652]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.404717] 
[   19.404741] The buggy address belongs to the physical page:
[   19.404803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.404858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.404917] page_type: f5(slab)
[   19.405006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.405295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.405369] page dumped because: kasan: bad access detected
[   19.405484] 
[   19.405532] Memory state around the buggy address:
[   19.405589]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406086]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406148] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.406216]                                      ^
[   19.406252]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.406297]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.406589] ==================================================================
[   19.292989] ==================================================================
[   19.293045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.293098] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.293149] 
[   19.293185] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.293268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.293295] Hardware name: linux,dummy-virt (DT)
[   19.293329] Call trace:
[   19.293352]  show_stack+0x20/0x38 (C)
[   19.293401]  dump_stack_lvl+0x8c/0xd0
[   19.293447]  print_report+0x118/0x5d0
[   19.293494]  kasan_report+0xdc/0x128
[   19.293539]  kasan_check_range+0x100/0x1a8
[   19.293588]  __kasan_check_write+0x20/0x30
[   19.293633]  kasan_atomics_helper+0xf88/0x4858
[   19.293680]  kasan_atomics+0x198/0x2e0
[   19.293726]  kunit_try_run_case+0x170/0x3f0
[   19.293772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.293825]  kthread+0x328/0x630
[   19.293899]  ret_from_fork+0x10/0x20
[   19.293951] 
[   19.293971] Allocated by task 265:
[   19.294000]  kasan_save_stack+0x3c/0x68
[   19.294042]  kasan_save_track+0x20/0x40
[   19.294080]  kasan_save_alloc_info+0x40/0x58
[   19.294122]  __kasan_kmalloc+0xd4/0xd8
[   19.294160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.294200]  kasan_atomics+0xb8/0x2e0
[   19.294237]  kunit_try_run_case+0x170/0x3f0
[   19.294276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.294325]  kthread+0x328/0x630
[   19.294359]  ret_from_fork+0x10/0x20
[   19.294396] 
[   19.294417] The buggy address belongs to the object at fff00000c79fb480
[   19.294417]  which belongs to the cache kmalloc-64 of size 64
[   19.294475] The buggy address is located 0 bytes to the right of
[   19.294475]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.294538] 
[   19.294559] The buggy address belongs to the physical page:
[   19.294592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.294645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.294695] page_type: f5(slab)
[   19.294734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.294785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.294827] page dumped because: kasan: bad access detected
[   19.294860] 
[   19.294892] Memory state around the buggy address:
[   19.294924]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.294968]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.295012] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.295051]                                      ^
[   19.295083]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.295126]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.295166] ==================================================================
[   19.305688] ==================================================================
[   19.305793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.305878] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.305974] 
[   19.306044] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.306140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.306436] Hardware name: linux,dummy-virt (DT)
[   19.306519] Call trace:
[   19.306546]  show_stack+0x20/0x38 (C)
[   19.306634]  dump_stack_lvl+0x8c/0xd0
[   19.306722]  print_report+0x118/0x5d0
[   19.306778]  kasan_report+0xdc/0x128
[   19.306826]  kasan_check_range+0x100/0x1a8
[   19.306905]  __kasan_check_write+0x20/0x30
[   19.306981]  kasan_atomics_helper+0x10c0/0x4858
[   19.307062]  kasan_atomics+0x198/0x2e0
[   19.307147]  kunit_try_run_case+0x170/0x3f0
[   19.307195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.307254]  kthread+0x328/0x630
[   19.307324]  ret_from_fork+0x10/0x20
[   19.307587] 
[   19.307621] Allocated by task 265:
[   19.307679]  kasan_save_stack+0x3c/0x68
[   19.308003]  kasan_save_track+0x20/0x40
[   19.308665]  kasan_save_alloc_info+0x40/0x58
[   19.308904]  __kasan_kmalloc+0xd4/0xd8
[   19.309282]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.309525]  kasan_atomics+0xb8/0x2e0
[   19.309579]  kunit_try_run_case+0x170/0x3f0
[   19.309619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.309665]  kthread+0x328/0x630
[   19.309700]  ret_from_fork+0x10/0x20
[   19.309739] 
[   19.309761] The buggy address belongs to the object at fff00000c79fb480
[   19.309761]  which belongs to the cache kmalloc-64 of size 64
[   19.309822] The buggy address is located 0 bytes to the right of
[   19.309822]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.309898] 
[   19.309920] The buggy address belongs to the physical page:
[   19.309952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.310006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.310055] page_type: f5(slab)
[   19.310094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.310146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.310189] page dumped because: kasan: bad access detected
[   19.310226] 
[   19.310248] Memory state around the buggy address:
[   19.310281]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.310325]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.310370] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.310411]                                      ^
[   19.310443]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.310487]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.310527] ==================================================================
[   19.364009] ==================================================================
[   19.364072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.364123] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.364265] 
[   19.364402] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.364517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.364546] Hardware name: linux,dummy-virt (DT)
[   19.364603] Call trace:
[   19.364628]  show_stack+0x20/0x38 (C)
[   19.364792]  dump_stack_lvl+0x8c/0xd0
[   19.364878]  print_report+0x118/0x5d0
[   19.364929]  kasan_report+0xdc/0x128
[   19.364983]  kasan_check_range+0x100/0x1a8
[   19.365043]  __kasan_check_write+0x20/0x30
[   19.365096]  kasan_atomics_helper+0x15b4/0x4858
[   19.365161]  kasan_atomics+0x198/0x2e0
[   19.365216]  kunit_try_run_case+0x170/0x3f0
[   19.365341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.365493]  kthread+0x328/0x630
[   19.365546]  ret_from_fork+0x10/0x20
[   19.365594] 
[   19.365631] Allocated by task 265:
[   19.365711]  kasan_save_stack+0x3c/0x68
[   19.365780]  kasan_save_track+0x20/0x40
[   19.365827]  kasan_save_alloc_info+0x40/0x58
[   19.365927]  __kasan_kmalloc+0xd4/0xd8
[   19.365974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.366021]  kasan_atomics+0xb8/0x2e0
[   19.366069]  kunit_try_run_case+0x170/0x3f0
[   19.366152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.366198]  kthread+0x328/0x630
[   19.366231]  ret_from_fork+0x10/0x20
[   19.366287] 
[   19.366309] The buggy address belongs to the object at fff00000c79fb480
[   19.366309]  which belongs to the cache kmalloc-64 of size 64
[   19.366464] The buggy address is located 0 bytes to the right of
[   19.366464]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.366635] 
[   19.366662] The buggy address belongs to the physical page:
[   19.366695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.366760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.366934] page_type: f5(slab)
[   19.366977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.367030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.367163] page dumped because: kasan: bad access detected
[   19.367211] 
[   19.367251] Memory state around the buggy address:
[   19.367304]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.367350]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.367395] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.367458]                                      ^
[   19.367493]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.367536]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.367574] ==================================================================
[   19.247140] ==================================================================
[   19.247183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.247242] Write of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.247293] 
[   19.247321] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.247401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.247430] Hardware name: linux,dummy-virt (DT)
[   19.247460] Call trace:
[   19.247493]  show_stack+0x20/0x38 (C)
[   19.247540]  dump_stack_lvl+0x8c/0xd0
[   19.247588]  print_report+0x118/0x5d0
[   19.247633]  kasan_report+0xdc/0x128
[   19.247680]  kasan_check_range+0x100/0x1a8
[   19.247727]  __kasan_check_write+0x20/0x30
[   19.247774]  kasan_atomics_helper+0xd3c/0x4858
[   19.247834]  kasan_atomics+0x198/0x2e0
[   19.248454]  kunit_try_run_case+0x170/0x3f0
[   19.248727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.248789]  kthread+0x328/0x630
[   19.248853]  ret_from_fork+0x10/0x20
[   19.248918] 
[   19.248939] Allocated by task 265:
[   19.248970]  kasan_save_stack+0x3c/0x68
[   19.249013]  kasan_save_track+0x20/0x40
[   19.249428]  kasan_save_alloc_info+0x40/0x58
[   19.249568]  __kasan_kmalloc+0xd4/0xd8
[   19.249818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.250058]  kasan_atomics+0xb8/0x2e0
[   19.250212]  kunit_try_run_case+0x170/0x3f0
[   19.250274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.250355]  kthread+0x328/0x630
[   19.250489]  ret_from_fork+0x10/0x20
[   19.250528] 
[   19.250552] The buggy address belongs to the object at fff00000c79fb480
[   19.250552]  which belongs to the cache kmalloc-64 of size 64
[   19.250625] The buggy address is located 0 bytes to the right of
[   19.250625]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.250690] 
[   19.250846] The buggy address belongs to the physical page:
[   19.250964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.251064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.251467] page_type: f5(slab)
[   19.251560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.251661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.251704] page dumped because: kasan: bad access detected
[   19.251763] 
[   19.251785] Memory state around the buggy address:
[   19.251820]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.252040]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.252170] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.252266]                                      ^
[   19.252330]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.252375]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.252597] ==================================================================
[   19.276966] ==================================================================
[   19.277048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.277111] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.277164] 
[   19.277199] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.277279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.277333] Hardware name: linux,dummy-virt (DT)
[   19.277365] Call trace:
[   19.277390]  show_stack+0x20/0x38 (C)
[   19.277439]  dump_stack_lvl+0x8c/0xd0
[   19.277489]  print_report+0x118/0x5d0
[   19.277535]  kasan_report+0xdc/0x128
[   19.277717]  __asan_report_store8_noabort+0x20/0x30
[   19.277795]  kasan_atomics_helper+0x3e5c/0x4858
[   19.277958]  kasan_atomics+0x198/0x2e0
[   19.278050]  kunit_try_run_case+0x170/0x3f0
[   19.278102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.278156]  kthread+0x328/0x630
[   19.278204]  ret_from_fork+0x10/0x20
[   19.278255] 
[   19.278469] Allocated by task 265:
[   19.278618]  kasan_save_stack+0x3c/0x68
[   19.278671]  kasan_save_track+0x20/0x40
[   19.278783]  kasan_save_alloc_info+0x40/0x58
[   19.278826]  __kasan_kmalloc+0xd4/0xd8
[   19.278907]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.278950]  kasan_atomics+0xb8/0x2e0
[   19.278988]  kunit_try_run_case+0x170/0x3f0
[   19.279034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.279111]  kthread+0x328/0x630
[   19.279145]  ret_from_fork+0x10/0x20
[   19.279183] 
[   19.279205] The buggy address belongs to the object at fff00000c79fb480
[   19.279205]  which belongs to the cache kmalloc-64 of size 64
[   19.279269] The buggy address is located 0 bytes to the right of
[   19.279269]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.279345] 
[   19.279369] The buggy address belongs to the physical page:
[   19.279410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.279479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.279530] page_type: f5(slab)
[   19.279570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.279630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.279678] page dumped because: kasan: bad access detected
[   19.279714] 
[   19.279733] Memory state around the buggy address:
[   19.279798]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.279842]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.279896] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.279936]                                      ^
[   19.279969]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.280052]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.280092] ==================================================================
[   19.253605] ==================================================================
[   19.253713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.253788] Read of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.253899] 
[   19.253966] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.254087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.254134] Hardware name: linux,dummy-virt (DT)
[   19.254345] Call trace:
[   19.254451]  show_stack+0x20/0x38 (C)
[   19.254513]  dump_stack_lvl+0x8c/0xd0
[   19.254626]  print_report+0x118/0x5d0
[   19.254692]  kasan_report+0xdc/0x128
[   19.254757]  __asan_report_load4_noabort+0x20/0x30
[   19.254839]  kasan_atomics_helper+0x3e04/0x4858
[   19.254921]  kasan_atomics+0x198/0x2e0
[   19.254972]  kunit_try_run_case+0x170/0x3f0
[   19.255038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.255236]  kthread+0x328/0x630
[   19.255286]  ret_from_fork+0x10/0x20
[   19.255337] 
[   19.255360] Allocated by task 265:
[   19.255392]  kasan_save_stack+0x3c/0x68
[   19.255522]  kasan_save_track+0x20/0x40
[   19.255590]  kasan_save_alloc_info+0x40/0x58
[   19.255634]  __kasan_kmalloc+0xd4/0xd8
[   19.255711]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.256050]  kasan_atomics+0xb8/0x2e0
[   19.256185]  kunit_try_run_case+0x170/0x3f0
[   19.256269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.256347]  kthread+0x328/0x630
[   19.256382]  ret_from_fork+0x10/0x20
[   19.256419] 
[   19.256449] The buggy address belongs to the object at fff00000c79fb480
[   19.256449]  which belongs to the cache kmalloc-64 of size 64
[   19.256510] The buggy address is located 0 bytes to the right of
[   19.256510]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.256576] 
[   19.256599] The buggy address belongs to the physical page:
[   19.256682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.256741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.256793] page_type: f5(slab)
[   19.256833] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.256899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.256940] page dumped because: kasan: bad access detected
[   19.257124] 
[   19.257229] Memory state around the buggy address:
[   19.257306]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.257386]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.257475] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.257810]                                      ^
[   19.257896]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.257953]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.258041] ==================================================================
[   19.082907] ==================================================================
[   19.082985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   19.085069] 
[   19.085235] page_type: f5(slab)
[   19.085276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.085328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.085380] page dumped because: kasan: bad access detected
[   19.088743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.088789]  kthread+0x328/0x630
[   19.088874]  ret_from_fork+0x10/0x20
[   19.090103]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.090747] 
[   19.091669]  __kasan_check_read+0x20/0x30
[   19.092618]  kthread+0x328/0x630
[   19.092921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.094643] Write of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.097039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.099537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   19.100756]  kasan_save_stack+0x3c/0x68
[   19.101742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.101793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.101841] page_type: f5(slab)
[   19.101903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.102038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.102230] page dumped because: kasan: bad access detected
[   19.102290] 
[   19.102362] Memory state around the buggy address:
[   19.102396]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.102480]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.102856] ==================================================================
[   19.342635] ==================================================================
[   19.342764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.342828] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.342913] 
[   19.342956] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.343039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.343067] Hardware name: linux,dummy-virt (DT)
[   19.343102] Call trace:
[   19.343128]  show_stack+0x20/0x38 (C)
[   19.343179]  dump_stack_lvl+0x8c/0xd0
[   19.343233]  print_report+0x118/0x5d0
[   19.343293]  kasan_report+0xdc/0x128
[   19.343341]  kasan_check_range+0x100/0x1a8
[   19.343389]  __kasan_check_write+0x20/0x30
[   19.343435]  kasan_atomics_helper+0x1384/0x4858
[   19.343488]  kasan_atomics+0x198/0x2e0
[   19.343534]  kunit_try_run_case+0x170/0x3f0
[   19.343592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.343654]  kthread+0x328/0x630
[   19.343695]  ret_from_fork+0x10/0x20
[   19.343750] 
[   19.343778] Allocated by task 265:
[   19.343808]  kasan_save_stack+0x3c/0x68
[   19.343877]  kasan_save_track+0x20/0x40
[   19.343918]  kasan_save_alloc_info+0x40/0x58
[   19.343966]  __kasan_kmalloc+0xd4/0xd8
[   19.344013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.344056]  kasan_atomics+0xb8/0x2e0
[   19.344092]  kunit_try_run_case+0x170/0x3f0
[   19.344138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.344189]  kthread+0x328/0x630
[   19.344224]  ret_from_fork+0x10/0x20
[   19.344261] 
[   19.344284] The buggy address belongs to the object at fff00000c79fb480
[   19.344284]  which belongs to the cache kmalloc-64 of size 64
[   19.344344] The buggy address is located 0 bytes to the right of
[   19.344344]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.344409] 
[   19.344433] The buggy address belongs to the physical page:
[   19.344490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.344547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.344597] page_type: f5(slab)
[   19.344638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.344691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.344733] page dumped because: kasan: bad access detected
[   19.344766] 
[   19.344787] Memory state around the buggy address:
[   19.344821]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.344876]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.344920] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.344961]                                      ^
[   19.344993]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.345036]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.345074] ==================================================================
[   19.359282] ==================================================================
[   19.359338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.359385] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.359436] 
[   19.359466] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.359546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.359574] Hardware name: linux,dummy-virt (DT)
[   19.359607] Call trace:
[   19.359660]  show_stack+0x20/0x38 (C)
[   19.359714]  dump_stack_lvl+0x8c/0xd0
[   19.359770]  print_report+0x118/0x5d0
[   19.359834]  kasan_report+0xdc/0x128
[   19.359931]  kasan_check_range+0x100/0x1a8
[   19.360009]  __kasan_check_write+0x20/0x30
[   19.360086]  kasan_atomics_helper+0x154c/0x4858
[   19.360146]  kasan_atomics+0x198/0x2e0
[   19.360192]  kunit_try_run_case+0x170/0x3f0
[   19.360239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.360292]  kthread+0x328/0x630
[   19.360334]  ret_from_fork+0x10/0x20
[   19.360394] 
[   19.360446] Allocated by task 265:
[   19.360508]  kasan_save_stack+0x3c/0x68
[   19.360595]  kasan_save_track+0x20/0x40
[   19.360634]  kasan_save_alloc_info+0x40/0x58
[   19.360694]  __kasan_kmalloc+0xd4/0xd8
[   19.360734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.360774]  kasan_atomics+0xb8/0x2e0
[   19.361161]  kunit_try_run_case+0x170/0x3f0
[   19.361242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.361324]  kthread+0x328/0x630
[   19.361397]  ret_from_fork+0x10/0x20
[   19.361486] 
[   19.361543] The buggy address belongs to the object at fff00000c79fb480
[   19.361543]  which belongs to the cache kmalloc-64 of size 64
[   19.361825] The buggy address is located 0 bytes to the right of
[   19.361825]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.361953] 
[   19.361975] The buggy address belongs to the physical page:
[   19.362009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.362110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.362451] page_type: f5(slab)
[   19.362529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.362600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.362811] page dumped because: kasan: bad access detected
[   19.362909] 
[   19.362958] Memory state around the buggy address:
[   19.363028]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.363115]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.363183] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.363250]                                      ^
[   19.363307]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.363351]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.363390] ==================================================================
[   19.310971] ==================================================================
[   19.311027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.311077] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.311127] 
[   19.311158] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.311247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.311276] Hardware name: linux,dummy-virt (DT)
[   19.311309] Call trace:
[   19.311333]  show_stack+0x20/0x38 (C)
[   19.311382]  dump_stack_lvl+0x8c/0xd0
[   19.311431]  print_report+0x118/0x5d0
[   19.311479]  kasan_report+0xdc/0x128
[   19.311524]  kasan_check_range+0x100/0x1a8
[   19.311573]  __kasan_check_write+0x20/0x30
[   19.311618]  kasan_atomics_helper+0x1128/0x4858
[   19.311666]  kasan_atomics+0x198/0x2e0
[   19.311711]  kunit_try_run_case+0x170/0x3f0
[   19.315405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.315475]  kthread+0x328/0x630
[   19.315521]  ret_from_fork+0x10/0x20
[   19.315570] 
[   19.315591] Allocated by task 265:
[   19.315622]  kasan_save_stack+0x3c/0x68
[   19.315665]  kasan_save_track+0x20/0x40
[   19.315703]  kasan_save_alloc_info+0x40/0x58
[   19.315745]  __kasan_kmalloc+0xd4/0xd8
[   19.315783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.315824]  kasan_atomics+0xb8/0x2e0
[   19.315874]  kunit_try_run_case+0x170/0x3f0
[   19.315914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.315960]  kthread+0x328/0x630
[   19.315993]  ret_from_fork+0x10/0x20
[   19.316029] 
[   19.316050] The buggy address belongs to the object at fff00000c79fb480
[   19.316050]  which belongs to the cache kmalloc-64 of size 64
[   19.316109] The buggy address is located 0 bytes to the right of
[   19.316109]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.316174] 
[   19.316197] The buggy address belongs to the physical page:
[   19.316230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.316286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.316338] page_type: f5(slab)
[   19.316376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.316428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.316471] page dumped because: kasan: bad access detected
[   19.316506] 
[   19.316526] Memory state around the buggy address:
[   19.316559]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.316604]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.316648] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.316706]                                      ^
[   19.316768]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.316820]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.316873] ==================================================================
[   19.392285] ==================================================================
[   19.392334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.392382] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.392617] 
[   19.392662] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.392747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.392776] Hardware name: linux,dummy-virt (DT)
[   19.392807] Call trace:
[   19.392830]  show_stack+0x20/0x38 (C)
[   19.392894]  dump_stack_lvl+0x8c/0xd0
[   19.392942]  print_report+0x118/0x5d0
[   19.392989]  kasan_report+0xdc/0x128
[   19.393217]  kasan_check_range+0x100/0x1a8
[   19.393397]  __kasan_check_write+0x20/0x30
[   19.393457]  kasan_atomics_helper+0x175c/0x4858
[   19.393551]  kasan_atomics+0x198/0x2e0
[   19.393615]  kunit_try_run_case+0x170/0x3f0
[   19.393670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.393733]  kthread+0x328/0x630
[   19.393780]  ret_from_fork+0x10/0x20
[   19.393829] 
[   19.393849] Allocated by task 265:
[   19.393900]  kasan_save_stack+0x3c/0x68
[   19.393952]  kasan_save_track+0x20/0x40
[   19.393999]  kasan_save_alloc_info+0x40/0x58
[   19.394041]  __kasan_kmalloc+0xd4/0xd8
[   19.394079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.394121]  kasan_atomics+0xb8/0x2e0
[   19.394159]  kunit_try_run_case+0x170/0x3f0
[   19.394208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.394254]  kthread+0x328/0x630
[   19.394288]  ret_from_fork+0x10/0x20
[   19.394324] 
[   19.394344] The buggy address belongs to the object at fff00000c79fb480
[   19.394344]  which belongs to the cache kmalloc-64 of size 64
[   19.394411] The buggy address is located 0 bytes to the right of
[   19.394411]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.394477] 
[   19.394500] The buggy address belongs to the physical page:
[   19.394532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.394591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.394639] page_type: f5(slab)
[   19.394687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.394740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.394790] page dumped because: kasan: bad access detected
[   19.394825] 
[   19.394845] Memory state around the buggy address:
[   19.395314]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.395370]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.395426] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.395750]                                      ^
[   19.396122]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.396377]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.396605] ==================================================================
[   19.382226] ==================================================================
[   19.382370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.382429] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.382497] 
[   19.382543] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.382632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.382663] Hardware name: linux,dummy-virt (DT)
[   19.382702] Call trace:
[   19.382755]  show_stack+0x20/0x38 (C)
[   19.382810]  dump_stack_lvl+0x8c/0xd0
[   19.382895]  print_report+0x118/0x5d0
[   19.383057]  kasan_report+0xdc/0x128
[   19.383104]  kasan_check_range+0x100/0x1a8
[   19.383158]  __kasan_check_write+0x20/0x30
[   19.383204]  kasan_atomics_helper+0x16d0/0x4858
[   19.383429]  kasan_atomics+0x198/0x2e0
[   19.383545]  kunit_try_run_case+0x170/0x3f0
[   19.383616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.383689]  kthread+0x328/0x630
[   19.383734]  ret_from_fork+0x10/0x20
[   19.383789] 
[   19.383831] Allocated by task 265:
[   19.383949]  kasan_save_stack+0x3c/0x68
[   19.384004]  kasan_save_track+0x20/0x40
[   19.384044]  kasan_save_alloc_info+0x40/0x58
[   19.384110]  __kasan_kmalloc+0xd4/0xd8
[   19.384150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.384191]  kasan_atomics+0xb8/0x2e0
[   19.384550]  kunit_try_run_case+0x170/0x3f0
[   19.384715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.384780]  kthread+0x328/0x630
[   19.384844]  ret_from_fork+0x10/0x20
[   19.385277] 
[   19.385518] The buggy address belongs to the object at fff00000c79fb480
[   19.385518]  which belongs to the cache kmalloc-64 of size 64
[   19.385660] The buggy address is located 0 bytes to the right of
[   19.385660]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.385745] 
[   19.385770] The buggy address belongs to the physical page:
[   19.385825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.385893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.385992] page_type: f5(slab)
[   19.386051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.386103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.386146] page dumped because: kasan: bad access detected
[   19.386181] 
[   19.386201] Memory state around the buggy address:
[   19.386234]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.386279]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.386494] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.386594]                                      ^
[   19.386667]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.386748]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.387080] ==================================================================
[   19.354243] ==================================================================
[   19.354296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.354344] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.354395] 
[   19.354427] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.354507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.354536] Hardware name: linux,dummy-virt (DT)
[   19.354570] Call trace:
[   19.354596]  show_stack+0x20/0x38 (C)
[   19.354644]  dump_stack_lvl+0x8c/0xd0
[   19.354691]  print_report+0x118/0x5d0
[   19.354739]  kasan_report+0xdc/0x128
[   19.354785]  kasan_check_range+0x100/0x1a8
[   19.354835]  __kasan_check_write+0x20/0x30
[   19.354895]  kasan_atomics_helper+0x147c/0x4858
[   19.354944]  kasan_atomics+0x198/0x2e0
[   19.354990]  kunit_try_run_case+0x170/0x3f0
[   19.355036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.355089]  kthread+0x328/0x630
[   19.355133]  ret_from_fork+0x10/0x20
[   19.355180] 
[   19.355201] Allocated by task 265:
[   19.355237]  kasan_save_stack+0x3c/0x68
[   19.355278]  kasan_save_track+0x20/0x40
[   19.355318]  kasan_save_alloc_info+0x40/0x58
[   19.355358]  __kasan_kmalloc+0xd4/0xd8
[   19.355397]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.355437]  kasan_atomics+0xb8/0x2e0
[   19.355475]  kunit_try_run_case+0x170/0x3f0
[   19.355513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.355559]  kthread+0x328/0x630
[   19.355592]  ret_from_fork+0x10/0x20
[   19.355630] 
[   19.355651] The buggy address belongs to the object at fff00000c79fb480
[   19.355651]  which belongs to the cache kmalloc-64 of size 64
[   19.355710] The buggy address is located 0 bytes to the right of
[   19.355710]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.355776] 
[   19.355797] The buggy address belongs to the physical page:
[   19.355830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.355892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.355939] page_type: f5(slab)
[   19.355978] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.356041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.356085] page dumped because: kasan: bad access detected
[   19.356126] 
[   19.356156] Memory state around the buggy address:
[   19.356188]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.356233]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.356277] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.356317]                                      ^
[   19.356349]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.356392]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.356430] ==================================================================
[   19.329373] ==================================================================
[   19.329428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.329521] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.329589] 
[   19.329624] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.329720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.329757] Hardware name: linux,dummy-virt (DT)
[   19.329790] Call trace:
[   19.329831]  show_stack+0x20/0x38 (C)
[   19.330105]  dump_stack_lvl+0x8c/0xd0
[   19.330180]  print_report+0x118/0x5d0
[   19.330234]  kasan_report+0xdc/0x128
[   19.330291]  kasan_check_range+0x100/0x1a8
[   19.330357]  __kasan_check_write+0x20/0x30
[   19.330413]  kasan_atomics_helper+0x126c/0x4858
[   19.330468]  kasan_atomics+0x198/0x2e0
[   19.330534]  kunit_try_run_case+0x170/0x3f0
[   19.330590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.330643]  kthread+0x328/0x630
[   19.330710]  ret_from_fork+0x10/0x20
[   19.330777] 
[   19.330805] Allocated by task 265:
[   19.330843]  kasan_save_stack+0x3c/0x68
[   19.330908]  kasan_save_track+0x20/0x40
[   19.330947]  kasan_save_alloc_info+0x40/0x58
[   19.330989]  __kasan_kmalloc+0xd4/0xd8
[   19.331026]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.331068]  kasan_atomics+0xb8/0x2e0
[   19.331104]  kunit_try_run_case+0x170/0x3f0
[   19.331144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.331187]  kthread+0x328/0x630
[   19.331331]  ret_from_fork+0x10/0x20
[   19.331403] 
[   19.331429] The buggy address belongs to the object at fff00000c79fb480
[   19.331429]  which belongs to the cache kmalloc-64 of size 64
[   19.331496] The buggy address is located 0 bytes to the right of
[   19.331496]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.331571] 
[   19.331595] The buggy address belongs to the physical page:
[   19.331633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.331687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.331737] page_type: f5(slab)
[   19.331776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.331846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.331912] page dumped because: kasan: bad access detected
[   19.332065] 
[   19.332105] Memory state around the buggy address:
[   19.332191]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.332246]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.332292] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.332334]                                      ^
[   19.332370]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.332412]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.332452] ==================================================================
[   19.387431] ==================================================================
[   19.387480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.387531] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.387686] 
[   19.387763] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.388106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.388161] Hardware name: linux,dummy-virt (DT)
[   19.388202] Call trace:
[   19.388246]  show_stack+0x20/0x38 (C)
[   19.388300]  dump_stack_lvl+0x8c/0xd0
[   19.388362]  print_report+0x118/0x5d0
[   19.388420]  kasan_report+0xdc/0x128
[   19.388467]  __asan_report_load8_noabort+0x20/0x30
[   19.388519]  kasan_atomics_helper+0x3e10/0x4858
[   19.388596]  kasan_atomics+0x198/0x2e0
[   19.388646]  kunit_try_run_case+0x170/0x3f0
[   19.388694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.388748]  kthread+0x328/0x630
[   19.388817]  ret_from_fork+0x10/0x20
[   19.389074] 
[   19.389114] Allocated by task 265:
[   19.389175]  kasan_save_stack+0x3c/0x68
[   19.389303]  kasan_save_track+0x20/0x40
[   19.389377]  kasan_save_alloc_info+0x40/0x58
[   19.389430]  __kasan_kmalloc+0xd4/0xd8
[   19.389486]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.389810]  kasan_atomics+0xb8/0x2e0
[   19.389890]  kunit_try_run_case+0x170/0x3f0
[   19.390006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.390097]  kthread+0x328/0x630
[   19.390160]  ret_from_fork+0x10/0x20
[   19.390278] 
[   19.390321] The buggy address belongs to the object at fff00000c79fb480
[   19.390321]  which belongs to the cache kmalloc-64 of size 64
[   19.390399] The buggy address is located 0 bytes to the right of
[   19.390399]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.390485] 
[   19.390509] The buggy address belongs to the physical page:
[   19.390541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.390839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.391025] page_type: f5(slab)
[   19.391110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.391307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.391480] page dumped because: kasan: bad access detected
[   19.391544] 
[   19.391593] Memory state around the buggy address:
[   19.391722]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.391815]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.391870] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.391910]                                      ^
[   19.391973]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.392019]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.392058] ==================================================================
[   19.396800] ==================================================================
[   19.396893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.396945] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.397210] 
[   19.397287] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.397433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.397468] Hardware name: linux,dummy-virt (DT)
[   19.397526] Call trace:
[   19.397551]  show_stack+0x20/0x38 (C)
[   19.397604]  dump_stack_lvl+0x8c/0xd0
[   19.397918]  print_report+0x118/0x5d0
[   19.397995]  kasan_report+0xdc/0x128
[   19.398051]  __asan_report_load8_noabort+0x20/0x30
[   19.398103]  kasan_atomics_helper+0x3e20/0x4858
[   19.398226]  kasan_atomics+0x198/0x2e0
[   19.398311]  kunit_try_run_case+0x170/0x3f0
[   19.398367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.398439]  kthread+0x328/0x630
[   19.398524]  ret_from_fork+0x10/0x20
[   19.398579] 
[   19.398608] Allocated by task 265:
[   19.398647]  kasan_save_stack+0x3c/0x68
[   19.398689]  kasan_save_track+0x20/0x40
[   19.398728]  kasan_save_alloc_info+0x40/0x58
[   19.398928]  __kasan_kmalloc+0xd4/0xd8
[   19.398972]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.399099]  kasan_atomics+0xb8/0x2e0
[   19.399158]  kunit_try_run_case+0x170/0x3f0
[   19.399227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.399381]  kthread+0x328/0x630
[   19.399418]  ret_from_fork+0x10/0x20
[   19.399456] 
[   19.399584] The buggy address belongs to the object at fff00000c79fb480
[   19.399584]  which belongs to the cache kmalloc-64 of size 64
[   19.399679] The buggy address is located 0 bytes to the right of
[   19.399679]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.399890] 
[   19.399935] The buggy address belongs to the physical page:
[   19.400002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.400143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.400232] page_type: f5(slab)
[   19.400306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.400444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.400488] page dumped because: kasan: bad access detected
[   19.400523] 
[   19.400542] Memory state around the buggy address:
[   19.400576]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.400623]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.400668] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.401039]                                      ^
[   19.401175]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.401250]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.401293] ==================================================================
[   19.244803] ==================================================================
[   19.244856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.244926] Read of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.244977] 
[   19.245009] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.245091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.245118] Hardware name: linux,dummy-virt (DT)
[   19.245151] Call trace:
[   19.245174]  show_stack+0x20/0x38 (C)
[   19.245223]  dump_stack_lvl+0x8c/0xd0
[   19.245271]  print_report+0x118/0x5d0
[   19.245318]  kasan_report+0xdc/0x128
[   19.245364]  __asan_report_load4_noabort+0x20/0x30
[   19.245417]  kasan_atomics_helper+0x3dd8/0x4858
[   19.245465]  kasan_atomics+0x198/0x2e0
[   19.245510]  kunit_try_run_case+0x170/0x3f0
[   19.245558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.245612]  kthread+0x328/0x630
[   19.245656]  ret_from_fork+0x10/0x20
[   19.245705] 
[   19.245725] Allocated by task 265:
[   19.245755]  kasan_save_stack+0x3c/0x68
[   19.245796]  kasan_save_track+0x20/0x40
[   19.245837]  kasan_save_alloc_info+0x40/0x58
[   19.245892]  __kasan_kmalloc+0xd4/0xd8
[   19.245932]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.245973]  kasan_atomics+0xb8/0x2e0
[   19.246022]  kunit_try_run_case+0x170/0x3f0
[   19.246062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.246113]  kthread+0x328/0x630
[   19.246148]  ret_from_fork+0x10/0x20
[   19.246187] 
[   19.246207] The buggy address belongs to the object at fff00000c79fb480
[   19.246207]  which belongs to the cache kmalloc-64 of size 64
[   19.246265] The buggy address is located 0 bytes to the right of
[   19.246265]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.246330] 
[   19.246351] The buggy address belongs to the physical page:
[   19.246395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.246456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.246506] page_type: f5(slab)
[   19.246543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.246594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.246644] page dumped because: kasan: bad access detected
[   19.246678] 
[   19.246697] Memory state around the buggy address:
[   19.246729]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.246779]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.246825] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.246880]                                      ^
[   19.246913]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.246956]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.246997] ==================================================================
[   19.285654] ==================================================================
[   19.285731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.285784] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.285911] 
[   19.285946] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.286110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.286140] Hardware name: linux,dummy-virt (DT)
[   19.286269] Call trace:
[   19.286324]  show_stack+0x20/0x38 (C)
[   19.286422]  dump_stack_lvl+0x8c/0xd0
[   19.286499]  print_report+0x118/0x5d0
[   19.286571]  kasan_report+0xdc/0x128
[   19.286650]  kasan_check_range+0x100/0x1a8
[   19.286726]  __kasan_check_write+0x20/0x30
[   19.286771]  kasan_atomics_helper+0xf20/0x4858
[   19.286832]  kasan_atomics+0x198/0x2e0
[   19.286927]  kunit_try_run_case+0x170/0x3f0
[   19.286977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.287029]  kthread+0x328/0x630
[   19.287164]  ret_from_fork+0x10/0x20
[   19.287211] 
[   19.287374] Allocated by task 265:
[   19.287443]  kasan_save_stack+0x3c/0x68
[   19.287506]  kasan_save_track+0x20/0x40
[   19.287547]  kasan_save_alloc_info+0x40/0x58
[   19.287588]  __kasan_kmalloc+0xd4/0xd8
[   19.287627]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.287669]  kasan_atomics+0xb8/0x2e0
[   19.287716]  kunit_try_run_case+0x170/0x3f0
[   19.287792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.287838]  kthread+0x328/0x630
[   19.288024]  ret_from_fork+0x10/0x20
[   19.288123] 
[   19.288158] The buggy address belongs to the object at fff00000c79fb480
[   19.288158]  which belongs to the cache kmalloc-64 of size 64
[   19.288282] The buggy address is located 0 bytes to the right of
[   19.288282]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.288399] 
[   19.288421] The buggy address belongs to the physical page:
[   19.288455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.288653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.288705] page_type: f5(slab)
[   19.288745] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.289022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.289149] page dumped because: kasan: bad access detected
[   19.289266] 
[   19.289336] Memory state around the buggy address:
[   19.292180]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.292252]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.292296] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.292336]                                      ^
[   19.292371]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.292415]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.292455] ==================================================================
[   19.258822] ==================================================================
[   19.258942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.258996] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.259079] 
[   19.259114] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.259196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.259254] Hardware name: linux,dummy-virt (DT)
[   19.259289] Call trace:
[   19.259341]  show_stack+0x20/0x38 (C)
[   19.259392]  dump_stack_lvl+0x8c/0xd0
[   19.259439]  print_report+0x118/0x5d0
[   19.259486]  kasan_report+0xdc/0x128
[   19.259531]  kasan_check_range+0x100/0x1a8
[   19.259700]  __kasan_check_read+0x20/0x30
[   19.259830]  kasan_atomics_helper+0xdd4/0x4858
[   19.259960]  kasan_atomics+0x198/0x2e0
[   19.260040]  kunit_try_run_case+0x170/0x3f0
[   19.260225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.260337]  kthread+0x328/0x630
[   19.260405]  ret_from_fork+0x10/0x20
[   19.260588] 
[   19.260648] Allocated by task 265:
[   19.261034]  kasan_save_stack+0x3c/0x68
[   19.261136]  kasan_save_track+0x20/0x40
[   19.261225]  kasan_save_alloc_info+0x40/0x58
[   19.261311]  __kasan_kmalloc+0xd4/0xd8
[   19.261402]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.261475]  kasan_atomics+0xb8/0x2e0
[   19.261513]  kunit_try_run_case+0x170/0x3f0
[   19.261577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.261625]  kthread+0x328/0x630
[   19.261694]  ret_from_fork+0x10/0x20
[   19.261733] 
[   19.261755] The buggy address belongs to the object at fff00000c79fb480
[   19.261755]  which belongs to the cache kmalloc-64 of size 64
[   19.261816] The buggy address is located 0 bytes to the right of
[   19.261816]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.261894] 
[   19.261918] The buggy address belongs to the physical page:
[   19.262074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.262210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.262325] page_type: f5(slab)
[   19.262575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.262700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.262821] page dumped because: kasan: bad access detected
[   19.262914] 
[   19.263036] Memory state around the buggy address:
[   19.263072]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.263117]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.266228] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.266280]                                      ^
[   19.266318]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.266362]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.266402] ==================================================================
[   19.266901] ==================================================================
[   19.266956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.267009] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.267059] 
[   19.267092] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.267174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.267201] Hardware name: linux,dummy-virt (DT)
[   19.267243] Call trace:
[   19.267266]  show_stack+0x20/0x38 (C)
[   19.267316]  dump_stack_lvl+0x8c/0xd0
[   19.267364]  print_report+0x118/0x5d0
[   19.267412]  kasan_report+0xdc/0x128
[   19.267457]  __asan_report_load8_noabort+0x20/0x30
[   19.267537]  kasan_atomics_helper+0x3f58/0x4858
[   19.267588]  kasan_atomics+0x198/0x2e0
[   19.267949]  kunit_try_run_case+0x170/0x3f0
[   19.268053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.268199]  kthread+0x328/0x630
[   19.268253]  ret_from_fork+0x10/0x20
[   19.268312] 
[   19.268334] Allocated by task 265:
[   19.268365]  kasan_save_stack+0x3c/0x68
[   19.268407]  kasan_save_track+0x20/0x40
[   19.268585]  kasan_save_alloc_info+0x40/0x58
[   19.268637]  __kasan_kmalloc+0xd4/0xd8
[   19.268676]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.268800]  kasan_atomics+0xb8/0x2e0
[   19.268882]  kunit_try_run_case+0x170/0x3f0
[   19.268976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.269170]  kthread+0x328/0x630
[   19.269464]  ret_from_fork+0x10/0x20
[   19.269562] 
[   19.269612] The buggy address belongs to the object at fff00000c79fb480
[   19.269612]  which belongs to the cache kmalloc-64 of size 64
[   19.269712] The buggy address is located 0 bytes to the right of
[   19.269712]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.269791] 
[   19.269815] The buggy address belongs to the physical page:
[   19.269848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.270183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.270393] page_type: f5(slab)
[   19.270435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.270488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.270745] page dumped because: kasan: bad access detected
[   19.270823] 
[   19.270991] Memory state around the buggy address:
[   19.271057]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.271101]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.271147] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.271786]                                      ^
[   19.271832]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.271892]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.271933] ==================================================================
[   19.272543] ==================================================================
[   19.272599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.272651] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.272701] 
[   19.272735] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.272815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.272844] Hardware name: linux,dummy-virt (DT)
[   19.272894] Call trace:
[   19.272918]  show_stack+0x20/0x38 (C)
[   19.272966]  dump_stack_lvl+0x8c/0xd0
[   19.273014]  print_report+0x118/0x5d0
[   19.273061]  kasan_report+0xdc/0x128
[   19.273106]  kasan_check_range+0x100/0x1a8
[   19.273155]  __kasan_check_write+0x20/0x30
[   19.273203]  kasan_atomics_helper+0xe44/0x4858
[   19.273254]  kasan_atomics+0x198/0x2e0
[   19.273298]  kunit_try_run_case+0x170/0x3f0
[   19.273346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.273397]  kthread+0x328/0x630
[   19.273441]  ret_from_fork+0x10/0x20
[   19.273488] 
[   19.273508] Allocated by task 265:
[   19.273537]  kasan_save_stack+0x3c/0x68
[   19.273579]  kasan_save_track+0x20/0x40
[   19.273618]  kasan_save_alloc_info+0x40/0x58
[   19.273661]  __kasan_kmalloc+0xd4/0xd8
[   19.273699]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.273741]  kasan_atomics+0xb8/0x2e0
[   19.273778]  kunit_try_run_case+0x170/0x3f0
[   19.273817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.275767]  kthread+0x328/0x630
[   19.275819]  ret_from_fork+0x10/0x20
[   19.275870] 
[   19.275893] The buggy address belongs to the object at fff00000c79fb480
[   19.275893]  which belongs to the cache kmalloc-64 of size 64
[   19.275954] The buggy address is located 0 bytes to the right of
[   19.275954]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.276020] 
[   19.276042] The buggy address belongs to the physical page:
[   19.276078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.276135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.276186] page_type: f5(slab)
[   19.276227] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.276278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.276321] page dumped because: kasan: bad access detected
[   19.276355] 
[   19.276375] Memory state around the buggy address:
[   19.276408]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.276451]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.276496] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.276536]                                      ^
[   19.276570]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.276612]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.276652] ==================================================================
[   19.301325] ==================================================================
[   19.301402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.301455] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.301548] 
[   19.301611] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.301732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.301763] Hardware name: linux,dummy-virt (DT)
[   19.301845] Call trace:
[   19.301902]  show_stack+0x20/0x38 (C)
[   19.301953]  dump_stack_lvl+0x8c/0xd0
[   19.302002]  print_report+0x118/0x5d0
[   19.302242]  kasan_report+0xdc/0x128
[   19.302302]  kasan_check_range+0x100/0x1a8
[   19.302408]  __kasan_check_write+0x20/0x30
[   19.302484]  kasan_atomics_helper+0x1058/0x4858
[   19.302536]  kasan_atomics+0x198/0x2e0
[   19.302611]  kunit_try_run_case+0x170/0x3f0
[   19.302660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.302880]  kthread+0x328/0x630
[   19.302959]  ret_from_fork+0x10/0x20
[   19.303038] 
[   19.303096] Allocated by task 265:
[   19.303154]  kasan_save_stack+0x3c/0x68
[   19.303227]  kasan_save_track+0x20/0x40
[   19.303292]  kasan_save_alloc_info+0x40/0x58
[   19.303335]  __kasan_kmalloc+0xd4/0xd8
[   19.303372]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.303460]  kasan_atomics+0xb8/0x2e0
[   19.303568]  kunit_try_run_case+0x170/0x3f0
[   19.303608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.303655]  kthread+0x328/0x630
[   19.303689]  ret_from_fork+0x10/0x20
[   19.304221] 
[   19.304736] The buggy address belongs to the object at fff00000c79fb480
[   19.304736]  which belongs to the cache kmalloc-64 of size 64
[   19.304800] The buggy address is located 0 bytes to the right of
[   19.304800]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.304878] 
[   19.304902] The buggy address belongs to the physical page:
[   19.304934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.304990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.305040] page_type: f5(slab)
[   19.305080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.305132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.305174] page dumped because: kasan: bad access detected
[   19.305207] 
[   19.305229] Memory state around the buggy address:
[   19.305262]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.305305]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.305350] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.305389]                                      ^
[   19.305422]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.305466]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.305506] ==================================================================
[   19.349471] ==================================================================
[   19.349751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.349844] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.349906] 
[   19.349965] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.350046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.350079] Hardware name: linux,dummy-virt (DT)
[   19.350125] Call trace:
[   19.350151]  show_stack+0x20/0x38 (C)
[   19.350212]  dump_stack_lvl+0x8c/0xd0
[   19.350338]  print_report+0x118/0x5d0
[   19.350515]  kasan_report+0xdc/0x128
[   19.350592]  kasan_check_range+0x100/0x1a8
[   19.350646]  __kasan_check_write+0x20/0x30
[   19.350693]  kasan_atomics_helper+0x1414/0x4858
[   19.350740]  kasan_atomics+0x198/0x2e0
[   19.350826]  kunit_try_run_case+0x170/0x3f0
[   19.350884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.350937]  kthread+0x328/0x630
[   19.350985]  ret_from_fork+0x10/0x20
[   19.351050] 
[   19.351078] Allocated by task 265:
[   19.351115]  kasan_save_stack+0x3c/0x68
[   19.351158]  kasan_save_track+0x20/0x40
[   19.351216]  kasan_save_alloc_info+0x40/0x58
[   19.351259]  __kasan_kmalloc+0xd4/0xd8
[   19.351297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.351354]  kasan_atomics+0xb8/0x2e0
[   19.351399]  kunit_try_run_case+0x170/0x3f0
[   19.351455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.351499]  kthread+0x328/0x630
[   19.351534]  ret_from_fork+0x10/0x20
[   19.351570] 
[   19.351592] The buggy address belongs to the object at fff00000c79fb480
[   19.351592]  which belongs to the cache kmalloc-64 of size 64
[   19.351649] The buggy address is located 0 bytes to the right of
[   19.351649]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.351912] 
[   19.351950] The buggy address belongs to the physical page:
[   19.352194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.352941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.353020] page_type: f5(slab)
[   19.353087] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.353422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.353468] page dumped because: kasan: bad access detected
[   19.353501] 
[   19.353536] Memory state around the buggy address:
[   19.353573]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.353618]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.353694] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.353777]                                      ^
[   19.353836]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.353888]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.353948] ==================================================================
[   19.280894] ==================================================================
[   19.280948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.280998] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.281049] 
[   19.281081] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.281162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.281189] Hardware name: linux,dummy-virt (DT)
[   19.281222] Call trace:
[   19.281245]  show_stack+0x20/0x38 (C)
[   19.281292]  dump_stack_lvl+0x8c/0xd0
[   19.281339]  print_report+0x118/0x5d0
[   19.281455]  kasan_report+0xdc/0x128
[   19.281566]  kasan_check_range+0x100/0x1a8
[   19.281623]  __kasan_check_write+0x20/0x30
[   19.281724]  kasan_atomics_helper+0xeb8/0x4858
[   19.281778]  kasan_atomics+0x198/0x2e0
[   19.281914]  kunit_try_run_case+0x170/0x3f0
[   19.282019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.282106]  kthread+0x328/0x630
[   19.282154]  ret_from_fork+0x10/0x20
[   19.282265] 
[   19.282397] Allocated by task 265:
[   19.282426]  kasan_save_stack+0x3c/0x68
[   19.282469]  kasan_save_track+0x20/0x40
[   19.282625]  kasan_save_alloc_info+0x40/0x58
[   19.282680]  __kasan_kmalloc+0xd4/0xd8
[   19.282776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.282819]  kasan_atomics+0xb8/0x2e0
[   19.282888]  kunit_try_run_case+0x170/0x3f0
[   19.282929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.282974]  kthread+0x328/0x630
[   19.283009]  ret_from_fork+0x10/0x20
[   19.283083] 
[   19.283209] The buggy address belongs to the object at fff00000c79fb480
[   19.283209]  which belongs to the cache kmalloc-64 of size 64
[   19.283273] The buggy address is located 0 bytes to the right of
[   19.283273]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.283338] 
[   19.283487] The buggy address belongs to the physical page:
[   19.283547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.283603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.283651] page_type: f5(slab)
[   19.283691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.283947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.284083] page dumped because: kasan: bad access detected
[   19.284173] 
[   19.284297] Memory state around the buggy address:
[   19.284383]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.284476]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.284599] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.284820]                                      ^
[   19.284958]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.285061]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.285112] ==================================================================
[   19.356536] ==================================================================
[   19.356587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.356632] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.356684] 
[   19.356712] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.356790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.356839] Hardware name: linux,dummy-virt (DT)
[   19.356883] Call trace:
[   19.356906]  show_stack+0x20/0x38 (C)
[   19.356954]  dump_stack_lvl+0x8c/0xd0
[   19.357009]  print_report+0x118/0x5d0
[   19.357056]  kasan_report+0xdc/0x128
[   19.357106]  kasan_check_range+0x100/0x1a8
[   19.357155]  __kasan_check_write+0x20/0x30
[   19.357199]  kasan_atomics_helper+0x14e4/0x4858
[   19.357250]  kasan_atomics+0x198/0x2e0
[   19.357296]  kunit_try_run_case+0x170/0x3f0
[   19.357342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.357394]  kthread+0x328/0x630
[   19.357437]  ret_from_fork+0x10/0x20
[   19.357482] 
[   19.357526] Allocated by task 265:
[   19.357565]  kasan_save_stack+0x3c/0x68
[   19.357606]  kasan_save_track+0x20/0x40
[   19.357653]  kasan_save_alloc_info+0x40/0x58
[   19.357694]  __kasan_kmalloc+0xd4/0xd8
[   19.357733]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.357774]  kasan_atomics+0xb8/0x2e0
[   19.357813]  kunit_try_run_case+0x170/0x3f0
[   19.357851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.357915]  kthread+0x328/0x630
[   19.357949]  ret_from_fork+0x10/0x20
[   19.357987] 
[   19.358009] The buggy address belongs to the object at fff00000c79fb480
[   19.358009]  which belongs to the cache kmalloc-64 of size 64
[   19.358068] The buggy address is located 0 bytes to the right of
[   19.358068]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.358132] 
[   19.358153] The buggy address belongs to the physical page:
[   19.358186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.358237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.358284] page_type: f5(slab)
[   19.358322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.358375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.358417] page dumped because: kasan: bad access detected
[   19.358450] 
[   19.358472] Memory state around the buggy address:
[   19.358504]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.358549]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.358593] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.358634]                                      ^
[   19.358666]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.358710]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.358748] ==================================================================
[   19.375919] ==================================================================
[   19.376054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.376140] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.376267] 
[   19.377247] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.377434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.377467] Hardware name: linux,dummy-virt (DT)
[   19.377619] Call trace:
[   19.377648]  show_stack+0x20/0x38 (C)
[   19.377701]  dump_stack_lvl+0x8c/0xd0
[   19.377776]  print_report+0x118/0x5d0
[   19.377823]  kasan_report+0xdc/0x128
[   19.377882]  __asan_report_load8_noabort+0x20/0x30
[   19.377933]  kasan_atomics_helper+0x3df4/0x4858
[   19.377983]  kasan_atomics+0x198/0x2e0
[   19.378054]  kunit_try_run_case+0x170/0x3f0
[   19.378123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.378177]  kthread+0x328/0x630
[   19.378222]  ret_from_fork+0x10/0x20
[   19.378364] 
[   19.378422] Allocated by task 265:
[   19.378502]  kasan_save_stack+0x3c/0x68
[   19.378743]  kasan_save_track+0x20/0x40
[   19.378848]  kasan_save_alloc_info+0x40/0x58
[   19.378997]  __kasan_kmalloc+0xd4/0xd8
[   19.379064]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.379127]  kasan_atomics+0xb8/0x2e0
[   19.379245]  kunit_try_run_case+0x170/0x3f0
[   19.379334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.379398]  kthread+0x328/0x630
[   19.379490]  ret_from_fork+0x10/0x20
[   19.379556] 
[   19.379634] The buggy address belongs to the object at fff00000c79fb480
[   19.379634]  which belongs to the cache kmalloc-64 of size 64
[   19.379793] The buggy address is located 0 bytes to the right of
[   19.379793]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.379871] 
[   19.379986] The buggy address belongs to the physical page:
[   19.380061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.380186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.380274] page_type: f5(slab)
[   19.380383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.380459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.380553] page dumped because: kasan: bad access detected
[   19.380886] 
[   19.380938] Memory state around the buggy address:
[   19.381015]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.381087]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.381132] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.381191]                                      ^
[   19.381227]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.381573]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.381629] ==================================================================
[   19.186538] ==================================================================
[   19.186657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.186711] Write of size 4 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.186762] 
[   19.186795] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.186951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.186983] Hardware name: linux,dummy-virt (DT)
[   19.187015] Call trace:
[   19.187405]  show_stack+0x20/0x38 (C)
[   19.187458]  dump_stack_lvl+0x8c/0xd0
[   19.187525]  print_report+0x118/0x5d0
[   19.187580]  kasan_report+0xdc/0x128
[   19.187638]  kasan_check_range+0x100/0x1a8
[   19.187705]  __kasan_check_write+0x20/0x30
[   19.187761]  kasan_atomics_helper+0xa6c/0x4858
[   19.187812]  kasan_atomics+0x198/0x2e0
[   19.187859]  kunit_try_run_case+0x170/0x3f0
[   19.187917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.187971]  kthread+0x328/0x630
[   19.188015]  ret_from_fork+0x10/0x20
[   19.188063] 
[   19.188083] Allocated by task 265:
[   19.188113]  kasan_save_stack+0x3c/0x68
[   19.188155]  kasan_save_track+0x20/0x40
[   19.188194]  kasan_save_alloc_info+0x40/0x58
[   19.188250]  __kasan_kmalloc+0xd4/0xd8
[   19.188289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.188332]  kasan_atomics+0xb8/0x2e0
[   19.188368]  kunit_try_run_case+0x170/0x3f0
[   19.188447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.188541]  kthread+0x328/0x630
[   19.188760]  ret_from_fork+0x10/0x20
[   19.188798] 
[   19.188939] The buggy address belongs to the object at fff00000c79fb480
[   19.188939]  which belongs to the cache kmalloc-64 of size 64
[   19.189393] The buggy address is located 0 bytes to the right of
[   19.189393]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.189518] 
[   19.189669] The buggy address belongs to the physical page:
[   19.189702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.189921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.190034] page_type: f5(slab)
[   19.190593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.191460]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.194810] Allocated by task 265:
[   19.194840]  kasan_save_stack+0x3c/0x68
[   19.194895]  kasan_save_track+0x20/0x40
[   19.195195]  kasan_save_alloc_info+0x40/0x58
[   19.195355]  __kasan_kmalloc+0xd4/0xd8
[   19.196689]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.196749]  kasan_atomics+0xb8/0x2e0
[   19.196789]  kunit_try_run_case+0x170/0x3f0
[   19.196830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.198011] The buggy address is located 0 bytes to the right of
[   19.198011]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.202325] Call trace:
[   19.204898]  kasan_save_track+0x20/0x40
[   19.206773] 
[   19.207934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.210122]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.213076]  kasan_save_track+0x20/0x40
[   19.213116]  kasan_save_alloc_info+0x40/0x58
[   19.213358]  __kasan_kmalloc+0xd4/0xd8
[   19.213407]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.213458]  kasan_atomics+0xb8/0x2e0
[   19.219499]  kthread+0x328/0x630
[   19.219720]  kasan_save_alloc_info+0x40/0x58
[   19.219770]  __kasan_kmalloc+0xd4/0xd8
[   19.219807]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.219979]  kthread+0x328/0x630
[   19.220194] 
[   19.220437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.222034]  kasan_check_range+0x100/0x1a8
[   19.222718]  __kasan_kmalloc+0xd4/0xd8
[   19.223501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.225013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.228971]  kasan_atomics+0xb8/0x2e0
[   19.232622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.236993] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.237275] ==================================================================
[   19.372571] ==================================================================
[   19.372750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.372814] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.372881] 
[   19.373139] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.373242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.373314] Hardware name: linux,dummy-virt (DT)
[   19.373382] Call trace:
[   19.373409]  show_stack+0x20/0x38 (C)
[   19.373471]  dump_stack_lvl+0x8c/0xd0
[   19.373563]  print_report+0x118/0x5d0
[   19.373611]  kasan_report+0xdc/0x128
[   19.373658]  kasan_check_range+0x100/0x1a8
[   19.373725]  __kasan_check_write+0x20/0x30
[   19.373772]  kasan_atomics_helper+0x1644/0x4858
[   19.373820]  kasan_atomics+0x198/0x2e0
[   19.373878]  kunit_try_run_case+0x170/0x3f0
[   19.373926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.373978]  kthread+0x328/0x630
[   19.374020]  ret_from_fork+0x10/0x20
[   19.374084] 
[   19.374113] Allocated by task 265:
[   19.374143]  kasan_save_stack+0x3c/0x68
[   19.374188]  kasan_save_track+0x20/0x40
[   19.374226]  kasan_save_alloc_info+0x40/0x58
[   19.374283]  __kasan_kmalloc+0xd4/0xd8
[   19.374323]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.374363]  kasan_atomics+0xb8/0x2e0
[   19.374414]  kunit_try_run_case+0x170/0x3f0
[   19.374456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.374499]  kthread+0x328/0x630
[   19.374534]  ret_from_fork+0x10/0x20
[   19.374579] 
[   19.374601] The buggy address belongs to the object at fff00000c79fb480
[   19.374601]  which belongs to the cache kmalloc-64 of size 64
[   19.374659] The buggy address is located 0 bytes to the right of
[   19.374659]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.374724] 
[   19.374747] The buggy address belongs to the physical page:
[   19.374779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.374832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.374890] page_type: f5(slab)
[   19.374930] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.374982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.375024] page dumped because: kasan: bad access detected
[   19.375057] 
[   19.375078] Memory state around the buggy address:
[   19.375111]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.375419]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.375479] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.375522]                                      ^
[   19.375558]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.375626]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.375666] ==================================================================
[   19.324563] ==================================================================
[   19.324613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.324663] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.324713] 
[   19.324748] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.324829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.324856] Hardware name: linux,dummy-virt (DT)
[   19.324904] Call trace:
[   19.324929]  show_stack+0x20/0x38 (C)
[   19.324978]  dump_stack_lvl+0x8c/0xd0
[   19.325027]  print_report+0x118/0x5d0
[   19.325123]  kasan_report+0xdc/0x128
[   19.325170]  kasan_check_range+0x100/0x1a8
[   19.325229]  __kasan_check_write+0x20/0x30
[   19.325275]  kasan_atomics_helper+0x11f8/0x4858
[   19.325358]  kasan_atomics+0x198/0x2e0
[   19.325423]  kunit_try_run_case+0x170/0x3f0
[   19.325542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.325724]  kthread+0x328/0x630
[   19.325823]  ret_from_fork+0x10/0x20
[   19.325891] 
[   19.325941] Allocated by task 265:
[   19.325988]  kasan_save_stack+0x3c/0x68
[   19.326043]  kasan_save_track+0x20/0x40
[   19.326090]  kasan_save_alloc_info+0x40/0x58
[   19.326133]  __kasan_kmalloc+0xd4/0xd8
[   19.326171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.326213]  kasan_atomics+0xb8/0x2e0
[   19.326249]  kunit_try_run_case+0x170/0x3f0
[   19.326290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.326333]  kthread+0x328/0x630
[   19.326383]  ret_from_fork+0x10/0x20
[   19.326420] 
[   19.326442] The buggy address belongs to the object at fff00000c79fb480
[   19.326442]  which belongs to the cache kmalloc-64 of size 64
[   19.326500] The buggy address is located 0 bytes to the right of
[   19.326500]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.326565] 
[   19.326588] The buggy address belongs to the physical page:
[   19.326620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.326674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.326722] page_type: f5(slab)
[   19.326762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.326826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.327336] page dumped because: kasan: bad access detected
[   19.327380] 
[   19.327402] Memory state around the buggy address:
[   19.327436]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.327482]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.327526] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.327742]                                      ^
[   19.327852]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.328093]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.328753] ==================================================================
[   19.317416] ==================================================================
[   19.317472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.317778] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.317831] 
[   19.318186] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.320162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.320192] Hardware name: linux,dummy-virt (DT)
[   19.320225] Call trace:
[   19.320249]  show_stack+0x20/0x38 (C)
[   19.320303]  dump_stack_lvl+0x8c/0xd0
[   19.320354]  print_report+0x118/0x5d0
[   19.320402]  kasan_report+0xdc/0x128
[   19.320448]  kasan_check_range+0x100/0x1a8
[   19.320497]  __kasan_check_write+0x20/0x30
[   19.320542]  kasan_atomics_helper+0x1190/0x4858
[   19.320591]  kasan_atomics+0x198/0x2e0
[   19.320637]  kunit_try_run_case+0x170/0x3f0
[   19.320686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.320739]  kthread+0x328/0x630
[   19.320783]  ret_from_fork+0x10/0x20
[   19.320830] 
[   19.320850] Allocated by task 265:
[   19.320893]  kasan_save_stack+0x3c/0x68
[   19.320935]  kasan_save_track+0x20/0x40
[   19.320974]  kasan_save_alloc_info+0x40/0x58
[   19.321014]  __kasan_kmalloc+0xd4/0xd8
[   19.321053]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.321092]  kasan_atomics+0xb8/0x2e0
[   19.321131]  kunit_try_run_case+0x170/0x3f0
[   19.321170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.321215]  kthread+0x328/0x630
[   19.321248]  ret_from_fork+0x10/0x20
[   19.321286] 
[   19.321307] The buggy address belongs to the object at fff00000c79fb480
[   19.321307]  which belongs to the cache kmalloc-64 of size 64
[   19.321365] The buggy address is located 0 bytes to the right of
[   19.321365]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.321429] 
[   19.321454] The buggy address belongs to the physical page:
[   19.321487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.321540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.321589] page_type: f5(slab)
[   19.321629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.321681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.321723] page dumped because: kasan: bad access detected
[   19.321756] 
[   19.321777] Memory state around the buggy address:
[   19.321810]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.321857]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.324171] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.324215]                                      ^
[   19.324253]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324296]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324335] ==================================================================
[   19.367921] ==================================================================
[   19.368061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.368175] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.368461] 
[   19.368542] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.368625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.368655] Hardware name: linux,dummy-virt (DT)
[   19.368689] Call trace:
[   19.368712]  show_stack+0x20/0x38 (C)
[   19.368997]  dump_stack_lvl+0x8c/0xd0
[   19.369081]  print_report+0x118/0x5d0
[   19.369131]  kasan_report+0xdc/0x128
[   19.369177]  __asan_report_load8_noabort+0x20/0x30
[   19.369230]  kasan_atomics_helper+0x3db0/0x4858
[   19.369278]  kasan_atomics+0x198/0x2e0
[   19.369392]  kunit_try_run_case+0x170/0x3f0
[   19.369460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.369553]  kthread+0x328/0x630
[   19.369801]  ret_from_fork+0x10/0x20
[   19.369902] 
[   19.369951] Allocated by task 265:
[   19.370053]  kasan_save_stack+0x3c/0x68
[   19.370119]  kasan_save_track+0x20/0x40
[   19.370178]  kasan_save_alloc_info+0x40/0x58
[   19.370285]  __kasan_kmalloc+0xd4/0xd8
[   19.370352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.370409]  kasan_atomics+0xb8/0x2e0
[   19.370515]  kunit_try_run_case+0x170/0x3f0
[   19.370585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.370638]  kthread+0x328/0x630
[   19.370686]  ret_from_fork+0x10/0x20
[   19.370753] 
[   19.370775] The buggy address belongs to the object at fff00000c79fb480
[   19.370775]  which belongs to the cache kmalloc-64 of size 64
[   19.370841] The buggy address is located 0 bytes to the right of
[   19.370841]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.370916] 
[   19.370939] The buggy address belongs to the physical page:
[   19.370972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.371264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.371333] page_type: f5(slab)
[   19.371390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.371462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.371761] page dumped because: kasan: bad access detected
[   19.371853] 
[   19.371903] Memory state around the buggy address:
[   19.372025]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.372103]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.372154] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.372197]                                      ^
[   19.372258]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.372301]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.372341] ==================================================================
[   19.295273] ==================================================================
[   19.295315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.295359] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.295406] 
[   19.295435] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.295515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.295543] Hardware name: linux,dummy-virt (DT)
[   19.295575] Call trace:
[   19.295597]  show_stack+0x20/0x38 (C)
[   19.295644]  dump_stack_lvl+0x8c/0xd0
[   19.295691]  print_report+0x118/0x5d0
[   19.298125]  kasan_report+0xdc/0x128
[   19.298190]  kasan_check_range+0x100/0x1a8
[   19.298241]  __kasan_check_write+0x20/0x30
[   19.298286]  kasan_atomics_helper+0xff0/0x4858
[   19.298335]  kasan_atomics+0x198/0x2e0
[   19.298380]  kunit_try_run_case+0x170/0x3f0
[   19.298428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.298481]  kthread+0x328/0x630
[   19.298522]  ret_from_fork+0x10/0x20
[   19.298570] 
[   19.298593] Allocated by task 265:
[   19.298623]  kasan_save_stack+0x3c/0x68
[   19.298666]  kasan_save_track+0x20/0x40
[   19.298705]  kasan_save_alloc_info+0x40/0x58
[   19.298747]  __kasan_kmalloc+0xd4/0xd8
[   19.298786]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.298825]  kasan_atomics+0xb8/0x2e0
[   19.298876]  kunit_try_run_case+0x170/0x3f0
[   19.298937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.298984]  kthread+0x328/0x630
[   19.299030]  ret_from_fork+0x10/0x20
[   19.299070] 
[   19.299092] The buggy address belongs to the object at fff00000c79fb480
[   19.299092]  which belongs to the cache kmalloc-64 of size 64
[   19.299152] The buggy address is located 0 bytes to the right of
[   19.299152]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.299223] 
[   19.299283] The buggy address belongs to the physical page:
[   19.299323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.299377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.299427] page_type: f5(slab)
[   19.299473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.299538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.299586] page dumped because: kasan: bad access detected
[   19.299626] 
[   19.299645] Memory state around the buggy address:
[   19.299678]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.299724]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.300073] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.300118]                                      ^
[   19.300154]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.300220]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.300263] ==================================================================
[   19.345149] ==================================================================
[   19.345190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.345249] Read of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.345299] 
[   19.345329] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.345407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.345436] Hardware name: linux,dummy-virt (DT)
[   19.345470] Call trace:
[   19.345492]  show_stack+0x20/0x38 (C)
[   19.345541]  dump_stack_lvl+0x8c/0xd0
[   19.345588]  print_report+0x118/0x5d0
[   19.345637]  kasan_report+0xdc/0x128
[   19.345683]  __asan_report_load8_noabort+0x20/0x30
[   19.345735]  kasan_atomics_helper+0x3f04/0x4858
[   19.345784]  kasan_atomics+0x198/0x2e0
[   19.345830]  kunit_try_run_case+0x170/0x3f0
[   19.345891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.345945]  kthread+0x328/0x630
[   19.345987]  ret_from_fork+0x10/0x20
[   19.346035] 
[   19.346055] Allocated by task 265:
[   19.346083]  kasan_save_stack+0x3c/0x68
[   19.346124]  kasan_save_track+0x20/0x40
[   19.346162]  kasan_save_alloc_info+0x40/0x58
[   19.346204]  __kasan_kmalloc+0xd4/0xd8
[   19.346241]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.346306]  kasan_atomics+0xb8/0x2e0
[   19.346356]  kunit_try_run_case+0x170/0x3f0
[   19.346433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.346501]  kthread+0x328/0x630
[   19.346569]  ret_from_fork+0x10/0x20
[   19.346642] 
[   19.346701] The buggy address belongs to the object at fff00000c79fb480
[   19.346701]  which belongs to the cache kmalloc-64 of size 64
[   19.347209] The buggy address is located 0 bytes to the right of
[   19.347209]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.347315] 
[   19.347388] The buggy address belongs to the physical page:
[   19.347475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.347562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.347641] page_type: f5(slab)
[   19.347686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.347765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.347855] page dumped because: kasan: bad access detected
[   19.347922] 
[   19.347960] Memory state around the buggy address:
[   19.347999]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.348044]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.348383] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.348425]                                      ^
[   19.348459]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.348502]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.348542] ==================================================================
[   19.332907] ==================================================================
[   19.332962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.333012] Write of size 8 at addr fff00000c79fb4b0 by task kunit_try_catch/265
[   19.333063] 
[   19.333095] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.333249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.333358] Hardware name: linux,dummy-virt (DT)
[   19.333416] Call trace:
[   19.333470]  show_stack+0x20/0x38 (C)
[   19.333593]  dump_stack_lvl+0x8c/0xd0
[   19.333680]  print_report+0x118/0x5d0
[   19.333999]  kasan_report+0xdc/0x128
[   19.334076]  kasan_check_range+0x100/0x1a8
[   19.334185]  __kasan_check_write+0x20/0x30
[   19.334272]  kasan_atomics_helper+0x12d8/0x4858
[   19.334345]  kasan_atomics+0x198/0x2e0
[   19.334423]  kunit_try_run_case+0x170/0x3f0
[   19.334513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.334612]  kthread+0x328/0x630
[   19.334704]  ret_from_fork+0x10/0x20
[   19.334822] 
[   19.334850] Allocated by task 265:
[   19.334890]  kasan_save_stack+0x3c/0x68
[   19.334934]  kasan_save_track+0x20/0x40
[   19.335271]  kasan_save_alloc_info+0x40/0x58
[   19.335353]  __kasan_kmalloc+0xd4/0xd8
[   19.335417]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.335503]  kasan_atomics+0xb8/0x2e0
[   19.335582]  kunit_try_run_case+0x170/0x3f0
[   19.335635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.335914]  kthread+0x328/0x630
[   19.336003]  ret_from_fork+0x10/0x20
[   19.336061] 
[   19.336085] The buggy address belongs to the object at fff00000c79fb480
[   19.336085]  which belongs to the cache kmalloc-64 of size 64
[   19.336145] The buggy address is located 0 bytes to the right of
[   19.336145]  allocated 48-byte region [fff00000c79fb480, fff00000c79fb4b0)
[   19.336210] 
[   19.336252] The buggy address belongs to the physical page:
[   19.336293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079fb
[   19.336349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.336621] page_type: f5(slab)
[   19.336674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.336728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.336814] page dumped because: kasan: bad access detected
[   19.336920] 
[   19.336981] Memory state around the buggy address:
[   19.337027]  fff00000c79fb380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.337132]  fff00000c79fb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.337207] >fff00000c79fb480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.337249]                                      ^
[   19.337283]  fff00000c79fb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.337325]  fff00000c79fb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.337500] ==================================================================

[   14.987564] ==================================================================
[   14.987979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.988336] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.988626] 
[   14.988776] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.988872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.988885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.988920] Call Trace:
[   14.988940]  <TASK>
[   14.988961]  dump_stack_lvl+0x73/0xb0
[   14.988992]  print_report+0xd1/0x610
[   14.989016]  ? __virt_addr_valid+0x1db/0x2d0
[   14.989041]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.989074]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.989098]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.989121]  kasan_report+0x141/0x180
[   14.989173]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.989201]  kasan_check_range+0x10c/0x1c0
[   14.989255]  __kasan_check_write+0x18/0x20
[   14.989275]  kasan_atomics_helper+0x7c7/0x5450
[   14.989299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.989322]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.989349]  ? kasan_atomics+0x152/0x310
[   14.989378]  kasan_atomics+0x1dc/0x310
[   14.989401]  ? __pfx_kasan_atomics+0x10/0x10
[   14.989426]  ? __pfx_read_tsc+0x10/0x10
[   14.989448]  ? ktime_get_ts64+0x86/0x230
[   14.989502]  kunit_try_run_case+0x1a5/0x480
[   14.989545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.989595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.989622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.989647]  ? __kthread_parkme+0x82/0x180
[   14.989668]  ? preempt_count_sub+0x50/0x80
[   14.989695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.989719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.989744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.989816]  kthread+0x337/0x6f0
[   14.989862]  ? trace_preempt_on+0x20/0xc0
[   14.989888]  ? __pfx_kthread+0x10/0x10
[   14.989910]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.989944]  ? calculate_sigpending+0x7b/0xa0
[   14.989969]  ? __pfx_kthread+0x10/0x10
[   14.989991]  ret_from_fork+0x116/0x1d0
[   14.990010]  ? __pfx_kthread+0x10/0x10
[   14.990031]  ret_from_fork_asm+0x1a/0x30
[   14.990073]  </TASK>
[   14.990084] 
[   15.002328] Allocated by task 282:
[   15.002670]  kasan_save_stack+0x45/0x70
[   15.003122]  kasan_save_track+0x18/0x40
[   15.003618]  kasan_save_alloc_info+0x3b/0x50
[   15.003892]  __kasan_kmalloc+0xb7/0xc0
[   15.004195]  __kmalloc_cache_noprof+0x189/0x420
[   15.004384]  kasan_atomics+0x95/0x310
[   15.004698]  kunit_try_run_case+0x1a5/0x480
[   15.005086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.005424]  kthread+0x337/0x6f0
[   15.005768]  ret_from_fork+0x116/0x1d0
[   15.006038]  ret_from_fork_asm+0x1a/0x30
[   15.006243] 
[   15.006370] The buggy address belongs to the object at ffff8881026ce080
[   15.006370]  which belongs to the cache kmalloc-64 of size 64
[   15.007278] The buggy address is located 0 bytes to the right of
[   15.007278]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.008134] 
[   15.008242] The buggy address belongs to the physical page:
[   15.008478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.009127] flags: 0x200000000000000(node=0|zone=2)
[   15.009434] page_type: f5(slab)
[   15.009581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.010228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.010567] page dumped because: kasan: bad access detected
[   15.010956] 
[   15.011086] Memory state around the buggy address:
[   15.011363]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.011937]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.012255] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.012790]                                      ^
[   15.013098]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.013513]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.014008] ==================================================================
[   15.529235] ==================================================================
[   15.529560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.529914] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.530463] 
[   15.530586] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.530632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.530646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.530671] Call Trace:
[   15.530689]  <TASK>
[   15.530706]  dump_stack_lvl+0x73/0xb0
[   15.530736]  print_report+0xd1/0x610
[   15.530759]  ? __virt_addr_valid+0x1db/0x2d0
[   15.530782]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.530805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.530829]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.530852]  kasan_report+0x141/0x180
[   15.530875]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.530927]  kasan_check_range+0x10c/0x1c0
[   15.530953]  __kasan_check_write+0x18/0x20
[   15.530972]  kasan_atomics_helper+0x12e6/0x5450
[   15.530997]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.531019]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.531046]  ? kasan_atomics+0x152/0x310
[   15.531087]  kasan_atomics+0x1dc/0x310
[   15.531110]  ? __pfx_kasan_atomics+0x10/0x10
[   15.531135]  ? __pfx_read_tsc+0x10/0x10
[   15.531156]  ? ktime_get_ts64+0x86/0x230
[   15.531181]  kunit_try_run_case+0x1a5/0x480
[   15.531206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.531230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.531256]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.531280]  ? __kthread_parkme+0x82/0x180
[   15.531301]  ? preempt_count_sub+0x50/0x80
[   15.531326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.531351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.531375]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.531420]  kthread+0x337/0x6f0
[   15.531440]  ? trace_preempt_on+0x20/0xc0
[   15.531464]  ? __pfx_kthread+0x10/0x10
[   15.531485]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.531508]  ? calculate_sigpending+0x7b/0xa0
[   15.531533]  ? __pfx_kthread+0x10/0x10
[   15.531556]  ret_from_fork+0x116/0x1d0
[   15.531575]  ? __pfx_kthread+0x10/0x10
[   15.531596]  ret_from_fork_asm+0x1a/0x30
[   15.531630]  </TASK>
[   15.531641] 
[   15.542637] Allocated by task 282:
[   15.543220]  kasan_save_stack+0x45/0x70
[   15.543518]  kasan_save_track+0x18/0x40
[   15.543814]  kasan_save_alloc_info+0x3b/0x50
[   15.544223]  __kasan_kmalloc+0xb7/0xc0
[   15.544495]  __kmalloc_cache_noprof+0x189/0x420
[   15.544834]  kasan_atomics+0x95/0x310
[   15.545162]  kunit_try_run_case+0x1a5/0x480
[   15.545369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.545604]  kthread+0x337/0x6f0
[   15.546214]  ret_from_fork+0x116/0x1d0
[   15.546383]  ret_from_fork_asm+0x1a/0x30
[   15.546959] 
[   15.547230] The buggy address belongs to the object at ffff8881026ce080
[   15.547230]  which belongs to the cache kmalloc-64 of size 64
[   15.547922] The buggy address is located 0 bytes to the right of
[   15.547922]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.548617] 
[   15.548711] The buggy address belongs to the physical page:
[   15.549232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.549617] flags: 0x200000000000000(node=0|zone=2)
[   15.549846] page_type: f5(slab)
[   15.550119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.550423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.551028] page dumped because: kasan: bad access detected
[   15.551331] 
[   15.551419] Memory state around the buggy address:
[   15.551719]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.552242]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.552671] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.553118]                                      ^
[   15.553390]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.553934]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.554269] ==================================================================
[   14.783599] ==================================================================
[   14.784265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.784627] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.784979] 
[   14.785092] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.785135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.785146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.785167] Call Trace:
[   14.785182]  <TASK>
[   14.785198]  dump_stack_lvl+0x73/0xb0
[   14.785337]  print_report+0xd1/0x610
[   14.785360]  ? __virt_addr_valid+0x1db/0x2d0
[   14.785402]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.785424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.785446]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.785469]  kasan_report+0x141/0x180
[   14.785492]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.785519]  __asan_report_store4_noabort+0x1b/0x30
[   14.785545]  kasan_atomics_helper+0x4b6e/0x5450
[   14.785569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.785609]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.785635]  ? kasan_atomics+0x152/0x310
[   14.785663]  kasan_atomics+0x1dc/0x310
[   14.785687]  ? __pfx_kasan_atomics+0x10/0x10
[   14.785712]  ? __pfx_read_tsc+0x10/0x10
[   14.785733]  ? ktime_get_ts64+0x86/0x230
[   14.785761]  kunit_try_run_case+0x1a5/0x480
[   14.785787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.785810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.785836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.785861]  ? __kthread_parkme+0x82/0x180
[   14.785882]  ? preempt_count_sub+0x50/0x80
[   14.785907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.785932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.785957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.785983]  kthread+0x337/0x6f0
[   14.786002]  ? trace_preempt_on+0x20/0xc0
[   14.786026]  ? __pfx_kthread+0x10/0x10
[   14.786047]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.786081]  ? calculate_sigpending+0x7b/0xa0
[   14.786106]  ? __pfx_kthread+0x10/0x10
[   14.786128]  ret_from_fork+0x116/0x1d0
[   14.786148]  ? __pfx_kthread+0x10/0x10
[   14.786169]  ret_from_fork_asm+0x1a/0x30
[   14.786206]  </TASK>
[   14.786217] 
[   14.799506] Allocated by task 282:
[   14.799713]  kasan_save_stack+0x45/0x70
[   14.800200]  kasan_save_track+0x18/0x40
[   14.800399]  kasan_save_alloc_info+0x3b/0x50
[   14.800788]  __kasan_kmalloc+0xb7/0xc0
[   14.801343]  __kmalloc_cache_noprof+0x189/0x420
[   14.801656]  kasan_atomics+0x95/0x310
[   14.802095]  kunit_try_run_case+0x1a5/0x480
[   14.802322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.802556]  kthread+0x337/0x6f0
[   14.803106]  ret_from_fork+0x116/0x1d0
[   14.803512]  ret_from_fork_asm+0x1a/0x30
[   14.804084] 
[   14.804192] The buggy address belongs to the object at ffff8881026ce080
[   14.804192]  which belongs to the cache kmalloc-64 of size 64
[   14.804987] The buggy address is located 0 bytes to the right of
[   14.804987]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.805937] 
[   14.806179] The buggy address belongs to the physical page:
[   14.806434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.807285] flags: 0x200000000000000(node=0|zone=2)
[   14.807604] page_type: f5(slab)
[   14.807776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.808457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.809350] page dumped because: kasan: bad access detected
[   14.809780] 
[   14.810089] Memory state around the buggy address:
[   14.810444]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.811169]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.811614] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.812106]                                      ^
[   14.812488]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.813088]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.813544] ==================================================================
[   15.390003] ==================================================================
[   15.390352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.391100] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.391382] 
[   15.391495] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.391540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.391552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.391576] Call Trace:
[   15.391594]  <TASK>
[   15.391612]  dump_stack_lvl+0x73/0xb0
[   15.391641]  print_report+0xd1/0x610
[   15.391664]  ? __virt_addr_valid+0x1db/0x2d0
[   15.391687]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.391710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.391732]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.391756]  kasan_report+0x141/0x180
[   15.391778]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.391806]  __asan_report_load4_noabort+0x18/0x20
[   15.391883]  kasan_atomics_helper+0x4a1c/0x5450
[   15.391908]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.391943]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.391969]  ? kasan_atomics+0x152/0x310
[   15.391998]  kasan_atomics+0x1dc/0x310
[   15.392094]  ? __pfx_kasan_atomics+0x10/0x10
[   15.392183]  ? __pfx_read_tsc+0x10/0x10
[   15.392206]  ? ktime_get_ts64+0x86/0x230
[   15.392304]  kunit_try_run_case+0x1a5/0x480
[   15.392343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.392366]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.392392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.392417]  ? __kthread_parkme+0x82/0x180
[   15.392438]  ? preempt_count_sub+0x50/0x80
[   15.392464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.392489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.392514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.392538]  kthread+0x337/0x6f0
[   15.392558]  ? trace_preempt_on+0x20/0xc0
[   15.392582]  ? __pfx_kthread+0x10/0x10
[   15.392612]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.392635]  ? calculate_sigpending+0x7b/0xa0
[   15.392660]  ? __pfx_kthread+0x10/0x10
[   15.392681]  ret_from_fork+0x116/0x1d0
[   15.392701]  ? __pfx_kthread+0x10/0x10
[   15.392722]  ret_from_fork_asm+0x1a/0x30
[   15.392755]  </TASK>
[   15.392765] 
[   15.401089] Allocated by task 282:
[   15.401223]  kasan_save_stack+0x45/0x70
[   15.401361]  kasan_save_track+0x18/0x40
[   15.401738]  kasan_save_alloc_info+0x3b/0x50
[   15.402013]  __kasan_kmalloc+0xb7/0xc0
[   15.402258]  __kmalloc_cache_noprof+0x189/0x420
[   15.402483]  kasan_atomics+0x95/0x310
[   15.402695]  kunit_try_run_case+0x1a5/0x480
[   15.402934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.403209]  kthread+0x337/0x6f0
[   15.403333]  ret_from_fork+0x116/0x1d0
[   15.403463]  ret_from_fork_asm+0x1a/0x30
[   15.403600] 
[   15.403670] The buggy address belongs to the object at ffff8881026ce080
[   15.403670]  which belongs to the cache kmalloc-64 of size 64
[   15.404059] The buggy address is located 0 bytes to the right of
[   15.404059]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.404662] 
[   15.404763] The buggy address belongs to the physical page:
[   15.405022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.405518] flags: 0x200000000000000(node=0|zone=2)
[   15.405784] page_type: f5(slab)
[   15.405936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.406438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.406893] page dumped because: kasan: bad access detected
[   15.407133] 
[   15.407285] Memory state around the buggy address:
[   15.407510]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.407855]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.408285] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.408551]                                      ^
[   15.408706]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.408922]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.409270] ==================================================================
[   14.834977] ==================================================================
[   14.835539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.836007] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.836293] 
[   14.836386] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.836430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.836442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.836466] Call Trace:
[   14.836484]  <TASK>
[   14.836503]  dump_stack_lvl+0x73/0xb0
[   14.836533]  print_report+0xd1/0x610
[   14.836557]  ? __virt_addr_valid+0x1db/0x2d0
[   14.836580]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.836603]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.836627]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.836649]  kasan_report+0x141/0x180
[   14.836671]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.836699]  __asan_report_load4_noabort+0x18/0x20
[   14.836724]  kasan_atomics_helper+0x4b54/0x5450
[   14.836747]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.836770]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.836796]  ? kasan_atomics+0x152/0x310
[   14.836882]  kasan_atomics+0x1dc/0x310
[   14.836905]  ? __pfx_kasan_atomics+0x10/0x10
[   14.836930]  ? __pfx_read_tsc+0x10/0x10
[   14.836952]  ? ktime_get_ts64+0x86/0x230
[   14.836978]  kunit_try_run_case+0x1a5/0x480
[   14.837004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.837027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.837066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.837091]  ? __kthread_parkme+0x82/0x180
[   14.837112]  ? preempt_count_sub+0x50/0x80
[   14.837138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.837162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.837187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.837211]  kthread+0x337/0x6f0
[   14.837231]  ? trace_preempt_on+0x20/0xc0
[   14.837256]  ? __pfx_kthread+0x10/0x10
[   14.837277]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.837299]  ? calculate_sigpending+0x7b/0xa0
[   14.837325]  ? __pfx_kthread+0x10/0x10
[   14.837347]  ret_from_fork+0x116/0x1d0
[   14.837366]  ? __pfx_kthread+0x10/0x10
[   14.837387]  ret_from_fork_asm+0x1a/0x30
[   14.837421]  </TASK>
[   14.837432] 
[   14.846011] Allocated by task 282:
[   14.846236]  kasan_save_stack+0x45/0x70
[   14.846451]  kasan_save_track+0x18/0x40
[   14.846799]  kasan_save_alloc_info+0x3b/0x50
[   14.847023]  __kasan_kmalloc+0xb7/0xc0
[   14.847173]  __kmalloc_cache_noprof+0x189/0x420
[   14.847335]  kasan_atomics+0x95/0x310
[   14.847523]  kunit_try_run_case+0x1a5/0x480
[   14.848073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.848353]  kthread+0x337/0x6f0
[   14.848532]  ret_from_fork+0x116/0x1d0
[   14.848910]  ret_from_fork_asm+0x1a/0x30
[   14.849121] 
[   14.849221] The buggy address belongs to the object at ffff8881026ce080
[   14.849221]  which belongs to the cache kmalloc-64 of size 64
[   14.849733] The buggy address is located 0 bytes to the right of
[   14.849733]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.850348] 
[   14.850456] The buggy address belongs to the physical page:
[   14.850736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.851097] flags: 0x200000000000000(node=0|zone=2)
[   14.851348] page_type: f5(slab)
[   14.851476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.851714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.852003] page dumped because: kasan: bad access detected
[   14.852264] 
[   14.852360] Memory state around the buggy address:
[   14.852586]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.853248]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.853550] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.854015]                                      ^
[   14.854210]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.854433]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.854866] ==================================================================
[   14.878143] ==================================================================
[   14.878456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.878778] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.879149] 
[   14.879247] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.879296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.879309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.879333] Call Trace:
[   14.879435]  <TASK>
[   14.879458]  dump_stack_lvl+0x73/0xb0
[   14.879491]  print_report+0xd1/0x610
[   14.879516]  ? __virt_addr_valid+0x1db/0x2d0
[   14.879541]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.879564]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.879588]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.879611]  kasan_report+0x141/0x180
[   14.879636]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.879664]  __asan_report_store4_noabort+0x1b/0x30
[   14.879690]  kasan_atomics_helper+0x4b3a/0x5450
[   14.879713]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.879735]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.879762]  ? kasan_atomics+0x152/0x310
[   14.879790]  kasan_atomics+0x1dc/0x310
[   14.879825]  ? __pfx_kasan_atomics+0x10/0x10
[   14.879851]  ? __pfx_read_tsc+0x10/0x10
[   14.879872]  ? ktime_get_ts64+0x86/0x230
[   14.879899]  kunit_try_run_case+0x1a5/0x480
[   14.879925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.879948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.879974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.879998]  ? __kthread_parkme+0x82/0x180
[   14.880020]  ? preempt_count_sub+0x50/0x80
[   14.880046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.880083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.880107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.880132]  kthread+0x337/0x6f0
[   14.880152]  ? trace_preempt_on+0x20/0xc0
[   14.880176]  ? __pfx_kthread+0x10/0x10
[   14.880197]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.880219]  ? calculate_sigpending+0x7b/0xa0
[   14.880245]  ? __pfx_kthread+0x10/0x10
[   14.880267]  ret_from_fork+0x116/0x1d0
[   14.880287]  ? __pfx_kthread+0x10/0x10
[   14.880307]  ret_from_fork_asm+0x1a/0x30
[   14.880342]  </TASK>
[   14.880352] 
[   14.888460] Allocated by task 282:
[   14.888675]  kasan_save_stack+0x45/0x70
[   14.889011]  kasan_save_track+0x18/0x40
[   14.889214]  kasan_save_alloc_info+0x3b/0x50
[   14.889371]  __kasan_kmalloc+0xb7/0xc0
[   14.889507]  __kmalloc_cache_noprof+0x189/0x420
[   14.889971]  kasan_atomics+0x95/0x310
[   14.890184]  kunit_try_run_case+0x1a5/0x480
[   14.890400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.890616]  kthread+0x337/0x6f0
[   14.890740]  ret_from_fork+0x116/0x1d0
[   14.890877]  ret_from_fork_asm+0x1a/0x30
[   14.891334] 
[   14.891439] The buggy address belongs to the object at ffff8881026ce080
[   14.891439]  which belongs to the cache kmalloc-64 of size 64
[   14.892120] The buggy address is located 0 bytes to the right of
[   14.892120]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.892635] 
[   14.892737] The buggy address belongs to the physical page:
[   14.893209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.893526] flags: 0x200000000000000(node=0|zone=2)
[   14.893747] page_type: f5(slab)
[   14.893872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.894143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.894490] page dumped because: kasan: bad access detected
[   14.894978] 
[   14.895093] Memory state around the buggy address:
[   14.895297]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.895568]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.895796] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.896136]                                      ^
[   14.896370]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.896694]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.897194] ==================================================================
[   14.937494] ==================================================================
[   14.938217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.938567] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.938926] 
[   14.939098] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.939171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.939196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.939234] Call Trace:
[   14.939253]  <TASK>
[   14.939286]  dump_stack_lvl+0x73/0xb0
[   14.939317]  print_report+0xd1/0x610
[   14.939341]  ? __virt_addr_valid+0x1db/0x2d0
[   14.939364]  ? kasan_atomics_helper+0x697/0x5450
[   14.939405]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.939430]  ? kasan_atomics_helper+0x697/0x5450
[   14.939452]  kasan_report+0x141/0x180
[   14.939475]  ? kasan_atomics_helper+0x697/0x5450
[   14.939503]  kasan_check_range+0x10c/0x1c0
[   14.939528]  __kasan_check_write+0x18/0x20
[   14.939548]  kasan_atomics_helper+0x697/0x5450
[   14.939572]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.939649]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.939677]  ? kasan_atomics+0x152/0x310
[   14.939706]  kasan_atomics+0x1dc/0x310
[   14.939730]  ? __pfx_kasan_atomics+0x10/0x10
[   14.939756]  ? __pfx_read_tsc+0x10/0x10
[   14.939777]  ? ktime_get_ts64+0x86/0x230
[   14.939973]  kunit_try_run_case+0x1a5/0x480
[   14.940003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.940026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.940066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.940091]  ? __kthread_parkme+0x82/0x180
[   14.940112]  ? preempt_count_sub+0x50/0x80
[   14.940138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.940163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.940188]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.940212]  kthread+0x337/0x6f0
[   14.940232]  ? trace_preempt_on+0x20/0xc0
[   14.940256]  ? __pfx_kthread+0x10/0x10
[   14.940277]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.940299]  ? calculate_sigpending+0x7b/0xa0
[   14.940325]  ? __pfx_kthread+0x10/0x10
[   14.940348]  ret_from_fork+0x116/0x1d0
[   14.940367]  ? __pfx_kthread+0x10/0x10
[   14.940387]  ret_from_fork_asm+0x1a/0x30
[   14.940421]  </TASK>
[   14.940431] 
[   14.949832] Allocated by task 282:
[   14.950100]  kasan_save_stack+0x45/0x70
[   14.950331]  kasan_save_track+0x18/0x40
[   14.950506]  kasan_save_alloc_info+0x3b/0x50
[   14.950657]  __kasan_kmalloc+0xb7/0xc0
[   14.950918]  __kmalloc_cache_noprof+0x189/0x420
[   14.951180]  kasan_atomics+0x95/0x310
[   14.951489]  kunit_try_run_case+0x1a5/0x480
[   14.951714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.952327]  kthread+0x337/0x6f0
[   14.952776]  ret_from_fork+0x116/0x1d0
[   14.953152]  ret_from_fork_asm+0x1a/0x30
[   14.953389] 
[   14.953474] The buggy address belongs to the object at ffff8881026ce080
[   14.953474]  which belongs to the cache kmalloc-64 of size 64
[   14.953953] The buggy address is located 0 bytes to the right of
[   14.953953]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.954701] 
[   14.954802] The buggy address belongs to the physical page:
[   14.955350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.955800] flags: 0x200000000000000(node=0|zone=2)
[   14.956585] page_type: f5(slab)
[   14.956797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.957346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.958016] page dumped because: kasan: bad access detected
[   14.958264] 
[   14.958352] Memory state around the buggy address:
[   14.958787]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.959188]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.959678] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.960318]                                      ^
[   14.960664]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.961065]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.961638] ==================================================================
[   15.500160] ==================================================================
[   15.500813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.501512] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.502367] 
[   15.502469] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.502514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.502526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.502551] Call Trace:
[   15.502569]  <TASK>
[   15.502588]  dump_stack_lvl+0x73/0xb0
[   15.502618]  print_report+0xd1/0x610
[   15.502642]  ? __virt_addr_valid+0x1db/0x2d0
[   15.502665]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.502687]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.502710]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.502733]  kasan_report+0x141/0x180
[   15.502756]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.502799]  __asan_report_load4_noabort+0x18/0x20
[   15.502825]  kasan_atomics_helper+0x49e8/0x5450
[   15.502848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.502871]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.502897]  ? kasan_atomics+0x152/0x310
[   15.502924]  kasan_atomics+0x1dc/0x310
[   15.502948]  ? __pfx_kasan_atomics+0x10/0x10
[   15.502972]  ? __pfx_read_tsc+0x10/0x10
[   15.502993]  ? ktime_get_ts64+0x86/0x230
[   15.503020]  kunit_try_run_case+0x1a5/0x480
[   15.503048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.503081]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.503106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.503131]  ? __kthread_parkme+0x82/0x180
[   15.503153]  ? preempt_count_sub+0x50/0x80
[   15.503178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.503202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.503227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.503336]  kthread+0x337/0x6f0
[   15.503360]  ? trace_preempt_on+0x20/0xc0
[   15.503385]  ? __pfx_kthread+0x10/0x10
[   15.503406]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.503429]  ? calculate_sigpending+0x7b/0xa0
[   15.503454]  ? __pfx_kthread+0x10/0x10
[   15.503476]  ret_from_fork+0x116/0x1d0
[   15.503495]  ? __pfx_kthread+0x10/0x10
[   15.503515]  ret_from_fork_asm+0x1a/0x30
[   15.503550]  </TASK>
[   15.503561] 
[   15.516587] Allocated by task 282:
[   15.516738]  kasan_save_stack+0x45/0x70
[   15.517133]  kasan_save_track+0x18/0x40
[   15.517844]  kasan_save_alloc_info+0x3b/0x50
[   15.518444]  __kasan_kmalloc+0xb7/0xc0
[   15.518866]  __kmalloc_cache_noprof+0x189/0x420
[   15.519309]  kasan_atomics+0x95/0x310
[   15.519674]  kunit_try_run_case+0x1a5/0x480
[   15.520150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.520387]  kthread+0x337/0x6f0
[   15.520512]  ret_from_fork+0x116/0x1d0
[   15.520648]  ret_from_fork_asm+0x1a/0x30
[   15.520937] 
[   15.521161] The buggy address belongs to the object at ffff8881026ce080
[   15.521161]  which belongs to the cache kmalloc-64 of size 64
[   15.522468] The buggy address is located 0 bytes to the right of
[   15.522468]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.523625] 
[   15.523705] The buggy address belongs to the physical page:
[   15.524102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.524879] flags: 0x200000000000000(node=0|zone=2)
[   15.525149] page_type: f5(slab)
[   15.525277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.525511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.525761] page dumped because: kasan: bad access detected
[   15.526349] 
[   15.526452] Memory state around the buggy address:
[   15.526625]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.527005]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.527283] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.527580]                                      ^
[   15.527851]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.528270]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.528602] ==================================================================
[   15.555020] ==================================================================
[   15.555406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.556267] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.556534] 
[   15.556662] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.556708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.556720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.556744] Call Trace:
[   15.556756]  <TASK>
[   15.556773]  dump_stack_lvl+0x73/0xb0
[   15.557028]  print_report+0xd1/0x610
[   15.557092]  ? __virt_addr_valid+0x1db/0x2d0
[   15.557116]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.557139]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.557163]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.557185]  kasan_report+0x141/0x180
[   15.557209]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.557237]  __asan_report_load4_noabort+0x18/0x20
[   15.557262]  kasan_atomics_helper+0x49ce/0x5450
[   15.557286]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.557309]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.557335]  ? kasan_atomics+0x152/0x310
[   15.557364]  kasan_atomics+0x1dc/0x310
[   15.557388]  ? __pfx_kasan_atomics+0x10/0x10
[   15.557412]  ? __pfx_read_tsc+0x10/0x10
[   15.557434]  ? ktime_get_ts64+0x86/0x230
[   15.557460]  kunit_try_run_case+0x1a5/0x480
[   15.557485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.557508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.557535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.557559]  ? __kthread_parkme+0x82/0x180
[   15.557580]  ? preempt_count_sub+0x50/0x80
[   15.557707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.557732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.557757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.557782]  kthread+0x337/0x6f0
[   15.557802]  ? trace_preempt_on+0x20/0xc0
[   15.557827]  ? __pfx_kthread+0x10/0x10
[   15.557848]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.557871]  ? calculate_sigpending+0x7b/0xa0
[   15.557896]  ? __pfx_kthread+0x10/0x10
[   15.557918]  ret_from_fork+0x116/0x1d0
[   15.557937]  ? __pfx_kthread+0x10/0x10
[   15.557958]  ret_from_fork_asm+0x1a/0x30
[   15.557992]  </TASK>
[   15.558003] 
[   15.568075] Allocated by task 282:
[   15.568264]  kasan_save_stack+0x45/0x70
[   15.568455]  kasan_save_track+0x18/0x40
[   15.568913]  kasan_save_alloc_info+0x3b/0x50
[   15.569101]  __kasan_kmalloc+0xb7/0xc0
[   15.569429]  __kmalloc_cache_noprof+0x189/0x420
[   15.569672]  kasan_atomics+0x95/0x310
[   15.569965]  kunit_try_run_case+0x1a5/0x480
[   15.570264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.570623]  kthread+0x337/0x6f0
[   15.570883]  ret_from_fork+0x116/0x1d0
[   15.571034]  ret_from_fork_asm+0x1a/0x30
[   15.571383] 
[   15.571565] The buggy address belongs to the object at ffff8881026ce080
[   15.571565]  which belongs to the cache kmalloc-64 of size 64
[   15.572087] The buggy address is located 0 bytes to the right of
[   15.572087]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.572868] 
[   15.572969] The buggy address belongs to the physical page:
[   15.573182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.573695] flags: 0x200000000000000(node=0|zone=2)
[   15.574008] page_type: f5(slab)
[   15.574201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.574703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.575136] page dumped because: kasan: bad access detected
[   15.575460] 
[   15.575563] Memory state around the buggy address:
[   15.575878]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.576185]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.576501] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.577018]                                      ^
[   15.577204]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.577674]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.578066] ==================================================================
[   15.578938] ==================================================================
[   15.579231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.580011] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.580278] 
[   15.580398] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.580443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.580456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.580478] Call Trace:
[   15.580496]  <TASK>
[   15.580514]  dump_stack_lvl+0x73/0xb0
[   15.580544]  print_report+0xd1/0x610
[   15.580567]  ? __virt_addr_valid+0x1db/0x2d0
[   15.580605]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.580626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.580650]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.580673]  kasan_report+0x141/0x180
[   15.580695]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.580723]  kasan_check_range+0x10c/0x1c0
[   15.580747]  __kasan_check_read+0x15/0x20
[   15.580767]  kasan_atomics_helper+0x13b5/0x5450
[   15.580790]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.580813]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.580839]  ? kasan_atomics+0x152/0x310
[   15.580867]  kasan_atomics+0x1dc/0x310
[   15.580891]  ? __pfx_kasan_atomics+0x10/0x10
[   15.580916]  ? __pfx_read_tsc+0x10/0x10
[   15.580937]  ? ktime_get_ts64+0x86/0x230
[   15.580963]  kunit_try_run_case+0x1a5/0x480
[   15.580988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.581011]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.581036]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.581072]  ? __kthread_parkme+0x82/0x180
[   15.581093]  ? preempt_count_sub+0x50/0x80
[   15.581118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.581143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.581167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.581192]  kthread+0x337/0x6f0
[   15.581212]  ? trace_preempt_on+0x20/0xc0
[   15.581236]  ? __pfx_kthread+0x10/0x10
[   15.581256]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.581279]  ? calculate_sigpending+0x7b/0xa0
[   15.581304]  ? __pfx_kthread+0x10/0x10
[   15.581326]  ret_from_fork+0x116/0x1d0
[   15.581345]  ? __pfx_kthread+0x10/0x10
[   15.581365]  ret_from_fork_asm+0x1a/0x30
[   15.581400]  </TASK>
[   15.581411] 
[   15.589153] Allocated by task 282:
[   15.589300]  kasan_save_stack+0x45/0x70
[   15.589505]  kasan_save_track+0x18/0x40
[   15.589812]  kasan_save_alloc_info+0x3b/0x50
[   15.589967]  __kasan_kmalloc+0xb7/0xc0
[   15.590112]  __kmalloc_cache_noprof+0x189/0x420
[   15.590322]  kasan_atomics+0x95/0x310
[   15.590510]  kunit_try_run_case+0x1a5/0x480
[   15.590739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.591168]  kthread+0x337/0x6f0
[   15.591292]  ret_from_fork+0x116/0x1d0
[   15.591425]  ret_from_fork_asm+0x1a/0x30
[   15.591565] 
[   15.591637] The buggy address belongs to the object at ffff8881026ce080
[   15.591637]  which belongs to the cache kmalloc-64 of size 64
[   15.592527] The buggy address is located 0 bytes to the right of
[   15.592527]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.593169] 
[   15.593242] The buggy address belongs to the physical page:
[   15.593414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.593957] flags: 0x200000000000000(node=0|zone=2)
[   15.594144] page_type: f5(slab)
[   15.594276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.594513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.595228] page dumped because: kasan: bad access detected
[   15.595492] 
[   15.595620] Memory state around the buggy address:
[   15.595849]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.596163]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.596473] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.596844]                                      ^
[   15.597085]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.597362]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.598316] ==================================================================
[   15.739232] ==================================================================
[   15.739633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.739970] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.740334] 
[   15.740461] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.740508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.740520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.740545] Call Trace:
[   15.740565]  <TASK>
[   15.740585]  dump_stack_lvl+0x73/0xb0
[   15.740617]  print_report+0xd1/0x610
[   15.740641]  ? __virt_addr_valid+0x1db/0x2d0
[   15.740665]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.740687]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.740710]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.740733]  kasan_report+0x141/0x180
[   15.740756]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.740784]  kasan_check_range+0x10c/0x1c0
[   15.740808]  __kasan_check_write+0x18/0x20
[   15.740828]  kasan_atomics_helper+0x16e7/0x5450
[   15.740852]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.740874]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.740901]  ? kasan_atomics+0x152/0x310
[   15.740929]  kasan_atomics+0x1dc/0x310
[   15.740953]  ? __pfx_kasan_atomics+0x10/0x10
[   15.740978]  ? __pfx_read_tsc+0x10/0x10
[   15.741000]  ? ktime_get_ts64+0x86/0x230
[   15.741026]  kunit_try_run_case+0x1a5/0x480
[   15.741065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.741089]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.741117]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.741142]  ? __kthread_parkme+0x82/0x180
[   15.741165]  ? preempt_count_sub+0x50/0x80
[   15.741191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.741216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.741252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.741277]  kthread+0x337/0x6f0
[   15.741303]  ? trace_preempt_on+0x20/0xc0
[   15.741329]  ? __pfx_kthread+0x10/0x10
[   15.741350]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.741372]  ? calculate_sigpending+0x7b/0xa0
[   15.741398]  ? __pfx_kthread+0x10/0x10
[   15.741420]  ret_from_fork+0x116/0x1d0
[   15.741439]  ? __pfx_kthread+0x10/0x10
[   15.741461]  ret_from_fork_asm+0x1a/0x30
[   15.741495]  </TASK>
[   15.741507] 
[   15.750847] Allocated by task 282:
[   15.751429]  kasan_save_stack+0x45/0x70
[   15.752350]  kasan_save_track+0x18/0x40
[   15.752543]  kasan_save_alloc_info+0x3b/0x50
[   15.752906]  __kasan_kmalloc+0xb7/0xc0
[   15.753108]  __kmalloc_cache_noprof+0x189/0x420
[   15.753330]  kasan_atomics+0x95/0x310
[   15.753469]  kunit_try_run_case+0x1a5/0x480
[   15.753618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.753796]  kthread+0x337/0x6f0
[   15.753921]  ret_from_fork+0x116/0x1d0
[   15.754329]  ret_from_fork_asm+0x1a/0x30
[   15.754535] 
[   15.756127] The buggy address belongs to the object at ffff8881026ce080
[   15.756127]  which belongs to the cache kmalloc-64 of size 64
[   15.756904] The buggy address is located 0 bytes to the right of
[   15.756904]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.757387] 
[   15.757468] The buggy address belongs to the physical page:
[   15.757659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.758033] flags: 0x200000000000000(node=0|zone=2)
[   15.758264] page_type: f5(slab)
[   15.758388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.758647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.758996] page dumped because: kasan: bad access detected
[   15.759311] 
[   15.759385] Memory state around the buggy address:
[   15.759540]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.759952]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.761190] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.761533]                                      ^
[   15.761743]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.762139]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.762368] ==================================================================
[   15.254469] ==================================================================
[   15.255329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.255661] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.256136] 
[   15.256485] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.256634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.256649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.256674] Call Trace:
[   15.256694]  <TASK>
[   15.256716]  dump_stack_lvl+0x73/0xb0
[   15.256757]  print_report+0xd1/0x610
[   15.256783]  ? __virt_addr_valid+0x1db/0x2d0
[   15.256807]  ? kasan_atomics_helper+0xde0/0x5450
[   15.256864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.256889]  ? kasan_atomics_helper+0xde0/0x5450
[   15.256912]  kasan_report+0x141/0x180
[   15.256935]  ? kasan_atomics_helper+0xde0/0x5450
[   15.256963]  kasan_check_range+0x10c/0x1c0
[   15.256988]  __kasan_check_write+0x18/0x20
[   15.257007]  kasan_atomics_helper+0xde0/0x5450
[   15.257031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.257064]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.257090]  ? kasan_atomics+0x152/0x310
[   15.257119]  kasan_atomics+0x1dc/0x310
[   15.257143]  ? __pfx_kasan_atomics+0x10/0x10
[   15.257169]  ? __pfx_read_tsc+0x10/0x10
[   15.257191]  ? ktime_get_ts64+0x86/0x230
[   15.257217]  kunit_try_run_case+0x1a5/0x480
[   15.257245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257268]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.257295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.257320]  ? __kthread_parkme+0x82/0x180
[   15.257342]  ? preempt_count_sub+0x50/0x80
[   15.257368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.257418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.257443]  kthread+0x337/0x6f0
[   15.257463]  ? trace_preempt_on+0x20/0xc0
[   15.257487]  ? __pfx_kthread+0x10/0x10
[   15.257508]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.257532]  ? calculate_sigpending+0x7b/0xa0
[   15.257558]  ? __pfx_kthread+0x10/0x10
[   15.257580]  ret_from_fork+0x116/0x1d0
[   15.257599]  ? __pfx_kthread+0x10/0x10
[   15.257620]  ret_from_fork_asm+0x1a/0x30
[   15.257654]  </TASK>
[   15.257666] 
[   15.266140] Allocated by task 282:
[   15.266296]  kasan_save_stack+0x45/0x70
[   15.266447]  kasan_save_track+0x18/0x40
[   15.266586]  kasan_save_alloc_info+0x3b/0x50
[   15.266801]  __kasan_kmalloc+0xb7/0xc0
[   15.266995]  __kmalloc_cache_noprof+0x189/0x420
[   15.267231]  kasan_atomics+0x95/0x310
[   15.267437]  kunit_try_run_case+0x1a5/0x480
[   15.267720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.268029]  kthread+0x337/0x6f0
[   15.268165]  ret_from_fork+0x116/0x1d0
[   15.268303]  ret_from_fork_asm+0x1a/0x30
[   15.268528] 
[   15.268663] The buggy address belongs to the object at ffff8881026ce080
[   15.268663]  which belongs to the cache kmalloc-64 of size 64
[   15.269145] The buggy address is located 0 bytes to the right of
[   15.269145]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.269703] 
[   15.269822] The buggy address belongs to the physical page:
[   15.270012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.270272] flags: 0x200000000000000(node=0|zone=2)
[   15.270441] page_type: f5(slab)
[   15.270564] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.270866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.271220] page dumped because: kasan: bad access detected
[   15.271472] 
[   15.271565] Memory state around the buggy address:
[   15.271939]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.272262]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.272576] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.272797]                                      ^
[   15.273004]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.273334]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.273648] ==================================================================
[   15.959728] ==================================================================
[   15.960142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.960477] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.960823] 
[   15.960948] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.961005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.961018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.961041] Call Trace:
[   15.961065]  <TASK>
[   15.961082]  dump_stack_lvl+0x73/0xb0
[   15.961112]  print_report+0xd1/0x610
[   15.961145]  ? __virt_addr_valid+0x1db/0x2d0
[   15.961169]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.961202]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.961226]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.961249]  kasan_report+0x141/0x180
[   15.961272]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.961301]  kasan_check_range+0x10c/0x1c0
[   15.961326]  __kasan_check_write+0x18/0x20
[   15.961346]  kasan_atomics_helper+0x1d7a/0x5450
[   15.961379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.961402]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.961438]  ? kasan_atomics+0x152/0x310
[   15.961466]  kasan_atomics+0x1dc/0x310
[   15.961490]  ? __pfx_kasan_atomics+0x10/0x10
[   15.961515]  ? __pfx_read_tsc+0x10/0x10
[   15.961536]  ? ktime_get_ts64+0x86/0x230
[   15.961561]  kunit_try_run_case+0x1a5/0x480
[   15.961597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.961622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.961647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.961681]  ? __kthread_parkme+0x82/0x180
[   15.961701]  ? preempt_count_sub+0x50/0x80
[   15.961726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.961761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.961786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.961811]  kthread+0x337/0x6f0
[   15.961831]  ? trace_preempt_on+0x20/0xc0
[   15.961863]  ? __pfx_kthread+0x10/0x10
[   15.961884]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.961906]  ? calculate_sigpending+0x7b/0xa0
[   15.961941]  ? __pfx_kthread+0x10/0x10
[   15.961963]  ret_from_fork+0x116/0x1d0
[   15.961982]  ? __pfx_kthread+0x10/0x10
[   15.962003]  ret_from_fork_asm+0x1a/0x30
[   15.962037]  </TASK>
[   15.962047] 
[   15.969886] Allocated by task 282:
[   15.970091]  kasan_save_stack+0x45/0x70
[   15.970306]  kasan_save_track+0x18/0x40
[   15.970488]  kasan_save_alloc_info+0x3b/0x50
[   15.970711]  __kasan_kmalloc+0xb7/0xc0
[   15.970887]  __kmalloc_cache_noprof+0x189/0x420
[   15.971105]  kasan_atomics+0x95/0x310
[   15.971295]  kunit_try_run_case+0x1a5/0x480
[   15.971471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.971715]  kthread+0x337/0x6f0
[   15.971890]  ret_from_fork+0x116/0x1d0
[   15.972030]  ret_from_fork_asm+0x1a/0x30
[   15.972234] 
[   15.972328] The buggy address belongs to the object at ffff8881026ce080
[   15.972328]  which belongs to the cache kmalloc-64 of size 64
[   15.972871] The buggy address is located 0 bytes to the right of
[   15.972871]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.973536] 
[   15.973658] The buggy address belongs to the physical page:
[   15.973928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.974301] flags: 0x200000000000000(node=0|zone=2)
[   15.974542] page_type: f5(slab)
[   15.974766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.975163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.975503] page dumped because: kasan: bad access detected
[   15.975752] 
[   15.975858] Memory state around the buggy address:
[   15.976087]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.976311]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.976533] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.976752]                                      ^
[   15.976959]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.977348]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.977677] ==================================================================
[   16.042066] ==================================================================
[   16.042315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.042548] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.042770] 
[   16.042876] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.042919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.042930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.043432] Call Trace:
[   16.043450]  <TASK>
[   16.043467]  dump_stack_lvl+0x73/0xb0
[   16.043498]  print_report+0xd1/0x610
[   16.043522]  ? __virt_addr_valid+0x1db/0x2d0
[   16.043546]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.043569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.043593]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.043617]  kasan_report+0x141/0x180
[   16.043640]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.043669]  __asan_report_load8_noabort+0x18/0x20
[   16.043694]  kasan_atomics_helper+0x4f71/0x5450
[   16.043718]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.043742]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.043769]  ? kasan_atomics+0x152/0x310
[   16.043797]  kasan_atomics+0x1dc/0x310
[   16.043821]  ? __pfx_kasan_atomics+0x10/0x10
[   16.043845]  ? __pfx_read_tsc+0x10/0x10
[   16.043867]  ? ktime_get_ts64+0x86/0x230
[   16.043892]  kunit_try_run_case+0x1a5/0x480
[   16.043917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.043941]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.043966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.043990]  ? __kthread_parkme+0x82/0x180
[   16.044011]  ? preempt_count_sub+0x50/0x80
[   16.044037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.044076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.044126]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.044151]  kthread+0x337/0x6f0
[   16.044171]  ? trace_preempt_on+0x20/0xc0
[   16.044213]  ? __pfx_kthread+0x10/0x10
[   16.044234]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.044268]  ? calculate_sigpending+0x7b/0xa0
[   16.044293]  ? __pfx_kthread+0x10/0x10
[   16.044315]  ret_from_fork+0x116/0x1d0
[   16.044335]  ? __pfx_kthread+0x10/0x10
[   16.044356]  ret_from_fork_asm+0x1a/0x30
[   16.044389]  </TASK>
[   16.044401] 
[   16.051969] Allocated by task 282:
[   16.052109]  kasan_save_stack+0x45/0x70
[   16.052254]  kasan_save_track+0x18/0x40
[   16.052439]  kasan_save_alloc_info+0x3b/0x50
[   16.052739]  __kasan_kmalloc+0xb7/0xc0
[   16.052929]  __kmalloc_cache_noprof+0x189/0x420
[   16.053194]  kasan_atomics+0x95/0x310
[   16.053355]  kunit_try_run_case+0x1a5/0x480
[   16.053547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.053802]  kthread+0x337/0x6f0
[   16.053967]  ret_from_fork+0x116/0x1d0
[   16.054113]  ret_from_fork_asm+0x1a/0x30
[   16.054304] 
[   16.054405] The buggy address belongs to the object at ffff8881026ce080
[   16.054405]  which belongs to the cache kmalloc-64 of size 64
[   16.054918] The buggy address is located 0 bytes to the right of
[   16.054918]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.055538] 
[   16.055652] The buggy address belongs to the physical page:
[   16.055930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.056261] flags: 0x200000000000000(node=0|zone=2)
[   16.056428] page_type: f5(slab)
[   16.056553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.056915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.057310] page dumped because: kasan: bad access detected
[   16.057535] 
[   16.057654] Memory state around the buggy address:
[   16.057885]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.058162]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.058489] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.058799]                                      ^
[   16.059012]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.059242]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.059460] ==================================================================
[   16.189365] ==================================================================
[   16.189717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.190037] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.190284] 
[   16.190374] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.190416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.190428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.190451] Call Trace:
[   16.190470]  <TASK>
[   16.190487]  dump_stack_lvl+0x73/0xb0
[   16.190516]  print_report+0xd1/0x610
[   16.190538]  ? __virt_addr_valid+0x1db/0x2d0
[   16.190562]  ? kasan_atomics_helper+0x5115/0x5450
[   16.190606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.190630]  ? kasan_atomics_helper+0x5115/0x5450
[   16.190653]  kasan_report+0x141/0x180
[   16.190676]  ? kasan_atomics_helper+0x5115/0x5450
[   16.190705]  __asan_report_load8_noabort+0x18/0x20
[   16.190731]  kasan_atomics_helper+0x5115/0x5450
[   16.190755]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.190779]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.190805]  ? kasan_atomics+0x152/0x310
[   16.190834]  kasan_atomics+0x1dc/0x310
[   16.190858]  ? __pfx_kasan_atomics+0x10/0x10
[   16.190883]  ? __pfx_read_tsc+0x10/0x10
[   16.190904]  ? ktime_get_ts64+0x86/0x230
[   16.190930]  kunit_try_run_case+0x1a5/0x480
[   16.190956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.190980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.191007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.191033]  ? __kthread_parkme+0x82/0x180
[   16.191062]  ? preempt_count_sub+0x50/0x80
[   16.191088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.191114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.191139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.191165]  kthread+0x337/0x6f0
[   16.191185]  ? trace_preempt_on+0x20/0xc0
[   16.191210]  ? __pfx_kthread+0x10/0x10
[   16.191231]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.191254]  ? calculate_sigpending+0x7b/0xa0
[   16.191279]  ? __pfx_kthread+0x10/0x10
[   16.191301]  ret_from_fork+0x116/0x1d0
[   16.191321]  ? __pfx_kthread+0x10/0x10
[   16.191342]  ret_from_fork_asm+0x1a/0x30
[   16.191375]  </TASK>
[   16.191386] 
[   16.198552] Allocated by task 282:
[   16.198701]  kasan_save_stack+0x45/0x70
[   16.198847]  kasan_save_track+0x18/0x40
[   16.199029]  kasan_save_alloc_info+0x3b/0x50
[   16.199251]  __kasan_kmalloc+0xb7/0xc0
[   16.199438]  __kmalloc_cache_noprof+0x189/0x420
[   16.199690]  kasan_atomics+0x95/0x310
[   16.199886]  kunit_try_run_case+0x1a5/0x480
[   16.200080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.200317]  kthread+0x337/0x6f0
[   16.200479]  ret_from_fork+0x116/0x1d0
[   16.200684]  ret_from_fork_asm+0x1a/0x30
[   16.200873] 
[   16.200962] The buggy address belongs to the object at ffff8881026ce080
[   16.200962]  which belongs to the cache kmalloc-64 of size 64
[   16.201458] The buggy address is located 0 bytes to the right of
[   16.201458]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.201907] 
[   16.201983] The buggy address belongs to the physical page:
[   16.202224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.202598] flags: 0x200000000000000(node=0|zone=2)
[   16.202843] page_type: f5(slab)
[   16.202989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.203253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.203496] page dumped because: kasan: bad access detected
[   16.203778] 
[   16.203876] Memory state around the buggy address:
[   16.204113]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.204445]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.204790] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.205018]                                      ^
[   16.205255]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205536]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205776] ==================================================================
[   14.962151] ==================================================================
[   14.962480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.963009] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.963739] 
[   14.963841] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.964775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.964820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.964847] Call Trace:
[   14.964870]  <TASK>
[   14.964892]  dump_stack_lvl+0x73/0xb0
[   14.964927]  print_report+0xd1/0x610
[   14.964952]  ? __virt_addr_valid+0x1db/0x2d0
[   14.964978]  ? kasan_atomics_helper+0x72f/0x5450
[   14.965000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.965024]  ? kasan_atomics_helper+0x72f/0x5450
[   14.965048]  kasan_report+0x141/0x180
[   14.965180]  ? kasan_atomics_helper+0x72f/0x5450
[   14.965209]  kasan_check_range+0x10c/0x1c0
[   14.965234]  __kasan_check_write+0x18/0x20
[   14.965253]  kasan_atomics_helper+0x72f/0x5450
[   14.965277]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.965300]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.965326]  ? kasan_atomics+0x152/0x310
[   14.965355]  kasan_atomics+0x1dc/0x310
[   14.965378]  ? __pfx_kasan_atomics+0x10/0x10
[   14.965404]  ? __pfx_read_tsc+0x10/0x10
[   14.965425]  ? ktime_get_ts64+0x86/0x230
[   14.965450]  kunit_try_run_case+0x1a5/0x480
[   14.965476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.965499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.965524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.965549]  ? __kthread_parkme+0x82/0x180
[   14.965594]  ? preempt_count_sub+0x50/0x80
[   14.965620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.965645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.965670]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.965694]  kthread+0x337/0x6f0
[   14.965714]  ? trace_preempt_on+0x20/0xc0
[   14.965739]  ? __pfx_kthread+0x10/0x10
[   14.965760]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.965782]  ? calculate_sigpending+0x7b/0xa0
[   14.965864]  ? __pfx_kthread+0x10/0x10
[   14.965886]  ret_from_fork+0x116/0x1d0
[   14.965906]  ? __pfx_kthread+0x10/0x10
[   14.965927]  ret_from_fork_asm+0x1a/0x30
[   14.965960]  </TASK>
[   14.965972] 
[   14.977222] Allocated by task 282:
[   14.977376]  kasan_save_stack+0x45/0x70
[   14.977718]  kasan_save_track+0x18/0x40
[   14.977929]  kasan_save_alloc_info+0x3b/0x50
[   14.978345]  __kasan_kmalloc+0xb7/0xc0
[   14.978638]  __kmalloc_cache_noprof+0x189/0x420
[   14.978952]  kasan_atomics+0x95/0x310
[   14.979167]  kunit_try_run_case+0x1a5/0x480
[   14.979438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.979940]  kthread+0x337/0x6f0
[   14.980155]  ret_from_fork+0x116/0x1d0
[   14.980347]  ret_from_fork_asm+0x1a/0x30
[   14.980545] 
[   14.980672] The buggy address belongs to the object at ffff8881026ce080
[   14.980672]  which belongs to the cache kmalloc-64 of size 64
[   14.981476] The buggy address is located 0 bytes to the right of
[   14.981476]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.982115] 
[   14.982226] The buggy address belongs to the physical page:
[   14.982477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.982824] flags: 0x200000000000000(node=0|zone=2)
[   14.983148] page_type: f5(slab)
[   14.983471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.984127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.984621] page dumped because: kasan: bad access detected
[   14.984868] 
[   14.984963] Memory state around the buggy address:
[   14.985196]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.985495]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.985818] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.986221]                                      ^
[   14.986378]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.986720]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987019] ==================================================================
[   15.410682] ==================================================================
[   15.411180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.411750] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.412612] 
[   15.412704] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.413103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.413117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.413140] Call Trace:
[   15.413157]  <TASK>
[   15.413174]  dump_stack_lvl+0x73/0xb0
[   15.413204]  print_report+0xd1/0x610
[   15.413226]  ? __virt_addr_valid+0x1db/0x2d0
[   15.413251]  ? kasan_atomics_helper+0x1148/0x5450
[   15.413274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.413298]  ? kasan_atomics_helper+0x1148/0x5450
[   15.413320]  kasan_report+0x141/0x180
[   15.413344]  ? kasan_atomics_helper+0x1148/0x5450
[   15.413372]  kasan_check_range+0x10c/0x1c0
[   15.413395]  __kasan_check_write+0x18/0x20
[   15.413416]  kasan_atomics_helper+0x1148/0x5450
[   15.413439]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.413462]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.413488]  ? kasan_atomics+0x152/0x310
[   15.413517]  kasan_atomics+0x1dc/0x310
[   15.413539]  ? __pfx_kasan_atomics+0x10/0x10
[   15.413565]  ? __pfx_read_tsc+0x10/0x10
[   15.413600]  ? ktime_get_ts64+0x86/0x230
[   15.413626]  kunit_try_run_case+0x1a5/0x480
[   15.413651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.413674]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.413700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.413724]  ? __kthread_parkme+0x82/0x180
[   15.413745]  ? preempt_count_sub+0x50/0x80
[   15.413770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.413795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.413821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.413845]  kthread+0x337/0x6f0
[   15.413865]  ? trace_preempt_on+0x20/0xc0
[   15.413889]  ? __pfx_kthread+0x10/0x10
[   15.413909]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.413933]  ? calculate_sigpending+0x7b/0xa0
[   15.413957]  ? __pfx_kthread+0x10/0x10
[   15.413979]  ret_from_fork+0x116/0x1d0
[   15.413998]  ? __pfx_kthread+0x10/0x10
[   15.414019]  ret_from_fork_asm+0x1a/0x30
[   15.414062]  </TASK>
[   15.414072] 
[   15.425923] Allocated by task 282:
[   15.426370]  kasan_save_stack+0x45/0x70
[   15.426581]  kasan_save_track+0x18/0x40
[   15.426765]  kasan_save_alloc_info+0x3b/0x50
[   15.427093]  __kasan_kmalloc+0xb7/0xc0
[   15.427641]  __kmalloc_cache_noprof+0x189/0x420
[   15.428121]  kasan_atomics+0x95/0x310
[   15.428299]  kunit_try_run_case+0x1a5/0x480
[   15.428867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.429317]  kthread+0x337/0x6f0
[   15.429524]  ret_from_fork+0x116/0x1d0
[   15.429980]  ret_from_fork_asm+0x1a/0x30
[   15.430208] 
[   15.430313] The buggy address belongs to the object at ffff8881026ce080
[   15.430313]  which belongs to the cache kmalloc-64 of size 64
[   15.431213] The buggy address is located 0 bytes to the right of
[   15.431213]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.432220] 
[   15.432305] The buggy address belongs to the physical page:
[   15.432769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.433160] flags: 0x200000000000000(node=0|zone=2)
[   15.433545] page_type: f5(slab)
[   15.433767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.434491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.434928] page dumped because: kasan: bad access detected
[   15.435216] 
[   15.435305] Memory state around the buggy address:
[   15.435519]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.436444]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.437004] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.437441]                                      ^
[   15.437846]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.438371]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.438873] ==================================================================
[   15.221087] ==================================================================
[   15.221743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.222454] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.222722] 
[   15.222822] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.222870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.222884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.222910] Call Trace:
[   15.222931]  <TASK>
[   15.222952]  dump_stack_lvl+0x73/0xb0
[   15.223680]  print_report+0xd1/0x610
[   15.223708]  ? __virt_addr_valid+0x1db/0x2d0
[   15.223735]  ? kasan_atomics_helper+0xd47/0x5450
[   15.223758]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.223783]  ? kasan_atomics_helper+0xd47/0x5450
[   15.223806]  kasan_report+0x141/0x180
[   15.223829]  ? kasan_atomics_helper+0xd47/0x5450
[   15.223861]  kasan_check_range+0x10c/0x1c0
[   15.223888]  __kasan_check_write+0x18/0x20
[   15.223908]  kasan_atomics_helper+0xd47/0x5450
[   15.223932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.223956]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.223982]  ? kasan_atomics+0x152/0x310
[   15.224012]  kasan_atomics+0x1dc/0x310
[   15.224035]  ? __pfx_kasan_atomics+0x10/0x10
[   15.224180]  ? __pfx_read_tsc+0x10/0x10
[   15.224206]  ? ktime_get_ts64+0x86/0x230
[   15.224232]  kunit_try_run_case+0x1a5/0x480
[   15.224261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.224284]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.224311]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.224336]  ? __kthread_parkme+0x82/0x180
[   15.224359]  ? preempt_count_sub+0x50/0x80
[   15.224385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.224409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.224434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.224459]  kthread+0x337/0x6f0
[   15.224479]  ? trace_preempt_on+0x20/0xc0
[   15.224505]  ? __pfx_kthread+0x10/0x10
[   15.224525]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.224547]  ? calculate_sigpending+0x7b/0xa0
[   15.224596]  ? __pfx_kthread+0x10/0x10
[   15.224619]  ret_from_fork+0x116/0x1d0
[   15.224637]  ? __pfx_kthread+0x10/0x10
[   15.224659]  ret_from_fork_asm+0x1a/0x30
[   15.224693]  </TASK>
[   15.224705] 
[   15.240042] Allocated by task 282:
[   15.240505]  kasan_save_stack+0x45/0x70
[   15.240980]  kasan_save_track+0x18/0x40
[   15.241186]  kasan_save_alloc_info+0x3b/0x50
[   15.241392]  __kasan_kmalloc+0xb7/0xc0
[   15.241569]  __kmalloc_cache_noprof+0x189/0x420
[   15.241777]  kasan_atomics+0x95/0x310
[   15.242213]  kunit_try_run_case+0x1a5/0x480
[   15.242642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.243133]  kthread+0x337/0x6f0
[   15.243502]  ret_from_fork+0x116/0x1d0
[   15.243840]  ret_from_fork_asm+0x1a/0x30
[   15.244201] 
[   15.244300] The buggy address belongs to the object at ffff8881026ce080
[   15.244300]  which belongs to the cache kmalloc-64 of size 64
[   15.245376] The buggy address is located 0 bytes to the right of
[   15.245376]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.246152] 
[   15.246262] The buggy address belongs to the physical page:
[   15.246505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.247564] flags: 0x200000000000000(node=0|zone=2)
[   15.248025] page_type: f5(slab)
[   15.248455] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.249139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.249678] page dumped because: kasan: bad access detected
[   15.250103] 
[   15.250205] Memory state around the buggy address:
[   15.250418]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.251110]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.251653] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.252176]                                      ^
[   15.252395]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.252944]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253461] ==================================================================
[   15.470457] ==================================================================
[   15.470714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.471260] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.472328] 
[   15.472475] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.472523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.472535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.472558] Call Trace:
[   15.472574]  <TASK>
[   15.472591]  dump_stack_lvl+0x73/0xb0
[   15.472622]  print_report+0xd1/0x610
[   15.472744]  ? __virt_addr_valid+0x1db/0x2d0
[   15.472801]  ? kasan_atomics_helper+0x1217/0x5450
[   15.472836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.472975]  ? kasan_atomics_helper+0x1217/0x5450
[   15.472998]  kasan_report+0x141/0x180
[   15.473021]  ? kasan_atomics_helper+0x1217/0x5450
[   15.473061]  kasan_check_range+0x10c/0x1c0
[   15.473085]  __kasan_check_write+0x18/0x20
[   15.473106]  kasan_atomics_helper+0x1217/0x5450
[   15.473130]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.473153]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.473180]  ? kasan_atomics+0x152/0x310
[   15.473208]  kasan_atomics+0x1dc/0x310
[   15.473232]  ? __pfx_kasan_atomics+0x10/0x10
[   15.473256]  ? __pfx_read_tsc+0x10/0x10
[   15.473278]  ? ktime_get_ts64+0x86/0x230
[   15.473303]  kunit_try_run_case+0x1a5/0x480
[   15.473329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.473351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.473378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.473402]  ? __kthread_parkme+0x82/0x180
[   15.473423]  ? preempt_count_sub+0x50/0x80
[   15.473448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.473472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.473497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.473522]  kthread+0x337/0x6f0
[   15.473542]  ? trace_preempt_on+0x20/0xc0
[   15.473566]  ? __pfx_kthread+0x10/0x10
[   15.473588]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.473609]  ? calculate_sigpending+0x7b/0xa0
[   15.473634]  ? __pfx_kthread+0x10/0x10
[   15.473657]  ret_from_fork+0x116/0x1d0
[   15.473675]  ? __pfx_kthread+0x10/0x10
[   15.473696]  ret_from_fork_asm+0x1a/0x30
[   15.473729]  </TASK>
[   15.473739] 
[   15.486036] Allocated by task 282:
[   15.486193]  kasan_save_stack+0x45/0x70
[   15.486355]  kasan_save_track+0x18/0x40
[   15.487007]  kasan_save_alloc_info+0x3b/0x50
[   15.487209]  __kasan_kmalloc+0xb7/0xc0
[   15.487352]  __kmalloc_cache_noprof+0x189/0x420
[   15.487513]  kasan_atomics+0x95/0x310
[   15.487651]  kunit_try_run_case+0x1a5/0x480
[   15.487800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.487979]  kthread+0x337/0x6f0
[   15.488114]  ret_from_fork+0x116/0x1d0
[   15.488251]  ret_from_fork_asm+0x1a/0x30
[   15.488472] 
[   15.488570] The buggy address belongs to the object at ffff8881026ce080
[   15.488570]  which belongs to the cache kmalloc-64 of size 64
[   15.490506] The buggy address is located 0 bytes to the right of
[   15.490506]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.490895] 
[   15.490972] The buggy address belongs to the physical page:
[   15.491519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.492329] flags: 0x200000000000000(node=0|zone=2)
[   15.492518] page_type: f5(slab)
[   15.492647] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.492877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.494314] page dumped because: kasan: bad access detected
[   15.495361] 
[   15.495446] Memory state around the buggy address:
[   15.495619]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.495839]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.496612] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.497304]                                      ^
[   15.497778]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.498620]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.499300] ==================================================================
[   15.094987] ==================================================================
[   15.095384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.095739] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.096058] 
[   15.096158] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.096232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.096247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.096271] Call Trace:
[   15.096292]  <TASK>
[   15.096314]  dump_stack_lvl+0x73/0xb0
[   15.096364]  print_report+0xd1/0x610
[   15.096388]  ? __virt_addr_valid+0x1db/0x2d0
[   15.096412]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.096456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.096480]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.096503]  kasan_report+0x141/0x180
[   15.096545]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.096606]  kasan_check_range+0x10c/0x1c0
[   15.096632]  __kasan_check_write+0x18/0x20
[   15.096651]  kasan_atomics_helper+0xa2b/0x5450
[   15.096675]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.096699]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.096724]  ? kasan_atomics+0x152/0x310
[   15.096754]  kasan_atomics+0x1dc/0x310
[   15.096777]  ? __pfx_kasan_atomics+0x10/0x10
[   15.096820]  ? __pfx_read_tsc+0x10/0x10
[   15.096844]  ? ktime_get_ts64+0x86/0x230
[   15.096870]  kunit_try_run_case+0x1a5/0x480
[   15.096897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.096921]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.096948]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.096973]  ? __kthread_parkme+0x82/0x180
[   15.096995]  ? preempt_count_sub+0x50/0x80
[   15.097022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.097046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.097081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.097106]  kthread+0x337/0x6f0
[   15.097126]  ? trace_preempt_on+0x20/0xc0
[   15.097150]  ? __pfx_kthread+0x10/0x10
[   15.097172]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.097195]  ? calculate_sigpending+0x7b/0xa0
[   15.097221]  ? __pfx_kthread+0x10/0x10
[   15.097283]  ret_from_fork+0x116/0x1d0
[   15.097304]  ? __pfx_kthread+0x10/0x10
[   15.097325]  ret_from_fork_asm+0x1a/0x30
[   15.097360]  </TASK>
[   15.097370] 
[   15.110249] Allocated by task 282:
[   15.110439]  kasan_save_stack+0x45/0x70
[   15.111078]  kasan_save_track+0x18/0x40
[   15.111451]  kasan_save_alloc_info+0x3b/0x50
[   15.111697]  __kasan_kmalloc+0xb7/0xc0
[   15.112031]  __kmalloc_cache_noprof+0x189/0x420
[   15.112435]  kasan_atomics+0x95/0x310
[   15.112783]  kunit_try_run_case+0x1a5/0x480
[   15.113215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.113665]  kthread+0x337/0x6f0
[   15.114102]  ret_from_fork+0x116/0x1d0
[   15.114299]  ret_from_fork_asm+0x1a/0x30
[   15.114489] 
[   15.114883] The buggy address belongs to the object at ffff8881026ce080
[   15.114883]  which belongs to the cache kmalloc-64 of size 64
[   15.116156] The buggy address is located 0 bytes to the right of
[   15.116156]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.116544] 
[   15.116963] The buggy address belongs to the physical page:
[   15.117738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.118629] flags: 0x200000000000000(node=0|zone=2)
[   15.119299] page_type: f5(slab)
[   15.119614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.120037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.120284] page dumped because: kasan: bad access detected
[   15.120457] 
[   15.120528] Memory state around the buggy address:
[   15.120767]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.121335]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.121830] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.122464]                                      ^
[   15.122697]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.123628]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.124151] ==================================================================
[   15.996967] ==================================================================
[   15.997560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.997974] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.998230] 
[   15.998323] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.998366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.998379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.998403] Call Trace:
[   15.998420]  <TASK>
[   15.998437]  dump_stack_lvl+0x73/0xb0
[   15.998468]  print_report+0xd1/0x610
[   15.998491]  ? __virt_addr_valid+0x1db/0x2d0
[   15.998515]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.998537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.998561]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.998584]  kasan_report+0x141/0x180
[   15.998618]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.998647]  kasan_check_range+0x10c/0x1c0
[   15.998672]  __kasan_check_write+0x18/0x20
[   15.998692]  kasan_atomics_helper+0x1eaa/0x5450
[   15.998717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.998740]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.998767]  ? kasan_atomics+0x152/0x310
[   15.998796]  kasan_atomics+0x1dc/0x310
[   15.998820]  ? __pfx_kasan_atomics+0x10/0x10
[   15.998846]  ? __pfx_read_tsc+0x10/0x10
[   15.998868]  ? ktime_get_ts64+0x86/0x230
[   15.998906]  kunit_try_run_case+0x1a5/0x480
[   15.998932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.998976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.999003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.999028]  ? __kthread_parkme+0x82/0x180
[   15.999079]  ? preempt_count_sub+0x50/0x80
[   15.999105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.999130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.999155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.999181]  kthread+0x337/0x6f0
[   15.999200]  ? trace_preempt_on+0x20/0xc0
[   15.999225]  ? __pfx_kthread+0x10/0x10
[   15.999246]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.999268]  ? calculate_sigpending+0x7b/0xa0
[   15.999294]  ? __pfx_kthread+0x10/0x10
[   15.999316]  ret_from_fork+0x116/0x1d0
[   15.999335]  ? __pfx_kthread+0x10/0x10
[   15.999356]  ret_from_fork_asm+0x1a/0x30
[   15.999389]  </TASK>
[   15.999399] 
[   16.010449] Allocated by task 282:
[   16.011030]  kasan_save_stack+0x45/0x70
[   16.011242]  kasan_save_track+0x18/0x40
[   16.011808]  kasan_save_alloc_info+0x3b/0x50
[   16.012009]  __kasan_kmalloc+0xb7/0xc0
[   16.012157]  __kmalloc_cache_noprof+0x189/0x420
[   16.012689]  kasan_atomics+0x95/0x310
[   16.012831]  kunit_try_run_case+0x1a5/0x480
[   16.012976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.013267]  kthread+0x337/0x6f0
[   16.013395]  ret_from_fork+0x116/0x1d0
[   16.013531]  ret_from_fork_asm+0x1a/0x30
[   16.013674] 
[   16.013747] The buggy address belongs to the object at ffff8881026ce080
[   16.013747]  which belongs to the cache kmalloc-64 of size 64
[   16.014115] The buggy address is located 0 bytes to the right of
[   16.014115]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.014498] 
[   16.014598] The buggy address belongs to the physical page:
[   16.014858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.015233] flags: 0x200000000000000(node=0|zone=2)
[   16.015474] page_type: f5(slab)
[   16.015596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.015831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.017092] page dumped because: kasan: bad access detected
[   16.017364] 
[   16.017461] Memory state around the buggy address:
[   16.017724]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.017992]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.018263] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.018975]                                      ^
[   16.019238]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.019568]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.019880] ==================================================================
[   16.117138] ==================================================================
[   16.117643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.117993] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.118333] 
[   16.118443] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.118485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.118496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.118518] Call Trace:
[   16.118532]  <TASK>
[   16.118546]  dump_stack_lvl+0x73/0xb0
[   16.118573]  print_report+0xd1/0x610
[   16.118595]  ? __virt_addr_valid+0x1db/0x2d0
[   16.118648]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.118671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.118695]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.118717]  kasan_report+0x141/0x180
[   16.118740]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.118768]  __asan_report_load8_noabort+0x18/0x20
[   16.118793]  kasan_atomics_helper+0x4fb2/0x5450
[   16.118817]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.118840]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.118865]  ? kasan_atomics+0x152/0x310
[   16.118894]  kasan_atomics+0x1dc/0x310
[   16.118918]  ? __pfx_kasan_atomics+0x10/0x10
[   16.118943]  ? __pfx_read_tsc+0x10/0x10
[   16.118964]  ? ktime_get_ts64+0x86/0x230
[   16.118988]  kunit_try_run_case+0x1a5/0x480
[   16.119013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.119036]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.119073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.119098]  ? __kthread_parkme+0x82/0x180
[   16.119118]  ? preempt_count_sub+0x50/0x80
[   16.119143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.119168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.119208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.119233]  kthread+0x337/0x6f0
[   16.119253]  ? trace_preempt_on+0x20/0xc0
[   16.119277]  ? __pfx_kthread+0x10/0x10
[   16.119299]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.119322]  ? calculate_sigpending+0x7b/0xa0
[   16.119346]  ? __pfx_kthread+0x10/0x10
[   16.119368]  ret_from_fork+0x116/0x1d0
[   16.119387]  ? __pfx_kthread+0x10/0x10
[   16.119409]  ret_from_fork_asm+0x1a/0x30
[   16.119442]  </TASK>
[   16.119452] 
[   16.126876] Allocated by task 282:
[   16.127022]  kasan_save_stack+0x45/0x70
[   16.127184]  kasan_save_track+0x18/0x40
[   16.127396]  kasan_save_alloc_info+0x3b/0x50
[   16.127605]  __kasan_kmalloc+0xb7/0xc0
[   16.127815]  __kmalloc_cache_noprof+0x189/0x420
[   16.128077]  kasan_atomics+0x95/0x310
[   16.128235]  kunit_try_run_case+0x1a5/0x480
[   16.128445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.128742]  kthread+0x337/0x6f0
[   16.128873]  ret_from_fork+0x116/0x1d0
[   16.129011]  ret_from_fork_asm+0x1a/0x30
[   16.129165] 
[   16.129278] The buggy address belongs to the object at ffff8881026ce080
[   16.129278]  which belongs to the cache kmalloc-64 of size 64
[   16.129809] The buggy address is located 0 bytes to the right of
[   16.129809]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.130341] 
[   16.130416] The buggy address belongs to the physical page:
[   16.130593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.130962] flags: 0x200000000000000(node=0|zone=2)
[   16.131241] page_type: f5(slab)
[   16.131440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.131927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.132253] page dumped because: kasan: bad access detected
[   16.132476] 
[   16.132549] Memory state around the buggy address:
[   16.132706]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.133027]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.133347] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.133573]                                      ^
[   16.133819]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.134103]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.134354] ==================================================================
[   14.764507] ==================================================================
[   14.764910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.765352] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.765659] 
[   14.765781] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.765868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.765880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.765903] Call Trace:
[   14.765920]  <TASK>
[   14.765939]  dump_stack_lvl+0x73/0xb0
[   14.765970]  print_report+0xd1/0x610
[   14.765992]  ? __virt_addr_valid+0x1db/0x2d0
[   14.766015]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.766035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.766070]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.766092]  kasan_report+0x141/0x180
[   14.766113]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.766140]  __asan_report_load4_noabort+0x18/0x20
[   14.766164]  kasan_atomics_helper+0x4b88/0x5450
[   14.766186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.766212]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.766237]  ? kasan_atomics+0x152/0x310
[   14.766263]  kasan_atomics+0x1dc/0x310
[   14.766286]  ? __pfx_kasan_atomics+0x10/0x10
[   14.766310]  ? __pfx_read_tsc+0x10/0x10
[   14.766330]  ? ktime_get_ts64+0x86/0x230
[   14.766355]  kunit_try_run_case+0x1a5/0x480
[   14.766380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.766402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.766427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.766450]  ? __kthread_parkme+0x82/0x180
[   14.766470]  ? preempt_count_sub+0x50/0x80
[   14.766495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.766518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.766542]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.766566]  kthread+0x337/0x6f0
[   14.766584]  ? trace_preempt_on+0x20/0xc0
[   14.766607]  ? __pfx_kthread+0x10/0x10
[   14.766627]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.766648]  ? calculate_sigpending+0x7b/0xa0
[   14.766672]  ? __pfx_kthread+0x10/0x10
[   14.766693]  ret_from_fork+0x116/0x1d0
[   14.766711]  ? __pfx_kthread+0x10/0x10
[   14.766731]  ret_from_fork_asm+0x1a/0x30
[   14.766764]  </TASK>
[   14.766774] 
[   14.775194] Allocated by task 282:
[   14.775383]  kasan_save_stack+0x45/0x70
[   14.775586]  kasan_save_track+0x18/0x40
[   14.775763]  kasan_save_alloc_info+0x3b/0x50
[   14.776013]  __kasan_kmalloc+0xb7/0xc0
[   14.776197]  __kmalloc_cache_noprof+0x189/0x420
[   14.776414]  kasan_atomics+0x95/0x310
[   14.776606]  kunit_try_run_case+0x1a5/0x480
[   14.776792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.777016]  kthread+0x337/0x6f0
[   14.777281]  ret_from_fork+0x116/0x1d0
[   14.777465]  ret_from_fork_asm+0x1a/0x30
[   14.777745] 
[   14.777907] The buggy address belongs to the object at ffff8881026ce080
[   14.777907]  which belongs to the cache kmalloc-64 of size 64
[   14.778295] The buggy address is located 0 bytes to the right of
[   14.778295]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.778830] 
[   14.778927] The buggy address belongs to the physical page:
[   14.779187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.779511] flags: 0x200000000000000(node=0|zone=2)
[   14.779678] page_type: f5(slab)
[   14.779800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.780035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.780579] page dumped because: kasan: bad access detected
[   14.780912] 
[   14.781010] Memory state around the buggy address:
[   14.781250]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.781468]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.782086] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.782355]                                      ^
[   14.782577]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.782943]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.783217] ==================================================================
[   16.079232] ==================================================================
[   16.079571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.079909] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.080249] 
[   16.080350] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.080390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.080402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.080423] Call Trace:
[   16.080439]  <TASK>
[   16.080454]  dump_stack_lvl+0x73/0xb0
[   16.080482]  print_report+0xd1/0x610
[   16.080504]  ? __virt_addr_valid+0x1db/0x2d0
[   16.080528]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.080549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.080573]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.080621]  kasan_report+0x141/0x180
[   16.080644]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.080673]  __asan_report_load8_noabort+0x18/0x20
[   16.080698]  kasan_atomics_helper+0x4f98/0x5450
[   16.080722]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.080745]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.080770]  ? kasan_atomics+0x152/0x310
[   16.080798]  kasan_atomics+0x1dc/0x310
[   16.080821]  ? __pfx_kasan_atomics+0x10/0x10
[   16.080846]  ? __pfx_read_tsc+0x10/0x10
[   16.080888]  ? ktime_get_ts64+0x86/0x230
[   16.080914]  kunit_try_run_case+0x1a5/0x480
[   16.080938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.080961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.080987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.081011]  ? __kthread_parkme+0x82/0x180
[   16.081047]  ? preempt_count_sub+0x50/0x80
[   16.081081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.081105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.081130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.081156]  kthread+0x337/0x6f0
[   16.081175]  ? trace_preempt_on+0x20/0xc0
[   16.081199]  ? __pfx_kthread+0x10/0x10
[   16.081238]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.081261]  ? calculate_sigpending+0x7b/0xa0
[   16.081286]  ? __pfx_kthread+0x10/0x10
[   16.081309]  ret_from_fork+0x116/0x1d0
[   16.081328]  ? __pfx_kthread+0x10/0x10
[   16.081349]  ret_from_fork_asm+0x1a/0x30
[   16.081382]  </TASK>
[   16.081392] 
[   16.088908] Allocated by task 282:
[   16.089036]  kasan_save_stack+0x45/0x70
[   16.089192]  kasan_save_track+0x18/0x40
[   16.089375]  kasan_save_alloc_info+0x3b/0x50
[   16.089587]  __kasan_kmalloc+0xb7/0xc0
[   16.089801]  __kmalloc_cache_noprof+0x189/0x420
[   16.090024]  kasan_atomics+0x95/0x310
[   16.090249]  kunit_try_run_case+0x1a5/0x480
[   16.090464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.090735]  kthread+0x337/0x6f0
[   16.090878]  ret_from_fork+0x116/0x1d0
[   16.091014]  ret_from_fork_asm+0x1a/0x30
[   16.091165] 
[   16.091237] The buggy address belongs to the object at ffff8881026ce080
[   16.091237]  which belongs to the cache kmalloc-64 of size 64
[   16.091722] The buggy address is located 0 bytes to the right of
[   16.091722]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.092771] 
[   16.092873] The buggy address belongs to the physical page:
[   16.093148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.093491] flags: 0x200000000000000(node=0|zone=2)
[   16.093714] page_type: f5(slab)
[   16.093836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.094109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.094473] page dumped because: kasan: bad access detected
[   16.094800] 
[   16.094871] Memory state around the buggy address:
[   16.095083]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.095424]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.095686] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.096149]                                      ^
[   16.096316]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.096536]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.097206] ==================================================================
[   15.190998] ==================================================================
[   15.191695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.193498] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.195137] 
[   15.195268] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.195317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.195330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.195355] Call Trace:
[   15.195375]  <TASK>
[   15.195394]  dump_stack_lvl+0x73/0xb0
[   15.195427]  print_report+0xd1/0x610
[   15.195450]  ? __virt_addr_valid+0x1db/0x2d0
[   15.195475]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.195498]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.195521]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.195544]  kasan_report+0x141/0x180
[   15.195568]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.196042]  __asan_report_load4_noabort+0x18/0x20
[   15.196090]  kasan_atomics_helper+0x4a84/0x5450
[   15.196115]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.196139]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.196165]  ? kasan_atomics+0x152/0x310
[   15.196195]  kasan_atomics+0x1dc/0x310
[   15.196217]  ? __pfx_kasan_atomics+0x10/0x10
[   15.196243]  ? __pfx_read_tsc+0x10/0x10
[   15.196265]  ? ktime_get_ts64+0x86/0x230
[   15.196292]  kunit_try_run_case+0x1a5/0x480
[   15.196318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.196342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.196368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.196392]  ? __kthread_parkme+0x82/0x180
[   15.196414]  ? preempt_count_sub+0x50/0x80
[   15.196439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.196464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.196490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.196515]  kthread+0x337/0x6f0
[   15.196535]  ? trace_preempt_on+0x20/0xc0
[   15.196559]  ? __pfx_kthread+0x10/0x10
[   15.196580]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.196602]  ? calculate_sigpending+0x7b/0xa0
[   15.196628]  ? __pfx_kthread+0x10/0x10
[   15.196651]  ret_from_fork+0x116/0x1d0
[   15.196669]  ? __pfx_kthread+0x10/0x10
[   15.196691]  ret_from_fork_asm+0x1a/0x30
[   15.196724]  </TASK>
[   15.196736] 
[   15.210547] Allocated by task 282:
[   15.210902]  kasan_save_stack+0x45/0x70
[   15.211405]  kasan_save_track+0x18/0x40
[   15.211576]  kasan_save_alloc_info+0x3b/0x50
[   15.211998]  __kasan_kmalloc+0xb7/0xc0
[   15.212374]  __kmalloc_cache_noprof+0x189/0x420
[   15.212877]  kasan_atomics+0x95/0x310
[   15.213016]  kunit_try_run_case+0x1a5/0x480
[   15.213175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.213353]  kthread+0x337/0x6f0
[   15.213475]  ret_from_fork+0x116/0x1d0
[   15.213633]  ret_from_fork_asm+0x1a/0x30
[   15.213776] 
[   15.213854] The buggy address belongs to the object at ffff8881026ce080
[   15.213854]  which belongs to the cache kmalloc-64 of size 64
[   15.214273] The buggy address is located 0 bytes to the right of
[   15.214273]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.214885] 
[   15.214985] The buggy address belongs to the physical page:
[   15.215256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.215570] flags: 0x200000000000000(node=0|zone=2)
[   15.215840] page_type: f5(slab)
[   15.215966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.216975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.217284] page dumped because: kasan: bad access detected
[   15.217530] 
[   15.217604] Memory state around the buggy address:
[   15.217982]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.218282]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.218743] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.219335]                                      ^
[   15.219548]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.220039]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.220374] ==================================================================
[   16.021753] ==================================================================
[   16.022839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.023144] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.023423] 
[   16.023524] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.023570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.023583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.023606] Call Trace:
[   16.023625]  <TASK>
[   16.023646]  dump_stack_lvl+0x73/0xb0
[   16.023677]  print_report+0xd1/0x610
[   16.023700]  ? __virt_addr_valid+0x1db/0x2d0
[   16.023723]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.023745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.023769]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.023792]  kasan_report+0x141/0x180
[   16.023816]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.023862]  kasan_check_range+0x10c/0x1c0
[   16.023887]  __kasan_check_write+0x18/0x20
[   16.023907]  kasan_atomics_helper+0x1f43/0x5450
[   16.023931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.023954]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.023981]  ? kasan_atomics+0x152/0x310
[   16.024009]  kasan_atomics+0x1dc/0x310
[   16.024032]  ? __pfx_kasan_atomics+0x10/0x10
[   16.024828]  ? __pfx_read_tsc+0x10/0x10
[   16.024860]  ? ktime_get_ts64+0x86/0x230
[   16.024887]  kunit_try_run_case+0x1a5/0x480
[   16.024915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.024938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.024965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.024989]  ? __kthread_parkme+0x82/0x180
[   16.025011]  ? preempt_count_sub+0x50/0x80
[   16.025037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.025229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.025258]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.025283]  kthread+0x337/0x6f0
[   16.025306]  ? trace_preempt_on+0x20/0xc0
[   16.025330]  ? __pfx_kthread+0x10/0x10
[   16.025351]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.025374]  ? calculate_sigpending+0x7b/0xa0
[   16.025398]  ? __pfx_kthread+0x10/0x10
[   16.025420]  ret_from_fork+0x116/0x1d0
[   16.025439]  ? __pfx_kthread+0x10/0x10
[   16.025460]  ret_from_fork_asm+0x1a/0x30
[   16.025493]  </TASK>
[   16.025505] 
[   16.033872] Allocated by task 282:
[   16.034067]  kasan_save_stack+0x45/0x70
[   16.034279]  kasan_save_track+0x18/0x40
[   16.034419]  kasan_save_alloc_info+0x3b/0x50
[   16.034622]  __kasan_kmalloc+0xb7/0xc0
[   16.034909]  __kmalloc_cache_noprof+0x189/0x420
[   16.035090]  kasan_atomics+0x95/0x310
[   16.035227]  kunit_try_run_case+0x1a5/0x480
[   16.035440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.035894]  kthread+0x337/0x6f0
[   16.036081]  ret_from_fork+0x116/0x1d0
[   16.036289]  ret_from_fork_asm+0x1a/0x30
[   16.036451] 
[   16.036550] The buggy address belongs to the object at ffff8881026ce080
[   16.036550]  which belongs to the cache kmalloc-64 of size 64
[   16.037081] The buggy address is located 0 bytes to the right of
[   16.037081]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.037515] 
[   16.037609] The buggy address belongs to the physical page:
[   16.037907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.038213] flags: 0x200000000000000(node=0|zone=2)
[   16.038652] page_type: f5(slab)
[   16.038825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.039168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.039459] page dumped because: kasan: bad access detected
[   16.039717] 
[   16.039900] Memory state around the buggy address:
[   16.040068]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.040349]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.040763] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.040991]                                      ^
[   16.041157]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.041376]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.041589] ==================================================================
[   14.917383] ==================================================================
[   14.917745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.918178] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.918615] 
[   14.918734] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.918780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.918791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.918816] Call Trace:
[   14.918835]  <TASK>
[   14.918852]  dump_stack_lvl+0x73/0xb0
[   14.918883]  print_report+0xd1/0x610
[   14.918906]  ? __virt_addr_valid+0x1db/0x2d0
[   14.918930]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.918952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.918976]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.918999]  kasan_report+0x141/0x180
[   14.919021]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.919111]  kasan_check_range+0x10c/0x1c0
[   14.919139]  __kasan_check_write+0x18/0x20
[   14.919159]  kasan_atomics_helper+0x5fe/0x5450
[   14.919182]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.919206]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.919232]  ? kasan_atomics+0x152/0x310
[   14.919261]  kasan_atomics+0x1dc/0x310
[   14.919284]  ? __pfx_kasan_atomics+0x10/0x10
[   14.919310]  ? __pfx_read_tsc+0x10/0x10
[   14.919331]  ? ktime_get_ts64+0x86/0x230
[   14.919357]  kunit_try_run_case+0x1a5/0x480
[   14.919383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.919406]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.919431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.919456]  ? __kthread_parkme+0x82/0x180
[   14.919478]  ? preempt_count_sub+0x50/0x80
[   14.919504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.919528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.919553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.919578]  kthread+0x337/0x6f0
[   14.919597]  ? trace_preempt_on+0x20/0xc0
[   14.919622]  ? __pfx_kthread+0x10/0x10
[   14.919642]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.919665]  ? calculate_sigpending+0x7b/0xa0
[   14.919690]  ? __pfx_kthread+0x10/0x10
[   14.919712]  ret_from_fork+0x116/0x1d0
[   14.919731]  ? __pfx_kthread+0x10/0x10
[   14.919752]  ret_from_fork_asm+0x1a/0x30
[   14.919786]  </TASK>
[   14.919796] 
[   14.928216] Allocated by task 282:
[   14.928422]  kasan_save_stack+0x45/0x70
[   14.928647]  kasan_save_track+0x18/0x40
[   14.928788]  kasan_save_alloc_info+0x3b/0x50
[   14.929001]  __kasan_kmalloc+0xb7/0xc0
[   14.929199]  __kmalloc_cache_noprof+0x189/0x420
[   14.929413]  kasan_atomics+0x95/0x310
[   14.929574]  kunit_try_run_case+0x1a5/0x480
[   14.929958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.930204]  kthread+0x337/0x6f0
[   14.930332]  ret_from_fork+0x116/0x1d0
[   14.930482]  ret_from_fork_asm+0x1a/0x30
[   14.930790] 
[   14.930904] The buggy address belongs to the object at ffff8881026ce080
[   14.930904]  which belongs to the cache kmalloc-64 of size 64
[   14.931418] The buggy address is located 0 bytes to the right of
[   14.931418]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.932303] 
[   14.932403] The buggy address belongs to the physical page:
[   14.932671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.933078] flags: 0x200000000000000(node=0|zone=2)
[   14.933291] page_type: f5(slab)
[   14.933443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.933680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.933910] page dumped because: kasan: bad access detected
[   14.934136] 
[   14.934335] Memory state around the buggy address:
[   14.934564]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.934882]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.935497] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.936024]                                      ^
[   14.936330]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.936716]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.937130] ==================================================================
[   15.292574] ==================================================================
[   15.293099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.293397] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.293768] 
[   15.293980] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.294026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.294039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.294075] Call Trace:
[   15.294091]  <TASK>
[   15.294108]  dump_stack_lvl+0x73/0xb0
[   15.294138]  print_report+0xd1/0x610
[   15.294160]  ? __virt_addr_valid+0x1db/0x2d0
[   15.294184]  ? kasan_atomics_helper+0xf10/0x5450
[   15.294209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.294232]  ? kasan_atomics_helper+0xf10/0x5450
[   15.294255]  kasan_report+0x141/0x180
[   15.294277]  ? kasan_atomics_helper+0xf10/0x5450
[   15.294305]  kasan_check_range+0x10c/0x1c0
[   15.294330]  __kasan_check_write+0x18/0x20
[   15.294350]  kasan_atomics_helper+0xf10/0x5450
[   15.294373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.294396]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.294422]  ? kasan_atomics+0x152/0x310
[   15.294451]  kasan_atomics+0x1dc/0x310
[   15.294474]  ? __pfx_kasan_atomics+0x10/0x10
[   15.294499]  ? __pfx_read_tsc+0x10/0x10
[   15.294520]  ? ktime_get_ts64+0x86/0x230
[   15.294546]  kunit_try_run_case+0x1a5/0x480
[   15.294572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.294595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.294620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.294645]  ? __kthread_parkme+0x82/0x180
[   15.294666]  ? preempt_count_sub+0x50/0x80
[   15.294691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.294716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.294740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.294765]  kthread+0x337/0x6f0
[   15.294785]  ? trace_preempt_on+0x20/0xc0
[   15.294809]  ? __pfx_kthread+0x10/0x10
[   15.294830]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.294853]  ? calculate_sigpending+0x7b/0xa0
[   15.294877]  ? __pfx_kthread+0x10/0x10
[   15.294900]  ret_from_fork+0x116/0x1d0
[   15.294919]  ? __pfx_kthread+0x10/0x10
[   15.294939]  ret_from_fork_asm+0x1a/0x30
[   15.294973]  </TASK>
[   15.294984] 
[   15.303466] Allocated by task 282:
[   15.303632]  kasan_save_stack+0x45/0x70
[   15.303918]  kasan_save_track+0x18/0x40
[   15.304144]  kasan_save_alloc_info+0x3b/0x50
[   15.304364]  __kasan_kmalloc+0xb7/0xc0
[   15.304556]  __kmalloc_cache_noprof+0x189/0x420
[   15.304765]  kasan_atomics+0x95/0x310
[   15.305145]  kunit_try_run_case+0x1a5/0x480
[   15.305342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.305575]  kthread+0x337/0x6f0
[   15.305730]  ret_from_fork+0x116/0x1d0
[   15.306082]  ret_from_fork_asm+0x1a/0x30
[   15.306268] 
[   15.306366] The buggy address belongs to the object at ffff8881026ce080
[   15.306366]  which belongs to the cache kmalloc-64 of size 64
[   15.307019] The buggy address is located 0 bytes to the right of
[   15.307019]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.307396] 
[   15.307469] The buggy address belongs to the physical page:
[   15.307644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.308395] flags: 0x200000000000000(node=0|zone=2)
[   15.308643] page_type: f5(slab)
[   15.308814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.309215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.309911] page dumped because: kasan: bad access detected
[   15.310113] 
[   15.310186] Memory state around the buggy address:
[   15.310352]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.310674]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.311257] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.311582]                                      ^
[   15.311792]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.312072]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.312288] ==================================================================
[   14.814542] ==================================================================
[   14.815292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.815772] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.816358] 
[   14.816479] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.816529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.816541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.816564] Call Trace:
[   14.816584]  <TASK>
[   14.816604]  dump_stack_lvl+0x73/0xb0
[   14.816634]  print_report+0xd1/0x610
[   14.816658]  ? __virt_addr_valid+0x1db/0x2d0
[   14.816683]  ? kasan_atomics_helper+0x3df/0x5450
[   14.816705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.816729]  ? kasan_atomics_helper+0x3df/0x5450
[   14.816751]  kasan_report+0x141/0x180
[   14.816774]  ? kasan_atomics_helper+0x3df/0x5450
[   14.816802]  kasan_check_range+0x10c/0x1c0
[   14.816826]  __kasan_check_read+0x15/0x20
[   14.816845]  kasan_atomics_helper+0x3df/0x5450
[   14.816869]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.816892]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.816917]  ? kasan_atomics+0x152/0x310
[   14.816945]  kasan_atomics+0x1dc/0x310
[   14.816968]  ? __pfx_kasan_atomics+0x10/0x10
[   14.816993]  ? __pfx_read_tsc+0x10/0x10
[   14.817014]  ? ktime_get_ts64+0x86/0x230
[   14.817040]  kunit_try_run_case+0x1a5/0x480
[   14.817269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.817294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.817321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.817346]  ? __kthread_parkme+0x82/0x180
[   14.817367]  ? preempt_count_sub+0x50/0x80
[   14.817393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.817418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.817442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.817467]  kthread+0x337/0x6f0
[   14.817487]  ? trace_preempt_on+0x20/0xc0
[   14.817511]  ? __pfx_kthread+0x10/0x10
[   14.817532]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.817554]  ? calculate_sigpending+0x7b/0xa0
[   14.817579]  ? __pfx_kthread+0x10/0x10
[   14.817616]  ret_from_fork+0x116/0x1d0
[   14.817636]  ? __pfx_kthread+0x10/0x10
[   14.817657]  ret_from_fork_asm+0x1a/0x30
[   14.817691]  </TASK>
[   14.817701] 
[   14.826436] Allocated by task 282:
[   14.826631]  kasan_save_stack+0x45/0x70
[   14.826894]  kasan_save_track+0x18/0x40
[   14.827100]  kasan_save_alloc_info+0x3b/0x50
[   14.827315]  __kasan_kmalloc+0xb7/0xc0
[   14.827485]  __kmalloc_cache_noprof+0x189/0x420
[   14.827741]  kasan_atomics+0x95/0x310
[   14.827880]  kunit_try_run_case+0x1a5/0x480
[   14.828101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.828362]  kthread+0x337/0x6f0
[   14.828527]  ret_from_fork+0x116/0x1d0
[   14.828724]  ret_from_fork_asm+0x1a/0x30
[   14.828902] 
[   14.828978] The buggy address belongs to the object at ffff8881026ce080
[   14.828978]  which belongs to the cache kmalloc-64 of size 64
[   14.829499] The buggy address is located 0 bytes to the right of
[   14.829499]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.830009] 
[   14.830124] The buggy address belongs to the physical page:
[   14.830350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.830598] flags: 0x200000000000000(node=0|zone=2)
[   14.830767] page_type: f5(slab)
[   14.830898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.831253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.831587] page dumped because: kasan: bad access detected
[   14.831780] 
[   14.831850] Memory state around the buggy address:
[   14.832008]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.832623]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.833233] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.833507]                                      ^
[   14.833740]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.834077]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.834298] ==================================================================
[   15.312649] ==================================================================
[   15.312880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.313323] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.313771] 
[   15.313963] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.314006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.314018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.314041] Call Trace:
[   15.314070]  <TASK>
[   15.314086]  dump_stack_lvl+0x73/0xb0
[   15.314116]  print_report+0xd1/0x610
[   15.314138]  ? __virt_addr_valid+0x1db/0x2d0
[   15.314161]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.314182]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.314208]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.314231]  kasan_report+0x141/0x180
[   15.314253]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.314279]  kasan_check_range+0x10c/0x1c0
[   15.314303]  __kasan_check_write+0x18/0x20
[   15.314322]  kasan_atomics_helper+0xfa9/0x5450
[   15.314345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.314367]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.314392]  ? kasan_atomics+0x152/0x310
[   15.314419]  kasan_atomics+0x1dc/0x310
[   15.314442]  ? __pfx_kasan_atomics+0x10/0x10
[   15.314466]  ? __pfx_read_tsc+0x10/0x10
[   15.314487]  ? ktime_get_ts64+0x86/0x230
[   15.314513]  kunit_try_run_case+0x1a5/0x480
[   15.314540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.314565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.314590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.314614]  ? __kthread_parkme+0x82/0x180
[   15.314704]  ? preempt_count_sub+0x50/0x80
[   15.314732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.314759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.314786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.314851]  kthread+0x337/0x6f0
[   15.314873]  ? trace_preempt_on+0x20/0xc0
[   15.314897]  ? __pfx_kthread+0x10/0x10
[   15.314918]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.314942]  ? calculate_sigpending+0x7b/0xa0
[   15.314968]  ? __pfx_kthread+0x10/0x10
[   15.314991]  ret_from_fork+0x116/0x1d0
[   15.315010]  ? __pfx_kthread+0x10/0x10
[   15.315032]  ret_from_fork_asm+0x1a/0x30
[   15.315077]  </TASK>
[   15.315089] 
[   15.325528] Allocated by task 282:
[   15.325676]  kasan_save_stack+0x45/0x70
[   15.325828]  kasan_save_track+0x18/0x40
[   15.325962]  kasan_save_alloc_info+0x3b/0x50
[   15.326144]  __kasan_kmalloc+0xb7/0xc0
[   15.326339]  __kmalloc_cache_noprof+0x189/0x420
[   15.327091]  kasan_atomics+0x95/0x310
[   15.327498]  kunit_try_run_case+0x1a5/0x480
[   15.328009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.328535]  kthread+0x337/0x6f0
[   15.328960]  ret_from_fork+0x116/0x1d0
[   15.329323]  ret_from_fork_asm+0x1a/0x30
[   15.329748] 
[   15.329833] The buggy address belongs to the object at ffff8881026ce080
[   15.329833]  which belongs to the cache kmalloc-64 of size 64
[   15.330192] The buggy address is located 0 bytes to the right of
[   15.330192]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.330555] 
[   15.330628] The buggy address belongs to the physical page:
[   15.330800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.331036] flags: 0x200000000000000(node=0|zone=2)
[   15.331775] page_type: f5(slab)
[   15.332190] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.332981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.333802] page dumped because: kasan: bad access detected
[   15.334377] 
[   15.334613] Memory state around the buggy address:
[   15.335153]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335850]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.336516] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.337266]                                      ^
[   15.337757]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.338479]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.339248] ==================================================================
[   15.822172] ==================================================================
[   15.822499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.822918] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.823247] 
[   15.823368] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.823414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.823427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.823450] Call Trace:
[   15.823471]  <TASK>
[   15.823491]  dump_stack_lvl+0x73/0xb0
[   15.823520]  print_report+0xd1/0x610
[   15.823544]  ? __virt_addr_valid+0x1db/0x2d0
[   15.823576]  ? kasan_atomics_helper+0x194a/0x5450
[   15.823598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.823622]  ? kasan_atomics_helper+0x194a/0x5450
[   15.823645]  kasan_report+0x141/0x180
[   15.823668]  ? kasan_atomics_helper+0x194a/0x5450
[   15.823719]  kasan_check_range+0x10c/0x1c0
[   15.823745]  __kasan_check_write+0x18/0x20
[   15.823764]  kasan_atomics_helper+0x194a/0x5450
[   15.823800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.823824]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.823850]  ? kasan_atomics+0x152/0x310
[   15.823878]  kasan_atomics+0x1dc/0x310
[   15.823902]  ? __pfx_kasan_atomics+0x10/0x10
[   15.823927]  ? __pfx_read_tsc+0x10/0x10
[   15.823948]  ? ktime_get_ts64+0x86/0x230
[   15.823975]  kunit_try_run_case+0x1a5/0x480
[   15.824001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.824024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.824058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.824082]  ? __kthread_parkme+0x82/0x180
[   15.824106]  ? preempt_count_sub+0x50/0x80
[   15.824131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.824156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.824190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.824215]  kthread+0x337/0x6f0
[   15.824235]  ? trace_preempt_on+0x20/0xc0
[   15.824271]  ? __pfx_kthread+0x10/0x10
[   15.824293]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.824315]  ? calculate_sigpending+0x7b/0xa0
[   15.824351]  ? __pfx_kthread+0x10/0x10
[   15.824375]  ret_from_fork+0x116/0x1d0
[   15.824394]  ? __pfx_kthread+0x10/0x10
[   15.824414]  ret_from_fork_asm+0x1a/0x30
[   15.824448]  </TASK>
[   15.824460] 
[   15.832003] Allocated by task 282:
[   15.832146]  kasan_save_stack+0x45/0x70
[   15.832356]  kasan_save_track+0x18/0x40
[   15.832549]  kasan_save_alloc_info+0x3b/0x50
[   15.832832]  __kasan_kmalloc+0xb7/0xc0
[   15.833024]  __kmalloc_cache_noprof+0x189/0x420
[   15.833257]  kasan_atomics+0x95/0x310
[   15.833440]  kunit_try_run_case+0x1a5/0x480
[   15.833675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.833929]  kthread+0x337/0x6f0
[   15.834118]  ret_from_fork+0x116/0x1d0
[   15.834307]  ret_from_fork_asm+0x1a/0x30
[   15.834506] 
[   15.834630] The buggy address belongs to the object at ffff8881026ce080
[   15.834630]  which belongs to the cache kmalloc-64 of size 64
[   15.835099] The buggy address is located 0 bytes to the right of
[   15.835099]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.835480] 
[   15.835594] The buggy address belongs to the physical page:
[   15.835869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.836238] flags: 0x200000000000000(node=0|zone=2)
[   15.836483] page_type: f5(slab)
[   15.836702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.837068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.837305] page dumped because: kasan: bad access detected
[   15.837483] 
[   15.837555] Memory state around the buggy address:
[   15.837804]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.838165]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.838514] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.838878]                                      ^
[   15.839077]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.839430]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.839765] ==================================================================
[   15.339969] ==================================================================
[   15.340760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.341294] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.341525] 
[   15.341719] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.341815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.341828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.341851] Call Trace:
[   15.341892]  <TASK>
[   15.341911]  dump_stack_lvl+0x73/0xb0
[   15.341943]  print_report+0xd1/0x610
[   15.341966]  ? __virt_addr_valid+0x1db/0x2d0
[   15.341990]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.342012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.342036]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.342069]  kasan_report+0x141/0x180
[   15.342091]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.342120]  __asan_report_load4_noabort+0x18/0x20
[   15.342144]  kasan_atomics_helper+0x4a36/0x5450
[   15.342213]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.342238]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.342313]  ? kasan_atomics+0x152/0x310
[   15.342345]  kasan_atomics+0x1dc/0x310
[   15.342383]  ? __pfx_kasan_atomics+0x10/0x10
[   15.342410]  ? __pfx_read_tsc+0x10/0x10
[   15.342432]  ? ktime_get_ts64+0x86/0x230
[   15.342458]  kunit_try_run_case+0x1a5/0x480
[   15.342485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.342509]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.342534]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.342559]  ? __kthread_parkme+0x82/0x180
[   15.342598]  ? preempt_count_sub+0x50/0x80
[   15.342626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.342651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.342676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.342701]  kthread+0x337/0x6f0
[   15.342721]  ? trace_preempt_on+0x20/0xc0
[   15.342745]  ? __pfx_kthread+0x10/0x10
[   15.342767]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.342804]  ? calculate_sigpending+0x7b/0xa0
[   15.342831]  ? __pfx_kthread+0x10/0x10
[   15.342853]  ret_from_fork+0x116/0x1d0
[   15.342873]  ? __pfx_kthread+0x10/0x10
[   15.342893]  ret_from_fork_asm+0x1a/0x30
[   15.342927]  </TASK>
[   15.342940] 
[   15.357822] Allocated by task 282:
[   15.358295]  kasan_save_stack+0x45/0x70
[   15.358785]  kasan_save_track+0x18/0x40
[   15.359149]  kasan_save_alloc_info+0x3b/0x50
[   15.359310]  __kasan_kmalloc+0xb7/0xc0
[   15.359443]  __kmalloc_cache_noprof+0x189/0x420
[   15.359595]  kasan_atomics+0x95/0x310
[   15.359728]  kunit_try_run_case+0x1a5/0x480
[   15.359873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.360046]  kthread+0x337/0x6f0
[   15.360175]  ret_from_fork+0x116/0x1d0
[   15.360307]  ret_from_fork_asm+0x1a/0x30
[   15.360494] 
[   15.360593] The buggy address belongs to the object at ffff8881026ce080
[   15.360593]  which belongs to the cache kmalloc-64 of size 64
[   15.361317] The buggy address is located 0 bytes to the right of
[   15.361317]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.361919] 
[   15.362007] The buggy address belongs to the physical page:
[   15.362357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.362638] flags: 0x200000000000000(node=0|zone=2)
[   15.362829] page_type: f5(slab)
[   15.362969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.363416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.363899] page dumped because: kasan: bad access detected
[   15.364354] 
[   15.364636] Memory state around the buggy address:
[   15.364868]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.365161]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.365454] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.365671]                                      ^
[   15.365835]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.366160]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.366486] ==================================================================
[   14.897617] ==================================================================
[   14.897964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.898655] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.899069] 
[   14.899199] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.899248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.899261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.899284] Call Trace:
[   14.899302]  <TASK>
[   14.899321]  dump_stack_lvl+0x73/0xb0
[   14.899352]  print_report+0xd1/0x610
[   14.899377]  ? __virt_addr_valid+0x1db/0x2d0
[   14.899403]  ? kasan_atomics_helper+0x565/0x5450
[   14.899425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.899449]  ? kasan_atomics_helper+0x565/0x5450
[   14.899473]  kasan_report+0x141/0x180
[   14.899497]  ? kasan_atomics_helper+0x565/0x5450
[   14.899526]  kasan_check_range+0x10c/0x1c0
[   14.899551]  __kasan_check_write+0x18/0x20
[   14.899571]  kasan_atomics_helper+0x565/0x5450
[   14.899596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.899619]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.899646]  ? kasan_atomics+0x152/0x310
[   14.899675]  kasan_atomics+0x1dc/0x310
[   14.899699]  ? __pfx_kasan_atomics+0x10/0x10
[   14.899725]  ? __pfx_read_tsc+0x10/0x10
[   14.899746]  ? ktime_get_ts64+0x86/0x230
[   14.899773]  kunit_try_run_case+0x1a5/0x480
[   14.899799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.899822]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.899852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.899877]  ? __kthread_parkme+0x82/0x180
[   14.899900]  ? preempt_count_sub+0x50/0x80
[   14.899925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.899950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.899976]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.900080]  kthread+0x337/0x6f0
[   14.900104]  ? trace_preempt_on+0x20/0xc0
[   14.900129]  ? __pfx_kthread+0x10/0x10
[   14.900150]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.900173]  ? calculate_sigpending+0x7b/0xa0
[   14.900198]  ? __pfx_kthread+0x10/0x10
[   14.900221]  ret_from_fork+0x116/0x1d0
[   14.900240]  ? __pfx_kthread+0x10/0x10
[   14.900261]  ret_from_fork_asm+0x1a/0x30
[   14.900298]  </TASK>
[   14.900310] 
[   14.908498] Allocated by task 282:
[   14.908699]  kasan_save_stack+0x45/0x70
[   14.908853]  kasan_save_track+0x18/0x40
[   14.909161]  kasan_save_alloc_info+0x3b/0x50
[   14.909378]  __kasan_kmalloc+0xb7/0xc0
[   14.909543]  __kmalloc_cache_noprof+0x189/0x420
[   14.910019]  kasan_atomics+0x95/0x310
[   14.910250]  kunit_try_run_case+0x1a5/0x480
[   14.910451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.910706]  kthread+0x337/0x6f0
[   14.911006]  ret_from_fork+0x116/0x1d0
[   14.911163]  ret_from_fork_asm+0x1a/0x30
[   14.911307] 
[   14.911381] The buggy address belongs to the object at ffff8881026ce080
[   14.911381]  which belongs to the cache kmalloc-64 of size 64
[   14.911829] The buggy address is located 0 bytes to the right of
[   14.911829]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.912519] 
[   14.912608] The buggy address belongs to the physical page:
[   14.912947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.913211] flags: 0x200000000000000(node=0|zone=2)
[   14.913398] page_type: f5(slab)
[   14.913571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.914079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.914427] page dumped because: kasan: bad access detected
[   14.914697] 
[   14.914778] Memory state around the buggy address:
[   14.914983]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.915283]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.915577] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.915843]                                      ^
[   14.916062]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.916365]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.916934] ==================================================================
[   15.918162] ==================================================================
[   15.918552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.918958] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.919423] 
[   15.919515] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.919560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.919572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.919595] Call Trace:
[   15.919613]  <TASK>
[   15.919631]  dump_stack_lvl+0x73/0xb0
[   15.919660]  print_report+0xd1/0x610
[   15.919684]  ? __virt_addr_valid+0x1db/0x2d0
[   15.919708]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.919730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.919767]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.919790]  kasan_report+0x141/0x180
[   15.919821]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.919862]  __asan_report_load8_noabort+0x18/0x20
[   15.919888]  kasan_atomics_helper+0x4f30/0x5450
[   15.919914]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.919937]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.919963]  ? kasan_atomics+0x152/0x310
[   15.919991]  kasan_atomics+0x1dc/0x310
[   15.920014]  ? __pfx_kasan_atomics+0x10/0x10
[   15.920039]  ? __pfx_read_tsc+0x10/0x10
[   15.920070]  ? ktime_get_ts64+0x86/0x230
[   15.920097]  kunit_try_run_case+0x1a5/0x480
[   15.920132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.920155]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.920192]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.920231]  ? __kthread_parkme+0x82/0x180
[   15.920252]  ? preempt_count_sub+0x50/0x80
[   15.920279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.920304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.920329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.920354]  kthread+0x337/0x6f0
[   15.920375]  ? trace_preempt_on+0x20/0xc0
[   15.920399]  ? __pfx_kthread+0x10/0x10
[   15.920421]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.920443]  ? calculate_sigpending+0x7b/0xa0
[   15.920468]  ? __pfx_kthread+0x10/0x10
[   15.920490]  ret_from_fork+0x116/0x1d0
[   15.920509]  ? __pfx_kthread+0x10/0x10
[   15.920531]  ret_from_fork_asm+0x1a/0x30
[   15.920564]  </TASK>
[   15.920575] 
[   15.928398] Allocated by task 282:
[   15.928576]  kasan_save_stack+0x45/0x70
[   15.928791]  kasan_save_track+0x18/0x40
[   15.928962]  kasan_save_alloc_info+0x3b/0x50
[   15.929170]  __kasan_kmalloc+0xb7/0xc0
[   15.929375]  __kmalloc_cache_noprof+0x189/0x420
[   15.929577]  kasan_atomics+0x95/0x310
[   15.929766]  kunit_try_run_case+0x1a5/0x480
[   15.929985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.930234]  kthread+0x337/0x6f0
[   15.930408]  ret_from_fork+0x116/0x1d0
[   15.930626]  ret_from_fork_asm+0x1a/0x30
[   15.930796] 
[   15.930904] The buggy address belongs to the object at ffff8881026ce080
[   15.930904]  which belongs to the cache kmalloc-64 of size 64
[   15.931407] The buggy address is located 0 bytes to the right of
[   15.931407]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.931970] 
[   15.932079] The buggy address belongs to the physical page:
[   15.932285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.932588] flags: 0x200000000000000(node=0|zone=2)
[   15.932840] page_type: f5(slab)
[   15.933014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.933361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.933701] page dumped because: kasan: bad access detected
[   15.933952] 
[   15.934023] Memory state around the buggy address:
[   15.934260]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.934538]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.934983] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.935324]                                      ^
[   15.935485]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936005]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.936268] ==================================================================
[   15.899298] ==================================================================
[   15.899720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.900264] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.900534] 
[   15.900698] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.900746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.900771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.900795] Call Trace:
[   15.900816]  <TASK>
[   15.900846]  dump_stack_lvl+0x73/0xb0
[   15.900877]  print_report+0xd1/0x610
[   15.900900]  ? __virt_addr_valid+0x1db/0x2d0
[   15.900924]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.900946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.900970]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.900994]  kasan_report+0x141/0x180
[   15.901017]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.901045]  kasan_check_range+0x10c/0x1c0
[   15.901080]  __kasan_check_write+0x18/0x20
[   15.901099]  kasan_atomics_helper+0x1c18/0x5450
[   15.901124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.901147]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.901173]  ? kasan_atomics+0x152/0x310
[   15.901202]  kasan_atomics+0x1dc/0x310
[   15.901236]  ? __pfx_kasan_atomics+0x10/0x10
[   15.901261]  ? __pfx_read_tsc+0x10/0x10
[   15.901294]  ? ktime_get_ts64+0x86/0x230
[   15.901321]  kunit_try_run_case+0x1a5/0x480
[   15.901348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.901371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.901397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.901422]  ? __kthread_parkme+0x82/0x180
[   15.901443]  ? preempt_count_sub+0x50/0x80
[   15.901469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.901494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.901519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.901544]  kthread+0x337/0x6f0
[   15.901564]  ? trace_preempt_on+0x20/0xc0
[   15.901589]  ? __pfx_kthread+0x10/0x10
[   15.901610]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.901642]  ? calculate_sigpending+0x7b/0xa0
[   15.901667]  ? __pfx_kthread+0x10/0x10
[   15.901701]  ret_from_fork+0x116/0x1d0
[   15.901720]  ? __pfx_kthread+0x10/0x10
[   15.901744]  ret_from_fork_asm+0x1a/0x30
[   15.901781]  </TASK>
[   15.901792] 
[   15.909753] Allocated by task 282:
[   15.909931]  kasan_save_stack+0x45/0x70
[   15.910097]  kasan_save_track+0x18/0x40
[   15.910316]  kasan_save_alloc_info+0x3b/0x50
[   15.910531]  __kasan_kmalloc+0xb7/0xc0
[   15.910734]  __kmalloc_cache_noprof+0x189/0x420
[   15.910916]  kasan_atomics+0x95/0x310
[   15.911115]  kunit_try_run_case+0x1a5/0x480
[   15.911333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.911515]  kthread+0x337/0x6f0
[   15.911640]  ret_from_fork+0x116/0x1d0
[   15.911775]  ret_from_fork_asm+0x1a/0x30
[   15.911918] 
[   15.911992] The buggy address belongs to the object at ffff8881026ce080
[   15.911992]  which belongs to the cache kmalloc-64 of size 64
[   15.912364] The buggy address is located 0 bytes to the right of
[   15.912364]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.912987] 
[   15.913110] The buggy address belongs to the physical page:
[   15.913367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.913909] flags: 0x200000000000000(node=0|zone=2)
[   15.914113] page_type: f5(slab)
[   15.914243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.914479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.915041] page dumped because: kasan: bad access detected
[   15.915309] 
[   15.915405] Memory state around the buggy address:
[   15.915713]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.915977]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.916208] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.916427]                                      ^
[   15.916677]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.917025]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.917373] ==================================================================
[   15.170916] ==================================================================
[   15.171627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.172015] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.172254] 
[   15.172344] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.172389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.172401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.172425] Call Trace:
[   15.172444]  <TASK>
[   15.172463]  dump_stack_lvl+0x73/0xb0
[   15.172492]  print_report+0xd1/0x610
[   15.172515]  ? __virt_addr_valid+0x1db/0x2d0
[   15.172539]  ? kasan_atomics_helper+0xc70/0x5450
[   15.172560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.172585]  ? kasan_atomics_helper+0xc70/0x5450
[   15.172619]  kasan_report+0x141/0x180
[   15.172653]  ? kasan_atomics_helper+0xc70/0x5450
[   15.172682]  kasan_check_range+0x10c/0x1c0
[   15.172706]  __kasan_check_write+0x18/0x20
[   15.172725]  kasan_atomics_helper+0xc70/0x5450
[   15.172749]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.172771]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.172798]  ? kasan_atomics+0x152/0x310
[   15.172827]  kasan_atomics+0x1dc/0x310
[   15.172862]  ? __pfx_kasan_atomics+0x10/0x10
[   15.172887]  ? __pfx_read_tsc+0x10/0x10
[   15.172908]  ? ktime_get_ts64+0x86/0x230
[   15.172934]  kunit_try_run_case+0x1a5/0x480
[   15.172962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.172985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.173010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.173035]  ? __kthread_parkme+0x82/0x180
[   15.173068]  ? preempt_count_sub+0x50/0x80
[   15.173094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.173119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.173144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.173169]  kthread+0x337/0x6f0
[   15.173188]  ? trace_preempt_on+0x20/0xc0
[   15.173213]  ? __pfx_kthread+0x10/0x10
[   15.173234]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.173256]  ? calculate_sigpending+0x7b/0xa0
[   15.173282]  ? __pfx_kthread+0x10/0x10
[   15.173304]  ret_from_fork+0x116/0x1d0
[   15.173322]  ? __pfx_kthread+0x10/0x10
[   15.173343]  ret_from_fork_asm+0x1a/0x30
[   15.173376]  </TASK>
[   15.173388] 
[   15.181874] Allocated by task 282:
[   15.182021]  kasan_save_stack+0x45/0x70
[   15.182240]  kasan_save_track+0x18/0x40
[   15.182435]  kasan_save_alloc_info+0x3b/0x50
[   15.182646]  __kasan_kmalloc+0xb7/0xc0
[   15.182799]  __kmalloc_cache_noprof+0x189/0x420
[   15.183071]  kasan_atomics+0x95/0x310
[   15.183209]  kunit_try_run_case+0x1a5/0x480
[   15.183358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.183538]  kthread+0x337/0x6f0
[   15.183699]  ret_from_fork+0x116/0x1d0
[   15.183885]  ret_from_fork_asm+0x1a/0x30
[   15.184299] 
[   15.184415] The buggy address belongs to the object at ffff8881026ce080
[   15.184415]  which belongs to the cache kmalloc-64 of size 64
[   15.185101] The buggy address is located 0 bytes to the right of
[   15.185101]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.185477] 
[   15.185628] The buggy address belongs to the physical page:
[   15.186193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.186477] flags: 0x200000000000000(node=0|zone=2)
[   15.186888] page_type: f5(slab)
[   15.187092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.187389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.187710] page dumped because: kasan: bad access detected
[   15.188064] 
[   15.188160] Memory state around the buggy address:
[   15.188357]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.188678]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.188899] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.189555]                                      ^
[   15.190032]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.190379]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.190601] ==================================================================
[   15.367017] ==================================================================
[   15.367379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.367718] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.368216] 
[   15.368334] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.368383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.368395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.368419] Call Trace:
[   15.368439]  <TASK>
[   15.368458]  dump_stack_lvl+0x73/0xb0
[   15.368488]  print_report+0xd1/0x610
[   15.368510]  ? __virt_addr_valid+0x1db/0x2d0
[   15.368534]  ? kasan_atomics_helper+0x1079/0x5450
[   15.368555]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.368579]  ? kasan_atomics_helper+0x1079/0x5450
[   15.368602]  kasan_report+0x141/0x180
[   15.368625]  ? kasan_atomics_helper+0x1079/0x5450
[   15.368652]  kasan_check_range+0x10c/0x1c0
[   15.368676]  __kasan_check_write+0x18/0x20
[   15.368738]  kasan_atomics_helper+0x1079/0x5450
[   15.368765]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.368851]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.368878]  ? kasan_atomics+0x152/0x310
[   15.368907]  kasan_atomics+0x1dc/0x310
[   15.369015]  ? __pfx_kasan_atomics+0x10/0x10
[   15.369090]  ? __pfx_read_tsc+0x10/0x10
[   15.369113]  ? ktime_get_ts64+0x86/0x230
[   15.369151]  kunit_try_run_case+0x1a5/0x480
[   15.369178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.369202]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.369227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.369253]  ? __kthread_parkme+0x82/0x180
[   15.369274]  ? preempt_count_sub+0x50/0x80
[   15.369299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.369324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.369348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.369373]  kthread+0x337/0x6f0
[   15.369393]  ? trace_preempt_on+0x20/0xc0
[   15.369418]  ? __pfx_kthread+0x10/0x10
[   15.369439]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.369461]  ? calculate_sigpending+0x7b/0xa0
[   15.369487]  ? __pfx_kthread+0x10/0x10
[   15.369509]  ret_from_fork+0x116/0x1d0
[   15.369528]  ? __pfx_kthread+0x10/0x10
[   15.369549]  ret_from_fork_asm+0x1a/0x30
[   15.369628]  </TASK>
[   15.369639] 
[   15.379560] Allocated by task 282:
[   15.379862]  kasan_save_stack+0x45/0x70
[   15.380165]  kasan_save_track+0x18/0x40
[   15.380458]  kasan_save_alloc_info+0x3b/0x50
[   15.380705]  __kasan_kmalloc+0xb7/0xc0
[   15.380836]  __kmalloc_cache_noprof+0x189/0x420
[   15.381108]  kasan_atomics+0x95/0x310
[   15.381348]  kunit_try_run_case+0x1a5/0x480
[   15.381559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.381905]  kthread+0x337/0x6f0
[   15.382173]  ret_from_fork+0x116/0x1d0
[   15.382368]  ret_from_fork_asm+0x1a/0x30
[   15.382726] 
[   15.382820] The buggy address belongs to the object at ffff8881026ce080
[   15.382820]  which belongs to the cache kmalloc-64 of size 64
[   15.383324] The buggy address is located 0 bytes to the right of
[   15.383324]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.383952] 
[   15.384105] The buggy address belongs to the physical page:
[   15.384365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.384989] flags: 0x200000000000000(node=0|zone=2)
[   15.385461] page_type: f5(slab)
[   15.385637] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.385956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.386532] page dumped because: kasan: bad access detected
[   15.386801] 
[   15.386919] Memory state around the buggy address:
[   15.387185]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.387399]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.387669] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.388236]                                      ^
[   15.388771]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.389247]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.389660] ==================================================================
[   15.680214] ==================================================================
[   15.680537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.680857] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.681183] 
[   15.681310] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.681366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.681378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.681402] Call Trace:
[   15.681419]  <TASK>
[   15.681436]  dump_stack_lvl+0x73/0xb0
[   15.681465]  print_report+0xd1/0x610
[   15.681487]  ? __virt_addr_valid+0x1db/0x2d0
[   15.681520]  ? kasan_atomics_helper+0x151d/0x5450
[   15.681542]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.681567]  ? kasan_atomics_helper+0x151d/0x5450
[   15.681609]  kasan_report+0x141/0x180
[   15.681632]  ? kasan_atomics_helper+0x151d/0x5450
[   15.681660]  kasan_check_range+0x10c/0x1c0
[   15.681684]  __kasan_check_write+0x18/0x20
[   15.681713]  kasan_atomics_helper+0x151d/0x5450
[   15.681737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.681760]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.681797]  ? kasan_atomics+0x152/0x310
[   15.681825]  kasan_atomics+0x1dc/0x310
[   15.681848]  ? __pfx_kasan_atomics+0x10/0x10
[   15.681873]  ? __pfx_read_tsc+0x10/0x10
[   15.681894]  ? ktime_get_ts64+0x86/0x230
[   15.681920]  kunit_try_run_case+0x1a5/0x480
[   15.681946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.681969]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.681996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.682021]  ? __kthread_parkme+0x82/0x180
[   15.682058]  ? preempt_count_sub+0x50/0x80
[   15.682085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.682120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.682145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.682171]  kthread+0x337/0x6f0
[   15.682191]  ? trace_preempt_on+0x20/0xc0
[   15.682220]  ? __pfx_kthread+0x10/0x10
[   15.682241]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.682272]  ? calculate_sigpending+0x7b/0xa0
[   15.682297]  ? __pfx_kthread+0x10/0x10
[   15.682319]  ret_from_fork+0x116/0x1d0
[   15.682348]  ? __pfx_kthread+0x10/0x10
[   15.682369]  ret_from_fork_asm+0x1a/0x30
[   15.682402]  </TASK>
[   15.682412] 
[   15.690135] Allocated by task 282:
[   15.690312]  kasan_save_stack+0x45/0x70
[   15.690488]  kasan_save_track+0x18/0x40
[   15.690853]  kasan_save_alloc_info+0x3b/0x50
[   15.691025]  __kasan_kmalloc+0xb7/0xc0
[   15.691182]  __kmalloc_cache_noprof+0x189/0x420
[   15.691406]  kasan_atomics+0x95/0x310
[   15.691647]  kunit_try_run_case+0x1a5/0x480
[   15.691826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.692104]  kthread+0x337/0x6f0
[   15.692277]  ret_from_fork+0x116/0x1d0
[   15.692466]  ret_from_fork_asm+0x1a/0x30
[   15.692702] 
[   15.692793] The buggy address belongs to the object at ffff8881026ce080
[   15.692793]  which belongs to the cache kmalloc-64 of size 64
[   15.693303] The buggy address is located 0 bytes to the right of
[   15.693303]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.693846] 
[   15.693922] The buggy address belongs to the physical page:
[   15.694110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.694358] flags: 0x200000000000000(node=0|zone=2)
[   15.694610] page_type: f5(slab)
[   15.694829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.695494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.695860] page dumped because: kasan: bad access detected
[   15.696114] 
[   15.696187] Memory state around the buggy address:
[   15.696344]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.696562]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.696861] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.697208]                                      ^
[   15.697449]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.697834]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698222] ==================================================================
[   15.064072] ==================================================================
[   15.064796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.065590] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.066495] 
[   15.066738] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.066787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.066800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.066824] Call Trace:
[   15.066845]  <TASK>
[   15.066865]  dump_stack_lvl+0x73/0xb0
[   15.066896]  print_report+0xd1/0x610
[   15.066930]  ? __virt_addr_valid+0x1db/0x2d0
[   15.066956]  ? kasan_atomics_helper+0x992/0x5450
[   15.066979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.067006]  ? kasan_atomics_helper+0x992/0x5450
[   15.067032]  kasan_report+0x141/0x180
[   15.067067]  ? kasan_atomics_helper+0x992/0x5450
[   15.067095]  kasan_check_range+0x10c/0x1c0
[   15.067120]  __kasan_check_write+0x18/0x20
[   15.067140]  kasan_atomics_helper+0x992/0x5450
[   15.067163]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.067185]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.067212]  ? kasan_atomics+0x152/0x310
[   15.067241]  kasan_atomics+0x1dc/0x310
[   15.067265]  ? __pfx_kasan_atomics+0x10/0x10
[   15.067290]  ? __pfx_read_tsc+0x10/0x10
[   15.067312]  ? ktime_get_ts64+0x86/0x230
[   15.067339]  kunit_try_run_case+0x1a5/0x480
[   15.067364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.067389]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.067415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.067440]  ? __kthread_parkme+0x82/0x180
[   15.067462]  ? preempt_count_sub+0x50/0x80
[   15.067488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.067513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.067539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.067564]  kthread+0x337/0x6f0
[   15.067585]  ? trace_preempt_on+0x20/0xc0
[   15.067622]  ? __pfx_kthread+0x10/0x10
[   15.067645]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.067668]  ? calculate_sigpending+0x7b/0xa0
[   15.067705]  ? __pfx_kthread+0x10/0x10
[   15.067727]  ret_from_fork+0x116/0x1d0
[   15.067747]  ? __pfx_kthread+0x10/0x10
[   15.067768]  ret_from_fork_asm+0x1a/0x30
[   15.067803]  </TASK>
[   15.067813] 
[   15.081522] Allocated by task 282:
[   15.082030]  kasan_save_stack+0x45/0x70
[   15.082373]  kasan_save_track+0x18/0x40
[   15.082596]  kasan_save_alloc_info+0x3b/0x50
[   15.082813]  __kasan_kmalloc+0xb7/0xc0
[   15.083004]  __kmalloc_cache_noprof+0x189/0x420
[   15.084227]  kasan_atomics+0x95/0x310
[   15.085070]  kunit_try_run_case+0x1a5/0x480
[   15.085691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.086010]  kthread+0x337/0x6f0
[   15.086406]  ret_from_fork+0x116/0x1d0
[   15.086782]  ret_from_fork_asm+0x1a/0x30
[   15.087283] 
[   15.087364] The buggy address belongs to the object at ffff8881026ce080
[   15.087364]  which belongs to the cache kmalloc-64 of size 64
[   15.087731] The buggy address is located 0 bytes to the right of
[   15.087731]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.089081] 
[   15.089292] The buggy address belongs to the physical page:
[   15.089930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.090675] flags: 0x200000000000000(node=0|zone=2)
[   15.091200] page_type: f5(slab)
[   15.091375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.091620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.091851] page dumped because: kasan: bad access detected
[   15.092026] 
[   15.092122] Memory state around the buggy address:
[   15.092361]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.092699]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.093042] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.093436]                                      ^
[   15.093686]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.093913]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.094273] ==================================================================
[   15.880629] ==================================================================
[   15.881151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.881507] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.881943] 
[   15.882088] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.882134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.882147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.882171] Call Trace:
[   15.882192]  <TASK>
[   15.882216]  dump_stack_lvl+0x73/0xb0
[   15.882246]  print_report+0xd1/0x610
[   15.882269]  ? __virt_addr_valid+0x1db/0x2d0
[   15.882293]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.882316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.882340]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.882362]  kasan_report+0x141/0x180
[   15.882385]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.882414]  kasan_check_range+0x10c/0x1c0
[   15.882438]  __kasan_check_write+0x18/0x20
[   15.882457]  kasan_atomics_helper+0x1b22/0x5450
[   15.882481]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.882504]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.882531]  ? kasan_atomics+0x152/0x310
[   15.882559]  kasan_atomics+0x1dc/0x310
[   15.882582]  ? __pfx_kasan_atomics+0x10/0x10
[   15.882618]  ? __pfx_read_tsc+0x10/0x10
[   15.882639]  ? ktime_get_ts64+0x86/0x230
[   15.882677]  kunit_try_run_case+0x1a5/0x480
[   15.882703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.882754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.882779]  ? __kthread_parkme+0x82/0x180
[   15.882800]  ? preempt_count_sub+0x50/0x80
[   15.882826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.882875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.882900]  kthread+0x337/0x6f0
[   15.882921]  ? trace_preempt_on+0x20/0xc0
[   15.882945]  ? __pfx_kthread+0x10/0x10
[   15.882967]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.882990]  ? calculate_sigpending+0x7b/0xa0
[   15.883015]  ? __pfx_kthread+0x10/0x10
[   15.883040]  ret_from_fork+0x116/0x1d0
[   15.883070]  ? __pfx_kthread+0x10/0x10
[   15.883091]  ret_from_fork_asm+0x1a/0x30
[   15.883126]  </TASK>
[   15.883137] 
[   15.890836] Allocated by task 282:
[   15.890988]  kasan_save_stack+0x45/0x70
[   15.891157]  kasan_save_track+0x18/0x40
[   15.891301]  kasan_save_alloc_info+0x3b/0x50
[   15.891453]  __kasan_kmalloc+0xb7/0xc0
[   15.891657]  __kmalloc_cache_noprof+0x189/0x420
[   15.891885]  kasan_atomics+0x95/0x310
[   15.892112]  kunit_try_run_case+0x1a5/0x480
[   15.892329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.892587]  kthread+0x337/0x6f0
[   15.892829]  ret_from_fork+0x116/0x1d0
[   15.893048]  ret_from_fork_asm+0x1a/0x30
[   15.893283] 
[   15.893383] The buggy address belongs to the object at ffff8881026ce080
[   15.893383]  which belongs to the cache kmalloc-64 of size 64
[   15.893945] The buggy address is located 0 bytes to the right of
[   15.893945]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.894413] 
[   15.894492] The buggy address belongs to the physical page:
[   15.894715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.895113] flags: 0x200000000000000(node=0|zone=2)
[   15.895378] page_type: f5(slab)
[   15.895554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.895950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.896301] page dumped because: kasan: bad access detected
[   15.896554] 
[   15.896655] Memory state around the buggy address:
[   15.896908]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.897229]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.897546] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.897880]                                      ^
[   15.898120]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.898435]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.898687] ==================================================================
[   14.731085] ==================================================================
[   14.732485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.733230] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.733938] 
[   14.734047] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.734108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.734120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.734143] Call Trace:
[   14.734156]  <TASK>
[   14.734174]  dump_stack_lvl+0x73/0xb0
[   14.734208]  print_report+0xd1/0x610
[   14.734230]  ? __virt_addr_valid+0x1db/0x2d0
[   14.734253]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.734274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.734296]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.734317]  kasan_report+0x141/0x180
[   14.734338]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.734365]  __asan_report_store4_noabort+0x1b/0x30
[   14.734389]  kasan_atomics_helper+0x4ba2/0x5450
[   14.734411]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.734433]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.734458]  ? kasan_atomics+0x152/0x310
[   14.734485]  kasan_atomics+0x1dc/0x310
[   14.734507]  ? __pfx_kasan_atomics+0x10/0x10
[   14.734531]  ? __pfx_read_tsc+0x10/0x10
[   14.734552]  ? ktime_get_ts64+0x86/0x230
[   14.734576]  kunit_try_run_case+0x1a5/0x480
[   14.734612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.734634]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.734658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.734682]  ? __kthread_parkme+0x82/0x180
[   14.734702]  ? preempt_count_sub+0x50/0x80
[   14.734727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.734750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.734774]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.734797]  kthread+0x337/0x6f0
[   14.735014]  ? trace_preempt_on+0x20/0xc0
[   14.735040]  ? __pfx_kthread+0x10/0x10
[   14.735076]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.735098]  ? calculate_sigpending+0x7b/0xa0
[   14.735122]  ? __pfx_kthread+0x10/0x10
[   14.735143]  ret_from_fork+0x116/0x1d0
[   14.735161]  ? __pfx_kthread+0x10/0x10
[   14.735181]  ret_from_fork_asm+0x1a/0x30
[   14.735213]  </TASK>
[   14.735224] 
[   14.749685] Allocated by task 282:
[   14.750116]  kasan_save_stack+0x45/0x70
[   14.750504]  kasan_save_track+0x18/0x40
[   14.750902]  kasan_save_alloc_info+0x3b/0x50
[   14.751459]  __kasan_kmalloc+0xb7/0xc0
[   14.751927]  __kmalloc_cache_noprof+0x189/0x420
[   14.752224]  kasan_atomics+0x95/0x310
[   14.752364]  kunit_try_run_case+0x1a5/0x480
[   14.752513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.752897]  kthread+0x337/0x6f0
[   14.753264]  ret_from_fork+0x116/0x1d0
[   14.753621]  ret_from_fork_asm+0x1a/0x30
[   14.754031] 
[   14.754235] The buggy address belongs to the object at ffff8881026ce080
[   14.754235]  which belongs to the cache kmalloc-64 of size 64
[   14.755649] The buggy address is located 0 bytes to the right of
[   14.755649]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.756588] 
[   14.756760] The buggy address belongs to the physical page:
[   14.757276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.757539] flags: 0x200000000000000(node=0|zone=2)
[   14.758117] page_type: f5(slab)
[   14.758423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.759329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.760116] page dumped because: kasan: bad access detected
[   14.760450] 
[   14.760522] Memory state around the buggy address:
[   14.760774]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.761509]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.762365] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.763100]                                      ^
[   14.763267]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.763488]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.763729] ==================================================================
[   14.696675] ==================================================================
[   14.698441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.699547] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.700224] 
[   14.700331] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.700383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.700394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.700418] Call Trace:
[   14.700431]  <TASK>
[   14.700450]  dump_stack_lvl+0x73/0xb0
[   14.700486]  print_report+0xd1/0x610
[   14.700510]  ? __virt_addr_valid+0x1db/0x2d0
[   14.700536]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.700557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.700580]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.700601]  kasan_report+0x141/0x180
[   14.700622]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.700649]  __asan_report_load4_noabort+0x18/0x20
[   14.700673]  kasan_atomics_helper+0x4bbc/0x5450
[   14.700695]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.700717]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.700744]  ? kasan_atomics+0x152/0x310
[   14.700771]  kasan_atomics+0x1dc/0x310
[   14.700793]  ? __pfx_kasan_atomics+0x10/0x10
[   14.700873]  ? __pfx_read_tsc+0x10/0x10
[   14.700896]  ? ktime_get_ts64+0x86/0x230
[   14.700923]  kunit_try_run_case+0x1a5/0x480
[   14.700950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.700991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.701017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.701040]  ? __kthread_parkme+0x82/0x180
[   14.701073]  ? preempt_count_sub+0x50/0x80
[   14.701099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.701122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.701147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.701170]  kthread+0x337/0x6f0
[   14.701189]  ? trace_preempt_on+0x20/0xc0
[   14.701213]  ? __pfx_kthread+0x10/0x10
[   14.701234]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.701255]  ? calculate_sigpending+0x7b/0xa0
[   14.701280]  ? __pfx_kthread+0x10/0x10
[   14.701301]  ret_from_fork+0x116/0x1d0
[   14.701319]  ? __pfx_kthread+0x10/0x10
[   14.701339]  ret_from_fork_asm+0x1a/0x30
[   14.701374]  </TASK>
[   14.701385] 
[   14.716582] Allocated by task 282:
[   14.716975]  kasan_save_stack+0x45/0x70
[   14.717249]  kasan_save_track+0x18/0x40
[   14.717398]  kasan_save_alloc_info+0x3b/0x50
[   14.717548]  __kasan_kmalloc+0xb7/0xc0
[   14.717851]  __kmalloc_cache_noprof+0x189/0x420
[   14.718321]  kasan_atomics+0x95/0x310
[   14.718678]  kunit_try_run_case+0x1a5/0x480
[   14.719168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.719652]  kthread+0x337/0x6f0
[   14.719952]  ret_from_fork+0x116/0x1d0
[   14.720385]  ret_from_fork_asm+0x1a/0x30
[   14.720765] 
[   14.720937] The buggy address belongs to the object at ffff8881026ce080
[   14.720937]  which belongs to the cache kmalloc-64 of size 64
[   14.721727] The buggy address is located 0 bytes to the right of
[   14.721727]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.722991] 
[   14.723180] The buggy address belongs to the physical page:
[   14.723362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.723628] flags: 0x200000000000000(node=0|zone=2)
[   14.724161] page_type: f5(slab)
[   14.724458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.725320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.726113] page dumped because: kasan: bad access detected
[   14.726581] 
[   14.726769] Memory state around the buggy address:
[   14.727280]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.727665]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.728464] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.728968]                                      ^
[   14.729303]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.729524]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.730031] ==================================================================
[   15.598814] ==================================================================
[   15.599204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.599713] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.599986] 
[   15.600111] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.600155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.600167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.600189] Call Trace:
[   15.600206]  <TASK>
[   15.600224]  dump_stack_lvl+0x73/0xb0
[   15.600251]  print_report+0xd1/0x610
[   15.600275]  ? __virt_addr_valid+0x1db/0x2d0
[   15.600297]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.600320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.600343]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.600366]  kasan_report+0x141/0x180
[   15.600389]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.600417]  __asan_report_load8_noabort+0x18/0x20
[   15.600442]  kasan_atomics_helper+0x4eae/0x5450
[   15.600466]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.600489]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.600515]  ? kasan_atomics+0x152/0x310
[   15.600543]  kasan_atomics+0x1dc/0x310
[   15.600566]  ? __pfx_kasan_atomics+0x10/0x10
[   15.600591]  ? __pfx_read_tsc+0x10/0x10
[   15.600611]  ? ktime_get_ts64+0x86/0x230
[   15.600637]  kunit_try_run_case+0x1a5/0x480
[   15.600662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.600685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.600710]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.600734]  ? __kthread_parkme+0x82/0x180
[   15.600755]  ? preempt_count_sub+0x50/0x80
[   15.600782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.600806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.600831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.600856]  kthread+0x337/0x6f0
[   15.600876]  ? trace_preempt_on+0x20/0xc0
[   15.600901]  ? __pfx_kthread+0x10/0x10
[   15.600922]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.600945]  ? calculate_sigpending+0x7b/0xa0
[   15.600969]  ? __pfx_kthread+0x10/0x10
[   15.600992]  ret_from_fork+0x116/0x1d0
[   15.601024]  ? __pfx_kthread+0x10/0x10
[   15.601045]  ret_from_fork_asm+0x1a/0x30
[   15.601089]  </TASK>
[   15.601099] 
[   15.610936] Allocated by task 282:
[   15.611120]  kasan_save_stack+0x45/0x70
[   15.611309]  kasan_save_track+0x18/0x40
[   15.611486]  kasan_save_alloc_info+0x3b/0x50
[   15.612014]  __kasan_kmalloc+0xb7/0xc0
[   15.612349]  __kmalloc_cache_noprof+0x189/0x420
[   15.612779]  kasan_atomics+0x95/0x310
[   15.613107]  kunit_try_run_case+0x1a5/0x480
[   15.613319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.613561]  kthread+0x337/0x6f0
[   15.613721]  ret_from_fork+0x116/0x1d0
[   15.613895]  ret_from_fork_asm+0x1a/0x30
[   15.614086] 
[   15.614178] The buggy address belongs to the object at ffff8881026ce080
[   15.614178]  which belongs to the cache kmalloc-64 of size 64
[   15.615042] The buggy address is located 0 bytes to the right of
[   15.615042]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.615953] 
[   15.616222] The buggy address belongs to the physical page:
[   15.616539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.617020] flags: 0x200000000000000(node=0|zone=2)
[   15.617263] page_type: f5(slab)
[   15.617425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.618139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.618589] page dumped because: kasan: bad access detected
[   15.618973] 
[   15.619079] Memory state around the buggy address:
[   15.619287]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.619852]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.620353] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.620859]                                      ^
[   15.621217]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.621519]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.622293] ==================================================================
[   15.782571] ==================================================================
[   15.782975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.783488] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.784004] 
[   15.784204] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.784278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.784318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.784342] Call Trace:
[   15.784362]  <TASK>
[   15.784394]  dump_stack_lvl+0x73/0xb0
[   15.784427]  print_report+0xd1/0x610
[   15.784450]  ? __virt_addr_valid+0x1db/0x2d0
[   15.784475]  ? kasan_atomics_helper+0x1818/0x5450
[   15.784497]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.784522]  ? kasan_atomics_helper+0x1818/0x5450
[   15.784545]  kasan_report+0x141/0x180
[   15.784569]  ? kasan_atomics_helper+0x1818/0x5450
[   15.784596]  kasan_check_range+0x10c/0x1c0
[   15.784621]  __kasan_check_write+0x18/0x20
[   15.784641]  kasan_atomics_helper+0x1818/0x5450
[   15.784664]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.784687]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.784714]  ? kasan_atomics+0x152/0x310
[   15.784744]  kasan_atomics+0x1dc/0x310
[   15.784767]  ? __pfx_kasan_atomics+0x10/0x10
[   15.784792]  ? __pfx_read_tsc+0x10/0x10
[   15.784823]  ? ktime_get_ts64+0x86/0x230
[   15.784849]  kunit_try_run_case+0x1a5/0x480
[   15.784876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.784899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.784925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.784949]  ? __kthread_parkme+0x82/0x180
[   15.784970]  ? preempt_count_sub+0x50/0x80
[   15.784996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.785021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.785046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.785082]  kthread+0x337/0x6f0
[   15.785102]  ? trace_preempt_on+0x20/0xc0
[   15.785127]  ? __pfx_kthread+0x10/0x10
[   15.785181]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.785203]  ? calculate_sigpending+0x7b/0xa0
[   15.785240]  ? __pfx_kthread+0x10/0x10
[   15.785263]  ret_from_fork+0x116/0x1d0
[   15.785281]  ? __pfx_kthread+0x10/0x10
[   15.785302]  ret_from_fork_asm+0x1a/0x30
[   15.785337]  </TASK>
[   15.785348] 
[   15.793324] Allocated by task 282:
[   15.793490]  kasan_save_stack+0x45/0x70
[   15.793717]  kasan_save_track+0x18/0x40
[   15.793920]  kasan_save_alloc_info+0x3b/0x50
[   15.794212]  __kasan_kmalloc+0xb7/0xc0
[   15.794439]  __kmalloc_cache_noprof+0x189/0x420
[   15.794798]  kasan_atomics+0x95/0x310
[   15.795086]  kunit_try_run_case+0x1a5/0x480
[   15.795239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.795417]  kthread+0x337/0x6f0
[   15.795540]  ret_from_fork+0x116/0x1d0
[   15.795708]  ret_from_fork_asm+0x1a/0x30
[   15.795912] 
[   15.796012] The buggy address belongs to the object at ffff8881026ce080
[   15.796012]  which belongs to the cache kmalloc-64 of size 64
[   15.796638] The buggy address is located 0 bytes to the right of
[   15.796638]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.797362] 
[   15.797451] The buggy address belongs to the physical page:
[   15.797723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.798140] flags: 0x200000000000000(node=0|zone=2)
[   15.798320] page_type: f5(slab)
[   15.798447] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.798808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.799209] page dumped because: kasan: bad access detected
[   15.799520] 
[   15.799667] Memory state around the buggy address:
[   15.799876]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.800178]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.800419] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.800821]                                      ^
[   15.801036]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801292]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801684] ==================================================================
[   16.154105] ==================================================================
[   16.154937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.155313] Read of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.155669] 
[   16.155788] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.155833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.155846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.155870] Call Trace:
[   16.155890]  <TASK>
[   16.155909]  dump_stack_lvl+0x73/0xb0
[   16.155938]  print_report+0xd1/0x610
[   16.155962]  ? __virt_addr_valid+0x1db/0x2d0
[   16.155987]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.156008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.156033]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.156065]  kasan_report+0x141/0x180
[   16.156088]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.156118]  __asan_report_load8_noabort+0x18/0x20
[   16.156144]  kasan_atomics_helper+0x4fa5/0x5450
[   16.156168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.156192]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.156218]  ? kasan_atomics+0x152/0x310
[   16.156247]  kasan_atomics+0x1dc/0x310
[   16.156271]  ? __pfx_kasan_atomics+0x10/0x10
[   16.156297]  ? __pfx_read_tsc+0x10/0x10
[   16.156318]  ? ktime_get_ts64+0x86/0x230
[   16.156345]  kunit_try_run_case+0x1a5/0x480
[   16.156372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.156395]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.156422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.156447]  ? __kthread_parkme+0x82/0x180
[   16.156469]  ? preempt_count_sub+0x50/0x80
[   16.156496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.156521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.156547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.156573]  kthread+0x337/0x6f0
[   16.156593]  ? trace_preempt_on+0x20/0xc0
[   16.156618]  ? __pfx_kthread+0x10/0x10
[   16.156640]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.156663]  ? calculate_sigpending+0x7b/0xa0
[   16.156688]  ? __pfx_kthread+0x10/0x10
[   16.156711]  ret_from_fork+0x116/0x1d0
[   16.156730]  ? __pfx_kthread+0x10/0x10
[   16.156752]  ret_from_fork_asm+0x1a/0x30
[   16.156786]  </TASK>
[   16.156797] 
[   16.164156] Allocated by task 282:
[   16.164297]  kasan_save_stack+0x45/0x70
[   16.164448]  kasan_save_track+0x18/0x40
[   16.164678]  kasan_save_alloc_info+0x3b/0x50
[   16.164893]  __kasan_kmalloc+0xb7/0xc0
[   16.165091]  __kmalloc_cache_noprof+0x189/0x420
[   16.165319]  kasan_atomics+0x95/0x310
[   16.165509]  kunit_try_run_case+0x1a5/0x480
[   16.165730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.165913]  kthread+0x337/0x6f0
[   16.166038]  ret_from_fork+0x116/0x1d0
[   16.166184]  ret_from_fork_asm+0x1a/0x30
[   16.166389] 
[   16.166486] The buggy address belongs to the object at ffff8881026ce080
[   16.166486]  which belongs to the cache kmalloc-64 of size 64
[   16.167041] The buggy address is located 0 bytes to the right of
[   16.167041]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.167520] 
[   16.167617] The buggy address belongs to the physical page:
[   16.167797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.168057] flags: 0x200000000000000(node=0|zone=2)
[   16.168300] page_type: f5(slab)
[   16.168474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.168847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.169212] page dumped because: kasan: bad access detected
[   16.169473] 
[   16.169587] Memory state around the buggy address:
[   16.169816]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.170079]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.170358] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.170710]                                      ^
[   16.170922]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.171201]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.171440] ==================================================================
[   14.855379] ==================================================================
[   14.855883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.856223] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   14.856515] 
[   14.856801] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.856900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.856912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.856935] Call Trace:
[   14.856955]  <TASK>
[   14.856974]  dump_stack_lvl+0x73/0xb0
[   14.857006]  print_report+0xd1/0x610
[   14.857029]  ? __virt_addr_valid+0x1db/0x2d0
[   14.857065]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.857087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.857111]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.857133]  kasan_report+0x141/0x180
[   14.857157]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.857185]  kasan_check_range+0x10c/0x1c0
[   14.857209]  __kasan_check_write+0x18/0x20
[   14.857229]  kasan_atomics_helper+0x4a0/0x5450
[   14.857253]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.857276]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.857302]  ? kasan_atomics+0x152/0x310
[   14.857331]  kasan_atomics+0x1dc/0x310
[   14.857354]  ? __pfx_kasan_atomics+0x10/0x10
[   14.857379]  ? __pfx_read_tsc+0x10/0x10
[   14.857400]  ? ktime_get_ts64+0x86/0x230
[   14.857426]  kunit_try_run_case+0x1a5/0x480
[   14.857453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.857476]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.857502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.857526]  ? __kthread_parkme+0x82/0x180
[   14.857547]  ? preempt_count_sub+0x50/0x80
[   14.857573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.857610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.857635]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.857660]  kthread+0x337/0x6f0
[   14.857679]  ? trace_preempt_on+0x20/0xc0
[   14.857704]  ? __pfx_kthread+0x10/0x10
[   14.857725]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.857747]  ? calculate_sigpending+0x7b/0xa0
[   14.857773]  ? __pfx_kthread+0x10/0x10
[   14.857794]  ret_from_fork+0x116/0x1d0
[   14.857814]  ? __pfx_kthread+0x10/0x10
[   14.857900]  ret_from_fork_asm+0x1a/0x30
[   14.857935]  </TASK>
[   14.857946] 
[   14.866940] Allocated by task 282:
[   14.867141]  kasan_save_stack+0x45/0x70
[   14.867292]  kasan_save_track+0x18/0x40
[   14.867430]  kasan_save_alloc_info+0x3b/0x50
[   14.867582]  __kasan_kmalloc+0xb7/0xc0
[   14.867865]  __kmalloc_cache_noprof+0x189/0x420
[   14.868114]  kasan_atomics+0x95/0x310
[   14.868308]  kunit_try_run_case+0x1a5/0x480
[   14.868526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.869043]  kthread+0x337/0x6f0
[   14.869253]  ret_from_fork+0x116/0x1d0
[   14.869424]  ret_from_fork_asm+0x1a/0x30
[   14.869569] 
[   14.869643] The buggy address belongs to the object at ffff8881026ce080
[   14.869643]  which belongs to the cache kmalloc-64 of size 64
[   14.870133] The buggy address is located 0 bytes to the right of
[   14.870133]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   14.870745] 
[   14.870826] The buggy address belongs to the physical page:
[   14.871006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   14.871574] flags: 0x200000000000000(node=0|zone=2)
[   14.871820] page_type: f5(slab)
[   14.871951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.872201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.872703] page dumped because: kasan: bad access detected
[   14.873095] 
[   14.873515] Memory state around the buggy address:
[   14.874623]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.875170]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.875498] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.876093]                                      ^
[   14.876279]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877043]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877389] ==================================================================
[   15.152219] ==================================================================
[   15.152487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.152795] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.153164] 
[   15.153331] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.153377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.153391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.153415] Call Trace:
[   15.153434]  <TASK>
[   15.153452]  dump_stack_lvl+0x73/0xb0
[   15.153482]  print_report+0xd1/0x610
[   15.153505]  ? __virt_addr_valid+0x1db/0x2d0
[   15.153531]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.153553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.153576]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.153611]  kasan_report+0x141/0x180
[   15.153633]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.153661]  kasan_check_range+0x10c/0x1c0
[   15.153685]  __kasan_check_write+0x18/0x20
[   15.153705]  kasan_atomics_helper+0xb6a/0x5450
[   15.153729]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.153753]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.153779]  ? kasan_atomics+0x152/0x310
[   15.153807]  kasan_atomics+0x1dc/0x310
[   15.153841]  ? __pfx_kasan_atomics+0x10/0x10
[   15.153866]  ? __pfx_read_tsc+0x10/0x10
[   15.153888]  ? ktime_get_ts64+0x86/0x230
[   15.153914]  kunit_try_run_case+0x1a5/0x480
[   15.153941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.153963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.153989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.154014]  ? __kthread_parkme+0x82/0x180
[   15.154036]  ? preempt_count_sub+0x50/0x80
[   15.154071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.154096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.154121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.154146]  kthread+0x337/0x6f0
[   15.154165]  ? trace_preempt_on+0x20/0xc0
[   15.154190]  ? __pfx_kthread+0x10/0x10
[   15.154215]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.154238]  ? calculate_sigpending+0x7b/0xa0
[   15.154262]  ? __pfx_kthread+0x10/0x10
[   15.154284]  ret_from_fork+0x116/0x1d0
[   15.154304]  ? __pfx_kthread+0x10/0x10
[   15.154325]  ret_from_fork_asm+0x1a/0x30
[   15.154359]  </TASK>
[   15.154370] 
[   15.161995] Allocated by task 282:
[   15.162296]  kasan_save_stack+0x45/0x70
[   15.162503]  kasan_save_track+0x18/0x40
[   15.162841]  kasan_save_alloc_info+0x3b/0x50
[   15.163062]  __kasan_kmalloc+0xb7/0xc0
[   15.163250]  __kmalloc_cache_noprof+0x189/0x420
[   15.163504]  kasan_atomics+0x95/0x310
[   15.163772]  kunit_try_run_case+0x1a5/0x480
[   15.163922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.164418]  kthread+0x337/0x6f0
[   15.164648]  ret_from_fork+0x116/0x1d0
[   15.164803]  ret_from_fork_asm+0x1a/0x30
[   15.165088] 
[   15.165173] The buggy address belongs to the object at ffff8881026ce080
[   15.165173]  which belongs to the cache kmalloc-64 of size 64
[   15.165676] The buggy address is located 0 bytes to the right of
[   15.165676]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.166047] 
[   15.166134] The buggy address belongs to the physical page:
[   15.166480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.167061] flags: 0x200000000000000(node=0|zone=2)
[   15.167377] page_type: f5(slab)
[   15.167549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.167935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.168224] page dumped because: kasan: bad access detected
[   15.168517] 
[   15.168588] Memory state around the buggy address:
[   15.168809]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.169120]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.169339] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.169557]                                      ^
[   15.169715]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.169935]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.170252] ==================================================================
[   16.097798] ==================================================================
[   16.098203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.098582] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.099128] 
[   16.099250] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.099293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.099305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.099329] Call Trace:
[   16.099343]  <TASK>
[   16.099359]  dump_stack_lvl+0x73/0xb0
[   16.099388]  print_report+0xd1/0x610
[   16.099411]  ? __virt_addr_valid+0x1db/0x2d0
[   16.099434]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.099456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.099479]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.099502]  kasan_report+0x141/0x180
[   16.099524]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.099553]  kasan_check_range+0x10c/0x1c0
[   16.099577]  __kasan_check_write+0x18/0x20
[   16.099598]  kasan_atomics_helper+0x20c8/0x5450
[   16.099649]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.099676]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.099717]  ? kasan_atomics+0x152/0x310
[   16.099746]  kasan_atomics+0x1dc/0x310
[   16.099787]  ? __pfx_kasan_atomics+0x10/0x10
[   16.099812]  ? __pfx_read_tsc+0x10/0x10
[   16.099834]  ? ktime_get_ts64+0x86/0x230
[   16.099860]  kunit_try_run_case+0x1a5/0x480
[   16.099887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.099910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.099950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.099975]  ? __kthread_parkme+0x82/0x180
[   16.099995]  ? preempt_count_sub+0x50/0x80
[   16.100021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.100045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.100080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.100105]  kthread+0x337/0x6f0
[   16.100126]  ? trace_preempt_on+0x20/0xc0
[   16.100150]  ? __pfx_kthread+0x10/0x10
[   16.100172]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.100197]  ? calculate_sigpending+0x7b/0xa0
[   16.100239]  ? __pfx_kthread+0x10/0x10
[   16.100262]  ret_from_fork+0x116/0x1d0
[   16.100282]  ? __pfx_kthread+0x10/0x10
[   16.100303]  ret_from_fork_asm+0x1a/0x30
[   16.100337]  </TASK>
[   16.100347] 
[   16.107863] Allocated by task 282:
[   16.107991]  kasan_save_stack+0x45/0x70
[   16.108149]  kasan_save_track+0x18/0x40
[   16.108530]  kasan_save_alloc_info+0x3b/0x50
[   16.108774]  __kasan_kmalloc+0xb7/0xc0
[   16.108962]  __kmalloc_cache_noprof+0x189/0x420
[   16.109157]  kasan_atomics+0x95/0x310
[   16.109292]  kunit_try_run_case+0x1a5/0x480
[   16.109439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.109616]  kthread+0x337/0x6f0
[   16.109823]  ret_from_fork+0x116/0x1d0
[   16.110138]  ret_from_fork_asm+0x1a/0x30
[   16.110360] 
[   16.110459] The buggy address belongs to the object at ffff8881026ce080
[   16.110459]  which belongs to the cache kmalloc-64 of size 64
[   16.111296] The buggy address is located 0 bytes to the right of
[   16.111296]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.111898] 
[   16.111975] The buggy address belongs to the physical page:
[   16.112163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.112524] flags: 0x200000000000000(node=0|zone=2)
[   16.112868] page_type: f5(slab)
[   16.113061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.113348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.113710] page dumped because: kasan: bad access detected
[   16.113952] 
[   16.114047] Memory state around the buggy address:
[   16.114265]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.114539]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.114760] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.115714]                                      ^
[   16.115960]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.116308]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.116581] ==================================================================
[   15.802378] ==================================================================
[   15.802761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.803123] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.803519] 
[   15.803696] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.803767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.803778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.803803] Call Trace:
[   15.803823]  <TASK>
[   15.803846]  dump_stack_lvl+0x73/0xb0
[   15.803878]  print_report+0xd1/0x610
[   15.803903]  ? __virt_addr_valid+0x1db/0x2d0
[   15.803927]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.803950]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.803972]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.803995]  kasan_report+0x141/0x180
[   15.804018]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.804045]  kasan_check_range+0x10c/0x1c0
[   15.804108]  __kasan_check_write+0x18/0x20
[   15.804128]  kasan_atomics_helper+0x18b1/0x5450
[   15.804151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.804175]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.804201]  ? kasan_atomics+0x152/0x310
[   15.804229]  kasan_atomics+0x1dc/0x310
[   15.804252]  ? __pfx_kasan_atomics+0x10/0x10
[   15.804276]  ? __pfx_read_tsc+0x10/0x10
[   15.804298]  ? ktime_get_ts64+0x86/0x230
[   15.804324]  kunit_try_run_case+0x1a5/0x480
[   15.804352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.804375]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.804401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.804425]  ? __kthread_parkme+0x82/0x180
[   15.804447]  ? preempt_count_sub+0x50/0x80
[   15.804472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.804497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.804522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.804547]  kthread+0x337/0x6f0
[   15.804566]  ? trace_preempt_on+0x20/0xc0
[   15.804640]  ? __pfx_kthread+0x10/0x10
[   15.804661]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.804706]  ? calculate_sigpending+0x7b/0xa0
[   15.804732]  ? __pfx_kthread+0x10/0x10
[   15.804754]  ret_from_fork+0x116/0x1d0
[   15.804774]  ? __pfx_kthread+0x10/0x10
[   15.804808]  ret_from_fork_asm+0x1a/0x30
[   15.804845]  </TASK>
[   15.804857] 
[   15.813168] Allocated by task 282:
[   15.813404]  kasan_save_stack+0x45/0x70
[   15.813677]  kasan_save_track+0x18/0x40
[   15.813861]  kasan_save_alloc_info+0x3b/0x50
[   15.814068]  __kasan_kmalloc+0xb7/0xc0
[   15.814272]  __kmalloc_cache_noprof+0x189/0x420
[   15.814492]  kasan_atomics+0x95/0x310
[   15.814723]  kunit_try_run_case+0x1a5/0x480
[   15.814877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.815182]  kthread+0x337/0x6f0
[   15.815357]  ret_from_fork+0x116/0x1d0
[   15.815546]  ret_from_fork_asm+0x1a/0x30
[   15.815821] 
[   15.815929] The buggy address belongs to the object at ffff8881026ce080
[   15.815929]  which belongs to the cache kmalloc-64 of size 64
[   15.816367] The buggy address is located 0 bytes to the right of
[   15.816367]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.816867] 
[   15.817015] The buggy address belongs to the physical page:
[   15.817284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.817642] flags: 0x200000000000000(node=0|zone=2)
[   15.817979] page_type: f5(slab)
[   15.818153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.818528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.818789] page dumped because: kasan: bad access detected
[   15.818983] 
[   15.819087] Memory state around the buggy address:
[   15.819361]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819712]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.820136] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.820487]                                      ^
[   15.820707]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820929]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.821302] ==================================================================
[   15.439645] ==================================================================
[   15.440399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.440762] Read of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.441579] 
[   15.441776] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.441836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.441930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.441956] Call Trace:
[   15.441973]  <TASK>
[   15.441992]  dump_stack_lvl+0x73/0xb0
[   15.442023]  print_report+0xd1/0x610
[   15.442047]  ? __virt_addr_valid+0x1db/0x2d0
[   15.442082]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.442105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.442128]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.442151]  kasan_report+0x141/0x180
[   15.442174]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.442207]  __asan_report_load4_noabort+0x18/0x20
[   15.442232]  kasan_atomics_helper+0x4a02/0x5450
[   15.442256]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.442279]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.442305]  ? kasan_atomics+0x152/0x310
[   15.442333]  kasan_atomics+0x1dc/0x310
[   15.442356]  ? __pfx_kasan_atomics+0x10/0x10
[   15.442381]  ? __pfx_read_tsc+0x10/0x10
[   15.442402]  ? ktime_get_ts64+0x86/0x230
[   15.442428]  kunit_try_run_case+0x1a5/0x480
[   15.442452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.442475]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.442500]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.442525]  ? __kthread_parkme+0x82/0x180
[   15.442545]  ? preempt_count_sub+0x50/0x80
[   15.442571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.442605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.442630]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.442655]  kthread+0x337/0x6f0
[   15.442674]  ? trace_preempt_on+0x20/0xc0
[   15.442699]  ? __pfx_kthread+0x10/0x10
[   15.442720]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.442742]  ? calculate_sigpending+0x7b/0xa0
[   15.442767]  ? __pfx_kthread+0x10/0x10
[   15.442789]  ret_from_fork+0x116/0x1d0
[   15.442808]  ? __pfx_kthread+0x10/0x10
[   15.442828]  ret_from_fork_asm+0x1a/0x30
[   15.442863]  </TASK>
[   15.442873] 
[   15.456378] Allocated by task 282:
[   15.456588]  kasan_save_stack+0x45/0x70
[   15.456731]  kasan_save_track+0x18/0x40
[   15.457180]  kasan_save_alloc_info+0x3b/0x50
[   15.457595]  __kasan_kmalloc+0xb7/0xc0
[   15.458117]  __kmalloc_cache_noprof+0x189/0x420
[   15.458596]  kasan_atomics+0x95/0x310
[   15.458959]  kunit_try_run_case+0x1a5/0x480
[   15.459144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.459659]  kthread+0x337/0x6f0
[   15.460062]  ret_from_fork+0x116/0x1d0
[   15.460231]  ret_from_fork_asm+0x1a/0x30
[   15.460600] 
[   15.460835] The buggy address belongs to the object at ffff8881026ce080
[   15.460835]  which belongs to the cache kmalloc-64 of size 64
[   15.461817] The buggy address is located 0 bytes to the right of
[   15.461817]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.462352] 
[   15.462428] The buggy address belongs to the physical page:
[   15.462613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.463456] flags: 0x200000000000000(node=0|zone=2)
[   15.463964] page_type: f5(slab)
[   15.464338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.465126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.465794] page dumped because: kasan: bad access detected
[   15.466372] 
[   15.466550] Memory state around the buggy address:
[   15.466951]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.467327]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.467878] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.468114]                                      ^
[   15.468643]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.469062]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.469803] ==================================================================
[   16.060103] ==================================================================
[   16.060811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.061200] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.061505] 
[   16.061594] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.061636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.061648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.061670] Call Trace:
[   16.061685]  <TASK>
[   16.061700]  dump_stack_lvl+0x73/0xb0
[   16.061728]  print_report+0xd1/0x610
[   16.061750]  ? __virt_addr_valid+0x1db/0x2d0
[   16.061773]  ? kasan_atomics_helper+0x2006/0x5450
[   16.061795]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.061833]  ? kasan_atomics_helper+0x2006/0x5450
[   16.061856]  kasan_report+0x141/0x180
[   16.061905]  ? kasan_atomics_helper+0x2006/0x5450
[   16.061934]  kasan_check_range+0x10c/0x1c0
[   16.061970]  __kasan_check_write+0x18/0x20
[   16.061990]  kasan_atomics_helper+0x2006/0x5450
[   16.062014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.062037]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.062075]  ? kasan_atomics+0x152/0x310
[   16.062102]  kasan_atomics+0x1dc/0x310
[   16.062126]  ? __pfx_kasan_atomics+0x10/0x10
[   16.062150]  ? __pfx_read_tsc+0x10/0x10
[   16.062172]  ? ktime_get_ts64+0x86/0x230
[   16.062202]  kunit_try_run_case+0x1a5/0x480
[   16.062228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.062270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.062296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.062320]  ? __kthread_parkme+0x82/0x180
[   16.062341]  ? preempt_count_sub+0x50/0x80
[   16.062366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.062391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.062415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.062440]  kthread+0x337/0x6f0
[   16.062460]  ? trace_preempt_on+0x20/0xc0
[   16.062484]  ? __pfx_kthread+0x10/0x10
[   16.062505]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.062527]  ? calculate_sigpending+0x7b/0xa0
[   16.062552]  ? __pfx_kthread+0x10/0x10
[   16.062574]  ret_from_fork+0x116/0x1d0
[   16.062593]  ? __pfx_kthread+0x10/0x10
[   16.062614]  ret_from_fork_asm+0x1a/0x30
[   16.062646]  </TASK>
[   16.062656] 
[   16.070635] Allocated by task 282:
[   16.070821]  kasan_save_stack+0x45/0x70
[   16.071041]  kasan_save_track+0x18/0x40
[   16.071239]  kasan_save_alloc_info+0x3b/0x50
[   16.071423]  __kasan_kmalloc+0xb7/0xc0
[   16.071557]  __kmalloc_cache_noprof+0x189/0x420
[   16.071733]  kasan_atomics+0x95/0x310
[   16.071921]  kunit_try_run_case+0x1a5/0x480
[   16.072192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.072389]  kthread+0x337/0x6f0
[   16.072514]  ret_from_fork+0x116/0x1d0
[   16.072649]  ret_from_fork_asm+0x1a/0x30
[   16.072848] 
[   16.072947] The buggy address belongs to the object at ffff8881026ce080
[   16.072947]  which belongs to the cache kmalloc-64 of size 64
[   16.073497] The buggy address is located 0 bytes to the right of
[   16.073497]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.074040] 
[   16.074126] The buggy address belongs to the physical page:
[   16.074381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.074987] flags: 0x200000000000000(node=0|zone=2)
[   16.075225] page_type: f5(slab)
[   16.075373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.075748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.076013] page dumped because: kasan: bad access detected
[   16.076198] 
[   16.076268] Memory state around the buggy address:
[   16.076490]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.077094]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.077390] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.077641]                                      ^
[   16.077864]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.078188]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.078425] ==================================================================
[   16.135404] ==================================================================
[   16.136206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.136780] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.137120] 
[   16.137261] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.137309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.137320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.137362] Call Trace:
[   16.137382]  <TASK>
[   16.137401]  dump_stack_lvl+0x73/0xb0
[   16.137431]  print_report+0xd1/0x610
[   16.137454]  ? __virt_addr_valid+0x1db/0x2d0
[   16.137478]  ? kasan_atomics_helper+0x218a/0x5450
[   16.137500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.137524]  ? kasan_atomics_helper+0x218a/0x5450
[   16.137546]  kasan_report+0x141/0x180
[   16.137569]  ? kasan_atomics_helper+0x218a/0x5450
[   16.137597]  kasan_check_range+0x10c/0x1c0
[   16.137622]  __kasan_check_write+0x18/0x20
[   16.137642]  kasan_atomics_helper+0x218a/0x5450
[   16.137666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.137689]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.137715]  ? kasan_atomics+0x152/0x310
[   16.137743]  kasan_atomics+0x1dc/0x310
[   16.137766]  ? __pfx_kasan_atomics+0x10/0x10
[   16.137791]  ? __pfx_read_tsc+0x10/0x10
[   16.137812]  ? ktime_get_ts64+0x86/0x230
[   16.137838]  kunit_try_run_case+0x1a5/0x480
[   16.137864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.137887]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.137914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.137938]  ? __kthread_parkme+0x82/0x180
[   16.137959]  ? preempt_count_sub+0x50/0x80
[   16.137986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.138032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.138066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.138091]  kthread+0x337/0x6f0
[   16.138111]  ? trace_preempt_on+0x20/0xc0
[   16.138135]  ? __pfx_kthread+0x10/0x10
[   16.138157]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.138179]  ? calculate_sigpending+0x7b/0xa0
[   16.138209]  ? __pfx_kthread+0x10/0x10
[   16.138232]  ret_from_fork+0x116/0x1d0
[   16.138251]  ? __pfx_kthread+0x10/0x10
[   16.138272]  ret_from_fork_asm+0x1a/0x30
[   16.138304]  </TASK>
[   16.138315] 
[   16.145917] Allocated by task 282:
[   16.146128]  kasan_save_stack+0x45/0x70
[   16.146313]  kasan_save_track+0x18/0x40
[   16.146453]  kasan_save_alloc_info+0x3b/0x50
[   16.146637]  __kasan_kmalloc+0xb7/0xc0
[   16.146815]  __kmalloc_cache_noprof+0x189/0x420
[   16.147025]  kasan_atomics+0x95/0x310
[   16.147233]  kunit_try_run_case+0x1a5/0x480
[   16.147435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.147704]  kthread+0x337/0x6f0
[   16.147867]  ret_from_fork+0x116/0x1d0
[   16.148067]  ret_from_fork_asm+0x1a/0x30
[   16.148265] 
[   16.148339] The buggy address belongs to the object at ffff8881026ce080
[   16.148339]  which belongs to the cache kmalloc-64 of size 64
[   16.148822] The buggy address is located 0 bytes to the right of
[   16.148822]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.149252] 
[   16.149358] The buggy address belongs to the physical page:
[   16.149663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.150057] flags: 0x200000000000000(node=0|zone=2)
[   16.150305] page_type: f5(slab)
[   16.150480] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.150774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.151010] page dumped because: kasan: bad access detected
[   16.151198] 
[   16.151269] Memory state around the buggy address:
[   16.151528]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.151889]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.152234] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.152615]                                      ^
[   16.152876]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.153209]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.153512] ==================================================================
[   15.652730] ==================================================================
[   15.653155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.653471] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.654193] 
[   15.654558] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.654610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.654634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.654658] Call Trace:
[   15.654675]  <TASK>
[   15.654723]  dump_stack_lvl+0x73/0xb0
[   15.654757]  print_report+0xd1/0x610
[   15.654780]  ? __virt_addr_valid+0x1db/0x2d0
[   15.654805]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.654831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.654858]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.654882]  kasan_report+0x141/0x180
[   15.654905]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.654933]  __asan_report_store8_noabort+0x1b/0x30
[   15.654959]  kasan_atomics_helper+0x50d4/0x5450
[   15.654982]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.655005]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.655031]  ? kasan_atomics+0x152/0x310
[   15.655069]  kasan_atomics+0x1dc/0x310
[   15.655093]  ? __pfx_kasan_atomics+0x10/0x10
[   15.655118]  ? __pfx_read_tsc+0x10/0x10
[   15.655139]  ? ktime_get_ts64+0x86/0x230
[   15.655165]  kunit_try_run_case+0x1a5/0x480
[   15.655190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.655213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.655239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.655264]  ? __kthread_parkme+0x82/0x180
[   15.655286]  ? preempt_count_sub+0x50/0x80
[   15.655311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.655336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.655360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.655386]  kthread+0x337/0x6f0
[   15.655407]  ? trace_preempt_on+0x20/0xc0
[   15.655431]  ? __pfx_kthread+0x10/0x10
[   15.655452]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.655475]  ? calculate_sigpending+0x7b/0xa0
[   15.655500]  ? __pfx_kthread+0x10/0x10
[   15.655522]  ret_from_fork+0x116/0x1d0
[   15.655541]  ? __pfx_kthread+0x10/0x10
[   15.655563]  ret_from_fork_asm+0x1a/0x30
[   15.655609]  </TASK>
[   15.655619] 
[   15.667239] Allocated by task 282:
[   15.667413]  kasan_save_stack+0x45/0x70
[   15.667816]  kasan_save_track+0x18/0x40
[   15.668083]  kasan_save_alloc_info+0x3b/0x50
[   15.668429]  __kasan_kmalloc+0xb7/0xc0
[   15.668746]  __kmalloc_cache_noprof+0x189/0x420
[   15.669113]  kasan_atomics+0x95/0x310
[   15.669303]  kunit_try_run_case+0x1a5/0x480
[   15.669498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.670209]  kthread+0x337/0x6f0
[   15.670486]  ret_from_fork+0x116/0x1d0
[   15.670925]  ret_from_fork_asm+0x1a/0x30
[   15.671157] 
[   15.671254] The buggy address belongs to the object at ffff8881026ce080
[   15.671254]  which belongs to the cache kmalloc-64 of size 64
[   15.672075] The buggy address is located 0 bytes to the right of
[   15.672075]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.673026] 
[   15.673142] The buggy address belongs to the physical page:
[   15.673607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.674174] flags: 0x200000000000000(node=0|zone=2)
[   15.674609] page_type: f5(slab)
[   15.674864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.675343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.675907] page dumped because: kasan: bad access detected
[   15.676245] 
[   15.676488] Memory state around the buggy address:
[   15.676865]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.677178]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.677473] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.678221]                                      ^
[   15.678512]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.679177]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.679647] ==================================================================
[   15.936949] ==================================================================
[   15.937291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.937529] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.938217] 
[   15.938317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.938374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.938387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.938410] Call Trace:
[   15.938440]  <TASK>
[   15.938458]  dump_stack_lvl+0x73/0xb0
[   15.938490]  print_report+0xd1/0x610
[   15.938512]  ? __virt_addr_valid+0x1db/0x2d0
[   15.938535]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.938558]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.938581]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.938616]  kasan_report+0x141/0x180
[   15.938639]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.938667]  kasan_check_range+0x10c/0x1c0
[   15.938691]  __kasan_check_write+0x18/0x20
[   15.938711]  kasan_atomics_helper+0x1ce1/0x5450
[   15.938735]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.938758]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.938784]  ? kasan_atomics+0x152/0x310
[   15.938813]  kasan_atomics+0x1dc/0x310
[   15.938837]  ? __pfx_kasan_atomics+0x10/0x10
[   15.938861]  ? __pfx_read_tsc+0x10/0x10
[   15.938882]  ? ktime_get_ts64+0x86/0x230
[   15.938908]  kunit_try_run_case+0x1a5/0x480
[   15.938933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.938956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.938982]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.939007]  ? __kthread_parkme+0x82/0x180
[   15.939028]  ? preempt_count_sub+0x50/0x80
[   15.939064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.939090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.939114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.939139]  kthread+0x337/0x6f0
[   15.939159]  ? trace_preempt_on+0x20/0xc0
[   15.939182]  ? __pfx_kthread+0x10/0x10
[   15.939204]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.939226]  ? calculate_sigpending+0x7b/0xa0
[   15.939251]  ? __pfx_kthread+0x10/0x10
[   15.939273]  ret_from_fork+0x116/0x1d0
[   15.939292]  ? __pfx_kthread+0x10/0x10
[   15.939314]  ret_from_fork_asm+0x1a/0x30
[   15.939347]  </TASK>
[   15.939358] 
[   15.950165] Allocated by task 282:
[   15.950543]  kasan_save_stack+0x45/0x70
[   15.950773]  kasan_save_track+0x18/0x40
[   15.951075]  kasan_save_alloc_info+0x3b/0x50
[   15.951244]  __kasan_kmalloc+0xb7/0xc0
[   15.951554]  __kmalloc_cache_noprof+0x189/0x420
[   15.951934]  kasan_atomics+0x95/0x310
[   15.952215]  kunit_try_run_case+0x1a5/0x480
[   15.952505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.952876]  kthread+0x337/0x6f0
[   15.953114]  ret_from_fork+0x116/0x1d0
[   15.953392]  ret_from_fork_asm+0x1a/0x30
[   15.953552] 
[   15.953664] The buggy address belongs to the object at ffff8881026ce080
[   15.953664]  which belongs to the cache kmalloc-64 of size 64
[   15.954448] The buggy address is located 0 bytes to the right of
[   15.954448]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.955064] 
[   15.955140] The buggy address belongs to the physical page:
[   15.955420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.955846] flags: 0x200000000000000(node=0|zone=2)
[   15.956025] page_type: f5(slab)
[   15.956205] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.956507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.956897] page dumped because: kasan: bad access detected
[   15.957152] 
[   15.957249] Memory state around the buggy address:
[   15.957466]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.957773]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.958068] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.958382]                                      ^
[   15.958650]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.958888]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.959209] ==================================================================
[   15.717763] ==================================================================
[   15.718261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.718606] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.718862] 
[   15.718955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.719001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.719013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.719036] Call Trace:
[   15.719066]  <TASK>
[   15.719085]  dump_stack_lvl+0x73/0xb0
[   15.719126]  print_report+0xd1/0x610
[   15.719149]  ? __virt_addr_valid+0x1db/0x2d0
[   15.719184]  ? kasan_atomics_helper+0x164f/0x5450
[   15.719206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.719229]  ? kasan_atomics_helper+0x164f/0x5450
[   15.719253]  kasan_report+0x141/0x180
[   15.719275]  ? kasan_atomics_helper+0x164f/0x5450
[   15.719304]  kasan_check_range+0x10c/0x1c0
[   15.719329]  __kasan_check_write+0x18/0x20
[   15.719349]  kasan_atomics_helper+0x164f/0x5450
[   15.719373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.719396]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.719422]  ? kasan_atomics+0x152/0x310
[   15.719451]  kasan_atomics+0x1dc/0x310
[   15.719474]  ? __pfx_kasan_atomics+0x10/0x10
[   15.719499]  ? __pfx_read_tsc+0x10/0x10
[   15.719521]  ? ktime_get_ts64+0x86/0x230
[   15.719547]  kunit_try_run_case+0x1a5/0x480
[   15.719573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.719596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.719623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.719657]  ? __kthread_parkme+0x82/0x180
[   15.719679]  ? preempt_count_sub+0x50/0x80
[   15.719715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.719749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.719775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.719801]  kthread+0x337/0x6f0
[   15.719831]  ? trace_preempt_on+0x20/0xc0
[   15.719856]  ? __pfx_kthread+0x10/0x10
[   15.719888]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.719920]  ? calculate_sigpending+0x7b/0xa0
[   15.719945]  ? __pfx_kthread+0x10/0x10
[   15.719978]  ret_from_fork+0x116/0x1d0
[   15.719998]  ? __pfx_kthread+0x10/0x10
[   15.720019]  ret_from_fork_asm+0x1a/0x30
[   15.720062]  </TASK>
[   15.720073] 
[   15.730493] Allocated by task 282:
[   15.730673]  kasan_save_stack+0x45/0x70
[   15.730837]  kasan_save_track+0x18/0x40
[   15.731132]  kasan_save_alloc_info+0x3b/0x50
[   15.731348]  __kasan_kmalloc+0xb7/0xc0
[   15.731484]  __kmalloc_cache_noprof+0x189/0x420
[   15.731869]  kasan_atomics+0x95/0x310
[   15.732069]  kunit_try_run_case+0x1a5/0x480
[   15.732220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.732471]  kthread+0x337/0x6f0
[   15.732722]  ret_from_fork+0x116/0x1d0
[   15.732886]  ret_from_fork_asm+0x1a/0x30
[   15.733033] 
[   15.733141] The buggy address belongs to the object at ffff8881026ce080
[   15.733141]  which belongs to the cache kmalloc-64 of size 64
[   15.733733] The buggy address is located 0 bytes to the right of
[   15.733733]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.734276] 
[   15.734390] The buggy address belongs to the physical page:
[   15.734672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.735026] flags: 0x200000000000000(node=0|zone=2)
[   15.735270] page_type: f5(slab)
[   15.735438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.735783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.736110] page dumped because: kasan: bad access detected
[   15.736334] 
[   15.736405] Memory state around the buggy address:
[   15.736561]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.736878]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.737227] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.737472]                                      ^
[   15.737680]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.738079]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.738436] ==================================================================
[   15.623004] ==================================================================
[   15.623344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.623736] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.624585] 
[   15.625244] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.625311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.625325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.625349] Call Trace:
[   15.625363]  <TASK>
[   15.625413]  dump_stack_lvl+0x73/0xb0
[   15.625446]  print_report+0xd1/0x610
[   15.625468]  ? __virt_addr_valid+0x1db/0x2d0
[   15.625490]  ? kasan_atomics_helper+0x1467/0x5450
[   15.625514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.625540]  ? kasan_atomics_helper+0x1467/0x5450
[   15.625565]  kasan_report+0x141/0x180
[   15.625588]  ? kasan_atomics_helper+0x1467/0x5450
[   15.625616]  kasan_check_range+0x10c/0x1c0
[   15.625641]  __kasan_check_write+0x18/0x20
[   15.625661]  kasan_atomics_helper+0x1467/0x5450
[   15.625684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.625708]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.625734]  ? kasan_atomics+0x152/0x310
[   15.625762]  kasan_atomics+0x1dc/0x310
[   15.625784]  ? __pfx_kasan_atomics+0x10/0x10
[   15.625810]  ? __pfx_read_tsc+0x10/0x10
[   15.625830]  ? ktime_get_ts64+0x86/0x230
[   15.625856]  kunit_try_run_case+0x1a5/0x480
[   15.625881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.625904]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.625929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.625954]  ? __kthread_parkme+0x82/0x180
[   15.625974]  ? preempt_count_sub+0x50/0x80
[   15.625999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.626024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.626059]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.626085]  kthread+0x337/0x6f0
[   15.626105]  ? trace_preempt_on+0x20/0xc0
[   15.626129]  ? __pfx_kthread+0x10/0x10
[   15.626151]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.626173]  ? calculate_sigpending+0x7b/0xa0
[   15.626201]  ? __pfx_kthread+0x10/0x10
[   15.626224]  ret_from_fork+0x116/0x1d0
[   15.626243]  ? __pfx_kthread+0x10/0x10
[   15.626264]  ret_from_fork_asm+0x1a/0x30
[   15.626296]  </TASK>
[   15.626308] 
[   15.638962] Allocated by task 282:
[   15.639151]  kasan_save_stack+0x45/0x70
[   15.639343]  kasan_save_track+0x18/0x40
[   15.639526]  kasan_save_alloc_info+0x3b/0x50
[   15.640235]  __kasan_kmalloc+0xb7/0xc0
[   15.640506]  __kmalloc_cache_noprof+0x189/0x420
[   15.640919]  kasan_atomics+0x95/0x310
[   15.641252]  kunit_try_run_case+0x1a5/0x480
[   15.641716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.642133]  kthread+0x337/0x6f0
[   15.642300]  ret_from_fork+0x116/0x1d0
[   15.642480]  ret_from_fork_asm+0x1a/0x30
[   15.642876] 
[   15.643125] The buggy address belongs to the object at ffff8881026ce080
[   15.643125]  which belongs to the cache kmalloc-64 of size 64
[   15.643842] The buggy address is located 0 bytes to the right of
[   15.643842]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.644388] 
[   15.644482] The buggy address belongs to the physical page:
[   15.645162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.645827] flags: 0x200000000000000(node=0|zone=2)
[   15.646149] page_type: f5(slab)
[   15.646471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.647183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.647705] page dumped because: kasan: bad access detected
[   15.648167] 
[   15.648401] Memory state around the buggy address:
[   15.648784]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.649187]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.649484] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.650285]                                      ^
[   15.650604]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.651151]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.651447] ==================================================================
[   15.978320] ==================================================================
[   15.978769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.979093] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.979447] 
[   15.979545] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.979592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.979604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.979629] Call Trace:
[   15.979649]  <TASK>
[   15.979671]  dump_stack_lvl+0x73/0xb0
[   15.979715]  print_report+0xd1/0x610
[   15.979739]  ? __virt_addr_valid+0x1db/0x2d0
[   15.979764]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.979798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.979822]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.979845]  kasan_report+0x141/0x180
[   15.979869]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.979898]  kasan_check_range+0x10c/0x1c0
[   15.979923]  __kasan_check_write+0x18/0x20
[   15.979943]  kasan_atomics_helper+0x1e12/0x5450
[   15.979968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.979992]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.980019]  ? kasan_atomics+0x152/0x310
[   15.980048]  kasan_atomics+0x1dc/0x310
[   15.980079]  ? __pfx_kasan_atomics+0x10/0x10
[   15.980105]  ? __pfx_read_tsc+0x10/0x10
[   15.980127]  ? ktime_get_ts64+0x86/0x230
[   15.980154]  kunit_try_run_case+0x1a5/0x480
[   15.980180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.980204]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.980232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.980256]  ? __kthread_parkme+0x82/0x180
[   15.980279]  ? preempt_count_sub+0x50/0x80
[   15.980305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.980339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.980365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.980390]  kthread+0x337/0x6f0
[   15.980421]  ? trace_preempt_on+0x20/0xc0
[   15.980447]  ? __pfx_kthread+0x10/0x10
[   15.980468]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.980490]  ? calculate_sigpending+0x7b/0xa0
[   15.980526]  ? __pfx_kthread+0x10/0x10
[   15.980549]  ret_from_fork+0x116/0x1d0
[   15.980568]  ? __pfx_kthread+0x10/0x10
[   15.980599]  ret_from_fork_asm+0x1a/0x30
[   15.980634]  </TASK>
[   15.980644] 
[   15.988678] Allocated by task 282:
[   15.988865]  kasan_save_stack+0x45/0x70
[   15.989075]  kasan_save_track+0x18/0x40
[   15.989274]  kasan_save_alloc_info+0x3b/0x50
[   15.989466]  __kasan_kmalloc+0xb7/0xc0
[   15.989625]  __kmalloc_cache_noprof+0x189/0x420
[   15.989882]  kasan_atomics+0x95/0x310
[   15.990065]  kunit_try_run_case+0x1a5/0x480
[   15.990279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.990563]  kthread+0x337/0x6f0
[   15.990731]  ret_from_fork+0x116/0x1d0
[   15.990871]  ret_from_fork_asm+0x1a/0x30
[   15.991015] 
[   15.991098] The buggy address belongs to the object at ffff8881026ce080
[   15.991098]  which belongs to the cache kmalloc-64 of size 64
[   15.991462] The buggy address is located 0 bytes to the right of
[   15.991462]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.992192] 
[   15.992421] The buggy address belongs to the physical page:
[   15.992771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.993215] flags: 0x200000000000000(node=0|zone=2)
[   15.993495] page_type: f5(slab)
[   15.993649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.993936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.994225] page dumped because: kasan: bad access detected
[   15.994429] 
[   15.994513] Memory state around the buggy address:
[   15.994708]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.994967]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.995240] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.995764]                                      ^
[   15.995981]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.996215]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.996436] ==================================================================
[   15.014684] ==================================================================
[   15.015259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.015762] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.016192] 
[   15.016493] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.016541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.016574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.016599] Call Trace:
[   15.016619]  <TASK>
[   15.016639]  dump_stack_lvl+0x73/0xb0
[   15.016671]  print_report+0xd1/0x610
[   15.016693]  ? __virt_addr_valid+0x1db/0x2d0
[   15.016718]  ? kasan_atomics_helper+0x860/0x5450
[   15.016740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.016764]  ? kasan_atomics_helper+0x860/0x5450
[   15.016786]  kasan_report+0x141/0x180
[   15.016810]  ? kasan_atomics_helper+0x860/0x5450
[   15.016838]  kasan_check_range+0x10c/0x1c0
[   15.016862]  __kasan_check_write+0x18/0x20
[   15.016882]  kasan_atomics_helper+0x860/0x5450
[   15.016906]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.016929]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.016956]  ? kasan_atomics+0x152/0x310
[   15.016984]  kasan_atomics+0x1dc/0x310
[   15.017007]  ? __pfx_kasan_atomics+0x10/0x10
[   15.017032]  ? __pfx_read_tsc+0x10/0x10
[   15.017066]  ? ktime_get_ts64+0x86/0x230
[   15.017092]  kunit_try_run_case+0x1a5/0x480
[   15.017119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.017142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.017168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.017192]  ? __kthread_parkme+0x82/0x180
[   15.017214]  ? preempt_count_sub+0x50/0x80
[   15.017240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.017266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.017292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.017317]  kthread+0x337/0x6f0
[   15.017337]  ? trace_preempt_on+0x20/0xc0
[   15.017361]  ? __pfx_kthread+0x10/0x10
[   15.017382]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.017404]  ? calculate_sigpending+0x7b/0xa0
[   15.017429]  ? __pfx_kthread+0x10/0x10
[   15.017451]  ret_from_fork+0x116/0x1d0
[   15.017471]  ? __pfx_kthread+0x10/0x10
[   15.017492]  ret_from_fork_asm+0x1a/0x30
[   15.017525]  </TASK>
[   15.017536] 
[   15.025933] Allocated by task 282:
[   15.026169]  kasan_save_stack+0x45/0x70
[   15.026369]  kasan_save_track+0x18/0x40
[   15.026521]  kasan_save_alloc_info+0x3b/0x50
[   15.026897]  __kasan_kmalloc+0xb7/0xc0
[   15.027077]  __kmalloc_cache_noprof+0x189/0x420
[   15.027236]  kasan_atomics+0x95/0x310
[   15.027371]  kunit_try_run_case+0x1a5/0x480
[   15.027553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.027784]  kthread+0x337/0x6f0
[   15.027972]  ret_from_fork+0x116/0x1d0
[   15.028207]  ret_from_fork_asm+0x1a/0x30
[   15.028368] 
[   15.028461] The buggy address belongs to the object at ffff8881026ce080
[   15.028461]  which belongs to the cache kmalloc-64 of size 64
[   15.029014] The buggy address is located 0 bytes to the right of
[   15.029014]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.029622] 
[   15.029721] The buggy address belongs to the physical page:
[   15.029975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.030412] flags: 0x200000000000000(node=0|zone=2)
[   15.030764] page_type: f5(slab)
[   15.030888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.031132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.031363] page dumped because: kasan: bad access detected
[   15.031537] 
[   15.031607] Memory state around the buggy address:
[   15.031821]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032492]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.033120] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.033471]                                      ^
[   15.033876]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.034225]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.034521] ==================================================================
[   15.698908] ==================================================================
[   15.699465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.699883] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.700224] 
[   15.700321] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.700369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.700381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.700405] Call Trace:
[   15.700425]  <TASK>
[   15.700443]  dump_stack_lvl+0x73/0xb0
[   15.700474]  print_report+0xd1/0x610
[   15.700497]  ? __virt_addr_valid+0x1db/0x2d0
[   15.700521]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.700544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.700578]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.700601]  kasan_report+0x141/0x180
[   15.700624]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.700654]  kasan_check_range+0x10c/0x1c0
[   15.700679]  __kasan_check_write+0x18/0x20
[   15.700699]  kasan_atomics_helper+0x15b6/0x5450
[   15.700723]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.700747]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.700773]  ? kasan_atomics+0x152/0x310
[   15.700802]  kasan_atomics+0x1dc/0x310
[   15.700826]  ? __pfx_kasan_atomics+0x10/0x10
[   15.700852]  ? __pfx_read_tsc+0x10/0x10
[   15.700874]  ? ktime_get_ts64+0x86/0x230
[   15.700900]  kunit_try_run_case+0x1a5/0x480
[   15.700926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.700949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.700976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.701000]  ? __kthread_parkme+0x82/0x180
[   15.701021]  ? preempt_count_sub+0x50/0x80
[   15.701046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.701082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.701108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.701132]  kthread+0x337/0x6f0
[   15.701156]  ? trace_preempt_on+0x20/0xc0
[   15.701181]  ? __pfx_kthread+0x10/0x10
[   15.701220]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.701252]  ? calculate_sigpending+0x7b/0xa0
[   15.701278]  ? __pfx_kthread+0x10/0x10
[   15.701301]  ret_from_fork+0x116/0x1d0
[   15.701331]  ? __pfx_kthread+0x10/0x10
[   15.701354]  ret_from_fork_asm+0x1a/0x30
[   15.701387]  </TASK>
[   15.701397] 
[   15.709229] Allocated by task 282:
[   15.709416]  kasan_save_stack+0x45/0x70
[   15.709615]  kasan_save_track+0x18/0x40
[   15.709861]  kasan_save_alloc_info+0x3b/0x50
[   15.710048]  __kasan_kmalloc+0xb7/0xc0
[   15.710193]  __kmalloc_cache_noprof+0x189/0x420
[   15.710355]  kasan_atomics+0x95/0x310
[   15.710489]  kunit_try_run_case+0x1a5/0x480
[   15.710765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.711029]  kthread+0x337/0x6f0
[   15.711222]  ret_from_fork+0x116/0x1d0
[   15.711451]  ret_from_fork_asm+0x1a/0x30
[   15.711742] 
[   15.711841] The buggy address belongs to the object at ffff8881026ce080
[   15.711841]  which belongs to the cache kmalloc-64 of size 64
[   15.712471] The buggy address is located 0 bytes to the right of
[   15.712471]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.713022] 
[   15.713107] The buggy address belongs to the physical page:
[   15.713287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.713570] flags: 0x200000000000000(node=0|zone=2)
[   15.713823] page_type: f5(slab)
[   15.714021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.714403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.714748] page dumped because: kasan: bad access detected
[   15.714960] 
[   15.715078] Memory state around the buggy address:
[   15.715315]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.715622]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.715927] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.716246]                                      ^
[   15.716447]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.716823]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.717114] ==================================================================
[   15.274213] ==================================================================
[   15.274510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.274899] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.275143] 
[   15.275233] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.275278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.275289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.275313] Call Trace:
[   15.275332]  <TASK>
[   15.275349]  dump_stack_lvl+0x73/0xb0
[   15.275379]  print_report+0xd1/0x610
[   15.275402]  ? __virt_addr_valid+0x1db/0x2d0
[   15.275426]  ? kasan_atomics_helper+0xe78/0x5450
[   15.275448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.275472]  ? kasan_atomics_helper+0xe78/0x5450
[   15.275495]  kasan_report+0x141/0x180
[   15.275518]  ? kasan_atomics_helper+0xe78/0x5450
[   15.275545]  kasan_check_range+0x10c/0x1c0
[   15.275570]  __kasan_check_write+0x18/0x20
[   15.275590]  kasan_atomics_helper+0xe78/0x5450
[   15.275614]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.275637]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.275663]  ? kasan_atomics+0x152/0x310
[   15.275691]  kasan_atomics+0x1dc/0x310
[   15.275714]  ? __pfx_kasan_atomics+0x10/0x10
[   15.275739]  ? __pfx_read_tsc+0x10/0x10
[   15.275761]  ? ktime_get_ts64+0x86/0x230
[   15.275787]  kunit_try_run_case+0x1a5/0x480
[   15.275833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.275857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.275883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.275907]  ? __kthread_parkme+0x82/0x180
[   15.275929]  ? preempt_count_sub+0x50/0x80
[   15.275954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.275979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.276004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.276029]  kthread+0x337/0x6f0
[   15.276060]  ? trace_preempt_on+0x20/0xc0
[   15.276085]  ? __pfx_kthread+0x10/0x10
[   15.276106]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.276129]  ? calculate_sigpending+0x7b/0xa0
[   15.276154]  ? __pfx_kthread+0x10/0x10
[   15.276177]  ret_from_fork+0x116/0x1d0
[   15.276196]  ? __pfx_kthread+0x10/0x10
[   15.276217]  ret_from_fork_asm+0x1a/0x30
[   15.276251]  </TASK>
[   15.276262] 
[   15.283786] Allocated by task 282:
[   15.283920]  kasan_save_stack+0x45/0x70
[   15.284103]  kasan_save_track+0x18/0x40
[   15.284396]  kasan_save_alloc_info+0x3b/0x50
[   15.284615]  __kasan_kmalloc+0xb7/0xc0
[   15.284806]  __kmalloc_cache_noprof+0x189/0x420
[   15.285031]  kasan_atomics+0x95/0x310
[   15.285306]  kunit_try_run_case+0x1a5/0x480
[   15.285738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.286003]  kthread+0x337/0x6f0
[   15.286262]  ret_from_fork+0x116/0x1d0
[   15.286456]  ret_from_fork_asm+0x1a/0x30
[   15.286748] 
[   15.286824] The buggy address belongs to the object at ffff8881026ce080
[   15.286824]  which belongs to the cache kmalloc-64 of size 64
[   15.287266] The buggy address is located 0 bytes to the right of
[   15.287266]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.287914] 
[   15.288010] The buggy address belongs to the physical page:
[   15.288274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.288616] flags: 0x200000000000000(node=0|zone=2)
[   15.288861] page_type: f5(slab)
[   15.289079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.289400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.289724] page dumped because: kasan: bad access detected
[   15.289898] 
[   15.290008] Memory state around the buggy address:
[   15.290255]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.290498]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.291010] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.291329]                                      ^
[   15.291555]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.291849]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.292120] ==================================================================
[   16.172166] ==================================================================
[   16.172482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.172852] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   16.173157] 
[   16.173271] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.173315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.173328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.173351] Call Trace:
[   16.173369]  <TASK>
[   16.173387]  dump_stack_lvl+0x73/0xb0
[   16.173417]  print_report+0xd1/0x610
[   16.173441]  ? __virt_addr_valid+0x1db/0x2d0
[   16.173464]  ? kasan_atomics_helper+0x224c/0x5450
[   16.173486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.173511]  ? kasan_atomics_helper+0x224c/0x5450
[   16.173533]  kasan_report+0x141/0x180
[   16.173556]  ? kasan_atomics_helper+0x224c/0x5450
[   16.173607]  kasan_check_range+0x10c/0x1c0
[   16.173632]  __kasan_check_write+0x18/0x20
[   16.173653]  kasan_atomics_helper+0x224c/0x5450
[   16.173677]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.173701]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.173727]  ? kasan_atomics+0x152/0x310
[   16.173755]  kasan_atomics+0x1dc/0x310
[   16.173779]  ? __pfx_kasan_atomics+0x10/0x10
[   16.173804]  ? __pfx_read_tsc+0x10/0x10
[   16.173826]  ? ktime_get_ts64+0x86/0x230
[   16.173852]  kunit_try_run_case+0x1a5/0x480
[   16.173878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.173902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.173928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.173954]  ? __kthread_parkme+0x82/0x180
[   16.173975]  ? preempt_count_sub+0x50/0x80
[   16.174001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.174027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.174061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.174086]  kthread+0x337/0x6f0
[   16.174107]  ? trace_preempt_on+0x20/0xc0
[   16.174133]  ? __pfx_kthread+0x10/0x10
[   16.174154]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.174177]  ? calculate_sigpending+0x7b/0xa0
[   16.174208]  ? __pfx_kthread+0x10/0x10
[   16.174230]  ret_from_fork+0x116/0x1d0
[   16.174249]  ? __pfx_kthread+0x10/0x10
[   16.174270]  ret_from_fork_asm+0x1a/0x30
[   16.174305]  </TASK>
[   16.174317] 
[   16.181522] Allocated by task 282:
[   16.181685]  kasan_save_stack+0x45/0x70
[   16.181836]  kasan_save_track+0x18/0x40
[   16.182029]  kasan_save_alloc_info+0x3b/0x50
[   16.182257]  __kasan_kmalloc+0xb7/0xc0
[   16.182446]  __kmalloc_cache_noprof+0x189/0x420
[   16.182704]  kasan_atomics+0x95/0x310
[   16.182899]  kunit_try_run_case+0x1a5/0x480
[   16.183117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.183373]  kthread+0x337/0x6f0
[   16.183549]  ret_from_fork+0x116/0x1d0
[   16.183753]  ret_from_fork_asm+0x1a/0x30
[   16.183898] 
[   16.183975] The buggy address belongs to the object at ffff8881026ce080
[   16.183975]  which belongs to the cache kmalloc-64 of size 64
[   16.184540] The buggy address is located 0 bytes to the right of
[   16.184540]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   16.185068] 
[   16.185160] The buggy address belongs to the physical page:
[   16.185357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   16.185630] flags: 0x200000000000000(node=0|zone=2)
[   16.185801] page_type: f5(slab)
[   16.185947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.186306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.186670] page dumped because: kasan: bad access detected
[   16.186928] 
[   16.187009] Memory state around the buggy address:
[   16.187177]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.187399]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.187666] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.187920]                                      ^
[   16.188122]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.188422]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.188687] ==================================================================
[   15.763078] ==================================================================
[   15.763398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.763792] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.764084] 
[   15.764236] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.764287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.764300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.764325] Call Trace:
[   15.764346]  <TASK>
[   15.764369]  dump_stack_lvl+0x73/0xb0
[   15.764400]  print_report+0xd1/0x610
[   15.764424]  ? __virt_addr_valid+0x1db/0x2d0
[   15.764449]  ? kasan_atomics_helper+0x177f/0x5450
[   15.764470]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.764494]  ? kasan_atomics_helper+0x177f/0x5450
[   15.764517]  kasan_report+0x141/0x180
[   15.764556]  ? kasan_atomics_helper+0x177f/0x5450
[   15.764585]  kasan_check_range+0x10c/0x1c0
[   15.764620]  __kasan_check_write+0x18/0x20
[   15.764644]  kasan_atomics_helper+0x177f/0x5450
[   15.764670]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.764694]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.764732]  ? kasan_atomics+0x152/0x310
[   15.764760]  kasan_atomics+0x1dc/0x310
[   15.764797]  ? __pfx_kasan_atomics+0x10/0x10
[   15.764822]  ? __pfx_read_tsc+0x10/0x10
[   15.764843]  ? ktime_get_ts64+0x86/0x230
[   15.764871]  kunit_try_run_case+0x1a5/0x480
[   15.764898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.764931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.764959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.764984]  ? __kthread_parkme+0x82/0x180
[   15.765006]  ? preempt_count_sub+0x50/0x80
[   15.765033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.765072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.765107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.765133]  kthread+0x337/0x6f0
[   15.765164]  ? trace_preempt_on+0x20/0xc0
[   15.765190]  ? __pfx_kthread+0x10/0x10
[   15.765212]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.765236]  ? calculate_sigpending+0x7b/0xa0
[   15.765262]  ? __pfx_kthread+0x10/0x10
[   15.765284]  ret_from_fork+0x116/0x1d0
[   15.765304]  ? __pfx_kthread+0x10/0x10
[   15.765326]  ret_from_fork_asm+0x1a/0x30
[   15.765360]  </TASK>
[   15.765372] 
[   15.773424] Allocated by task 282:
[   15.773684]  kasan_save_stack+0x45/0x70
[   15.773856]  kasan_save_track+0x18/0x40
[   15.774046]  kasan_save_alloc_info+0x3b/0x50
[   15.774211]  __kasan_kmalloc+0xb7/0xc0
[   15.774348]  __kmalloc_cache_noprof+0x189/0x420
[   15.774585]  kasan_atomics+0x95/0x310
[   15.774820]  kunit_try_run_case+0x1a5/0x480
[   15.775104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.775363]  kthread+0x337/0x6f0
[   15.775509]  ret_from_fork+0x116/0x1d0
[   15.775783]  ret_from_fork_asm+0x1a/0x30
[   15.776073] 
[   15.776151] The buggy address belongs to the object at ffff8881026ce080
[   15.776151]  which belongs to the cache kmalloc-64 of size 64
[   15.776705] The buggy address is located 0 bytes to the right of
[   15.776705]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.777082] 
[   15.777158] The buggy address belongs to the physical page:
[   15.777727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.778080] flags: 0x200000000000000(node=0|zone=2)
[   15.778257] page_type: f5(slab)
[   15.778383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.778674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.779066] page dumped because: kasan: bad access detected
[   15.779399] 
[   15.779523] Memory state around the buggy address:
[   15.779967]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.780313]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.780577] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.780958]                                      ^
[   15.781209]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781471]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781867] ==================================================================
[   15.124993] ==================================================================
[   15.125524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.125953] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.126585] 
[   15.126769] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.126995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.127011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.127036] Call Trace:
[   15.127069]  <TASK>
[   15.127090]  dump_stack_lvl+0x73/0xb0
[   15.127124]  print_report+0xd1/0x610
[   15.127148]  ? __virt_addr_valid+0x1db/0x2d0
[   15.127173]  ? kasan_atomics_helper+0xac7/0x5450
[   15.127194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.127218]  ? kasan_atomics_helper+0xac7/0x5450
[   15.127241]  kasan_report+0x141/0x180
[   15.127264]  ? kasan_atomics_helper+0xac7/0x5450
[   15.127291]  kasan_check_range+0x10c/0x1c0
[   15.127316]  __kasan_check_write+0x18/0x20
[   15.127336]  kasan_atomics_helper+0xac7/0x5450
[   15.127359]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.127383]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.127409]  ? kasan_atomics+0x152/0x310
[   15.127437]  kasan_atomics+0x1dc/0x310
[   15.127461]  ? __pfx_kasan_atomics+0x10/0x10
[   15.127486]  ? __pfx_read_tsc+0x10/0x10
[   15.127508]  ? ktime_get_ts64+0x86/0x230
[   15.127534]  kunit_try_run_case+0x1a5/0x480
[   15.127561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.127584]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.127610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.127634]  ? __kthread_parkme+0x82/0x180
[   15.127656]  ? preempt_count_sub+0x50/0x80
[   15.127682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.127707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.127732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.127756]  kthread+0x337/0x6f0
[   15.127776]  ? trace_preempt_on+0x20/0xc0
[   15.127800]  ? __pfx_kthread+0x10/0x10
[   15.127837]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.127859]  ? calculate_sigpending+0x7b/0xa0
[   15.127884]  ? __pfx_kthread+0x10/0x10
[   15.127906]  ret_from_fork+0x116/0x1d0
[   15.127925]  ? __pfx_kthread+0x10/0x10
[   15.127946]  ret_from_fork_asm+0x1a/0x30
[   15.127980]  </TASK>
[   15.127991] 
[   15.140254] Allocated by task 282:
[   15.140619]  kasan_save_stack+0x45/0x70
[   15.140835]  kasan_save_track+0x18/0x40
[   15.140988]  kasan_save_alloc_info+0x3b/0x50
[   15.141150]  __kasan_kmalloc+0xb7/0xc0
[   15.141286]  __kmalloc_cache_noprof+0x189/0x420
[   15.141445]  kasan_atomics+0x95/0x310
[   15.141581]  kunit_try_run_case+0x1a5/0x480
[   15.141963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.142519]  kthread+0x337/0x6f0
[   15.142893]  ret_from_fork+0x116/0x1d0
[   15.143347]  ret_from_fork_asm+0x1a/0x30
[   15.143757] 
[   15.143916] The buggy address belongs to the object at ffff8881026ce080
[   15.143916]  which belongs to the cache kmalloc-64 of size 64
[   15.145093] The buggy address is located 0 bytes to the right of
[   15.145093]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.146481] 
[   15.146650] The buggy address belongs to the physical page:
[   15.147285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.147922] flags: 0x200000000000000(node=0|zone=2)
[   15.148103] page_type: f5(slab)
[   15.148230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.148465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.148992] page dumped because: kasan: bad access detected
[   15.149292] 
[   15.149379] Memory state around the buggy address:
[   15.149538]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.150009]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.150477] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.150792]                                      ^
[   15.151106]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.151446]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.151681] ==================================================================
[   15.862136] ==================================================================
[   15.862469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.862828] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.863282] 
[   15.863405] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.863463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.863476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.863512] Call Trace:
[   15.863532]  <TASK>
[   15.863554]  dump_stack_lvl+0x73/0xb0
[   15.863585]  print_report+0xd1/0x610
[   15.863622]  ? __virt_addr_valid+0x1db/0x2d0
[   15.863655]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.863677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.863701]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.863743]  kasan_report+0x141/0x180
[   15.863766]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.863795]  kasan_check_range+0x10c/0x1c0
[   15.863830]  __kasan_check_write+0x18/0x20
[   15.863850]  kasan_atomics_helper+0x1a7f/0x5450
[   15.863874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.863897]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.863924]  ? kasan_atomics+0x152/0x310
[   15.863952]  kasan_atomics+0x1dc/0x310
[   15.863976]  ? __pfx_kasan_atomics+0x10/0x10
[   15.864002]  ? __pfx_read_tsc+0x10/0x10
[   15.864025]  ? ktime_get_ts64+0x86/0x230
[   15.864070]  kunit_try_run_case+0x1a5/0x480
[   15.864097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.864120]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.864158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.864182]  ? __kthread_parkme+0x82/0x180
[   15.864204]  ? preempt_count_sub+0x50/0x80
[   15.864230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.864255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.864279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.864304]  kthread+0x337/0x6f0
[   15.864324]  ? trace_preempt_on+0x20/0xc0
[   15.864348]  ? __pfx_kthread+0x10/0x10
[   15.864369]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.864391]  ? calculate_sigpending+0x7b/0xa0
[   15.864417]  ? __pfx_kthread+0x10/0x10
[   15.864439]  ret_from_fork+0x116/0x1d0
[   15.864459]  ? __pfx_kthread+0x10/0x10
[   15.864479]  ret_from_fork_asm+0x1a/0x30
[   15.864524]  </TASK>
[   15.864534] 
[   15.872417] Allocated by task 282:
[   15.872608]  kasan_save_stack+0x45/0x70
[   15.872819]  kasan_save_track+0x18/0x40
[   15.873016]  kasan_save_alloc_info+0x3b/0x50
[   15.873234]  __kasan_kmalloc+0xb7/0xc0
[   15.873426]  __kmalloc_cache_noprof+0x189/0x420
[   15.873655]  kasan_atomics+0x95/0x310
[   15.873841]  kunit_try_run_case+0x1a5/0x480
[   15.874061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.874314]  kthread+0x337/0x6f0
[   15.874493]  ret_from_fork+0x116/0x1d0
[   15.874741]  ret_from_fork_asm+0x1a/0x30
[   15.874932] 
[   15.875032] The buggy address belongs to the object at ffff8881026ce080
[   15.875032]  which belongs to the cache kmalloc-64 of size 64
[   15.875547] The buggy address is located 0 bytes to the right of
[   15.875547]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.876079] 
[   15.876183] The buggy address belongs to the physical page:
[   15.876434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.876808] flags: 0x200000000000000(node=0|zone=2)
[   15.877068] page_type: f5(slab)
[   15.877204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.877445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.877678] page dumped because: kasan: bad access detected
[   15.877919] 
[   15.878014] Memory state around the buggy address:
[   15.878275]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.878601]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.878828] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.879046]                                      ^
[   15.879296]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.879647]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.879994] ==================================================================
[   15.840395] ==================================================================
[   15.840764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.841109] Write of size 8 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.841454] 
[   15.841610] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.841656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.841681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.841706] Call Trace:
[   15.841724]  <TASK>
[   15.841753]  dump_stack_lvl+0x73/0xb0
[   15.841783]  print_report+0xd1/0x610
[   15.841806]  ? __virt_addr_valid+0x1db/0x2d0
[   15.841830]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.841851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.841885]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.841909]  kasan_report+0x141/0x180
[   15.841931]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.841971]  kasan_check_range+0x10c/0x1c0
[   15.841996]  __kasan_check_write+0x18/0x20
[   15.842016]  kasan_atomics_helper+0x19e3/0x5450
[   15.842040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.842071]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.842107]  ? kasan_atomics+0x152/0x310
[   15.842136]  kasan_atomics+0x1dc/0x310
[   15.842170]  ? __pfx_kasan_atomics+0x10/0x10
[   15.842196]  ? __pfx_read_tsc+0x10/0x10
[   15.842222]  ? ktime_get_ts64+0x86/0x230
[   15.842248]  kunit_try_run_case+0x1a5/0x480
[   15.842283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.842308]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.842335]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.842370]  ? __kthread_parkme+0x82/0x180
[   15.842392]  ? preempt_count_sub+0x50/0x80
[   15.842419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.842452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.842477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.842512]  kthread+0x337/0x6f0
[   15.842532]  ? trace_preempt_on+0x20/0xc0
[   15.842558]  ? __pfx_kthread+0x10/0x10
[   15.842598]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.842621]  ? calculate_sigpending+0x7b/0xa0
[   15.842647]  ? __pfx_kthread+0x10/0x10
[   15.842670]  ret_from_fork+0x116/0x1d0
[   15.842689]  ? __pfx_kthread+0x10/0x10
[   15.842709]  ret_from_fork_asm+0x1a/0x30
[   15.842744]  </TASK>
[   15.842764] 
[   15.851798] Allocated by task 282:
[   15.852031]  kasan_save_stack+0x45/0x70
[   15.852242]  kasan_save_track+0x18/0x40
[   15.852431]  kasan_save_alloc_info+0x3b/0x50
[   15.852870]  __kasan_kmalloc+0xb7/0xc0
[   15.853294]  __kmalloc_cache_noprof+0x189/0x420
[   15.853707]  kasan_atomics+0x95/0x310
[   15.853896]  kunit_try_run_case+0x1a5/0x480
[   15.854110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.854354]  kthread+0x337/0x6f0
[   15.854513]  ret_from_fork+0x116/0x1d0
[   15.855103]  ret_from_fork_asm+0x1a/0x30
[   15.855360] 
[   15.855597] The buggy address belongs to the object at ffff8881026ce080
[   15.855597]  which belongs to the cache kmalloc-64 of size 64
[   15.856533] The buggy address is located 0 bytes to the right of
[   15.856533]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.857094] 
[   15.857176] The buggy address belongs to the physical page:
[   15.857460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.857822] flags: 0x200000000000000(node=0|zone=2)
[   15.858130] page_type: f5(slab)
[   15.858302] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.858641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.858927] page dumped because: kasan: bad access detected
[   15.859212] 
[   15.859312] Memory state around the buggy address:
[   15.859481]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.859874]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.860212] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.860467]                                      ^
[   15.860727]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.861042]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.861369] ==================================================================
[   15.035145] ==================================================================
[   15.035499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.035895] Write of size 4 at addr ffff8881026ce0b0 by task kunit_try_catch/282
[   15.036306] 
[   15.036449] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.036494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.036507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.036532] Call Trace:
[   15.036549]  <TASK>
[   15.036567]  dump_stack_lvl+0x73/0xb0
[   15.036598]  print_report+0xd1/0x610
[   15.036622]  ? __virt_addr_valid+0x1db/0x2d0
[   15.036645]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.036667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.036691]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.036713]  kasan_report+0x141/0x180
[   15.036736]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.036764]  kasan_check_range+0x10c/0x1c0
[   15.036789]  __kasan_check_write+0x18/0x20
[   15.036810]  kasan_atomics_helper+0x8f9/0x5450
[   15.036833]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.036857]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.036884]  ? kasan_atomics+0x152/0x310
[   15.036912]  kasan_atomics+0x1dc/0x310
[   15.036935]  ? __pfx_kasan_atomics+0x10/0x10
[   15.036961]  ? __pfx_read_tsc+0x10/0x10
[   15.036982]  ? ktime_get_ts64+0x86/0x230
[   15.037009]  kunit_try_run_case+0x1a5/0x480
[   15.037034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.037068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.037095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.037120]  ? __kthread_parkme+0x82/0x180
[   15.037142]  ? preempt_count_sub+0x50/0x80
[   15.037168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.037193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.037218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.037244]  kthread+0x337/0x6f0
[   15.037264]  ? trace_preempt_on+0x20/0xc0
[   15.037288]  ? __pfx_kthread+0x10/0x10
[   15.037310]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.037332]  ? calculate_sigpending+0x7b/0xa0
[   15.037358]  ? __pfx_kthread+0x10/0x10
[   15.037380]  ret_from_fork+0x116/0x1d0
[   15.037399]  ? __pfx_kthread+0x10/0x10
[   15.037422]  ret_from_fork_asm+0x1a/0x30
[   15.037457]  </TASK>
[   15.037468] 
[   15.046794] Allocated by task 282:
[   15.046935]  kasan_save_stack+0x45/0x70
[   15.047102]  kasan_save_track+0x18/0x40
[   15.047619]  kasan_save_alloc_info+0x3b/0x50
[   15.048856]  __kasan_kmalloc+0xb7/0xc0
[   15.049356]  __kmalloc_cache_noprof+0x189/0x420
[   15.050074]  kasan_atomics+0x95/0x310
[   15.050238]  kunit_try_run_case+0x1a5/0x480
[   15.050385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.050557]  kthread+0x337/0x6f0
[   15.051614]  ret_from_fork+0x116/0x1d0
[   15.052479]  ret_from_fork_asm+0x1a/0x30
[   15.053065] 
[   15.053400] The buggy address belongs to the object at ffff8881026ce080
[   15.053400]  which belongs to the cache kmalloc-64 of size 64
[   15.054439] The buggy address is located 0 bytes to the right of
[   15.054439]  allocated 48-byte region [ffff8881026ce080, ffff8881026ce0b0)
[   15.055882] 
[   15.056077] The buggy address belongs to the physical page:
[   15.056827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   15.057145] flags: 0x200000000000000(node=0|zone=2)
[   15.057319] page_type: f5(slab)
[   15.057447] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.057841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.058648] page dumped because: kasan: bad access detected
[   15.059300] 
[   15.059498] Memory state around the buggy address:
[   15.059994]  ffff8881026cdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060801]  ffff8881026ce000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.061630] >ffff8881026ce080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.062064]                                      ^
[   15.062258]  ffff8881026ce100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.062479]  ffff8881026ce180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.063000] ==================================================================